The prevalence of multicore processors and virtualization technology enables parallel soft real-time applications to run in virtualized environment. However, current hypervisors do not provide adequate support for the...
详细信息
The simulation grid has become a very important research topic. In order to ensure the QoS of resource management, we present a control mechanism in simulation grid, which is based on the prediction methods. In the co...
详细信息
Intrusion Prevention System (IPS) has been an effective tool to detect and prevent unwanted attempts, which are mainly through network and system vulnerabilities, at accessing and manipulating computer systems. Intrus...
详细信息
ISBN:
(纸本)9781605584058
Intrusion Prevention System (IPS) has been an effective tool to detect and prevent unwanted attempts, which are mainly through network and system vulnerabilities, at accessing and manipulating computer systems. Intrusion detection and prevention are two main functions of IPS. As attacks are becoming massive and complex, the traditional centralized IPSes are incapable of detecting all those attempts. The existing distributed IPSes, mainly based on mobile agent, have some serious problems, such as weak security of mobile agents, response latency, large code size. In this paper, we propose a customized intrusion prevention system, VMFence, in distributed virtual computing environment to simplify the complexity of the management. In VMFence, the states of detection processes vary with those of Virtual Machines (VMs), which are described by Deterministic Finite Automata (DFA). The detection processes, each of which detects one virtual machine, reside in a privileged virtual machine. The processes run synchronously and outside of VMs in order to achieve high performance and security. The experimental results also show VMFence has higher detection efficiency than traditional intrusion detection systems and little impact on the performance of the monitored VMs. Copyright 2009 ACM.
In order to achieve low delay services in VoIP, we can use application-layer routing scheme, which is to find proper relay nodes to intermediate voice packets from the source peer to the destination peer. The difficul...
详细信息
ISBN:
(纸本)9781605581279
In order to achieve low delay services in VoIP, we can use application-layer routing scheme, which is to find proper relay nodes to intermediate voice packets from the source peer to the destination peer. The difficulty of the scheme is how to find the proper relay nodes, which we call relay problem. This paper presents a new application-layer routing scheme, called DPLM, to resolve relay problem. We introduced the mechanism in detail, and evaluated our mechanism in NS2 network simulation environment and got a high relay node hit ratio result, which confirms the feasibility of a real system. Also we make a comparison with traditional schemes, and the results show that DPLM scheme has good performances. Copyright 2008 ACM.
Silicosis is one of the most serious occupational diseases in China. Radiologist information comes from chest radiographs, in which the most important parts are lung fields and ribs. It is necessary to distinguish lun...
详细信息
ISBN:
(纸本)9781605588407
Silicosis is one of the most serious occupational diseases in China. Radiologist information comes from chest radiographs, in which the most important parts are lung fields and ribs. It is necessary to distinguish lung fields and ribs from other organs. The anatomical knowledge-based lung segmentation can improve the accuracy of segmentation and solve the problems of opened region and lost clavicle region. The curve model-based rib segmentation can acquire more accurate rib location information, and provide more efficient orientation for latter diagnosis. These two methods are also deployed in grid environment to get higher efficiency when processing massive and distributed medical data for silicosis diagnosis. Experiments show that the two proposed algorithms can meet the latter medical requirements for chest radiograph with higher accuracy. Copyright 2009 ACM.
Web service becomes an important paradigm for internet application. To realize users' complex requirements, services with different functions, but sharing common features, should be selected quickly from a huge nu...
详细信息
Transactional memory (TM) is a parallel programming concept which reduces challenges in parallel programming. Existing distributed transactional memory system consumes too much bandwidth and brings high latency. In th...
详细信息
When multiple instances of an application running on multiple virtual machines, an interesting problem is how to utilize the fault handling result from one application instance to heal the same fault occurred on other...
详细信息
Android's permission system offers an all-or-nothing installation choice for users. To make it more flexible, users may choose a popular app tool, called permission manager, to selectively grant or revoke an app...
详细信息
ISBN:
(纸本)9781450336239
Android's permission system offers an all-or-nothing installation choice for users. To make it more flexible, users may choose a popular app tool, called permission manager, to selectively grant or revoke an app's permissions at runtime. A fundamental requirement for such permission manager is that the granted or revoked permissions should be enforced faithfully. However, we discover that none of existing permission managers meet this requirement due to permission leaks. To address this problem, we propose CICC, a finegrained, semantic-aware, and transparent approach for any permission managers to defend against the permission leaks. Compared to existing solutions, CICC is fine-grained because it detects the permission leaks using call-chain information at the component instance level, instead of at the app level or component level. The fine-grained feature enables it to generate a minimal impact on the usability of running apps. CICC is semantic-aware in a sense that it manages call-chains in the whole lifecycle of each component instance. CICC is transparent to users and app developers, and it requires minor modification to permission managers. Our evaluation shows that CICC incurs relatively low performance overhead and power consumption. Copyright 2015 ACM.
Peer-to-peer (P2P) has become an important computing model because of its adaptation, selforganization and autonomy. But how to organize dynamic nodes in P2P networks efficiently for gaming message passing services is...
详细信息
暂无评论