P2P technology has been widely adopted in live streaming system for its scalability and low commercial cost. However, tree based system or mesh based system still has to face the constraint or tradeoff caused by its s...
详细信息
grid workflow is a complex and typical grid application, but owing to the highly dynamic feature of grid environments, resource unavailability is increasingly becoming severe and poses great challenges to grid workflo...
详细信息
ISBN:
(纸本)9781595937575
grid workflow is a complex and typical grid application, but owing to the highly dynamic feature of grid environments, resource unavailability is increasingly becoming severe and poses great challenges to grid workflow scheduling. Though fault recovery mechanism adopted in gridsystem guarantee the completion of jobs to some extent, but wasting system resources. To overcome the shortcoming, this paper proposes a Markov Chain based grid node availability prediction model which can efficiently predict grid nodes' availability in the future without adding significant overhead. Based on this model, the paper presents a grid workflow scheduling based on reliability cost (RCGS). The performance evaluation results demonstrate that RCGS improves the dependability of workflow execution and success ratio of tasks with low reliability cost.
Peer-to-Peer (P2P) networks have been shown to be a promising approach to provide instant voice services over the Internet for its potential high scalability. However, for one paired peers, how to efficiently transmit...
详细信息
A series of problems arises with the emergence and fast development of grid. Among all the problems, one of them is how to smoothly connect heterogeneous grid platforms. There are a number of ways to solve this proble...
详细信息
Any mistaken maintenance for the complicated and distributed grid can bring unpredictable disaster. Here we focus on the system availability issues caused by service dependencies during the maintenance in grid. A nove...
详细信息
Nowadays, Peer-to-Peer technology has been widely used in live streaming applications and many related systems are proposed. However, their single overlay design and unbalanced scheduling methods lead to some ineffici...
详细信息
ISBN:
(纸本)9781595937575
Nowadays, Peer-to-Peer technology has been widely used in live streaming applications and many related systems are proposed. However, their single overlay design and unbalanced scheduling methods lead to some inefficiency including high control overhead and bad playback experience. This paper mainly discusses how to address these certain problems. We introduce a hybrid architecture to solve the locality problem and reduce the control overhead. We also propose a scheduling method to achieve load balance. All solutions are implemented in Anysee2.
Metadata management is a key technique of data grid. This paper presents a replication and cache based metadata management system (RCMMS) to improve metadata management of Global Distributed Storage system (GDSS). Sto...
详细信息
Metadata management is a key technique of data grid. This paper presents a replication and cache based metadata management system (RCMMS) to improve metadata management of Global Distributed Storage system (GDSS). Storage Service Provider (SSP) of GDSS has dedicated buffer to cache metadata. The design, implementation and evaluation of RCMMS are discussed in this paper. RCMMS provides efficient algorithms to manage highly dynamic metadata replicas. The evaluation demonstrates that replica plus cache metadata management system outperforms existing metadata management system of GDSS.
P2P technology has been widely adopted in live streaming system for its scalability and low commercial cost. However, tree based system or mesh based system still has to face the constraint or tradeoff caused by its s...
详细信息
P2P technology has been widely adopted in live streaming system for its scalability and low commercial cost. However, tree based system or mesh based system still has to face the constraint or tradeoff caused by its solo shaped overlay construction. To address this problem, this paper introduces a tree-mesh based hybrid overlay and an optimized scheduling method. These works have been proven efficient in terms of low control overhead and better streaming experience compared with other systems. All algorithms and methods have been implemented in Anysee 2.
Peer-to-peer (P2P) technology encounters serious methodological limitations to guarantee the quality of services (QoS) of P2P networks with very few peers. In this paper, we propose multiple-access channel model (MACM...
详细信息
Peer-to-peer (P2P) technology encounters serious methodological limitations to guarantee the quality of services (QoS) of P2P networks with very few peers. In this paper, we propose multiple-access channel model (MACM) to merge different P2P networks as a whole to share their data-transfer capability. The model abstracts the interlaced data links between peers as logical data channels according to their spatial-temporal relations. The channels can be subdivided based on multiplex technology and serve different applications at same time. MACM redefines P2P data-packet structure and organizes data packets into time-related groups according to cascade-packet rule to support controllable data-projection between data pools of peers. MACM-based P2P networks can be created as virtual sub-network or virtual-peer bridging strategy so as to improve the performance of P2P networks with few peers but high priorities within Internet protocol television (IPTV) and wireless sensor network (WSN) applications.
Automated trust negotiation (ATN) is an important means to establish trust between strangers through the exchange of digital credentials and access control policies specifying what credentials a stranger must submit i...
详细信息
Automated trust negotiation (ATN) is an important means to establish trust between strangers through the exchange of digital credentials and access control policies specifying what credentials a stranger must submit in the open and distributed environment. While ATN brings convenience, there are still two issues unsolved successfully: 1) to protect the transmitting message; 2) to prevent the sensitive information leakage. Hidden credential can provide high security level to protect sensitive resources, policies and credentials from being attacked. Zero-knowledge is an important means to avoid leakage and can be used to protect the user's private context and sensitive information from unauthorized inferences. If hidden credentials and zero-knowledge are well-combined and redesigned, they can jointly make ATN better. Based on these, a hidden credential based oblivious automated trust negotiation model (HBOA) is proposed in this paper. In the model, the negotiation information is carried by hidden credentials, which have the same secure level with elliptic curve. Zero-knowledge protocol is provided by Pedersen commitment scheme, which ensures that no sensitive information can be attained by authorized users. A practical example is given to prove its usability.
暂无评论