Next generation processor and memory technologies will provide tremendously increasing computing and memory capacities for application scaling. However, this comes at a price: Due to the growing number of transistors ...
详细信息
Puma is a framework for the development of applications that analyze and optionally transform C or C++ source code. It supports all standard ISO C and C++ language features as well as many language extensions of the G...
详细信息
Secondary recovery by engineered drives is a popular production process in the recovery of oil from subsurface reservoirs. It is mainly achieved by waterflooding technology – which involves the inject
Secondary recovery by engineered drives is a popular production process in the recovery of oil from subsurface reservoirs. It is mainly achieved by waterflooding technology – which involves the inject
Rich types of data offered by data as a service (DaaS) in the cloud are typically associated with different and complex data concerns that DaaS service providers, data providers and data consumers must carefully exami...
详细信息
Wireless sensor networks (WSNs) have attracted growing interest in the last decade as an infrastructure to support a diversity of ubiquitous computing and cyber-physical systems. However, most research work has focuse...
详细信息
Providing incentives for user contribution has been one of the primary design goals of Peer-to-Peer systems. The newly-emerged BitTorrent private communities adopt Sharing Ratio Enforcement (SRE) on top of BitTorrent&...
详细信息
Providing incentives for user contribution has been one of the primary design goals of Peer-to-Peer systems. The newly-emerged BitTorrent private communities adopt Sharing Ratio Enforcement (SRE) on top of BitTorrent's incentive mechanism, Tit-For-Tat, in order to strictly enforce a minimum contribution a member has to provide, in relation to the amount of service it has received. In this paper, we provide a theoretical model to analyze 1) how SRE provides seeding incentives, and 2) how SRE influences the download performance in the system. Specifically, we study the influence of the SRE threshold (i.e., the minimum sharing ratio requirement) and the bandwidth heterogeneity of the peers in the system. In our analysis, we assume users to be rational, i.e., peers seed only the minimum amount required by SRE, and we show that the download performance as predicted by our model represents a lower bound for the actual performance that can be reached in a BitTorrent private community. Hence, following our model, community administrators can predict the minimum performance level their systems will be able to reach.
Many private BitTorrent communities employ Sharing Ratio Enforcement (SRE) schemes to incentivize users to contribute their upload resources. It has been demonstrated that communities that use SRE are greatly oversupp...
详细信息
Many private BitTorrent communities employ Sharing Ratio Enforcement (SRE) schemes to incentivize users to contribute their upload resources. It has been demonstrated that communities that use SRE are greatly oversupplied, i.e., they have much higher seeder-to-leecher ratios than communities in which SRE is not employed. The first order effect of oversupply under SRE is a positive increase in the average downloading speed. However, users are forced to seed for extremely long times to maintain adequate sharing ratios to be able to start new downloads. In this paper, we propose a fluid model to study the effects of oversupply under SRE, which predicts the average downloading speed, the average seeding time, and the average upload capacity utilization for users in communities that employ SRE. We notice that the phenomenon of oversupply has two undesired negative effects: a) Peers are forced to seed for long times, even though their seeding efforts are often not very productive (in terms of low upload capacity utilization); and b) SRE discriminates against peers with low bandwidth capacities and forces them to seed for longer durations than peers with high capacities. To alleviate these problems, we propose four different strategies for SRE, which have been inspired by ideas in social sciences and economics. We evaluate these strategies through simulations. Our results indicate that these new strategies release users from needlessly long seeding durations, while also being fair towards peers with low capacities and maintaining high system-wide downloading speeds.
Among several techniques proposed for indoor positioning using IEEE 802.11 Wireless Fidelity (Wi-Fi) based networks, those that rely on fingerprinting have been demonstrated to outperform those based on lateration, an...
详细信息
Providing location privacy to users is one of the important issues that must be addressed in Vehicular Ad-Hoc Networks. Recent solutions address it by using cryptographic “mix-zones”, which are anonymizing regions w...
详细信息
Providing location privacy to users is one of the important issues that must be addressed in Vehicular Ad-Hoc Networks. Recent solutions address it by using cryptographic “mix-zones”, which are anonymizing regions where nodes change their temporary identities (pseudonym) without being tracked. However, existing solutions are vulnerable to internal attackers since within a mix-zone messages are encrypted using a group secret key. In this paper we improve location privacy of mix-zones via extensions to the CMIX protocol. By carrying out extensive simulations, we investigate and compare the effective location privacy provided by the proposed approach.
As interest in adopting Cloud computing for various applications is rapidly growing, it is important to understand how these applications and systems will perform when deployed on Clouds. Due to the scale and complexi...
详细信息
As interest in adopting Cloud computing for various applications is rapidly growing, it is important to understand how these applications and systems will perform when deployed on Clouds. Due to the scale and complexity of shared resources, it is often hard to analyze the performance of new scheduling and provisioning algorithms on actual Cloud test beds. Therefore, simulation tools are becoming more and more important in the evaluation of the Cloud computing model. Simulation tools allow researchers to rapidly evaluate the efficiency, performance and reliability of their new algorithms on a large heterogeneous Cloud infrastructure. However, current solutions lack either advanced application models such as message passing applications and workflows or scalable network model of data center. To fill this gap, we have extended a popular Cloud simulator (CloudSim) with a scalable network and generalized application model, which allows more accurate evaluation of scheduling and resource provisioning policies to optimize the performance of a Cloud infrastructure.
暂无评论