Recently much attention has been paid to semantic overlay networks for information retrieval in large scale peer-to-peer networks,and much research work on semantic overlay protocols and searching algorithms has been ...
详细信息
Recently much attention has been paid to semantic overlay networks for information retrieval in large scale peer-to-peer networks,and much research work on semantic overlay protocols and searching algorithms has been done and the results indicate that semantic overlay is efficient for content searching in peer-to-peer ***,very limited work has been done to analyze and evaluate the characteristics of semantic overlay *** this paper we identify a natural property of semantic overlay networks,the community *** propose a mathematical model to evaluate the property of community structure of semantic P2P overlay networks.A heuristic algorithm is designed to optimize the community *** the evaluation model we compare the SemreX semantic overlay with the Gnutella *** demonstrate that a SemreX overlay network has the distinctive community structure feature,while a Gnutella-like network does *** also simulate a simple flooding protocol in both overlays to show that the overlay with community structure is more efficient for content searching.
In this short paper, we present our solution to index, store and retrieve the domain knowledge. The main principle exploits Lucene to index the domain knowledge under guide of the domain schema. The method to map doma...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this short paper, we present our solution to index, store and retrieve the domain knowledge. The main principle exploits Lucene to index the domain knowledge under guide of the domain schema. The method to map domain knowledge structure into Lucene index structure, store and update the indices, and to transfer RDF-based query into Lucene's query are presented. Copyright 2007 ACM.
Free riding is a great challenge to the development and maintenance of Peer-to-Peer(P2P)networks.A file migration and workload balancing based approach (FMWBBA)to discourage free riding is proposed in this *** heart o...
详细信息
Free riding is a great challenge to the development and maintenance of Peer-to-Peer(P2P)networks.A file migration and workload balancing based approach (FMWBBA)to discourage free riding is proposed in this *** heart of our mechanism is to migrate some shared files from the overloaded peers to the neighboring free riders automatically and transparently,which enforces free riders to offer services when altruistic peers are heavily *** migration is a key issue in our approach,and some related strategies are discussed.A simulation is designed to verify this approach,and the results show that it can not only alleviate free riding,but also improve the Quality of Service(QoS)and robustness of P2P networks efficiently.
To satisfy the rapid growth of cloud technologies, a large number of web applications have been developed and deployed, and these applications are being run in clouds. Due to the scalability provided by clouds, a sing...
详细信息
To satisfy the rapid growth of cloud technologies, a large number of web applications have been developed and deployed, and these applications are being run in clouds. Due to the scalability provided by clouds, a single web application may be concurrently visited by several millions or billions of users. Thus, the testing and performance evaluations of these applications are increasingly important. User model based evaluations can significantly reduce the manual work required, and can enable us to determine the performance of applications under real runtime environments. Hence, it has become one of the most popular evaluation methods in both industry and academia. Significant efforts have focused on building different kinds of models using mining web access logs, such as Markov models and Customer Behavior Model Graph (CBMG). This paper proposes a new kind of model, named the User Representation Model Graph (URMG), which is built based on CBMG. It uses an algorithm to refine CBMG and optimizes the evaluations execution process. Based on this model, an automatic testing and evaluation system for web applications is designed, implemented, and deployed in our test cloud, which is able to execute all of the analysis and testing operations using only web access logs. In our system, the error rate caused by random access to applications in the execution phase is also reduced, and the results show that the error rate of the evaluation that depends on URMG is 50% less than that which depends on CBMG.
Resource oversubscription optimizes the utilization of the computing resources. Many well-known virtual machine monitors(VMMs)such as Xen and KVM,adopt this approach to help maximize the yield of the cloud datacenters...
详细信息
Resource oversubscription optimizes the utilization of the computing resources. Many well-known virtual machine monitors(VMMs)such as Xen and KVM,adopt this approach to help maximize the yield of the cloud datacenters That is,with proper resource oversubscription strategies,more virtual machines(VMs) can be supported by limited resources. However performance interference among VMs hosting in the same physical machines(PMs) exists in cloud environment,and probably aggravated by resource oversubscription strategies,which aims to put more VMs into the same PM. In this paper,we present a resource oversubscription strategy called Sponge targeting cloud platforms Sponge mitigates the issue of performance interference among the oversubscribed co-hosting VMs. Sponge also provides a VM association strategy for each PM to handle with its besteffort. We performed our evaluation on a virtua datacenter simulated by Xen. Our evaluation results show that Sponge improves the resources utilization and manages to make each VM mee its performance requirement even hosting with other VMs in the same PM.
Ciphertext-policy attribute-based encryption(CP-ABE)allows a user with some attributes to decrypt the ciphertexts associated with these *** several CP-ABE schemes with the constant size ciphertext were proposed to red...
详细信息
Ciphertext-policy attribute-based encryption(CP-ABE)allows a user with some attributes to decrypt the ciphertexts associated with these *** several CP-ABE schemes with the constant size ciphertext were proposed to reduce the communication cost,their master public and secret keys still have the size linear in the total number of *** schemes are unpractical for the attribute-scalable and many-attributes scenario.A new CP-ABE scheme is *** attribute is mapped to a mathematical value by a combination *** master public and secret keys of the proposed CP-ABE scheme have the size linear in the binary size of a hash function’s *** has the comparable performance with existing schemes in the aspects like the time costs of encryption and decryption,the expressiveness of access policy and the provable security.
Cloud computing is a model for enabling ubiquitous,convenient,on-demand access to a shared pool of configurable computing *** to Gartner’s survey,cloud computing has been at the head of a list of the top ten IT strat...
详细信息
Cloud computing is a model for enabling ubiquitous,convenient,on-demand access to a shared pool of configurable computing *** to Gartner’s survey,cloud computing has been at the head of a list of the top ten IT strategic technologies for some *** computing is currently undergoing vigorous development and promotion by many leading Chinese and foreign enterprises,and it has become the basis for a new
Unikernels provide an efficient and lightweight way to deploy cloud computingservices in application-specialized and single-address-space virtual machines (VMs). They can efficiently deploy hundreds of unikernel-base...
详细信息
Unikernels provide an efficient and lightweight way to deploy cloud computingservices in application-specialized and single-address-space virtual machines (VMs). They can efficiently deploy hundreds of unikernel-based VMs in a single physical server. In such a cloud computing platform, main memory is the primary bottleneck resource for high-density application deployment. Recently, non-volatile memory (NVM) technologies has become increasingly popular in cloud data centers because they can offer extremely large memory capacity at a low expense. However, there still remain many challenges to utilize NVMs for unikernel-based VMs, such as the difficulty of heterogeneous memory allocation and high performance overhead of address *** this paper, we present UCat, a heterogeneous memory management mechanism that support multi-grained memory allocation for unikernels. We propose front-end/back-end cooperative address space mapping to expose the host memory heterogeneity to unikernels. UCat exploits large pages to reduce the cost of two-layer address translation in virtualization environments, and leverages slab allocation to reduce memory waste due to internal memory fragmentation. We implement UCat based on a popular unikernel--OSv and conduct extensive experiments to evaluate its efficiency. Experimental results show that UCat can reduce the memory consumption of unikernels by 50% and TLB miss rate by 41%, and improve the throughput of real-world benchmarks such as memslap and YCSB by up to 18.5% and 14.8%, respectively.
Since the advent of cryptocurrencies such as Bitcoin, blockchain, as their underlying technologies,has drawn a massive amount of attention from both academia and the industry. This ever-evolving technology inherits t...
详细信息
Since the advent of cryptocurrencies such as Bitcoin, blockchain, as their underlying technologies,has drawn a massive amount of attention from both academia and the industry. This ever-evolving technology inherits the “genes” of distributed systems, offering significant advantages of immutability, transparency,auditability, and tamper-resistance. These benefits help blockchain re-establish public confidence, and hold the significant promise of reliable information sharing and value transfer. Therefore, blockchain has become the foundation of crucial strategic deployments in countries across the world, and the fundamental basis for building the next generation Web 3.0 — “Internet of value”. In this article, we will start with unraveling the essential ingredients of blockchain technology, and showing the characteristics of each of these ingredients in the context of distributed systems. We will then present the core technical challenges that need to be addressed prior to unleashing its full potential, including its performance, scalability, and cross-chain interoperability. Finally, we will introduce the recent developments of blockchain systems, and discuss the future trends of the blockchain ecosystem.
Emerging non-volatile memory(NVM) technologies promise high density, low cost and dynamic random access memory(DRAM)-like performance, at the expense of limited write endurance and high write energy consumption. It is...
详细信息
Emerging non-volatile memory(NVM) technologies promise high density, low cost and dynamic random access memory(DRAM)-like performance, at the expense of limited write endurance and high write energy consumption. It is more practical to use NVM combining with the traditional DRAM. However, the hybrid memory management such as page migration becomes more challenging in a virtualization environment because virtual machines(VMs) are unaware of the memory heterogeneity. In this paper, we propose HMvisor, a hypervisor and VM coordinated hybrid memory management mechanism to better utilize DRAM and NVM resources. HMvisor exposes the memory heterogeneity to VMs by mapping virtual NUMA nodes to different physical NUMA nodes. We propose a lightweight and efficient page migration mechanism by decoupling page hotness tracking from page migration. HMvisor performs those operations in the hypervisor and VMs separately, without disrupting the execution of VMs. We also propose a memory resource trading policy to adjust the capacity of DRAM and NVM for each VM, with the monetary cost unchanged. We implement our prototype system based on QEMU/KVM and evaluate it with several benchmarks. Experimental results show that HMvisor can reduce 50% of write traffic to NVM with less than 5% performance overhead. Moreover, the hybrid memory adjustment scheme in HMvisor can significantly improve application performance by up to 30×.
暂无评论