Private BitTorrent community (PT), as known as "BitTorrent Darknet", has become a popular research spot in recent years. PTs can provide ultra-high download performance which is much better than public BitTo...
详细信息
Private BitTorrent community (PT), as known as "BitTorrent Darknet", has become a popular research spot in recent years. PTs can provide ultra-high download performance which is much better than public BitTorrent communities. the Sharing Ratio Enhancement (SRE) mechanism is the key to PTs' success. However, it also brings negative side effects to the registered users in PTs. In this paper, we crawl and analyze all of user profiles from three influential PTs which provide very detailed information. We show that the sharing ratio of members cannot represent their upload contribution in terms of upload time and amount. Members are forced to seed for a long time to maintain adequate sharing ratios to survive in the community. SRE mechanism's nature drawbacks induce inequity. Based on these measurements, we propose a unified two-track payment system to pay peers based on their contribution, which is an alternative mechanism to SRE. We consider the payment with inflation and transit process. Our systems can provide a fair and consistent environment, which is helpful to unify and to build sustainable development of private BitTorrent communities.
Increasingly embedded devices are turning to two technologies to achieve high performance and enable efficient programmability as well as product usability. the first is multi-core processing on FPGA devices in which ...
详细信息
Increasingly embedded devices are turning to two technologies to achieve high performance and enable efficient programmability as well as product usability. the first is multi-core processing on FPGA devices in which the multi-core architecture allows software to map application-level parallelism to inherent parallel fabric to offer better performance, the re-configurability leads to flexible and adaptive designs. the second is wireless communications that allow sensors to be distributed flexibly across a structure for example in the case of a body area network. this paper describes the ongoing design of a multi RF channel, multi-core embedded design which will be used as a generic FPGA solution to meet the requirements of both e-healthapplications as well as robotics applications.
Recently, distributed online social networks (OSNs) are developed to address the security and privacy issues in centralized OSNs. Identity based cryptography (IBC) was introduced into distributed OSNs recently for bet...
详细信息
Recently, distributed online social networks (OSNs) are developed to address the security and privacy issues in centralized OSNs. Identity based cryptography (IBC) was introduced into distributed OSNs recently for better identity verification and authentication purposes. However, current IBC-based solutions in OSNs could not address the problem of secure private key issuing. In this paper we propose PEKING: a novel Pivacy Enhanced Key IssuiNG scheme for distributed online social networks using IBC. Our scheme adopts key generate center (KGC) and key privacy assistants (PAs) to issue keys to peers securely. In the scheme, PAs can be selected from users' friends. Neither KGC nor PAs can impersonate the users to obtain the private keys. Furthermore, to maintain the security of PAs, we develop a scheme to authenticate PAs using Byzantine fault tolerance protocol. the experimental results show that PEKING performs effectively and efficiently, and is able to support large scale networks.
作者:
Park, James J.Zomaya, AlbertYeo, Sang-SooSahni, SartajSeoulTech
Department of Computer Science and Engineering 172 Gongreung 2-dong Nowon-gu Seoul 139-743 Korea Republic of University of Sydney
School of Information Technologies Building J12 Sydney NSW 2006 Australia Mokwon University
Division of Computer Engineering 88 Do-An-Buk-Ro Seo-gu Daejeon 302-729 Korea Republic of University of Florida
Computer and Information Science and Engineering Department CSE 301 Gainesville FL 32611 United States
Every day, we create 2.5 quintillion bytes of data - so much that 90% of the data in the world today has been created in the last two years alone. this data comes from everywhere: sensors used to gather climate inform...
详细信息
Every day, we create 2.5 quintillion bytes of data - so much that 90% of the data in the world today has been created in the last two years alone. this data comes from everywhere: sensors used to gather climate information, posts to social media sites, digital pictures and videos, purchase transaction records, and cell phone GPS signals to name a few. the IDC sizing of the digital universe - information that is either created or captured in digital form and then replicated in 2006 - is 161 Exabyte, growing to 988 Exabyte in 2010, representing a compound annual growth rate (CAGR) of 57%. A variety of system architectures have been implemented for data-intensive computing and large-scale data analysis applications including parallel and distributed relational database management systems which have been available to run on shared nothing clusters of processing nodes for more than two decades. However most data growth is with data in unstructured form and new processing paradigms with more flexible data models were needed. Several solutions have emerged including the MapReduce architecture pioneered by Google and now available in an open-source implementation called Hadoop used by Yahoo, Facebook, and others. 20% of the world's servers go into huge data centers by the “Big 5” - Google, Microsoft, Yahoo, Amazon, eBay [1].
the sizes of databases have seen exponential growth in the past, and such growth is expected to accelerate in the future, withthe steady drop in storage cost accompanied by a rapid increase in storage capacity. Many ...
详细信息
the sizes of databases have seen exponential growth in the past, and such growth is expected to accelerate in the future, withthe steady drop in storage cost accompanied by a rapid increase in storage capacity. Many years ago, a terabyte database was considered to be large, but nowadays they are sometimes regarded as small, and the daily volumes of data being added to some databases are measured in terabytes. In the future, petabyte and exabyte databases will be common. With such volumes of data, it is evident that the sequential processing paradigm will be unable to cope, for example, even assuming a data rate of 1 terabyte per second, reading through a petabyte database will take over 10 days. To effectively manage such volumes of data, it is necessary to allocate multiple resources to it, very often massively so. the processing of databases of such astronomical proportions requires an understanding of how high-performance systems and parallelism work. Besides the massive volume of data in the database to be processed, some data has been distributed across the globe in a Grid environment. these massive data centres are also a part of the emergence of Cloud computing, where data access has shifted from local machines to powerful servers hosting web applications and services, making data access across the Internet using standard web browsers pervasive. this adds another dimension to such systems. this talk, based on our recent published book [1], discusses fundamental understanding of parallelism in data-intensive applications, and demonstrates how to develop faster capabilities to support them. this includes the importance of indexing in parallel systems [2-4], specialized algorithms to support various query processing [5-9], as well as objectoriented scheme [10-12]. parallelism in databases has been around since the early 1980s, when many researchers in this area aspired to build large special-purpose database machines -- databases employing dedicated specialized
this paper discusses a parallel immune algorithm (IA) for detection of lung cancer in chest X-ray images based on object shared space. the template matching method is combined to the algorithm and JavaSpaces is used a...
详细信息
Cloud computing provides an efficient way to expose computing capabilities as sophisticated services that can be accessed remotely. It eliminates the need for organizations to maintain extensive infrastructures. Paral...
详细信息
In this paper, we study CPU utilization time patterns of several MapReduce applications. After extracting running patterns of several applications, they are saved in a reference database to be later used to tweak syst...
详细信息
Using effective scheduling strategies to improve turnaround time, slowdown, and utilization is an important consideration in large supercomputing environments. Since such machines have traditionally used non-preemptio...
详细信息
暂无评论