The proceedings contain 12 papers. The special focus in this conference is on distributed Applications and Interoperable systems. The topics include: The HDFS Replica Placement Policies: A Comparative Experimental Inv...
ISBN:
(纸本)9783031160912
The proceedings contain 12 papers. The special focus in this conference is on distributed Applications and Interoperable systems. The topics include: The HDFS Replica Placement Policies: A Comparative Experimental Investigation;an Elastic and Scalable Topic-Based Pub/Sub System Using Deep Reinforcement Learning;challenges in Automated Measurement of Pedestrian Dynamics;Using SGX for Meta-Transactions Support in Ethereum DApps;understanding Cryptocoins Trends Correlations;rebop: Reputation-Based Incentives in Committee-Based Blockchains;lesser Evil: Embracing Failure to Protect Overall System Availability;failure Root Cause Analysis for Microservices, Explained;attestation Mechanisms for Trusted Execution Environments Demystified;accelerate Model Parallel Deep Learning Training Using Effective Graph Traversal Order in Device Placement;analysis of the Impact of Interaction Patterns and IoT Protocols on Energy Consumption of IoT Consumer Applications.
Blockchain assessment is a key method to evaluate the quality of blockchain products. Blockchain assessment can effectively address the problem of application systems breaking down due to poor quality of blockchain pr...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Blockchain assessment is a key method to evaluate the quality of blockchain products. Blockchain assessment can effectively address the problem of application systems breaking down due to poor quality of blockchain product. A comprehensive and in-depth assessment is important for enhancing the quality of blockchain products. Blockchain assessment can detect bugs and weaknesses in blockchain products, then it can promote the product upgrades and evolution. Recently, research on blockchain assessment is fragmented with lacking systematization. Therefore, this paper proposes a blockchain assessment framework from both technical and application perspectives. This assessment framework includes the blockchain systems assessment, supporting service systems assessment, and business application systems assessment. For each class of blockchain products, corresponding assessment dimensions and criteria are put forward.
With the fast development of information technology, the databases used as the fundamental storage and computing component of information system have to deal with much more complicated scenarios with high frequency an...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
With the fast development of information technology, the databases used as the fundamental storage and computing component of information system have to deal with much more complicated scenarios with high frequency and concurrency. distributed databases are becoming more and more common in data-intensive industries such as banking and telecommunications. The selection of distributed database products requires comprehensively consider the function, performance, security, ease of use and stability of the product. The stability of distributed database is known to be difficult in testing and product selection. The method widely used in database testing is TPC-DS (transaction processing performance council-decision support) benchmark, which is only suitable for functional and performance testing. To deal with this drawback, a distributed database stability testing platform based on chaos engineering methodology is developed Through the perturbation injection by using the stability testing platform, the performance fluctuation of the database under pressure condition can be observed, and the stability of the database can then be evaluated
Edge computing has become a promising computing paradigm for building IoT (Internet of Things) applications, particularly applications with latency and privacy constraints. However, these applications typically tend t...
详细信息
ISBN:
(纸本)9798400702341
Edge computing has become a promising computing paradigm for building IoT (Internet of Things) applications, particularly applications with latency and privacy constraints. However, these applications typically tend to be compute-intensive and compute resources are limited at the edge when compared to the cloud, so it is important to efficiently utilize all computing resources available at the edge. A key challenge in utilizing these resources is the scheduling of different computing tasks in a dynamically varying, highly hybrid computing environment. We describe the design, implementation, and evaluation of a dynamic distributed scheduler for the edge that constantly monitors the current state of the computing infrastructure and dynamically schedules various computing tasks to ensure that all application constraints are met in another paper. Based on that, this paper mainly proposes a profile evaluation method and results when applying an augmented reality application on distributedsystems at the edge. With that work done, we propose and implement a good solution to efficiently distribute edge AI applications at the edge.
This paper proposes a model of a distributed system that sorts items using robotic agents. The system operates with multiple robotic agents that work collaboratively to sort items in accordance with their destinations...
详细信息
ISBN:
(纸本)9798350339864
This paper proposes a model of a distributed system that sorts items using robotic agents. The system operates with multiple robotic agents that work collaboratively to sort items in accordance with their destinations, and a controller manages the behavior and states of the agents. The distributed system is designed to be scalable and fault-tolerant, with the ability to handle large volumes of items. Scalability is provided by a changeable number of robotic agents presented. The distributed sorting system offers flexibility in the allocation of resources and completes tasks more efficiently than traditional conveyor sorting systems do. In this paper we present the robotic agents fleet control system structure, the agents task modeling system and the sorting center space modeling system. Each agent receives an action schedule to execute from the control system and implements movements in the sorting center space modeling system. The fleet management system calculates the movement schedule for each agent, taking into account the movement, the tasks of all robotic agents and the states of the sorting center components. With the help of the distributed system, the sorting center throughput is estimated for the given model parameters. A series of experiments is conducted to provide this estimation.
In this paper, we consider a large-scale heterogeneous mobile edge computing system, where each device's mean computing task arrival rate, mean service rate, mean energy consumption, and mean offloading latency ar...
详细信息
ISBN:
(纸本)9798350339864
In this paper, we consider a large-scale heterogeneous mobile edge computing system, where each device's mean computing task arrival rate, mean service rate, mean energy consumption, and mean offloading latency are drawn from different bounded continuous probability distributions to reflect the diverse compute-intensive applications, mobile devices with different computing capabilities and battery efficiencies, and different types of wireless access networks (e.g., 4G/5G cellular networks, WiFi). We consider a class of distributed threshold-based randomized offloading policies and develop a threshold update algorithm based on its computational load, average offloading latency, average energy consumption, and edge server processing time, depending on the server utilization. We show that there always exists a unique Mean-Field Nash Equilibrium (MFNE) in the large-system limit when the task processing times of mobile devices follow an exponential distribution. This is achieved by carefully partitioning the space of mean arrival rates to account for the discrete structure of each device's optimal threshold. Moreover, we show that our proposed threshold update algorithm converges to the MFNE. Finally, we perform simulations to corroborate our theoretical results and demonstrate that our proposed algorithm still performs well in more general setups based on the collected real-world data and outperforms the well-known probabilistic offloading policy.
Through providing cheap rack and network hosting services, third-party internet data centers (IDCs) have gained significant popularity among cloud service providers. Real-time monitoring of the quality of the IDC netw...
详细信息
ISBN:
(纸本)9798350386066;9798350386059
Through providing cheap rack and network hosting services, third-party internet data centers (IDCs) have gained significant popularity among cloud service providers. Real-time monitoring of the quality of the IDC network and proactively alarming is crucial to guaranteeing the reliability of cloud services. The prevailing approach to addressing this problem involves utilizing active probes and making evaluations based on the results of single-link or multi-link probing. However, the existing efforts still tend to generate a significant number of unnecessary alerts, resulting in enormous operational costs. For this reason, we first build a large-scale distributed ping-based dial test system that enables monitoring the quality of the IDC network in a many-to-one probe mode. We develop an efficient exporter tool based on the standard Prometheus' data interface to ensure real-time and precise measurement data collection. To quickly and accurately detect potential network issues, we also design a multi-step heuristic-based fault detection and alarm method. Furthermore, we propose a comprehensive alarm life-cycle model based on the results of multi-link probing to guide alarm management in production practice. This system has been successfully deployed in the production environment of Sangfor company's managed cloud for over a year, enabling proactive diagnosis of hundreds of IDC gateway IP addresses. The actual statistical results indicate a significant improvement in the mean time to repair (MTTR) for IDC network failures, reducing it from a few hours to just a few minutes. The average daily number of alarms generated by this system is less than 15, decreasing approximately 85% compared to before. The alarm accuracy exceeds 95% and the false negative rate is less than 2%.
Edge computing brings computation closer to sources of data and knowledge by embedding computation in the physical space and close to the end users. Edge computing is becoming the ultimate platform where modern applic...
详细信息
ISBN:
(纸本)9798350304831
Edge computing brings computation closer to sources of data and knowledge by embedding computation in the physical space and close to the end users. Edge computing is becoming the ultimate platform where modern applications based on IoT and AI are deployed in a truly distributed manner. When edge applications require goal-oriented behaviour, AI planning comes into play as a powerful tool for achieving such behaviour. In turn, this necessitates AI planning systems that can be deployed and operate on the edge possibly on a multitude of dispersed nodes. Current approaches to distributed AI planning are mainly designed around the requirements and peculiarities of multi-agent systems, such as communication constraints and the self-interest of agents. In this work, we postulate that edge computing provides new perspectives for distributing AI planning. We propose the concept of edge AI planning where multiple AI planning components are distributed on edge nodes and communicate over a vast network. These components need to have clearly defined requirements of what can be distributed and how in order for the overall AI planning to work effectively, in turn enabling correct and consistent executions across the whole system.
The promises of the computing continuum paradigm motivate a paradigm change for Internet-distributedcomputingsystems. Unfortunately, we are still far from being able to develop computing continuum systems. We try to...
详细信息
ISBN:
(纸本)9798350340754
The promises of the computing continuum paradigm motivate a paradigm change for Internet-distributedcomputingsystems. Unfortunately, we are still far from being able to develop computing continuum systems. We try to move one step forward in the direction of the computing continuum systems by defining design phases for the interconnection of the application with its underlying infrastructure. We assume that SLOs are critical to that endeavor. Hence, we analyze its usage in the scientific literature. Based on the learnings obtained, we define 9 design phases to provide homogeneity and common behaviors in large-scale, heterogeneous, distributed, and complex systems.
Location-based services are at the heart of many applications that individuals use every day. However, there is often no guarantee of the truthfulness of users' location data, since this information can be easily ...
详细信息
ISBN:
(纸本)9798350328127
Location-based services are at the heart of many applications that individuals use every day. However, there is often no guarantee of the truthfulness of users' location data, since this information can be easily spoofed without a proof mechanism. In distributed system applications, preventing users from submitting counterfeit locations becomes even more challenging because of the lack of a central authority that monitors data provenance. In this work, we propose a decentralized architecture based on blockchains and decentralized technologies, offering a transparent solution for Proof of Location (PoL). We specifically address two main challenges, i.e., the issuing process of the PoL and the proof verification. We describe a smart contract based implementation in Reach, a blockchain-agnostic smart contract language, and the tests we conducted on different blockchains, i.e. Ethereum, Polygon, and Algorand, measuring latency and costs due to the payment of fees. Results confirm the viability of the proposal.
暂无评论