Since the virtual network traffic is invisible outside the hypervisor, it is impossible for traditional network-base security devices to harness the attacks happened in virtual computing environment. Industry and acad...
详细信息
This paper presents a practical approach to design guard robot alarm system using GPRS technology. GPRS offers an interesting communications infrastructure for remotely accessing, controlling and interacting with robo...
详细信息
Trace-driven cache simulation is the most widely used method to evaluate different cache structures. Several techniques have been proposed to reduce the simulation time of sequential trace-driven simulation. An obviou...
详细信息
Satisfiability modulo theories (SMT) play a key role in verification applications. A crucial SMT problem is to combine separate theory solvers for the union of theories. In previous work, the simplex method is used to...
详细信息
Satisfiability modulo theories (SMT) play a key role in verification applications. A crucial SMT problem is to combine separate theory solvers for the union of theories. In previous work, the simplex method is used to determine the solvability of constraint systems and the equalities implied by constraint systems are detected by a multitude of applications of the dual simplex method. We present an effective simplex tableau-based method to identify all implicit equalities such that the simplex method is harnessed to an irreducible minimum. Experimental results show that the method is feasible and effective.
Scheduling is essential in peer-to-peer (P2P) video-on-demand (VoD) applications to obtain desirable user experience and high sharing efficiency. Existing systems and proposals largely utilize scheduling mechanisms th...
详细信息
Scheduling is essential in peer-to-peer (P2P) video-on-demand (VoD) applications to obtain desirable user experience and high sharing efficiency. Existing systems and proposals largely utilize scheduling mechanisms that are periodical in nature. We refer these as time-driven scheduling. In this paper we argue that the time-driven scheduling algorithm is not efficient for P2P VoD due to its inadequate resource utilization and inability in quickly adapting to the potential dynamics in such systems. We propose an event-driven scheduling algorithm for P2P VoD systems, in which the scheduler is triggered by events such as peer churn or/and random seeks. We evaluate our design through extensive simulations, and the experimental results show that event-driven scheduling outperforms time-driven scheduling in terms of both user experience and system scalability.
Ambulatory electrocardiogram is used to record about 24 hours electrocardiogram waveform. The purpose is to find out the conspicuous variation in the recording data. A new strategy used to cluster the electrocardiogra...
详细信息
Recently there have been increasing attentions on the security aspects in Peer-to-Peer (P2P) networks, especially with respect to worm epidemics. However, existing worm containment mechanisms can be largely ineffectiv...
详细信息
Recently there have been increasing attentions on the security aspects in Peer-to-Peer (P2P) networks, especially with respect to worm epidemics. However, existing worm containment mechanisms can be largely ineffective due to the long delay exhibited in worm identification and patch generation. In this paper, we propose a new worm containment algorithm based on the concept of overlay partition, which can effectively quarantine worms into small and more manageable sub-networks. This algorithm relies on a simple anomaly detection which takes effect much faster than existing schemes. With ldquobridge linksrdquo, the alert of an anomaly can be disseminated faster than random scanning and dedicated worms. Further, in order to deal with false positives, we propose a granularity based clustering algorithm, called CAGA, which, through extensive simulation, is shown to realize better service sustenance during unnecessary partition caused by false positives and can effectively contain fast worms. Finally, we examine the effects of topologies and network dynamics.
A modeling and simulation tool called SimRC is described in this paper. It is dedicated to improve the efficiency of reconfigurable computing development. In SimRC, a new architecture description language is designed ...
详细信息
ISBN:
(纸本)9780889868106
A modeling and simulation tool called SimRC is described in this paper. It is dedicated to improve the efficiency of reconfigurable computing development. In SimRC, a new architecture description language is designed for architecture modeling, and the target architecture simulator is generated according to that model with our code generation approach. In this way, SimRC achieves the general purpose in a certain scope. The results of the preliminary experiments show that not only SimRC is able to model various architectures, but also it achieves the high simulation efficiency.
In artificial immune systems, the detectors in the nonself space are often adopted to detect anomaly changes, such as the negative selection algorithm and its improvements. Since the detectors in the self space can al...
详细信息
With the IT development, computer is more powerful and can accommodate more virtual servers than ever. Due to users' random requests, it is not economical to start all virtual servers beforehand. One reasonable ap...
详细信息
With the IT development, computer is more powerful and can accommodate more virtual servers than ever. Due to users' random requests, it is not economical to start all virtual servers beforehand. One reasonable approach is to start virtual servers dynamically. It will lead to varied performance in server consolidation. Thus, one of the key problems is how to evaluate dynamic performance of VMM in server consolidation. However, no evaluation approach for dynamic performance of VMM in server consolidation is available now. We present an approach to evaluate dynamic performance of VMM in server consolidation. The approach adopts popular application servers, such as Web and database server as workload. We firstly give the problem definition. Then we define performance metrics for evaluating dynamic performance of VMM in server consolidation. Finally, we use the approach to evaluate dynamic performance of VMM in server consolidation.
暂无评论