Virtual machine (VM) technologies are becoming more and more important among industrial and academic institutions with the decreasing cost of computer hardware. It can offer a lot of benefits including performance iso...
详细信息
ISBN:
(纸本)9781605584058
Virtual machine (VM) technologies are becoming more and more important among industrial and academic institutions with the decreasing cost of computer hardware. It can offer a lot of benefits including performance isolation, server consolidation, and live migration. However, the development of virtualization technology is preferred to application isolation as yet, thus the performance overheads of communicate between virtual machines which are resident on the same physical machine are relatively high. In network-intensive applications, such as Internet servers, are consolidated in a physical machine using VM technology, the inter-domain shared memory communication mechanisms is necessary. In other words, nearly all the virtual machine monitors are not very efficient in I/O performance to meet these applications' requirements. As a result, some scholars resort to inter-domain shared memory mechanisms to improve data transferring performance, but some of these solutions only provide one-way tunnel for domains to communicate with each other, and others are not network-bypass, which use the existing AF-INET protocol family, and incur unnecessary overhead brought by TCP/IP stack. In this paper, we present an inter-domain data transferring system, called IDTS, with dual-way tunnels and fully network-bypass features in Xen virtual machine environment. The design of IDTS is different from virtual network scheme in that IDTS uses static circular memory buffer shared between domains instead of the Xen page-flipping mechanism. In order to enable dual-way communication, IDTS provides two shared memory tunnels for co-resident domains to communicate with each other. Our evaluation demonstrates that IDTS can reduce inter-domain round trip latency by nearly a factor of 4, and increase bandwidth by approximately 5 times, and also keep high scalability, compared with traditional TCP/IP approach. Copyright 2009 ACM.
Range query in DHT based P2P network is a hot topic in recent researches. The hashing function in DHT protocols makes the data hard to keep their original order relationship. Hence range queries for such networks beco...
详细信息
Interval Type-2 Fuzzy Set is the most popular kind of Type-2 Fuzzy Set, its characteristic is that all the secondary membership functions equal to 1. Though Interval Type-2 Fuzzy Sets can reduce the calculation comple...
详细信息
Intrusion Prevention System (IPS) has been an effective tool to detect and prevent unwanted attempts, which are mainly through network and system vulnerabilities, at accessing and manipulating computer systems. Intrus...
详细信息
ISBN:
(纸本)9781605584058
Intrusion Prevention System (IPS) has been an effective tool to detect and prevent unwanted attempts, which are mainly through network and system vulnerabilities, at accessing and manipulating computer systems. Intrusion detection and prevention are two main functions of IPS. As attacks are becoming massive and complex, the traditional centralized IPSes are incapable of detecting all those attempts. The existing distributed IPSes, mainly based on mobile agent, have some serious problems, such as weak security of mobile agents, response latency, large code size. In this paper, we propose a customized intrusion prevention system, VMFence, in distributed virtual computing environment to simplify the complexity of the management. In VMFence, the states of detection processes vary with those of Virtual Machines (VMs), which are described by Deterministic Finite Automata (DFA). The detection processes, each of which detects one virtual machine, reside in a privileged virtual machine. The processes run synchronously and outside of VMs in order to achieve high performance and security. The experimental results also show VMFence has higher detection efficiency than traditional intrusion detection systems and little impact on the performance of the monitored VMs. Copyright 2009 ACM.
Silicosis is one of the most serious occupational diseases in China. Radiologist information comes from chest radiographs, in which the most important parts are lung fields and ribs. It is necessary to distinguish lun...
详细信息
ISBN:
(纸本)9781605588407
Silicosis is one of the most serious occupational diseases in China. Radiologist information comes from chest radiographs, in which the most important parts are lung fields and ribs. It is necessary to distinguish lung fields and ribs from other organs. The anatomical knowledge-based lung segmentation can improve the accuracy of segmentation and solve the problems of opened region and lost clavicle region. The curve model-based rib segmentation can acquire more accurate rib location information, and provide more efficient orientation for latter diagnosis. These two methods are also deployed in grid environment to get higher efficiency when processing massive and distributed medical data for silicosis diagnosis. Experiments show that the two proposed algorithms can meet the latter medical requirements for chest radiograph with higher accuracy. Copyright 2009 ACM.
The primary problem of data management in grid environment is how to effectively organise the geographical distributed storage devices to support the collaborative data operations. This paper focuses on how to resolve...
详细信息
Scheduling is the key to divisible workload execution. UMR (uniform multi-round) algorithm potentially performs near optimal by improving overlap of communication and computation. However, it is questioned how a stati...
详细信息
ISBN:
(纸本)9781424445264
Scheduling is the key to divisible workload execution. UMR (uniform multi-round) algorithm potentially performs near optimal by improving overlap of communication and computation. However, it is questioned how a static schedule works effectively in dynamic grid environment. The paper proposes an adaptive divisible workload scheduling system, which can adjust the schedule in a proactive way. An adaptive UMR-based multi-round algorithm (called AUMR) is presented and evaluated. In AUMR, if the run-time resource monitor notifies the scheduler of any resource changes, the scheduler will evaluate its impact and adjust the schedule if necessary. The experiment results show a considerable performance improvement by AUMR in dynamic grid environment.
In grid and cloud computing infrastructures, the integrity of a computing platform is a critical security requirement in order to provide secure and honest computing environments to service providers and resource cons...
详细信息
Binary translation system usually maps guest registers into host registers to accelerate the translation speed. QEMU can be treated as a typical binary translator and it uses a fixed register allocation. On most hosts...
详细信息
ISBN:
(纸本)9781424449095
Binary translation system usually maps guest registers into host registers to accelerate the translation speed. QEMU can be treated as a typical binary translator and it uses a fixed register allocation. On most hosts, QEMU simply maps all the target registers to memory and only store a few temporary variables in host registers. However, QEMU does not consider the dependence of two or more adjacent instructions. So even a guest register's value has been loaded into the temporary variables when executing the previous instruction, the next instruction could not use the value from the temporary variable directly, which is mapped into host register. The next instruction has to reload the value from memory again. This paper presents an approach to eliminate these unnecessary operations. Tests of benchmarks from nbench show that this approach can achieve 10%~20% speed improvement.
With the development of speech recognition, speech data mining becomes a hot topic in fields of data mining and natural language processing. In this paper, a novel clustering algorithm is presented to describe how to ...
详细信息
With the development of speech recognition, speech data mining becomes a hot topic in fields of data mining and natural language processing. In this paper, a novel clustering algorithm is presented to describe how to do semantic mining and how to understand the developing trend of event implied in speech sequence. At first, the speech sequences are extracted into a Bayesian network presenting the relationship between different speech elements. Then, we utilize a 3-dimensional space and sequence cluster techniques to excavate implied information from speech. Considering speech data features, we improve traditional distance-based clustering algorithm to get semantic information and enhance performance. The experimental results show that our algorithm is correct and effective.
暂无评论