A hybrid P2P system, such as Napster, has a central directory where the peers publish information about the content they offer for sharing. We study the incentives for self-interested node9;s participating in such ...
详细信息
ISBN:
(纸本)0769524052
A hybrid P2P system, such as Napster, has a central directory where the peers publish information about the content they offer for sharing. We study the incentives for self-interested node's participating in such P2P system with centralized directory, by developing the new cost model of P2P network In our model, a node will participate the system if and only if it can get more than it gives. We discover several interesting conclusions on the character of the participating. there is probably a threshold value in such P2P systems, that is, the system is unstable when the number of its nodes is less than the threshold and the system is,table and self-developing when its size exceeding the thresh-old.
On wireless Grids Information Services have special requirements. Resource information has to be updated when users and resource providers arrive and depart frequently. Meanwhile, Information Services may be also mobi...
详细信息
ISBN:
(纸本)0769524052
On wireless Grids Information Services have special requirements. Resource information has to be updated when users and resource providers arrive and depart frequently. Meanwhile, Information Services may be also mobile, so the clients and information sources should dynamically detect the existence and departure of Information Services. We present WGMDS, a WSRF-compliant and P2P (peer to peer) based Information Service to meet the special requirements on wireless Grids. We employ P2P mechanism to integrate Information Services to provide Grid-wide resource information. In WGMDS, the clients and information sources dynamically probe nearest Information Services to query or register resource information. three algorithms are proposed to support the Information Service architecture. We use simulations in NS2 to evaluate the three algorithms.
For simultaneous multithreaded (SMT) processors, a large rename register file (RRF) is indispensable for holding intermediate results of in-flight instructions from multiple threads. Meanwhile, inter-thread interferen...
详细信息
ISBN:
(纸本)0769524052
For simultaneous multithreaded (SMT) processors, a large rename register file (RRF) is indispensable for holding intermediate results of in-flight instructions from multiple threads. Meanwhile, inter-thread interferences lower the efficiency of RRF badly, exacerbating the pressure on RRF design. We propose thread-Sensitive Register Renaming (TSRR), which tracks the performance variations and dynamically tunes the amount of rename registers available to each thread. In contrast to the traditional fully-shared RRF this partly-shared scheme of TSRR guarantees (1) each thread has opportunities to fully exhibit its performance potential, (2) each thread can occupy just a reasonable number of rename registers, eliminating harmful inter-thread conflicts, and (3) the poorest-performance thread neither hinder other threads nor starve itself.
With service-oriented architecture entering into the mainstream and the fundamental role security service played in Grid computing, it is necessary and commonplace to integrate security service(s) with other Grid serv...
详细信息
ISBN:
(纸本)0769524052
With service-oriented architecture entering into the mainstream and the fundamental role security service played in Grid computing, it is necessary and commonplace to integrate security service(s) with other Grid services. However, current ad-hoc, handcrafted and proprietary integrating manners greatly hinder the the newly-integrated service's QoS (Quality of Service) and QoP (Quality of Protection). Efficient and effective security-service integration entails a higher-level abstraction of specific integration scenarios. that's where this paper takes root. In this paper, we borrow some idea from software engineering and propose several integration patterns of Grid security service. According to the number of the to-be-integrated non-security service(s), we classify all the patterns into 2 kinds: bilateral patterns and multilateral patterns, and propose 6 patterns (binding, on-demand, tailor, composite, contract and migration) and 4 patterns (separated, shared, mediated and enhanced) respectively. For each pattern, we discuss its intent, applicability, participants and consequences.
Software Architecture (SA) is emerging as an important research area in software engineering and forms the backbone for building successful software-intensive systems. Based on practical requirements, especially the r...
详细信息
In this paper, we present our efforts to parallelize an unstructured quadrilateral mesh generator. Its serial version is based on the divider-and-conquer idea, and mainly includes two stages, i.e. geometry decompositi...
详细信息
ISBN:
(纸本)0769524052
In this paper, we present our efforts to parallelize an unstructured quadrilateral mesh generator. Its serial version is based on the divider-and-conquer idea, and mainly includes two stages, i.e. geometry decomposition and mesh generation. Both stages are parallelized separately. A highly efficient fine-grain level parallel scheme is presented to parallelize the stage of geometry decomposition. A SubDomain Graph (SDG), which represents the connections of subdomains, is constructed the task of parallel mesh generation is then reduced to that of the SDG partitioning. Since the number of elements in subdomains could be pre-computed before meshing, a static load balancing scheme to partition the SDG performs well withthe aid of Metis tools. Numerical results show that scalable timing performance could be achieved by using the parallel mesh generator with resulting meshes nicely partitioned among processors, which enables a fast parallel simulation environment by eliminating the traditional 110-busy process of mesh repartitioning.
the paper is dedicated to an open T-system (OpenTS) - a programming system that supports automatic parallelization of computations for high-performance and distributedapplications. In this paper, we describe the syst...
详细信息
ISBN:
(纸本)3540281266
the paper is dedicated to an open T-system (OpenTS) - a programming system that supports automatic parallelization of computations for high-performance and distributedapplications. In this paper, we describe the system architecture and input programming language as well as system's distinctive features. the paper focuses on the achievements of the last two years of development, including support of distributed, meta-cluster computations.
We present an efficient and incremental (un)marshaling framework designed for distributedapplications. A marshaler/ unmarshaler pair converts arbitrary structured data between its host and network representations. th...
详细信息
We present an efficient and incremental (un)marshaling framework designed for distributedapplications. A marshaler/ unmarshaler pair converts arbitrary structured data between its host and network representations. this technology can also be used for persistent storage. Our framework simplifies the design of efficient and flexible marshalers. the network latency is reduced by concurrent execution of (un)marshaling and network operations. the framework is actually used in Mozart, a distributed programming system that implements Oz, a multi-paradigm concurrent language. (c) 2004 Elsevier B.V. All rights reserved.
A multiple image hiding method for one secret image is proposed in this paper First, different bit planes of a secret image are hided into different bit planes of those different open images by the technique of bit pl...
详细信息
ISBN:
(纸本)0769524052
A multiple image hiding method for one secret image is proposed in this paper First, different bit planes of a secret image are hided into different bit planes of those different open images by the technique of bit plane analysis. Second, employing image fusion method. a group of new hiding images is obtained, and then we get a new image by taking the "Exclusive-NOR" operation on these images. the final hiding result is obtained by hiding the image obtained in above step into certain open image.
the proceedings contain 249 papers. the topics discussed include: future technological challenges for high performance computers;an agile programming model for grid end users;scalable and practical nonblocking switchi...
详细信息
ISBN:
(纸本)0769524052
the proceedings contain 249 papers. the topics discussed include: future technological challenges for high performance computers;an agile programming model for grid end users;scalable and practical nonblocking switching networks;an efficient distributed broadcasting algorithm for wireless ad hoc networks;a ring removal movement-based mobility location update scheme;a scalable security architecture for grid;a novel security model based on virtual organization for grid;a simple process calculus for the analysis of security protocols;the architecture of the large-scale distributed intrusion detection system;construction of a prototype of a volume communications environment;study of channel characteristics of power line communications networks;the maximal rates of more general complex orthogonal designs;and random walk routing for wireless sensor networks.
暂无评论