With recent advancement in mobile communication, there has been a rise in the number of applications for mobile and its users are also continuously growing throughout the universe. Most of the applications developed, ...
详细信息
Scene text detection is an important task in computer vision. Many previous work require multi-step processing and are not robust against challenges, such as small-scales and blurring. In this paper, we propose a Mult...
详细信息
Traditional Virtual Machine Monitor (VMM) virtualizes some devices and instructions, which induces performance overhead to guest operating systems. Furthermore, the virtualization contributes a large amount of codes t...
详细信息
ISBN:
(纸本)9781450312660
Traditional Virtual Machine Monitor (VMM) virtualizes some devices and instructions, which induces performance overhead to guest operating systems. Furthermore, the virtualization contributes a large amount of codes to VMM, which makes a VMM prone to bugs and vulnerabilities. On the other hand, in cloud computing, cloud service provider configures virtual machines based on requirements which are specified by customers in advance. As resources in a multi-core server increase to more than adequate in the future, virtualization is not necessary although it provides convenience for cloud computing. Based on the above observations, this paper presents an alternative way for constructing a VMM: configuring a booting interface instead of virtualization technology. A lightweight virtual machine monitor - OSV is proposed based on this idea. OSV can host multiple full functional Linux kernels with little performance overhead. there are only 6 hyper-calls in OSV. the Linux running on top of OSV is intercepted only for the inter-processor interrupts. the resource isolation is implemented with hardware-assist virtualization. the resource sharing is controlled by distributed protocols embedded in current operating systems. We implement a prototype of OSV on AMD Opteron processor based 32-core servers with SVM and cache-coherent NUMA architectures. OSV can host up to 8 Linux kernels on the server with less than 10 lines of code modifications to Linux kernel. OSV has about 8000 lines of code which can be easily tuned and debugged. the experiment results show that OSV VMM has 23.7% performance improvement compared with Xen VMM.
Wireless community networks are wireless mesh networks created and managed by a local community with mainly two main goals: sharing internet connection and supporting local services. they are an emerging trend in Euro...
详细信息
Wireless community networks are wireless mesh networks created and managed by a local community with mainly two main goals: sharing internet connection and supporting local services. they are an emerging trend in Europe and have received the attention of many researchers, since they are large accessible deployments of distributed wireless networks. this paper illustrates the features of the Rome-based Ninux community network, the largest in Italy, and studies some interesting features it offers related to routing metrics and centrality metrics.
distributed Denial of Service (DDoS) attack poses a severe threat to the internet. It is difficult to find the exact signature of attacking. Moreover, it is hard to distinguish the difference of an unusual high volume...
详细信息
the increasing use of wireless internet and smartphone has accelerated the need for widespread computing. Smartphones stimulate growth of Global Position Systems (GPS) and mobile cloud computing. Mobile cloud computin...
详细信息
Aiming at the problem of access control in distributedcomputing security model, a secure Seal calculus based on hybrid type detection is proposed. In order to realize the security policy that low security level infor...
详细信息
this book constitutes the refereed proceedings of the 9thinternationalconference on Wireless Algorithms, Systems and Applications, WASA 2014, held in Harbin, China, in June 2014. the 41 revised full papers presented...
详细信息
ISBN:
(数字)9783319077826
ISBN:
(纸本)9783319077819
this book constitutes the refereed proceedings of the 9thinternationalconference on Wireless Algorithms, Systems and Applications, WASA 2014, held in Harbin, China, in June 2014. the 41 revised full papers presented together with 30 invited papers were carefully reviewed and selected from 134 submissions. the papers cover a wide range of topics including cognitive radio networks, wireless sensor networks, cyber-physical systems, distributed and localized algorithm design and analysis, information and coding theory for wireless networks, localization, mobile cloud computing, topology control and coverage, security and privacy, underwater and underground networks, vehicular networks, information processing and data management, programmable service interfaces, energy-efficient algorithms, system and protocol design, operating system and middle-ware support and experimental test-beds and models.
In scenarios like the surveillance of isolated areas, when the border node of a network does not have a permanent connection withthe internet, Wireless Sensor Networks (WSNs) are calling for resilient in-network data...
详细信息
ISBN:
(纸本)9781467324793
In scenarios like the surveillance of isolated areas, when the border node of a network does not have a permanent connection withthe internet, Wireless Sensor Networks (WSNs) are calling for resilient in-network data storage techniques which minimize the risk of data loss. the efficiency of these techniques can be largely improved exploiting information on the status of the network, such as that used by routing protocols. In particular, one of the most used protocol in internet of things (IoT) scenarios is the IPv6 Routing Protocol for Low power and lossy networks (RPL). In this paper, we propose a redundant distributed data storage and retrieval mechanism to increase the resilience and storage capacity of a RPL-based WSN against local memory shortage. We evaluate our approach in the Contiki operating system through extensive analysis withthe Cooja simulator.
暂无评论