Rapid growth of large-scale applications and their widespread use in research and industry has led to dramatic increases in energy consumption in enterprise data centers and large-scale distributed systems such as Gri...
详细信息
ISBN:
(纸本)9783642207549
Rapid growth of large-scale applications and their widespread use in research and industry has led to dramatic increases in energy consumption in enterprise data centers and large-scale distributed systems such as Grids. Any attempt at reducing the energy consumption without concern for performance can be destructive and deteriorate the overall efficiency of data centers and large-scale distributed systems running such applications. In this paper, we present an optimization model for resource management in virtualized distributed systems to minimize power costs automatically while satisfying performance constraints. the objective of our model is to keep the utilization of servers near to an optimum point to prevent performance degradation. the model includes two objective functions, one for power costs and another for performance. Using the objective functions, we present a scheduling algorithm to place a set of virtual machines on a set of servers dynamically so that to integrate power management with performance management. We show experimentally that the proposed scheduler consumes approximately 24% less energy than static power management techniques while maintaining comparable performance.
the emergence of cloud technology has raised a renewed emphasis on the issue of scalable on-demand computing. Cloud back-end support of small devices such as sensors and mobile phones is one important application. We ...
详细信息
We introduce a concept that allows attendees of a party to collaboratively influence the music selection process. As explicit feedback is likely to disturb the atmosphere, we introduce an unobtrusive, implicit feedbac...
详细信息
ISBN:
(纸本)9780769544380
We introduce a concept that allows attendees of a party to collaboratively influence the music selection process. As explicit feedback is likely to disturb the atmosphere, we introduce an unobtrusive, implicit feedback mechanism. In particular, we propose to sense the partygoers' dance engagement by means of their mobile phones. Since people tend to dance more when they enjoy the music, this metric provides a measure of the crowd's satisfaction. We verify experimentally that music can be selected such that the generated song sequence matches the taste of the crowd, and we demonstrate the feasibility of inferring an individual's dance engagement using the mobile phone's accelerometer. Our experiments show that the proposed method is robust to the body location at which the phone is worn and reaches an overall accuracy of 86.8% for distinguishing dancers from non-dancers.
the proceedings contain 40 papers. the topics discussed include: a classified cluster based architecture for resource discovery in P2P networks using collaborative agents;the probabilistic double token ring;an efficie...
ISBN:
(纸本)9780889868205
the proceedings contain 40 papers. the topics discussed include: a classified cluster based architecture for resource discovery in P2P networks using collaborative agents;the probabilistic double token ring;an efficient inter-domain routing in wireless mesh networks;a reliable transmission protocol for sensors in poorly connected areas over mobile networks;grid scheduling divisible load with load adaptive computing power;an energy efficient SMT processor with heterogeneous instruction set architectures;a proactive fault tolerance framework for high-performance computing;coverage overlay backfilling: efficient job allocation scheduling scheme for large-scale mesh-connected supercomputers;development of a network on chip for parallel processing systems;a low-power fault-tolerant NOC using error correction and detection codes;link state aware routing for multiple mobile robots in wireless sensor network;and channel assignment protocol with weaker restrictions in wireless multihop networks.
distributed file-systems are a popular storage abstraction for cloud-computingapplications. they provide generic data access for different applications in order to pass information between computing nodes and to save...
详细信息
distributed file-systems are a popular storage abstraction for cloud-computingapplications. they provide generic data access for different applications in order to pass information between computing nodes and to save computation results persistently. the performance of distributedapplications depends on data-consistency protocols and meta-data management, but these factors of influence are often statically configured in distributed file-systems. In this paper, we describe EFS, an in-memory file-system that manages meta-data and consistency by flexibly adapting to file-access patterns.
A new secret-sharing-based e-auction scheme is proposed. distributed bid opening is employed to protect bid privacy. It can achieve all the desired properties for sealed-bid auctions at a reasonable cost. Moreover, at...
详细信息
A new secret-sharing-based e-auction scheme is proposed. distributed bid opening is employed to protect bid privacy. It can achieve all the desired properties for sealed-bid auctions at a reasonable cost. Moreover, attacks existing in the current secret-sharing-based sealed-bid e-auction schemes are prevented in the new scheme. In addition, it does not need any trust assumption.
As the popularity and capabilities of mobile devices increases, there are many more opportunities arising for innovative applications on the mobile platform. Over recent years a trend has emerged withthe majority of ...
详细信息
the two most recent PVSS (publicly verifiable secret sharing) schemes are illustrated to be vulnerable to a simple attack. Moreover, one of them has to deteriorate its efficiency greatly to meet practical security req...
详细信息
the two most recent PVSS (publicly verifiable secret sharing) schemes are illustrated to be vulnerable to a simple attack. Moreover, one of them has to deteriorate its efficiency greatly to meet practical security requirement. the attack makes the share holders to receive incorrect shares, which will lead secret reconstruction to mistake. the efficiency deterioration is so serious that no practical application can tolerate it. So the two most recent PVSS schemes actually cannot work reliably and efficiently as they claim.
the oil and gas industries have been great consumers of parallel and distributedcomputing systems, by frequently running technical applications with intensive processing of terabytes of data. By the emergence of clou...
详细信息
the oil and gas industries have been great consumers of parallel and distributedcomputing systems, by frequently running technical applications with intensive processing of terabytes of data. By the emergence of cloud computing which gives the opportunity to hire high-throughput computing resources with lower operational costs, such industries have started to adopt their technical applications to be executed on such high-performance commodity systems. In this paper, we first give an overview of forward/inverse Prestack Kirchhoff Time Migration (PKTM) algorithm, as one of the well-known seismic imaging algorithms. then we will explain our proposed approach to fit this algorithm for running on Google's MapReduce framework. Toward the end, we will analyse the relation between MapReduce-based PKTM completion time and the number of mappers/reducers on pseudo-distributed MapReduce mode.
Dynamic load balancing (DLB) is a method for balancing the server load, and as an offset, the network traffic, in distributed systems. the DLB method is based on Network Transferable Computer (NTC) and Mobile IP, and ...
详细信息
暂无评论