Current grid information service is centralized or hierarchical and proves inefficient as grid scale rapidly increases. The introduction of P2P techniques into grids breaks an encouraging path. However, frequent join ...
详细信息
ISBN:
(纸本)9781605580777
Current grid information service is centralized or hierarchical and proves inefficient as grid scale rapidly increases. The introduction of P2P techniques into grids breaks an encouraging path. However, frequent join and departure of resource nodes require strong self-organization capacity of system to maintain their rigid structure. Moreover, arranging identifier space for P2P nodes is knotty and has great impact on system performance. If the identifier space is too large, some nodes will be overloaded. On the contraiy, small identifier space will bring the same problem as millennium bug. To address the issues, this paper proposes a scalable DHT-based (Distributed Hash Table) Information Service (DIS) for gridsystem, which organizes grid resources into a DHT ring based on VO (Virtual Organization). To save the identifier space while retaining the scalability and system performance, only stable VOs can join DIS via a new DHT node, whereas volatile VOs join DIS through being the sub-domain of other VO. Experimental results show that DIS provides rapid resource query, strong scalability and high throughput, meanwhile avoiding the key node failure as well as the bottleneck problem. Copyright 2008 ACM.
Efficient metadata management is a critical aspect of overall system performance in large distributed storage systems. Directory subtree partitioning and traditional hashing are two common techniques used for managing...
详细信息
Traditionally, complex engineering applications (CEAs), which consist of numerous components (software) and require a large amount of computing resources, usu- ally run in dedicated clusters or high performance co...
详细信息
Traditionally, complex engineering applications (CEAs), which consist of numerous components (software) and require a large amount of computing resources, usu- ally run in dedicated clusters or high performance computing (HPC) centers. Nowadays, Cloud computingsystem with the ability of providing massive computing resources and cus- tomizable execution environment is becoming an attractive option for CEAs. As a new type on Cloud applications, CEA also brings the challenges of dealing with Cloud resources. In this paper, we provide a comprehensive survey of Cloud resource management research for CEAs. The survey puts forward two important questions: 1) what are the main chal- lenges for CEAs to run in Clouds? and 2) what are the prior research topics addressing these challenges? We summarize and highlight the main challenges and prior research topics. Our work can be probably helpful to those scientists and en- gineers who are interested in running CEAs in Cloud envi- ronment.
Nowadays, Peer-to-Peer technology has been widely used in live streaming applications and many related systems are proposed. However, their single overlay design and unbalanced scheduling methods lead to some ineffici...
详细信息
ISBN:
(纸本)9781595937575
Nowadays, Peer-to-Peer technology has been widely used in live streaming applications and many related systems are proposed. However, their single overlay design and unbalanced scheduling methods lead to some inefficiency including high control overhead and bad playback experience. This paper mainly discusses how to address these certain problems. We introduce a hybrid architecture to solve the locality problem and reduce the control overhead. We also propose a scheduling method to achieve load balance. All solutions are implemented in Anysee2.
Long-running stream applications usually share the same fundamental computational infrastructure. To improve the efficiency of data processing in stream processing systems, a data analysis operator could be partitione...
详细信息
Temporal error concealment at the video communication receiver recovers damaged blocks using temporal information redundancy. To enhance the quality of reconstructed image, a multiple-reference temporal error concealm...
详细信息
Cryptographic functions, such as encryption/decryption libraries, are common and important tools for applications to enhance confidentiality of the data. However, these functions could be compromised by subtle attacks...
详细信息
Cloud provides users with a new model of utilizing the computing infrastructure with the ability to perform parallel and distributed computations using elastic virtual cluster. However, the multi-level and complex fea...
详细信息
Bloom filters are widely used in databases and network areas. These filters facilitate efficient membership checking with a low false positive ratio. It is a way to improve the throughput of bloom filter by parallel p...
详细信息
In order to ensure recognition accuracy, intelligent traffic video tracking system usually requires various types of information. Therefore, multi-features fusion becomes a good choice. In this paper, a new recognitio...
详细信息
暂无评论