Dynamic Grouping Strategy in Cloud Computing
|
|
- Julian Stanley
- 5 years ago
- Views:
Transcription
1 IEEE CGC 2012, November 1-3, Xiangtan, Hunan, China Dynamic Grouping Strategy in Cloud Computing Presenter : Qin Liu a Joint work with Yuhong Guo b, Jie Wu b, and Guojun Wang a a Central South University, China b Temple University, USA 1
2 Outline Introduction Preliminaries K-Mean-based Dynamic Grouping Extensions Evaluation Conclusion & Future work 2
3 Introduction 3
4 Cloud computing model o Cloud computing has emerged as a new type of commercial paradigm due to its overwhelming advantages, such as flexibility, scalability, and cost efficiency F 1 : 1 :{A, B} B} A, B Cloud F 2 : 2 :{B, D} D} Bob F 1 F F 3 : 3 :{C, D} D} 4
5 Application scenario University A Cloud Online library Access right Online library 5 Staffs &students
6 Problem: Cost grows linearly University A Alice {A,B} {F1,F2,F4} Redundant files: F1,F3: 2 F2,F4: 3 Bob Clark {A} {F1,F2} {C,D} {F2,F3,F4} {C} {F3,F4} 6 Donland
7 New chanllenge Alice University A {A,B} Deploy proxies inside Aggregate user queries Distribute search results Bob {F1, F2, F4} {A} {F1, F2} Proxy 1 {A,B} {F1, F2, F4} 7 Clark {C} {C, D} {F2, F3, F4} Proxy 2 Donland Return 6 files How to group queries to minimize the returned files? {F3, F4} {C, D} {F2, F3, F4}
8 Naïve solution: Random grouping Alice Clark Bob Donland University A {A,B} {F1, F2, F4} {C, D} {F2, F3, F4} {A} {F1, F2} {C} {F3, F4} Proxy 1 Proxy 2 Problems: Random grouping cause a waste of bandwidth {A,B} {F1, F2, F3 F4} {C, D} {F1,F2, F3, F4} Return 8 files Waste 20% bandwidth 8
9 Naïve solution: One proxy Alice University A {A,B} {F1, F2, F4} Problem: One proxy causes performance bottleneck and single point of failure Clark Bob Donland {C, D} {F2, F3, F4} {A} {F1, F2} {C} {F3, F4} Proxy {A,B,C, D} {F1,F2,F3,F4} Return 4 files Best performance 9
10 K-Mean-based Dynamic Grouping (KMDG) Classify n queries into k groups in the case of k proxy servers, so that each group size equals to n/k and the number of returned files is minimized. NP-Hard problem Heuristic grouping strategy Basic strategy: KMDG (based on K-Means) Extensions: KMDG1-Robust version KMDG2-Relax the constraint of equal group size 10
11 Design goals Effectiveness Cost efficiency Obtain optimal results within a polynomial time Load balancing Balance the bandwidth among proxies Minimize the bandwidth at at the cloud Robustness Obtain search results even if if some machines fail 11
12 Preliminaries 12
13 System model The cloud, many users, and many proxy servers Query router (QR) Aggregation and distribution machines (ADMs) 13
14 System model Given a public dictionary consisting of all keywords University A A user query/a combined query is a 0-1 bit string Alice Clark Bob {A,B} <1100> {C, D} <0011> {A} <1000> {C} <0010> Proxy {A,B,C, D} <1111> Dictionary=<A,B,C D> 14 Donland
15 Problem formulation Assumption Keywords are uniformly distributed in the file set The probability of each keyword in a file is the same 15 Minimize the total returned files = Minimize the number of keywords in combined queries Group queries with the most common keywords together Minimize the total number of 1s in the combined queries
16 Parameter analysis The expected value of the number of returned files can be calculated with Eq.1 d: the number of keywords in the dictionary γ: the average number of keywords in a file k: the number of groups/proxies t: the number of files in the cloud (grouping cost) : the average number of keywords in the j-th combined query (1) 16
17 K-Mean-based Dynamic Grouping (KMDG) 17
18 Definitions 18
19 High level ideas Suppose each query denotes a node 19
20 High level ideas An improvement: First choose a random node as the seed. For the i-th seed, choose the one with the total maximal distance with all i-1 seeds 20
21 High level ideas Closet: the minimal number of increased 1s after being combined with the seed s1=1100, s2=0011, s3=1001, s4=0101; Q=
22 High level ideas After choosing k seeds, grouping process is performed in the same way in next round 22
23 Algorithm 23
24 Example Sample Queries 24
25 Extensions 25
26 KMDG1-Algorithm Each user generates 2 α k query copies with the constraint that α copies are in different groups 26
27 KMDG1-Example 27
28 KMDG2-Algorithm Relax the constraint of equal group size to further reduce bandwidth 28
29 KMDG2-Example 29
30 Evaluation 30
31 Parameters Simulations are conducted with MATLAB R2010a, running on a local machine with an Intel Core 2 Duo E GHz CPU and 8 GB RAM Summary of parameters 31
32 Performance Comparison of total number of 1s. X-axis denotes the number of users and Y-axis denotes the total number of 1s. 32
33 Performance Comparison of bandwidth at the cloud. X-axis denotes the number of users and Y-axis denotes bandwidth at the cloud (MB) 33
34 Load balancing Comparison of imbalanced transfer-in bandwidth. X-axis denotes the number of users and Y-axis denotes the imbalanced transfer-in bandwidth (MB) 34
35 Load balancing Comparison of imbalanced transfer-out bandwidth. X-axis denotes the number of users and Y-axis denotes the imbalanced transfer-out bandwidth (MB) 35
36 Conclusion & Future work 1 A dynamic grouping strategy is proposed to achieve cost efficiency, load balancing, and robustness in cloud computing 2 Experiment results show that KMDG can largely reduce the bandwidth incurred at the cloud 3 Conduct experiments on other keyword distributions to verify the effectiveness of KMDG 36
37 37 Thank you!
Effective Query Grouping Strategy in Clouds
Liu Q, Guo Y, Wu J et al. Effective query grouping strategy in clouds. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(6): 1231 1249 Nov. 217. DOI 1.17/s1139-17-1797-9 Effective Query Grouping Strategy in
More informationOutsourcing Privacy-Preserving Social Networks to a Cloud
IEEE INFOCOM 2013, April 14-19, Turin, Italy Outsourcing Privacy-Preserving Social Networks to a Cloud Guojun Wang a, Qin Liu a, Feng Li c, Shuhui Yang d, and Jie Wu b a Central South University, China
More informationClock-Based Proxy Re-encryption Scheme in Unreliable Clouds
Clock-Based Proxy Re-encryption Scheme in Unreliable Clouds Qin Liu [1][2], Guojun Wang [1], and Jie Wu [2], [1] Central South University, China [2] Temple University, USA 1 Outline 1. 1. Introduction
More informationCooperative Private Searching in Clouds
Cooperative Private Searching in Clouds Jie Wu Department of Computer and Information Sciences Temple University Road Map Cloud Computing Basics Cloud Computing Security Privacy vs. Performance Proposed
More informationEfficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Qin Liu, Chiu C. Tan, Jie Wu, and Guojun Wang School of Information Science and Engineering, Central South University,
More informationHCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems
HCBE: Achieving Fine-Grained Access Control in Cloud-based PHR Systems Xuhui Liu [1], Qin Liu [1], Tao Peng [2], and Jie Wu [3] [1] Hunan University, China [2] Central South University, China [3] Temple
More informationFault-Tolerant and Secure Data Transmission Using Random Linear Network Coding
Fault-Tolerant and Secure Data Transmission Using Random Linear Network Coding Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu
More informationMulti-resource Energy-efficient Routing in Cloud Data Centers with Network-as-a-Service
in Cloud Data Centers with Network-as-a-Service Lin Wang*, Antonio Fernández Antaº, Fa Zhang*, Jie Wu+, Zhiyong Liu* *Institute of Computing Technology, CAS, China ºIMDEA Networks Institute, Spain + Temple
More informationOptimal Slice Allocation in 5G Core Networks
arxiv:182.4655v3 [cs.ni] 19 Dec 18 Optimal Slice Allocation in 5G Core Networks Danish Sattar Ashraf Matrawy Department of Systems and Computer Engineering Carleton University Ottawa, Canada danish.sattar@carleton.ca
More informationClustering Analysis for Malicious Network Traffic
Clustering Analysis for Malicious Network Traffic Jie Wang, Lili Yang, Jie Wu and Jemal H. Abawajy School of Information Science and Engineering, Central South University, Changsha, China Email: jwang,liliyang@csu.edu.cn
More informationover Multi Label Images
IBM Research Compact Hashing for Mixed Image Keyword Query over Multi Label Images Xianglong Liu 1, Yadong Mu 2, Bo Lang 1 and Shih Fu Chang 2 1 Beihang University, Beijing, China 2 Columbia University,
More informationRIGHTNOW A C E
RIGHTNOW A C E 2 0 1 4 2014 Aras 1 A C E 2 0 1 4 Scalability Test Projects Understanding the results 2014 Aras Overview Original Use Case Scalability vs Performance Scale to? Scaling the Database Server
More informationOutsourcing Privacy-Preserving Social Networks to a Cloud
IEEE TRANSACTIONS ON SOCIAL NETWORKING YEAR 23 Outsourcing Privacy-Preserving Social Networks to a Cloud Guojun Wang, Qin Liu, Feng Li, Shuhui Yang, and Jie Wu School of Information Science and Engineering,
More informationPerformance Analysis of Storage-Based Routing for Circuit-Switched Networks [1]
Performance Analysis of Storage-Based Routing for Circuit-Switched Networks [1] Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University, China
More informationMULTI-LAYER VIDEO STREAMING WITH HELPER NODES USING NETWORK CODING
MULTI-LAYER VIDEO STREAMING WITH HELPER NODES USING NETWORK CODING Pouya Ostovari, Abdallah Khreishah, and Jie Wu Computer and Information Sciences Temple University IEEE MASS 2013 Center for Networked
More informationIntroduction. Architecture Overview
Performance and Sizing Guide Version 17 November 2017 Contents Introduction... 5 Architecture Overview... 5 Performance and Scalability Considerations... 6 Vertical Scaling... 7 JVM Heap Sizes... 7 Hardware
More informationEfficient Subgraph Matching by Postponing Cartesian Products
Efficient Subgraph Matching by Postponing Cartesian Products Computer Science and Engineering Lijun Chang Lijun.Chang@unsw.edu.au The University of New South Wales, Australia Joint work with Fei Bi, Xuemin
More informationParallels Remote Application Server. Scalability Testing with Login VSI
Parallels Remote Application Server Scalability Testing with Login VSI Contents Introduction... 3 Scalability... 4 Testing the Scalability of Parallels RAS... 4 Configurations for Scalability Testing...
More informationHardware Sizing Guide OV
Hardware Sizing Guide OV3600 6.3 www.alcatel-lucent.com/enterprise Part Number: 0510620-01 Table of Contents Table of Contents... 2 Overview... 3 Properly Sizing Processing and for your OV3600 Server...
More informationcs/ee 143 Fall
cs/ee 143 Fall 2018 13 4 Internetworking 4.1 W&P, P6.1 (a) 2 points. How many IP addresses need to be leased from an ISP to support a DHCP server (with L ports) that uses NAT to service N clients at the
More informationTime-Based Proxy Re-encryption Review
Time-Based Proxy Re-encryption Review Meghatai Maruti Bhoite 1, I Govardhan Rao 2 CSE, University College of Engineering Osmania University, Hyderabad, India Abstract :- Fundamentals approach for secure
More informationNON-CENTRALIZED DISTINCT L-DIVERSITY
NON-CENTRALIZED DISTINCT L-DIVERSITY Chi Hong Cheong 1, Dan Wu 2, and Man Hon Wong 3 1,3 Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong {chcheong, mhwong}@cse.cuhk.edu.hk
More informationWeb caches (proxy server) Applications (part 3) Applications (part 3) Caching example (1) More about Web caching
By the end of this lecture, you should be able to. Explain the idea of edge delivery Explain the operation of CDNs Explain the operation of P2P file sharing systems such as Napster and Gnutella Web caches
More informationAutomated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University
D u k e S y s t e m s Automated Control for Elastic Storage Harold Lim, Shivnath Babu, Jeff Chase Duke University Motivation We address challenges for controlling elastic applications, specifically storage.
More informationExperimental Model for Load Balancing in Cloud Computing Using Throttled Algorithm
Experimental Model for Load Balancing in Cloud Computing Using Throttled Algorithm Gema Ramadhan 1, Tito Waluyo Purboyo 2, Roswan Latuconsina 3 Research Scholar 1, Lecturer 2,3 1,2,3 Computer Engineering,
More informationMulti-path based Algorithms for Data Transfer in the Grid Environment
New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School
More informationScalability Testing with Login VSI v16.2. White Paper Parallels Remote Application Server 2018
Scalability Testing with Login VSI v16.2 White Paper Parallels Remote Application Server 2018 Table of Contents Scalability... 3 Testing the Scalability of Parallels RAS... 3 Configurations for Scalability
More informationPreliminary Research on Distributed Cluster Monitoring of G/S Model
Available online at www.sciencedirect.com Physics Procedia 25 (2012 ) 860 867 2012 International Conference on Solid State Devices and Materials Science Preliminary Research on Distributed Cluster Monitoring
More informationMicrosoft Office is a collection of programs that you will be already using in school. This includes Word, PowerPoint, Publisher, Excel etc..
i Contents Introduction... 1 What is Office for Personal Devices?... 1 How do I get Office for Personal Devices?... 2 How to download... 3 How to Install... 3 Can My Computer Run It?... 4 Minimum Requirements...
More informationTowards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage Chenxi Qiu
Towards Green Cloud Computing: Demand Allocation and Pricing Policies for Cloud Service Brokerage Chenxi Qiu Holcombe Department of Electrical and Computer Engineering Outline 1. Introduction 2. Algorithm
More informationSSD-based Information Retrieval Systems
Efficient Online Index Maintenance for SSD-based Information Retrieval Systems Ruixuan Li, Xuefan Chen, Chengzhou Li, Xiwu Gu, Kunmei Wen Huazhong University of Science and Technology Wuhan, China SSD
More informationFinal Exam. Introduction to Artificial Intelligence. CS 188 Spring 2010 INSTRUCTIONS. You have 3 hours.
CS 188 Spring 2010 Introduction to Artificial Intelligence Final Exam INSTRUCTIONS You have 3 hours. The exam is closed book, closed notes except a two-page crib sheet. Please use non-programmable calculators
More informationExtending SLURM with Support for GPU Ranges
Available on-line at www.prace-ri.eu Partnership for Advanced Computing in Europe Extending SLURM with Support for GPU Ranges Seren Soner a, Can Özturana,, Itir Karac a a Computer Engineering Department,
More informationUsing Global Behavior Modeling to improve QoS in Cloud Data Storage Services
2 nd IEEE International Conference on Cloud Computing Technology and Science Using Global Behavior Modeling to improve QoS in Cloud Data Storage Services Jesús Montes, Bogdan Nicolae, Gabriel Antoniu,
More informationRisk-Aware Rapid Data Evacuation for Large- Scale Disasters in Optical Cloud Networks
Risk-Aware Rapid Data Evacuation for Large- Scale Disasters in Optical Cloud Networks Presenter: Yongcheng (Jeremy) Li PhD student, School of Electronic and Information Engineering, Soochow University,
More informationTHE proliferation of handheld mobile devices and wireless
1 NetVision: On-demand Video Processing in Wireless Networks Zongqing Lu Member, IEEE, Kevin Chan Member, IEEE, Rahul Urgaonkar, and Thomas La Porta Fellow, IEEE Abstract The vast adoption of mobile devices
More informationSSD-based Information Retrieval Systems
HPCC 2012, Liverpool, UK Efficient Online Index Maintenance for SSD-based Information Retrieval Systems Ruixuan Li, Xuefan Chen, Chengzhou Li, Xiwu Gu, Kunmei Wen Huazhong University of Science and Technology
More informationSimulation of Cloud Computing Environments with CloudSim
Simulation of Cloud Computing Environments with CloudSim Print ISSN: 1312-2622; Online ISSN: 2367-5357 DOI: 10.1515/itc-2016-0001 Key Words: Cloud computing; datacenter; simulation; resource management.
More informationCLUSTER HEAD SELECTION USING QOS STRATEGY IN WSN
CLUSTER HEAD SELECTION USING QOS STRATEGY IN WSN Nidhi Bhatia Manju Bala Varsha Research Scholar, Khalsa College of Engineering Assistant Professor, CTIEMT Shahpur Jalandhar, & Technology, Amritsar, CTIEMT
More informationLoad Balancing Algorithm over a Distributed Cloud Network
Load Balancing Algorithm over a Distributed Cloud Network Priyank Singhal Student, Computer Department Sumiran Shah Student, Computer Department Pranit Kalantri Student, Electronics Department Abstract
More informationSensor Tasking and Control
Sensor Tasking and Control Outline Task-Driven Sensing Roles of Sensor Nodes and Utilities Information-Based Sensor Tasking Joint Routing and Information Aggregation Summary Introduction To efficiently
More informationPerformance Extrapolation for Load Testing Results of Mixture of Applications
Performance Extrapolation for Load Testing Results of Mixture of Applications Subhasri Duttagupta, Manoj Nambiar Tata Innovation Labs, Performance Engineering Research Center Tata Consulting Services Mumbai,
More informationJoint Optimization of Server and Network Resource Utilization in Cloud Data Centers
Joint Optimization of Server and Network Resource Utilization in Cloud Data Centers Biyu Zhou, Jie Wu, Lin Wang, Fa Zhang, and Zhiyong Liu Beijing Key Laboratory of Mobile Computing and Pervasive Device,
More informationR-Storm: A Resource-Aware Scheduler for STORM. Mohammad Hosseini Boyang Peng Zhihao Hong Reza Farivar Roy Campbell
R-Storm: A Resource-Aware Scheduler for STORM Mohammad Hosseini Boyang Peng Zhihao Hong Reza Farivar Roy Campbell Introduction STORM is an open source distributed real-time data stream processing system
More informationDONAR Decentralized Server Selection for Cloud Services
DONAR Decentralized Server Selection for Cloud Services Patrick Wendell, Princeton University Joint work with Joe Wenjie Jiang, Michael J. Freedman, and Jennifer Rexford Outline Server selection background
More informationEnhancing Software-Defined RAN with Collaborative Caching and Scalable Video Coding
Enhancing Software-Defined RAN with Collaborative Caching and Scalable Video Coding Ruozhou Yu, Shuang Qin, Mehdi Bennis, Xianfu Chen, Gang Feng, Zhu Han, Guoliang Xue Agenda Introduction Problem Formulation
More informationEfficient Load Balancing and Disk Failure Avoidance Approach Using Restful Web Services
Efficient Load Balancing and Disk Failure Avoidance Approach Using Restful Web Services Neha Shiraz, Dr. Parikshit N. Mahalle Persuing M.E, Department of Computer Engineering, Smt. Kashibai Navale College
More informationA new caching policy for cloud assisted Peer-to-Peer video on-demand services
A new caching policy for cloud assisted Peer-to-Peer video on-demand services Franco Robledo, Pablo Rodríguez-Bocca, Pablo Romero and Claudia Rostagnol Facultad de Ingeniería, Universidad de la República.
More informationVIAF: Verification-based Integrity Assurance Framework for MapReduce. YongzhiWang, JinpengWei
VIAF: Verification-based Integrity Assurance Framework for MapReduce YongzhiWang, JinpengWei MapReduce in Brief Satisfying the demand for large scale data processing It is a parallel programming model
More informationA Firewall Architecture to Enhance Performance of Enterprise Network
A Firewall Architecture to Enhance Performance of Enterprise Network Hailu Tegenaw HiLCoE, Computer Science Programme, Ethiopia Commercial Bank of Ethiopia, Ethiopia hailutegenaw@yahoo.com Mesfin Kifle
More informationWIRELESS broadband networks are being increasingly
1960 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 24, NO. 11, NOVEMBER 2006 Joint Channel Assignment and Routing for Throughput Optimization in Multiradio Wireless Mesh Networks Mansoor Alicherry,
More informationRobust Wireless Delivery of Scalable Videos using Inter-layer Network Coding
Robust Wireless Delivery of Scalable Videos using Inter-layer Network Coding Pouya Ostovari and Jie Wu Department of Computer & Information Sciences, Temple University, Philadelphia, PA 19122 Abstract
More informationResearch and Implementation of Server Load Balancing Strategy in Service System
Journal of Electronics and Information Science (2018) 3: 16-21 Clausius Scientific Press, Canada Research and Implementation of Server Load Balancing Strategy in Service System Yunpeng Zhang a, Liwei Liu
More informationUtilizing Datacenter Networks: Centralized or Distributed Solutions?
Utilizing Datacenter Networks: Centralized or Distributed Solutions? Costin Raiciu Department of Computer Science University Politehnica of Bucharest We ve gotten used to great applications Enabling Such
More informationAn Evaluation of an Energy Efficient Many-Core SoC with Parallelized Face Detection
An Evaluation of an Energy Efficient Many-Core SoC with Parallelized Face Detection Hiroyuki Usui, Jun Tanabe, Toru Sano, Hui Xu, and Takashi Miyamori Toshiba Corporation, Kawasaki, Japan Copyright 2013,
More informationDevice-to-Device Networking Meets Cellular via Network Coding
Device-to-Device Networking Meets Cellular via Network Coding Yasaman Keshtkarjahromi, Student Member, IEEE, Hulya Seferoglu, Member, IEEE, Rashid Ansari, Fellow, IEEE, and Ashfaq Khokhar, Fellow, IEEE
More informationContents Overview of the Compression Server White Paper... 5 Business Problem... 7
P6 Professional Compression Server White Paper for On-Premises Version 17 July 2017 Contents Overview of the Compression Server White Paper... 5 Business Problem... 7 P6 Compression Server vs. Citrix...
More informationSome Routing Challenges in Dynamic Networks
Some Routing Challenges in Dynamic Networks Jie Wu Dept. of Computer and Information Sciences Temple University Overview 1. Current State of Networking More Wireless Mobile and Opportunistic Applications
More informationRelational Model, Relational Algebra, and SQL
Relational Model, Relational Algebra, and SQL August 29, 2007 1 Relational Model Data model. constraints. Set of conceptual tools for describing of data, data semantics, data relationships, and data integrity
More informationMining Frequent Itemsets for data streams over Weighted Sliding Windows
Mining Frequent Itemsets for data streams over Weighted Sliding Windows Pauray S.M. Tsai Yao-Ming Chen Department of Computer Science and Information Engineering Minghsin University of Science and Technology
More informationGuaranteeing Heterogeneous Bandwidth Demand in Multitenant Data Center Networks
1648 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 5, OCTOBER 2015 Guaranteeing Heterogeneous Bandwidth Demand in Multitenant Data Center Networks Dan Li, Member, IEEE, Jing Zhu, Jianping Wu, Fellow,
More informationCooperative Mobile Internet Access with Opportunistic Scheduling
Cooperative Mobile Internet Access with Opportunistic Scheduling Pouya Ostovari, Jie Wu, and Abdallah Khreishah Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu
More informationServer Specifications
Requirements Server s It is highly recommended that MS Exchange does not run on the same server as Practice Evolve. Server Minimum Minimum spec. is influenced by choice of operating system and by number
More informationGeometric Steiner Trees
Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 2: Global properties of Euclidean Steiner Trees and GeoSteiner Marcus Brazil
More informationFramework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm
Framework Research on Privacy Protection of PHR Owners in Medical Cloud System Based on Aggregation Key Encryption Algorithm Huiqi Zhao 1,2,3, Yinglong Wang 2,3*, Minglei Shu 2,3 1 Department of Information
More informationModeling and Analysis: System Model
by Gerrit Muller University of South-Eastern Norway-NISE e-mail: gaudisite@gmail.com www.gaudisite.nl Abstract This presentation uses a web shop service as example system to construct a system model. The
More informationEvaluating the Potential of Graphics Processors for High Performance Embedded Computing
Evaluating the Potential of Graphics Processors for High Performance Embedded Computing Shuai Mu, Chenxi Wang, Ming Liu, Yangdong Deng Department of Micro-/Nano-electronics Tsinghua University Outline
More informationReducing Power Consumption in Data Centers by Jointly Considering VM Placement and Flow Scheduling
Journal of Interconnection Networks c World Scientific Publishing Company Reducing Power Consumption in Data Centers by Jointly Considering VM Placement and Flow Scheduling DAWEI LI and JIE WU Department
More informationIngo Brenckmann Jochen Kirsten Storage Technology Strategists SAS EMEA Copyright 2003, SAS Institute Inc. All rights reserved.
Intelligent Storage Results from real life testing Ingo Brenckmann Jochen Kirsten Storage Technology Strategists SAS EMEA SAS Intelligent Storage components! OLAP Server! Scalable Performance Data Server!
More informationCQNCR: Optimal VM Migration Planning in Cloud Data Centers
CQNCR: Optimal VM Migration Planning in Cloud Data Centers Presented By Md. Faizul Bari PhD Candidate David R. Cheriton School of Computer science University of Waterloo Joint work with Mohamed Faten Zhani,
More informationA 3D Point Cloud Registration Algorithm based on Feature Points
International Conference on Information Sciences, Machinery, Materials and Energy (ICISMME 2015) A 3D Point Cloud Registration Algorithm based on Feature Points Yi Ren 1, 2, a, Fucai Zhou 1, b 1 School
More informationDatacenter Simulation Methodologies Case Studies
This work is supported by NSF grants CCF-1149252, CCF-1337215, and STARnet, a Semiconductor Research Corporation Program, sponsored by MARCO and DARPA. Datacenter Simulation Methodologies Case Studies
More informationSpectral Graph Multisection Through Orthogonality. Huanyang Zheng and Jie Wu CIS Department, Temple University
Spectral Graph Multisection Through Orthogonality Huanyang Zheng and Jie Wu CIS Department, Temple University Outline Motivation Preliminary Algorithm Evaluation Future work Motivation Traditional graph
More informationThe Construction of Open Source Cloud Storage System for Digital Resources
2017 3rd International Conference on Electronic Information Technology and Intellectualization (ICEITI 2017) ISBN: 978-1-60595-512-4 The Construction of Open Source Cloud Storage System for Digital Resources
More informationOn the Robustness of Distributed Computing Networks
1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,
More informationA Combined Semi-Pipelined Query Processing Architecture For Distributed Full-Text Retrieval
A Combined Semi-Pipelined Query Processing Architecture For Distributed Full-Text Retrieval Simon Jonassen and Svein Erik Bratsberg Department of Computer and Information Science Norwegian University of
More informationSAP High-Performance Analytic Appliance on the Cisco Unified Computing System
Solution Overview SAP High-Performance Analytic Appliance on the Cisco Unified Computing System What You Will Learn The SAP High-Performance Analytic Appliance (HANA) is a new non-intrusive hardware and
More informationDeltek Vision 7.4 Technical Overview & System Requirements: Basic Deployment ( Employees) 1/28/2015
Deltek Vision 7.4 Technical Overview & System Requirements: Basic Deployment (25-150 Employees) 1/28/2015 Table of Contents Basic Deployment Model (25-150 Employees)... 3 Introduction... 4 Consulting...
More informationSome economical principles
Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Some economical principles Assume users have
More informationMeraki MX Family. Overview
DATASHEET Meraki MX Family Overview The Meraki MX is a complete next generation firewall and branch gateway solution, designed to make distributed networks fast, secure, and easy to manage. The world s
More informationOn the Robustness of Distributed Computing Networks
1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,
More informationGenetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks
Genetic-Algorithm-Based Construction of Load-Balanced CDSs in Wireless Sensor Networks Jing He, Shouling Ji, Mingyuan Yan, Yi Pan, and Yingshu Li Department of Computer Science Georgia State University,
More informationSynthesis of Planar Mechanisms, Part IX: Path Generation using 6 Bar 2 Sliders Mechanism
International Journal of Computer Techniques - Volume 2 Issue 6, Nov- Dec 2015 RESEARCH ARTICLE Synthesis of Planar Mechanisms, Part IX: Path Generation using 6 Bar 2 Sliders Mechanism Galal Ali Hassaan
More informationCoriolis: Scalable VM Clustering in Clouds
1 / 21 Coriolis: Scalable VM Clustering in Clouds Daniel Campello 1 Carlos Crespo 1 Akshat Verma 2 RajuRangaswami 1 Praveen Jayachandran 2 1 School of Computing and Information Sciences
More informationColumn-Stores vs. Row-Stores. How Different are they Really? Arul Bharathi
Column-Stores vs. Row-Stores How Different are they Really? Arul Bharathi Authors Daniel J.Abadi Samuel R. Madden Nabil Hachem 2 Contents Introduction Row Oriented Execution Column Oriented Execution Column-Store
More informationQLogic 2500 Series FC HBAs Accelerate Application Performance
QLogic 2500 Series FC HBAs Accelerate QLogic 8Gb Fibre Channel Adapters from Cavium: Planning for Future Requirements 8Gb Performance Meets the Needs of Next-generation Data Centers EXECUTIVE SUMMARY It
More informationNSFA: Nested Scale-Free Architecture for Scalable Publish/Subscribe over P2P Networks
NSFA: Nested Scale-Free Architecture for Scalable Publish/Subscribe over P2P Networks Huanyang Zheng and Jie Wu Dept. of Computer and Info. Sciences Temple University Road Map Introduction Nested Scale-Free
More informationASN Configuration Best Practices
ASN Configuration Best Practices Managed machine Generally used CPUs and RAM amounts are enough for the managed machine: CPU still allows us to read and write data faster than real IO subsystem allows.
More informationEnhancing Cloud Resource Utilisation using Statistical Analysis
Institute of Advanced Engineering and Science International Journal of Cloud Computing and Services Science (IJ-CLOSER) Vol.3, No.1, February 2014, pp. 1~25 ISSN: 2089-3337 1 Enhancing Cloud Resource Utilisation
More informationEnergy-aware Scheduling for Frame-based Tasks on Heterogeneous Multiprocessor Platforms
Energy-aware Scheduling for Frame-based Tasks on Heterogeneous Multiprocessor Platforms Dawei Li and Jie Wu Temple University, Philadelphia, PA, USA 2012-9-13 ICPP 2012 1 Outline 1. Introduction 2. System
More informationAnalytical Modeling of Parallel Programs
Analytical Modeling of Parallel Programs Alexandre David Introduction to Parallel Computing 1 Topic overview Sources of overhead in parallel programs. Performance metrics for parallel systems. Effect of
More informationCapacity planning and.
Hints on capacity planning (and other approaches) Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ Some economical principles Assume users have
More informationG-NET: Effective GPU Sharing In NFV Systems
G-NET: Effective Sharing In NFV Systems Kai Zhang*, Bingsheng He^, Jiayu Hu #, Zeke Wang^, Bei Hua #, Jiayi Meng #, Lishan Yang # *Fudan University ^National University of Singapore #University of Science
More informationPower-Aware Throughput Control for Database Management Systems
Power-Aware Throughput Control for Database Management Systems Zichen Xu, Xiaorui Wang, Yi-Cheng Tu * The Ohio State University * The University of South Florida Power-Aware Computer Systems (PACS) Lab
More informationEffect of memory latency
CACHE AWARENESS Effect of memory latency Consider a processor operating at 1 GHz (1 ns clock) connected to a DRAM with a latency of 100 ns. Assume that the processor has two ALU units and it is capable
More informationDiffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading
Diffusing Your Mobile Apps: Extending In-Network Function Virtualisation to Mobile Function Offloading Mario Almeida, Liang Wang*, Jeremy Blackburn, Konstantina Papagiannaki, Jon Crowcroft* Telefonica
More informationAn Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing
An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing Qin Liu, Guojun Wang, and Jie Wu School of Information Science and Engineering Central South University Changsha 410083, Hunan Province,
More informationResearch on Heterogeneous Communication Network for Power Distribution Automation
3rd International Conference on Material, Mechanical and Manufacturing Engineering (IC3ME 2015) Research on Heterogeneous Communication Network for Power Distribution Automation Qiang YU 1,a*, Hui HUANG
More informationA Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology
A Randomized Algorithm for Minimizing User Disturbance Due to Changes in Cellular Technology Carlos A. S. OLIVEIRA CAO Lab, Dept. of ISE, University of Florida Gainesville, FL 32611, USA David PAOLINI
More informationUsing Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions
Using Hybrid Algorithm in Wireless Ad-Hoc Networks: Reducing the Number of Transmissions R.Thamaraiselvan 1, S.Gopikrishnan 2, V.Pavithra Devi 3 PG Student, Computer Science & Engineering, Paavai College
More information