Charging of services in a distributed system will become more and more important for systems which are utilized commercially. Such an important distributed system exists in form of a Computational Grid (CG), offering ...
详细信息
ISBN:
(纸本)0769510116
Charging of services in a distributed system will become more and more important for systems which are utilized commercially. Such an important distributed system exists in form of a Computational Grid (CG), offering a variety of services on deferent lavers to many users, academic and industrial ones. Although by itself a CG defines a research and operational problem area, the dedicated task of charging CG services, by definition a new grid service, has to be considered crucial, once a large number of users will share computational resources as well as services offered by a CG. The potential synergies for applying a similar concept to all layers and different types of services within a Computational Grid should be exploited. Safely assuming that the Internet will form the all-embracing communication technology in use in the near future, Differentiated Services Architecture-based communication layer services will offer the potential to differentiate higher layer and distributed services of the CG.
The proceedings contain 24 papers. The topics discussed include: an automated integration approach for semi-structured and structured data;enriched relationship processing in object-relational database management syst...
ISBN:
(纸本)0769511287
The proceedings contain 24 papers. The topics discussed include: an automated integration approach for semi-structured and structured data;enriched relationship processing in object-relational database management systems;realizing temporal XML repositories using temporal relational databases;range sum queries in dynamic OLAP data cubes;the personalized index service system in digital library;incorporating adaptive interaction property in cooperative agent for emergent process management;flexible data management and execution to support cooperative workflow: the COO approach;customized atomicity specification for transactional workflows;constraints for information cooperation in virtual enterprise systems;set-based access conflicts analysis of concurrent workflow definition;multi-weighted tree based query optimization method for parallel relational database systems;and concealing a secret image using the breadth first traversal linear Quadtree structure.
A new parallel semiconductor device simulation using the dynamic load balancing approach is presented. This semiconductor device simulation based on adaptive finite volume error estimation, and monotone iterative meth...
详细信息
Load balance is an important issue for the performance of software distributed shared memory (DSM) systems. One solution of addressing this issue is to exploit dynamic thread migration at runtime. In order to reduce t...
详细信息
ISBN:
(纸本)0769510108;0769510116
Load balance is an important issue for the performance of software distributed shared memory (DSM) systems. One solution of addressing this issue is to exploit dynamic thread migration at runtime. In order to reduce the data consistency communication increased by thread migration, an effective load balance scheme must carefully choose the threads and the destination nodes for workload migration. In this paper, a group-based load balance scheme is proposed to resolve this problem. The main characteristic of this scheme is to classify the overloaded nodes and the lightly loaded nodes into a sender group and a receiver group, and then consider all the threads of the sender group and all the nodes of the receiver group for each thread migration decision. The experimental results show that the group-based load balance scheme reduces more communication than what the previous ones do, Besides, this paper also resolves the problem of the high overhead caused by group-based schemes. Therefore, the performance of the test programs is effectively enhanced after Minimizing the communication increased by thread migration.
This paper presents research projects tackling two aspects in data mining. first, a toolbox is discussed that allows flexible and interactive data exploration, analysis and presentation using the scripting language Py...
详细信息
In this paper, we address the new problem of protecting volunteer computing systems front malicious volunteers who submit erroneous results by presenting sabotage-tolerance mechanisms that work without depending on ch...
详细信息
ISBN:
(纸本)0769510116
In this paper, we address the new problem of protecting volunteer computing systems front malicious volunteers who submit erroneous results by presenting sabotage-tolerance mechanisms that work without depending on checksums or cryptographic techniques. We first analyze the traditional technique of voting, and show how it reduces error rates exponentially with redundancy, but requires all work to be done at least twice, and does not work well when there are many saboteurs. We then present a new technique called spot-checking which reduces the error rate linearly (i.e., inversely) with the amount of work to be done, while only costing an extra fraction of the original time. We then integrate these mechanisms by presenting the new idea of credibility-based fault-tolerance, which uses probability estimates to efficiently limit and direct the use of redundancy. By using voting and spot-checking together credibility-based fault-tolerance effectively allows us to exponentially shrink an already linearly-reduced error rate, and thus achieve error rates that are orders-of-magnitude smaller than those offered by voting or spot-checking alone. We validate this new idea with Monte Carlo simulations, and discuss how credibility-based fault tolerance can be used with other mechanisms and in other applications.
The proceedings contain 32 papers. The topics discussed include: reformulation: a way to combine dynamic properties and B refinement;mechanized analysis of behavioral conformance in the Eiffel base libraries;proofs of...
ISBN:
(纸本)3540417915
The proceedings contain 32 papers. The topics discussed include: reformulation: a way to combine dynamic properties and B refinement;mechanized analysis of behavioral conformance in the Eiffel base libraries;proofs of correctness of cache-coherence protocols;how to make FDR spin: LTL model checking of CSP by refinement;avoiding state explosion for distributedsystems with timestamps;a rigorous approach to modeling and analyzing e-commerce architectures;a formal model for reasoning about adaptive QoS-enabled middleware;improvements in BDD-based reachability analysis of timed automata;serialising parallel processes in a hardware/software partitioning context;faithful translations among models and specifications;composing contracts: an adventure in financial engineering;coverage directed generation of system-level test cases for the validation of a DSP system;and a modular approach to the specification and validation of an electrical flight control system.
暂无评论