the proceedings contain 142 papers. the topics discussed include: distributed caching strategies in peer-to-peer systems;a power-aware based storage architecture for high performance computing;a distributed reconfigur...
ISBN:
(纸本)9780769545387
the proceedings contain 142 papers. the topics discussed include: distributed caching strategies in peer-to-peer systems;a power-aware based storage architecture for high performance computing;a distributed reconfigurable active SSD platform for data intensive applications;a parallel processing scheme for large-size sliding-window applications;algebraic models for the cube connected cycles and shuffle exchange graphs;a high-performance and energy-efficient virtually tagged stack cache architecture for multi-core environments;providing quality of science in volunteer computing;an effective dynamic scheduling runtime and tuning system for heterogeneous multi and many-core desktop platforms;on the social aspects of personalized ranking for web services;stable adaptive work-stealing for concurrent multi-core runtime systems;rule pattern parallelization of packet filters on multi-core environments;and memory-intensive applications on a many-core processor.
the proceedings contain 7 papers. the topics discussed include: memetic algorithm for web service selection;model-driven performance engineering for wireless sensor networks with feature modeling and event calculus;de...
ISBN:
(纸本)9781450307338
the proceedings contain 7 papers. the topics discussed include: memetic algorithm for web service selection;model-driven performance engineering for wireless sensor networks with feature modeling and event calculus;description and composition of bio-inspired design patterns: the gradient case;methods for self-organizing distributed software;protein structure prediction using particle swarm optimization and a distributedparallel approach;discrete optimization problem solving withthree variants of hybrid binary particle swarm optimization;and self-organized invasive parallel optimization.
Cloud computing grows rapidly as today's advanced information technology. However, by allowing outsourcing computation on the Cloud, users risk of disclosing privacy and obtaining forged results. these potential t...
详细信息
ISBN:
(纸本)9780769546001
Cloud computing grows rapidly as today's advanced information technology. However, by allowing outsourcing computation on the Cloud, users risk of disclosing privacy and obtaining forged results. these potential threats block sensitive applications to join the Cloud. In this paper, we characterize sensitive applications on the Cloud (SAND) problem and define two critical security requirements: confidentiality and verifiability. the former refers to the protection of sensitive programs/data from disclosing to other users or even the Cloud administrators. the latter concerns with user's capability to verify whether computing results are faithfully calculated. To address SAND, we propose a new Cloud model, Trusted Block as a Service (TBaaS), to provide a confidential and verifiable environment for each sensitive application. TBaaS limits Cloud provider's access of sensitive applications while granting user the ability to verify whether the computation is faithfully carried out. Moreover, it offers high flexibility and low performance overhead.
A new secret-sharing-based e-auction scheme is proposed. distributed bid opening is employed to protect bid privacy. It can achieve all the desired properties for sealed-bid auctions at a reasonable cost. Moreover, at...
详细信息
distributed file-systems are a popular storage abstraction for cloud-computingapplications. they provide generic data access for different applications in order to pass information between computing nodes and to save...
详细信息
the oil and gas industries have been great consumers of parallel and distributedcomputing systems, by frequently running technical applications with intensive processing of terabytes of data. By the emergence of clou...
详细信息
the proceedings contain 40 papers. the topics discussed include: efficient stack distance computation for priority replacement policies;elastic pipeline: addressing GPU on-chip shared memory bank conflicts;pruning har...
ISBN:
(纸本)9781450306980
the proceedings contain 40 papers. the topics discussed include: efficient stack distance computation for priority replacement policies;elastic pipeline: addressing GPU on-chip shared memory bank conflicts;pruning hardware evaluation space via correlation-driven application similarity analysis;scaling scientific applications on clusters of hybrid multicore/GPU nodes;performance optimization by dynamic code transformation;increasing power/performance resource efficiency on virtualized enterprise servers;a reconfigurable cache architecture for energy efficiency;hybrid high-performance low-power and ultra-low energy reliable caches;dynamic co-management of persistent ram main memory and storage resources;cluster-based topologies for 3D stacked architectures;universal optical multi-drop bus for heterogeneous memory architecture;CNC-hadoop: a graphical coordination language for distributed multiscale parallelism;and a parallel programming framework orchestrating multiple languages and architectures.
Many of today's large-scale software projects in the area of distributed systems and especially enterprise IT adopt service-oriented software architecture and technologies. For these projects, availability of soun...
详细信息
ISBN:
(纸本)9783642193934
Many of today's large-scale software projects in the area of distributed systems and especially enterprise IT adopt service-oriented software architecture and technologies. For these projects, availability of sound software engineering principles, methodology and tool support is of utmost importance. However, traditional software engineering approaches are not fully appropriate for the development of service-oriented applications. the limitations of traditional methods in the context of service-oriented computing have led to the emergence of Software Service Engineering (SSE) as a specialist discipline, but research in this area is still immature and many open issues remain. the WESOA workshop series brings together research community and industry practitioners in order to develop comprehensive engineering principles, methodologies and tool support for the entire software development lifecycle (SDLC) of service-oriented applications.
the two most recent PVSS (publicly verifiable secret sharing) schemes are illustrated to be vulnerable to a simple attack. Moreover, one of them has to deteriorate its efficiency greatly to meet practical security req...
详细信息
Withthe rapid growth of network technologies, many new web services have been developed to provide various applications and computing functions. these services rely deeply on the internet. therefore, packet classific...
详细信息
ISBN:
(纸本)9780769546001
Withthe rapid growth of network technologies, many new web services have been developed to provide various applications and computing functions. these services rely deeply on the internet. therefore, packet classification is an important issue of network security that typically adopts a flexible packet filtering system to classify each processed packet. Traditional packet classification requires hung computing time to process large amount of internet packets. Hence, we propose a GPGPU-based parallel packet classification method to decrease the computational cost. We also evaluate the performance of the proposed method with implementation on various memory architectures of CUDA device. the experiment results demonstrate that the proposed method can achieve significant speed up over the sequential packet classification algorithms on single CPU.
暂无评论