Elastic scaling in response to changes on demand is a main benefit of serverless computing. When bursty workloads arrive, a serverless platform launches many new containers and initializes function environments (known...
详细信息
In this paper a distributed weight mining algorithm is proposed based on FP-growth. As an important part of network fault management, the association rule takes effect on eliminating redundant alarms and preventing al...
详细信息
It is known to all that context-aware computing with uncertainty is an important part of pervasive computing for proactive service. Because multi-source evidence context-aware information with uncertainty is dynamic a...
详细信息
Moore's law continues to grant computer architects ever more transistors in the foreseeable future, and para-llelism is the key to continued performance scaling in modern microprocessors. In this paper, the achiev...
详细信息
Though many research groups have explored the design methodology of cluster system software stack, few works discuss what constitutes a good one. In this paper, we choose four criteria throughout the lifecycle of clus...
详细信息
ISBN:
(纸本)9781595939036
Though many research groups have explored the design methodology of cluster system software stack, few works discuss what constitutes a good one. In this paper, we choose four criteria throughout the lifecycle of cluster system software stack to evaluate its design methodology, including code reusability, evolveability, adaptability and manageability. According to the four criteria, we have proposed a management service-based layered design methodology and built a complete cluster system software stack for both scientific and business computing. Our practices and evaluations show our design methodology has advantages over others in terms of the proposed criteria. Copyright 2007 ACM.
Effectiveness is the most important factor considered in the ranking models yielded by algorithms of learning to rank (LTR). Most of the related ranking models only focus on improving the average effectiveness but ign...
详细信息
Modern datacenter servers hosting popular Internet services face significant and multi-facet challenges in performance and power control. The user-perceived performance is the result of a complex interaction of comple...
详细信息
Modern datacenter servers hosting popular Internet services face significant and multi-facet challenges in performance and power control. The user-perceived performance is the result of a complex interaction of complex workloads in a very complex underlying system. Highly dynamic and bursty workloads of Internet services fluctuate over multiple time scales, which has a significant impact on processing and power demands of datacenter servers. High-density servers apply virtualization technology for capacity planning and system manageability. Such virtuMized computer systems are increasingly large and complex. This paper surveys representative approaches to autonomic performance and power control on virtualized servers, which control the quality of service provided by virtualized resources, improve the energy efficiency of the underlying system, and reduce the burden of complex system management from human operators. It then presents three designed self-adaptive resource management techniques based on machine learning and control for percentile-based response time assurance, non-intrusive energy-efficient performance isolation, and joint performance and power guarantee on virtualized servers. The techniques were implemented and evaluated in a testbed of virtualized servers hosting benchmark applications. Finally, two research trends are identified and discussed for sustainable cloud computing in green datacenters.
Effectively controlling active power-assist lower-limb exoskeletons in a human-in-the-loop manner poses a substantial chal-lenge,demanding an approach that ensures wearer autonomy while seamlessly adapting to diverse ...
详细信息
Effectively controlling active power-assist lower-limb exoskeletons in a human-in-the-loop manner poses a substantial chal-lenge,demanding an approach that ensures wearer autonomy while seamlessly adapting to diverse wearer *** paper introduces a novel hierarchical control scheme comprising five integral components:intention recognition layer,dynamics feedforward layer,force distribution layer,feedback compensation layer,as well as sensors and *** intention rec-ognition layer predicts the wearer's movement and enables wearer-dominant movement through integrated force and position *** force distribution layer effectively resolves the statically indeterminate problem in the context of double-foot support,showcasing flexible control *** dynamics feedforward layer mitigates the effect of the exoskeleton itself on ***,the feedback compensation layer provides reliable closed-loop *** approach mitigates abrupt changes in joint torques during frequent transitions between swing and stance phases by decomposed *** this innovative hierarchical control scheme on a hydraulic exoskeleton platform through a series of experiments,the results demonstrate its capability to deliver assistance in various modes such as stepping,squatting,and jumping while adapting seamlessly to different terrains.
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It ...
详细信息
An accountable authority attribute-based encryption (A-ABE) scheme is presented in this paper. The notion of accountable authority identity-based encryption (A-IBE) was first introduced by Goyal at Crypto'07. It is a novel approach to mitigate the (inherent) key escrow problem in identity-based cryptosystems. In this work, the concept of accountable authority to attribute-based encryption (ABE) setting is generalized for the first time, and then a construction is given. The scheme non-trivially integrates an A-IBE scheme proposed by Libert et al. with an ABE scheme. In our construction, a user will be identified by a pair ( id, o~), where id denotes the user' s identity and ω denotes the set of attributes associated to the user. In addition, our construction is shown to be secure under some reasonable assumptions.
With increment of personal data amount, how to allow users to efficiently re-find personal data items becomes an important research issue. According to general experience of persons, task is taken as a popular way to ...
详细信息
暂无评论