Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause signi...
详细信息
Container-based virtualization isbecoming increasingly popular in cloud computing due to its efficiency and *** isolation is a fundamental property of *** works have indicated weak resource isolation could cause significant performance degradation for containerized applications and enhanced resource ***,current studies have almost not discussed the isolation problems of page cache which is a key resource for *** leverage memory cgroup to control page cache ***,existing policy introduces two major problems in a container-based ***,containers can utilize more memory than limited by their cgroup,effectively breaking memory ***,the Os kernel has to evict page cache to make space for newly-arrived memory requests,slowing down containerized *** paper performs an empirical study of these problems and demonstrates the performance impacts on containerized *** we propose pCache(precise control of page cache)to address the problems by dividing page cache into private and shared and controlling both kinds of page cache separately and *** do so,pCache leverages two new technologies:fair account(f-account)and evict on demand(EoD).F-account splits the shared page cache charging based on per-container share to prevent containers from using memory for free,enhancing memory *** EoD reduces unnecessary page cache evictions to avoid the performance *** evaluation results demonstrate that our system can effectively enhance memory isolation for containers and achieve substantial performance improvement over the original page cache management policy.
In this paper, we mainly study the structure of bi-Jordan n-derivations in triangular rings under conditions of maximal quotient rings and faithful bimodules, respectively. It is shown that every bi-Jordan n-derivatio...
详细信息
In this paper, we mainly study the structure of bi-Jordan n-derivations in triangular rings under conditions of maximal quotient rings and faithful bimodules, respectively. It is shown that every bi-Jordan n-derivation can be decomposed into the sum of an inner biderivation and an extremal biderivation in two different conditions. As by-products, the structures of bi-Jordan n-derivation over upper triangular matrix rings and nest algebras are characterized, respectively,and generalize the known results.
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi...
详细信息
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of service(DDoS) attack, which aims to drain the resources of SDN switches and controllers,is one of the most common. Once the switch or controller is damaged, the network services can be *** defense schemes against DDoS attacks have been proposed from the perspective of attack detection;however, such defense schemes are known to suffer from a time consuming and unpromising accuracy, which could result in an unavailable network service before specific countermeasures are taken. To address this issue through a systematic investigation, we propose an elaborate resource-management mechanism against DDoS attacks in an SDN. Specifically, by considering the SDN topology, we leverage the M/M/c queuing model to measure the resistance of an SDN to DDoS attacks. Network administrators can therefore invest a reasonable number of resources into SDN switches and SDN controllers to defend against DDoS attacks while guaranteeing the quality of service(QoS). Comprehensive analyses and empirical data-based experiments demonstrate the effectiveness of the proposed approach.
Predicting the occurrence of crop pests is becoming a crucial task in modern agriculture to facilitate farmers’ decision-making. One of the most significant pests is the olive fruit fly, a public concern because it c...
详细信息
This paper considers the distributed online optimization(DOO) problem over time-varying unbalanced networks, where gradient information is explicitly unknown. To address this issue, a privacy-preserving distributed on...
详细信息
This paper considers the distributed online optimization(DOO) problem over time-varying unbalanced networks, where gradient information is explicitly unknown. To address this issue, a privacy-preserving distributed online one-point residual feedback(OPRF) optimization algorithm is proposed. This algorithm updates decision variables by leveraging one-point residual feedback to estimate the true gradient information. It can achieve the same performance as the two-point feedback scheme while only requiring a single function value query per iteration. Additionally, it effectively eliminates the effect of time-varying unbalanced graphs by dynamically constructing row stochastic matrices. Furthermore, compared to other distributed optimization algorithms that only consider explicitly unknown cost functions, this paper also addresses the issue of privacy information leakage of nodes. Theoretical analysis demonstrate that the method attains sublinear regret while protecting the privacy information of agents. Finally, numerical experiments on distributed collaborative localization problem and federated learning confirm the effectiveness of the algorithm.
Real-Time Strategy (RTS) games have attracted millions of players due to their characteristics of diverse scenes and flexible decision-making mechanisms. However, the mechanisms, contents, and operations of RTS games ...
详细信息
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Labe...
详细信息
Reachability query plays a vital role in many graph analysis *** researches proposed many methods to efficiently answer reachability queries between vertex *** many real graphs are labeled graph,it highly demands Label-Constrained Reachability(LCR)query inwhich constraint includes a set of labels besides vertex *** researches proposed several methods for answering some LCR queries which require appearance of some labels specified in constraints in the *** that constraint may be a label set,query constraint may be ordered labels,namely OLCR(Ordered-Label-Constrained Reachability)queries which retrieve paths matching a sequence of ***,no solutions are available for ***,we propose DHL,a novel bloom filter based indexing technique for answering OLCR *** can be used to check reachability between vertex *** the answers are not no,then constrained DFS is ***,we employ DHL followed by performing constrained DFS to answer OLCR *** show that DHL has a bounded false positive rate,and it's powerful in saving indexing time and *** experiments on 10 real-life graphs and 12 synthetic graphs demonstrate that DHL achieves about 4.8-22.5 times smaller index space and 4.6-114 times less index construction time than two state-of-art techniques for LCR queries,while achieving comparable query response *** results also show that our algorithm can answer OLCR queries effectively.
Twitter is a powerful platform for communication and information sharing but is also susceptible to spreading false information. This false information has adverse consequences for society and can significantly impact...
详细信息
The discourse surrounding energy transition is intensifying due to insufficient global energy resources. Nonetheless, given that the capitalist economy prioritizes expansion and growth, it remains uncertain whether gr...
详细信息
The visual modeling method enables flexible interactions with rich graphical depictions of data and supports the exploration of the complexities of epidemiological ***,most epidemiology visualizations do not support t...
详细信息
The visual modeling method enables flexible interactions with rich graphical depictions of data and supports the exploration of the complexities of epidemiological ***,most epidemiology visualizations do not support the combined analysis of objective factors that might influence the transmission situation,resulting in a lack of quantitative and qualitative *** address this issue,we developed a portrait-based visual modeling method called+*** method considers the spatiotemporal features of virus transmission patterns and multidimensional features of objective risk factors in communities,enabling portrait-based exploration and comparison in epidemiological *** applied+msRNAer to aggregate COVID-19-related datasets in New South Wales,Australia,combining COVID-19 case number trends,geo-information,intervention events,and expert-supervised risk factors extracted from local government area-based *** perfected the+msRNAer workflow with collaborative views and evaluated its feasibility,effectiveness,and usefulness through one user study and three subject-driven case *** feedback from experts indicates that+msRNAer provides a general understanding for analyzing comprehension that not only compares relationships between cases in time-varying and risk factors through portraits but also supports navigation in fundamental geographical,timeline,and other factor *** adopting interactions,experts discovered functional and practical implications for potential patterns of long-standing community factors regarding the vulnerability faced by the *** confirmed that+msRNAer is expected to deliver visual modeling benefits with spatiotemporal and multidimensional features in other epidemiological analysis scenarios.
暂无评论