Fog computing extends the Cloud computing paradigm to the edge of the network, relying on computing services intelligently distributed to best meet the applications needs such as low communication latency, data cachin...
详细信息
Fog computing extends the Cloud computing paradigm to the edge of the network, relying on computing services intelligently distributed to best meet the applications needs such as low communication latency, data caching or confidentiality reinforcement. While P2P is especially prone to implement Fog computing platforms, it usually lacks important elements such as controlling where the data is stored and who will handle the computing tasks. In this paper we propose both a mapping approach for data-locality and a location-aware scheduling for P2P-based middlewares, improving the data management performance on fog environments. Experimental results comparing the data access performances demonstrate the interest of such techniques. (C) 2018 the Authors. Published by Elsevier Ltd.
Wireless Sensor Networks (WSNs) are collection of large number of sensor nodes that are used for essential monitoring purposes. they include many applications such as military and security applications, elementary mon...
详细信息
ISBN:
(纸本)9781509030385
Wireless Sensor Networks (WSNs) are collection of large number of sensor nodes that are used for essential monitoring purposes. they include many applications such as military and security applications, elementary monitoring, seismic monitoring, industrialized automation, wellness and robust monitoring etc. Due to its distributed nature and interconnected network approach, they are considered common target among attackers. WSNs are unprotected due to many attacks like illegal access, malicious node attack, wormhole attack, jamming attack, insider attack, cloning attack, routing attack and node capturing attack etc. Node capturing attack leads to node replication attack which is considered dangerous because after capturing node, attacker may extract all the encrypted information and further introduce many insider attacks. In node replication attack, attacker tries to capture the sensor node and if he becomes successful then he generates the replica which appears to be genuine. this paper reviews the various types of identification schemes and protocols contrary to replication attack.
this paper addresses the problem of continuously finding highly correlated pairs of time series over the most recent time window. the solution builds upon the ParCorr parallel method for online correlation discovery a...
详细信息
ISBN:
(纸本)9789897583773
this paper addresses the problem of continuously finding highly correlated pairs of time series over the most recent time window. the solution builds upon the ParCorr parallel method for online correlation discovery and is designed to run continuously on top of the UPM-CEP data streaming engine through efficient streaming operators. the implementation takes advantage of the flexible API of the streaming engine that provides low level primitives for developing custom operators. thus, each operator is implemented to process incoming tuples on-the-fly and hence emit resulting tuples as early as possible. this guarantees a real pipelined flow of data that allows for outputting early results, as the experimental evaluation shows.
Improved FCM algorithm based on genetic algorithm is used to extract user needs in mobile cloud computing. By using its characteristics of fast clustering, users can be divided into the same category with similar attr...
详细信息
ISBN:
(纸本)9781509050819
Improved FCM algorithm based on genetic algorithm is used to extract user needs in mobile cloud computing. By using its characteristics of fast clustering, users can be divided into the same category with similar attributes and behavior patterns, and then use the similarity recommendation algorithm, which makes the similar user requests can be quickly responded. this algorithm (GAFCM-CF) is proposed in this paper to solve the problem of mobile cloud user attribute collection and user request processing in small and medium network. At the same time, this paper compares the simulation experiment withthe traditional MIN-MIN scheduling algorithm, and verifies the effectiveness and efficiency of the algorithm.
the conventional unified parallel computation model becomes more and more complicated which has weak pertinence and little guidance for each parallelcomputing phase. therefore, a general layered and heterogeneous ide...
详细信息
ISBN:
(纸本)9780769548791
the conventional unified parallel computation model becomes more and more complicated which has weak pertinence and little guidance for each parallelcomputing phase. therefore, a general layered and heterogeneous idea for parallel computation model research was proposed in this paper. the general layered heterogeneous parallel computation model was composed of parallel algorithm design model, parallel programming model, parallel execution model, and each model correspond to the three computing phases respectively. the properties of each model were described and research spots were also given. In parallel algorithm design model, an advanced language was designed for algorithm designers, and the corresponding interpretation system which based on text scanning was proposed to map the advanced language to machine language that runs on the heterogeneous software and hardware architectures. the parallel method library and parameter library were also provided to achieve the comprehensive utilization of the different computing resources and assign parallel tasks reasonably. theoretical analysis results show that the general layered heterogeneous parallel computation model is clear and single goaled for each parallelcomputing phase.
this paper introduces the numerical parallel computation of geometrical ray-tracing. By analyzing the model of ray-tracing and using some parallel techniques, such as strategy of "Divide and Conquer" to desi...
详细信息
ISBN:
(纸本)0780378407
this paper introduces the numerical parallel computation of geometrical ray-tracing. By analyzing the model of ray-tracing and using some parallel techniques, such as strategy of "Divide and Conquer" to design a geometrical ray-tracing parallel program with MPI mode. the numerical simulation computation results of parallel program on PC-cluster platform and HPC (high performance computer) with DSM structure both show a great increase of computing speed and speedup ratio, the algorithm is proved efficient.
In this paper, scalable solver for time domain electromagnetic simulations will be stdudied. this solver is developed with discontinuous Galerkin (DG) method on unstructured mesh. High-order nodal basis, employing mul...
详细信息
ISBN:
(纸本)9780769548791
In this paper, scalable solver for time domain electromagnetic simulations will be stdudied. this solver is developed with discontinuous Galerkin (DG) method on unstructured mesh. High-order nodal basis, employing multivariate Lagrange polynomials defined on the triangles has been used to expand the electromagnetic fields. Both periodic and perfect electric conduct (PEC) conditions have been implemented. Domain decomposition has been used for the parallelization, and good scalability has been achieved due to the DG algorithm. Benchmarks for this solver on different supercomputers will be shown. At last, large simulations with 1024 processors will be shown.
Chord is a classical peer-to-peer document routing model. In this paper, we firstly present an improved Chord model, in which the nodes are organized into groups, to enhance the lookup efficiency and decrease the impa...
详细信息
ISBN:
(纸本)0769524052
Chord is a classical peer-to-peer document routing model. In this paper, we firstly present an improved Chord model, in which the nodes are organized into groups, to enhance the lookup efficiency and decrease the impact of dynamic environment. In addition, we propose a file storage strategy in the improved Chord model. Withthe strategy, shared file can be transmitted from multiple nodes simultaneously that could speed up the download, and at the same time the strategy can guarantee data security by means of introduction of a special metadata file.
A class of simple network topologies is proposed and analyzed in this paper as part of the research on a polymorphous array architecture for graphics and image processing. the topologies are extended from the mesh net...
详细信息
ISBN:
(纸本)9780769548791
A class of simple network topologies is proposed and analyzed in this paper as part of the research on a polymorphous array architecture for graphics and image processing. the topologies are extended from the mesh network topology and are amenable to VLSI implementation. Simulation and theoretical analyses show that these topologies have many advantages over the mesh and Xmesh topologies. Routing algorithms are also proposed and analyzed for these new network topologies.
the AS4DR (Adaptive Scheduling for distributed Resources) scheduling method experimented in this paper aims at maximizing the CPU use efficiency when executing divisible load applications on heterogeneous distributed ...
详细信息
ISBN:
(纸本)9780769548791
the AS4DR (Adaptive Scheduling for distributed Resources) scheduling method experimented in this paper aims at maximizing the CPU use efficiency when executing divisible load applications on heterogeneous distributed memory platforms. AS4DR adapts the scheduling to: the unawareness of the total workload, boththe unspecification and the variation over time of the execution parameters (available communication speed, available computing speed, etc.). this paper presents the first experimental assessments of the adaptivity of the scheduling withthis method.
暂无评论