The proceedings contain 75 papers. The topics discussed include: programming challenges for petascale and multicore parallelsystems;bandwidth-aware design of large-scale clusters for scientific computations;the chang...
详细信息
ISBN:
(纸本)9783540754435
The proceedings contain 75 papers. The topics discussed include: programming challenges for petascale and multicore parallelsystems;bandwidth-aware design of large-scale clusters for scientific computations;the changing impact of semiconductor technology on processor architecture;a windows-based parallel file system;coarse-grain time slicing with resource-share control in parallel-job scheduling;performance evaluation of distributed computing over heterogeneous networks;hybrid line search for multiobjective optimization;continuous adaptive outlier detection on distributed data streams;a data imputation model in sensor databases;an adaptive parallel hierarchical clustering algorithm;resource aggregation and workflow with webcom;performance evaluation of view-oriented parallel programming on cluster of computers;a low-power globally synchronous locally asynchronous FFT processor;and file and memory security analysis for grid systems.
This paper describes a source to source compilation tool for optimizing MPI-based parallel applications. This tool is able to automatically apply a "prepushing" transformation that causes MPI programs to agg...
详细信息
The utility and the effectiveness of peer-to-peer (P2P) content distribution systems can be greatly enhanced by augmenting their ad-hoc content discovery mechanisms with two capabilities, namely a mechanism to enable ...
详细信息
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the components of the system are secured. In th...
详细信息
ISBN:
(纸本)1424409101
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the components of the system are secured. In the last few years a number of Intrusion Detection systems (IDS) have been developed as network security tools, both in commercial and academic sectors. These systems have used different approaches to detecting unauthorized activity, and have given us some insight into the problems that still have to be solved. While considerable progress has been made in the areas of string matching, header processing and detecting DoS attacks at network level, complete systems have not yet been demonstrated that provide all of the functionality necessary to perform intrusion detection at each host system there by securing the entire network. In this paper we are proposing the architecture of a distributed Intrusion Detection System (DIDS) for use in high-speed networks. The proposed DIDS has Host IDS component at each host that combines the above-mentioned functionalities along with the capability of collecting the events at the application level to look for any signs of intrusion at the network level. DIDS consists of Central IDS component which performs sophisticated processing to detect any signs of distributed attacks on the entire network and update rules in each host system. For high speed networks it can be difficult to keep up with intrusion detection using purely software approach without affecting performance of the system intended for designed application. It is essential to use hardware systems or software with hardware accelerators. The proposed DIDS is a custom hardware implemented on Field Programmable Gate Arrays (FPGAs). This move to customized hardware-based systems allows the introduction of higher degree of parallelism than might be possible in software at a reasonable cost. The key aspects of this system are flexibility and partial reconfigurability
There are various threats in distributed storage systems, but there is no comprehensive category. There are some research works on threat modeling and the challenges of protecting storage systems, but there is no corr...
详细信息
ISBN:
(纸本)9783540768364
There are various threats in distributed storage systems, but there is no comprehensive category. There are some research works on threat modeling and the challenges of protecting storage systems, but there is no corresponding security measure to these threats and challenges. In this paper, elements of storage security and a comprehensive category of threats are presented, which goes from hardware level to software level, from kernel level to application level, from local to network. The corresponding security measures to these threats are provided. And the seven steps process of security is proposed which gives methodology to implement these security measures. Finally, some important storage security issues and future directions to storage security are concluded.
Educational virtual reality (VR) applications have a huge potential to support learning and teaching. A brief overview of previous educational VR applications will be followed by a summary of requirements specific to ...
详细信息
Many performance problems observed in high end systems are actually caused by the runtime system and not the application code. Detecting these cases will require parallel performance tools to incorporate information a...
详细信息
A language for semi-structured documents, XML has emerged as the core of the web services architecture, and is playing crucial roles in messaging systems, databases, and document processing. However, the processing of...
详细信息
ISBN:
(纸本)159593717X
A language for semi-structured documents, XML has emerged as the core of the web services architecture, and is playing crucial roles in messaging systems, databases, and document processing. However, the processing of XML documents has been regarded as the performance bottleneck in most systems and applications. On the other side, the multicore processor, emerged as a solution for the clock-speed limitation of the modern CPUs, has been growingly prevalent. Leveraging the parallelism provided by the multicorere source to speedup the software execution is becoming the trend of the software development. In this paper, we present a parallel processing model for the XML document. The model is not designed just for a specific XML processing task, instead, it is a general model, by which we are able to explore various parallel XML document processing. The kernel of the model is a stealing-based dynamic load-balancing mechanism, called ThreadCrew, by which multiple threads are able to process the disjointed parts of the XML document in parallel with balanced load distribution. The model also provides a novel mechanism to trace the stealing actions, thus the equivalent sequential result can be gotten by gluing the multiple parallel-running results together. To show the feasibility and effectiveness of our approaches, we present our C# implementation of parallel XML serialization in this paper. Our empirical study shows our parallel XML serialization algorithm can improved the XML serializing performance significantly on a multicore machine. Copyright 2007 ACM.
Recently, many parallel computing models using dynamically reconfigurable electrical buses have been proposed in the literature. The underlying characteristics are similar among these models, but they do have certain ...
详细信息
Due to fundamental physical limitations and power constraints, we are witnessing a radical change in commodity microprocessor architectures to multicore designs. Continued performance on multicore processors now requi...
详细信息
暂无评论