In a distributed web server system where tasks are not preemptible, the most important issue for improving quality of service (QoS) is how to realize fairness and reduce average slow down. In this paper, we analyze TA...
详细信息
ISBN:
(纸本)0780378407
In a distributed web server system where tasks are not preemptible, the most important issue for improving quality of service (QoS) is how to realize fairness and reduce average slow down. In this paper, we analyze TAGS (Task Assignment by Guessing Size) algorithm and put forward an algorithm named Extended TAGS by integrating Central Queue algorithm and TAGS, together with its performance analysis, system parameter setting algorithm subject to fairness requirement, and optimal grouping method.
H.26L is an emerging video encoding standard proposed by ITU, which goal is for video communication and multicast in low bit rate conditions. This paper gives detailed analysis and performance tests for the parallelis...
详细信息
ISBN:
(纸本)0780378407
H.26L is an emerging video encoding standard proposed by ITU, which goal is for video communication and multicast in low bit rate conditions. This paper gives detailed analysis and performance tests for the parallelism of the H.26L video encoder test model long-term (TML8.0). Based on these tests, several parallel schedule strategies are discussed in different aspects, and the optimal one is selected and implemented by using MPI. At last, experiment results on Dawning-2000 MPP machines with different processors are given. The analysis and simulation results show that the H.26L has a good parallel performance and scalability on slice layer, and parallelcomputing can greatly speed up the processing of H.26L encoder. The experiment methods and results can be applied to many parallel systems for H.26L video processing.
Flexible intrusion detection and response system (ID&R) needs to maximize security while minimizing cost and making response automatically. (CID)-D-2&R, the Cost-based Intelligent Intrusion Detection and Respo...
详细信息
ISBN:
(纸本)0780378407
Flexible intrusion detection and response system (ID&R) needs to maximize security while minimizing cost and making response automatically. (CID)-D-2&R, the Cost-based Intelligent Intrusion Detection and Response System, is proposed in the paper, which is originally developed as a facility to deal with network-based attacks and to make effective response automatically and intelligently. The networking environment deployed with the (CID)-D-2&R consists of two major parts: Guard, which runs on the specific Guarded Host (GH), and Spy, which runs in Guarded Network (GN). The components of the (CID)-D-2&R are introduced, which include intrusion detection, attack classification, damage analysis, attack path rebuilding, resources automatically safeguarding, calamity recovery, and security Officer. The several kinds of data flow in (CID)-D-2&R are discussed, too. While (CID)-D-2&R is only a prototype, some experimental results are also presented.
A new mathematical morphology-based algorithm is proposed to achieve automatic center location of non-eye typhoon. The center of a non-eye typhoon is near the geometric center of the cloud system and has higher temper...
详细信息
ISBN:
(纸本)0780378407
A new mathematical morphology-based algorithm is proposed to achieve automatic center location of non-eye typhoon. The center of a non-eye typhoon is near the geometric center of the cloud system and has higher temperature. For each infrared satellite cloud image, the locating procedures are as follows: a) noises filtering, b) main cloud systems segmenting, c) center locating and d) multispectral image verification. The algorithms are based on operations of mathematical morphology, and designed in IBM SP2 massively parallel computer. The experiment results show that the algorithm locates the centers of most non-eye typhoons successfully and achieves faster, more precise and non-human interactive non-eye typhoon center positioning.
Mobile computers and devices may operate in a variety of environments with different security schemes. In this paper, we present a Mobile Agent-Based Security Model, which supports flexible and specific security measu...
详细信息
ISBN:
(纸本)0780378407
Mobile computers and devices may operate in a variety of environments with different security schemes. In this paper, we present a Mobile Agent-Based Security Model, which supports flexible and specific security measures required by mobile computers and devices in distributed systems. We give a full description of Mobile Agent and its migration modes. After discussing possible security threats, our model is explained in detail and security analysis is also given.
This paper proposes a method to integrate the multi-data sources through the use of the Data Engine based on OPC (OLE for Process Control) specification. It introduces the generic architecture of the distributed data ...
详细信息
ISBN:
(纸本)0780378407
This paper proposes a method to integrate the multi-data sources through the use of the Data Engine based on OPC (OLE for Process Control) specification. It introduces the generic architecture of the distributed data integration. Then the Data Engine based on OPC specification is designed and the performance evaluation is done. The results show that a good performance and throughput could be achieved using the standard OPC data exchange mechanisms, and the data integration based on OPC specification has the characteristics of flexibility, upgradeability, openness and interoperability.
Airborne SAR remote sensing image has the characteristic of large data volume and computation burden, so the processing needs very large computer memory and stronger computation ability. Based on the introduction of t...
详细信息
ISBN:
(纸本)0780378407
Airborne SAR remote sensing image has the characteristic of large data volume and computation burden, so the processing needs very large computer memory and stronger computation ability. Based on the introduction of the SAR image processing procedure, this paper studies the SAR image processing using computer parallel computation technology. The parallel processing mechanism is based on the parallel computer cluster operation and the large virtual shared memory technology. In the Client/Server architecture based SAR image parallel system, agent based network communication plays an important role in the computer performance monitor and burden distribution. In the end, the application of the SAR image parallel processing system in the disaster monitor and assessment system is introduced. The application result illustrates the high efficiency of the system and the feasibility of our research.
The knapsack problem is very important in cryptosystem and in number theory. This paper proposes a new parallel algorithm for the knapsack problem where the method of divide and conquer is adopted. Basing on an EREW-S...
详细信息
ISBN:
(纸本)0780378407
The knapsack problem is very important in cryptosystem and in number theory. This paper proposes a new parallel algorithm for the knapsack problem where the method of divide and conquer is adopted. Basing on an EREW-SIMD machine with shared memory, the proposed algorithm utilizes O(2(n/4))(1-epsilon) processors, 0less than or equal to epsilon less than or equal to 1, and O(2(n)) memory to find a solution for the n-element knapsack problem in time O(2(n/4) (2(n/4))epsilon). Thus the cost of the proposed parallel algorithm is O(2(n)), which is optimal, and an improved result over the past researches. Keywords: Knapsack problem, parallel algorithm, optimal algorithm, memory conflicts.
Optimal scheduling of tasks of a directed acyclic graph (DAG) onto a set of processors is a strong NP-hard problem. Because list scheduling has shown good performance and is less difficult to design, it has been studi...
详细信息
ISBN:
(纸本)0780378407
Optimal scheduling of tasks of a directed acyclic graph (DAG) onto a set of processors is a strong NP-hard problem. Because list scheduling has shown good performance and is less difficult to design, it has been studied and used widely. In this paper we present a new list scheduling scheme to schedule tasks of a DAG onto a homogeneous multi-processors system. The primary objective of this scheme is to minimize schedule length and scheduling time itself. We analyzed three typical list scheduling algorithms-MCP algorithm, ETF algorithm and BDCP algorithm, and find that they all can not guarantee the earliest schedules of the CPNs. In this paper, we propose a better list scheduling algorithm based on critical path, and its time-complexity is O(pv(2)). This algorithm always it is the most important purpose that schedule CPN as soon as it is a ready task, which makes the nodes that have the greatest influence to the scheduling length of the task graph be scheduled first. This greatly shortens the scheduling length of the task graph. We compare the performance of this algorithm with existing scheduling scheme through analysis and the result of experiments. The scheduling length generated by this algorithm is shorter than that of other scheduling algorithm.
This paper presents a novel architecture for array processor, called LEAP, which is a set of simple processing elements. The targeted programs are perfect innermost loops. By using the technique called if-conversion, ...
详细信息
ISBN:
(纸本)0780378407
This paper presents a novel architecture for array processor, called LEAP, which is a set of simple processing elements. The targeted programs are perfect innermost loops. By using the technique called if-conversion, the control dependence can be converted to data dependence to prediction variables. Then an innermost loop can be represented by a data dependence graph, where the vertex supports the expression statements of high level languages. By mapping the data dependence graph to fixed PEs, each PE steps the loop iteration automatically and independently at the runtime. The execution forms multiple pipelining chains. The simulation of four loops of LFK shows the effectiveness of the LEAP architecture, compared with traditional CISC and RISC architectures.
暂无评论