The use of virtual cluster for High Performance Computing (HPC) work has a great benefit of hiding the complexity of physical infrastructure while providing a familiar HPC environment for users. Nevertheless, setting ...
详细信息
ISBN:
(纸本)9781479908059
The use of virtual cluster for High Performance Computing (HPC) work has a great benefit of hiding the complexity of physical infrastructure while providing a familiar HPC environment for users. Nevertheless, setting up one is still a challenging task for most users. In addition, the ability to span a virtual cluster across a multi-site cloud can even create a great potential for users to harness a much higher processing power from the cloud. In this paper, the development of a multi-site virtual cluster cloud is presented. This is done by providing the cloud infrastructures tailored specifically for virtual cluster deployment along with related utilities such as web-interface monitor and command line tools. To realize this infrastructure, an overlay network is created using Virtual Private Network (VPN) technology to merge every site into a single broadcast domain. Moreover, a Multi-tier VPN network topology is proposed to enhance the communication performance among the multi-site cloud. A smart virtual machine scheduling mechanism is introduced to reduce performance degradation caused by network delays. The experimental results show that the virtual cluster works well with highly parallel task with low communication among task. Thus, this technology can be used to support many classes of important HPC applications.
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where ...
详细信息
The primitive of proxy signatures allows the original signer to delegate proxy signers to sign on messages on behalf of the original signer. It has found numerous applications in distributed computing scenarios where delegation of signing rights is common. Certificate less public key cryptography eliminates the complicated certificates in traditional public key cryptosystems without suffering from the key escrow problem in identity-based public key cryptography. In this paper, we reveal the relationship between the two important primitives of proxy signatures and certificate less signatures and present a generic conversion from the latter to the former. Following the generic transformation, we propose an efficient proxy signature scheme with a recent certificate less signature scheme.
This paper proposes a new efficient algorithm for mining share-frequent itemsets from BitTable knowledge - extracted once from a transaction database. The knowledge contains sufficient information for such a mining ta...
详细信息
A buyer coalition is a group of buyers who join together to negotiate with sellers to purchase items for a larger discount. In this article, a novel buyer coalition scheme, called the "GroupSimilarBuyer Scheme, &...
详细信息
In this paper, we address the problem of multitarget tracking with unknown measurement noise variance parameters by the probability hypothesis density (PHD) filter. Based on the concept of conjugate prior distribution...
详细信息
ISBN:
(纸本)9781467357159
In this paper, we address the problem of multitarget tracking with unknown measurement noise variance parameters by the probability hypothesis density (PHD) filter. Based on the concept of conjugate prior distributions for noise statistics, the inverse-Gamma distributions are employed to describe the dynamics of the noise variance parameters and a novel implementation to the PHD recursion is developed by representing the predicted and the posterior intensities as mixtures of Gaussian-inverse-Gamma terms. As the target state and the noise variance parameters are coupled in the likelihood functions, the variational Bayesian approximation approach is applied so that the posterior is derived in the same form as the prior and the resulting algorithm is recursive. A numerical example is provided to illustrate the effectiveness of the proposed filter.
This paper is devoted to the finite-time control problem for multiple manipulators, where unmodeled dynamics is taken into consideration. An effective coordinated control strategy is introduced, under which distribute...
详细信息
ISBN:
(纸本)9781479901777
This paper is devoted to the finite-time control problem for multiple manipulators, where unmodeled dynamics is taken into consideration. An effective coordinated control strategy is introduced, under which distributed protocols with continuous feedbacks are proposed. By applying the homogeneous theory for stability analysis, it is proven that the multi-robot system can be globally finite-time stabilized through our protocols. Numerical simulations on four manipulators with two degrees of freedom are presented to validate the effectiveness of the control strategy.
Integrated Development Environments (IDE) generate multiple graphical and textual representations of programs. Co-ordination of these representations during program comprehension and debugging can be a complex task. I...
详细信息
This paper studies the problem of state estimation for jump Markov linear systems with uncompensated biases. By describing the state and the measurement biases as additive random variables, a suboptimal filter has bee...
详细信息
ISBN:
(纸本)9781479901777
This paper studies the problem of state estimation for jump Markov linear systems with uncompensated biases. By describing the state and the measurement biases as additive random variables, a suboptimal filter has been developed by applying the basic interacting multiple model (IMM) approach. To derive a precise representation of the biases contributions to the state estimation, three auxiliary matrices are introduced with respect to the correlation between the state estimation errors and the biases, which helps to derive mode-conditioned estimates in the framework of the IMM. A numerical example involving tracking a maneuvering target is provided to compare the performance of the proposed filter with that of the augmented state filter.
This paper describes the development of a course in Programming Concepts over a period of a decade. Initially we present educational principles that underlie the approach, as well as specific and generic aims for this...
详细信息
Cloud computing will be a main informa- tion infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for c...
详细信息
Cloud computing will be a main informa- tion infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key distribu- tion, feature template creation, cloud data processing and secure data access control. Finally, we compare the pro- posed scheme with other schemes through comprehensive analysis and simulation. The results show that the pro- posed data access scheme is feasible and secure for cloud computing.
暂无评论