{"title":"A Cost-Based Resource Scheduling Paradigm in Cloud Computing","authors":"Zhi Yang, Changqing Yin, Yan Liu","doi":"10.1109/PDCAT.2011.1","DOIUrl":"https://doi.org/10.1109/PDCAT.2011.1","url":null,"abstract":"Infrastructure as a Service (IaaS) is the most common and fundamental type of cloud computing. It provides on-demand rent and access to virtual machine and storage. In this type of cloud computing, infrastructure service suppliers and users form a resource market. In this paper, we present a cost-based resource scheduling paradigm in cloud computing by leveraging market theory to schedule compute resources to meet user's requirement. The set of computing resources with the lowest price are assigned to the user according to current suppliers' resource availability and price. We design an algorithm and protocol for cost-based cloud resource scheduling. This scheduling paradigm is implemented and evaluated in Java Cloud ware, the pure Java based private cloud platform.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128129969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Analysis of Email Worm Propagation Based on Stochastic Game Nets","authors":"Min Yu, Yuanzhuo Wang, Li Liu, Xueqi Cheng","doi":"10.1109/PDCAT.2011.55","DOIUrl":"https://doi.org/10.1109/PDCAT.2011.55","url":null,"abstract":"In this paper, we propose a model of email worm propagation based on a novel modeling method, Stochastic Game Nets (SGN), and use this model to analyze the rampant propagation issues of email worm. Combination the conceptual framework of SGN with the practical problems, we get some remarks based on the definitions of SGN in order to precisely describe the details of email worm propagation. An algorithm for solving the equilibrium strategy is presented to calculate the model of SGN. Finally we analyze our research result with several figures, such as infection rate and average propagation time. The results of our work can also offer some references for email users to defend email worms.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115024890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SmartAgents: A Scalable Infrastructure for Smart Car","authors":"Jie Sun, Yongping Zhang, Jianbo Fan","doi":"10.1109/PDCAT.2011.75","DOIUrl":"https://doi.org/10.1109/PDCAT.2011.75","url":null,"abstract":"The smart car is becoming a promising application domain of ubiquitous computing, which aims at assisting the driver with easier driving, less workload and less chance of getting injured. The multi-agent technology is a natural technological approach to implement the smart car. In this paper, we propose a multi-agent framework: Smart Agent, which is developed specifically for smart car. We define and implement five agents according to their functionality. The Smart Agents can acquire environment context, make certain decisions based on the predefined policies and the information received from sensors, and react to the driving environment.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114665997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"XunleiProbe: A Sensitive and Accurate Probing on a Large-Scale P2SP System","authors":"Yong Zhao, Zhibin Zhang, Li Guo, Binxing Fang","doi":"10.1109/PDCAT.2011.83","DOIUrl":"https://doi.org/10.1109/PDCAT.2011.83","url":null,"abstract":"Xunlei [1] is a new P2P content distribution system which is popular in China. It composes traditional HTTP/FTP downloading and P2P content distribution features which attract many people including researchers. Xunlei's network is Bit Torrent-like and the measurement is more difficult than other P2P networks [2]. There are many constrains on Xunlei tracker, so we can not obtain information from tracker easily. Besides this, the measurement will encounter some challenges that skew the results. Most of previous works on Bit Torrent system are based on tracker logs. However, we can not obtain tracker logs of Xunlei. As far as we know, there is no proposal about precise and detailed measurement method that probes the network directly in this area. Face to the challenges, we analyze the constrains that appear in most Bit Torrent-like systems and propose a stratified random selection model to describe the behavior of tracker. Based on the model, we design a measurement tool called XunleiProbe. With the help of our solutions that increase the accuracy of our results, we measure a popular swarm for about 22 hours. The results show that the average peer coverage of our tool can reach about 93%.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124451622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. R. Valêncio, L. R. Costa, Carlos Henrique El Hetti Laurenti, A. Cansian
{"title":"Application of Ontologies in Peer-to-Peer Database with Routing Queries Based on Ant Colony Algorithm","authors":"C. R. Valêncio, L. R. Costa, Carlos Henrique El Hetti Laurenti, A. Cansian","doi":"10.1109/PDCAT.2011.22","DOIUrl":"https://doi.org/10.1109/PDCAT.2011.22","url":null,"abstract":"A significant set of information stored in different databases around the world, can be shared through peer-to-peer databases. With that, is obtained a large base of knowledge, without the need for large investments because they are used existing databases, as well as the infrastructure in place. However, the structural characteristics of peer-to-peer, makes complex the process of finding such information. On the other side, these databases are often heterogeneous in their schemas, but semantically similar in their content. A good peer-to-peer databases systems should allow the user access information from databases scattered across the network and receive only the information really relate to your topic of interest. This paper proposes to use ontologies in peer-to-peer database queries to represent the semantics inherent to the data. The main contribution of this work is enable integration between heterogeneous databases, improve the performance of such queries and use the algorithm of optimization Ant Colony to solve the problem of locating information on peer-to-peer networks, which presents an improve of 18% in results.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122992329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Elder Vicente, Rivalino Matias, Autran Macêdo, Lucio Borges de Araujo
{"title":"Evaluation of Compound System Calls in the Linux Kernel on Physical and Virtual Machines","authors":"Elder Vicente, Rivalino Matias, Autran Macêdo, Lucio Borges de Araujo","doi":"10.1109/PDCAT.2011.39","DOIUrl":"https://doi.org/10.1109/PDCAT.2011.39","url":null,"abstract":"The high use of system calls in many applications has motivated research works focusing on reducing the overhead caused by these calls. In this work we implement three types of compound system calls, which are evaluated experimentally by taking into account their execution time in systems with 1 to 8 cores. We also investigate the system calls running in both physical and virtual machines. All proposed compound system calls present performance gains when compared to their conventional counterparts. The results indicate reduction in the execution time up to 58 percent. The dataset obtained through controlled experiments is analyzed using ANOVA and Tukey tests. We also verify that the highest improvements occur in the non-virtualized environment.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of OpenMP Constructs and Kernel Benchmarks on a Loongson-3A Quad-Core SMP System","authors":"Qiuming Luo, Chang Kong, Ye Cai, Gang Liu","doi":"10.1109/PDCAT.2011.66","DOIUrl":"https://doi.org/10.1109/PDCAT.2011.66","url":null,"abstract":"As a competitor and alternative to mainstream general-purpose CPU (Intel/AMD/etc.), Loongson is a family of general-purpose MIPS-compatible CPUs developed at the ICT of CAS in China. The quad-core Loongson 3A is evaluated in this paper. The performance of the basic OpenMP constructs on Loongson-3A quad-core SMP is obtained by applying the EPCC Micro benchmarks. And then the performance of NAS kernel codes is obtained by applying NAS Parallel Benchmarks (NPB). These benchmarking are carried out for three different OpenMP compilers (and the runtime system), which includes GCC, OMPipth (OMPi with pthread library) and OMPi-psth (OMPi with psthread library). The results show that OMPI-pth's performance is the best and OMPi-psth's performance is the worst. Those test results might help to program the OpenMP codes as well as to select the appropriate compiler and its runtime system. And an Intel core i5 quad-core platform is used for comparison purpose, by running NPB, which implies that Loongson 3A's performance is nearly one tenth of i5's. The NPB results can help to defining a Loongson system's scale when replacing an Intel i5 system for a given problem size.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121574125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access Pattern Based Re-reference Interval Table for Last Level Cache","authors":"B. Yu, Yifan Hu, Jianliang Ma, Tianzhou Chen","doi":"10.1109/PDCAT.2011.13","DOIUrl":"https://doi.org/10.1109/PDCAT.2011.13","url":null,"abstract":"The memory access stream to the last level cache (LLC) is a filtered version from the upper level caches. There are a large number of cache blocks with long re-reference interval in the LLC. What's worse, zero reuse blocks are in abundance in the LLC and pollute the LLC for a long time. Access pattern based re-reference interval table (RRIT), here we propose, is an efficient management technology for the LLC. RRIT introduces a table to track consecutive blocks' re-reference interval. And then predicts the re-reference interval for a new incoming block. RRIT always selects the block with the max re-reference interval as the victim block when a cache replacement issue occurs. Furthermore, we propose a dead block filtering (RRIT-Filter) mechanism based on RRIT. RRIT-Filter bypasses the predicted dead block and improves LLC efficiency. Our evaluations using the SPEC2006 workloads on a single-core with a 2MB LLC show that RRIT and RRIT-Filter outperform LRU replacement on the throughput metric by an average of 6.6% and 8.6% respectively. Our evaluations with 10 multi-programmed workloads on a 4-core CMP with an 8MB shared LLC show that our strategy outperforms LRU replacement on the throughput metric by an average of 23% and 39% respectively.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129451441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Stefan Werner, C. Reinke, Sven Groppe, V. Linnemann
{"title":"Adaptive Service Migration in Wireless Sensor Networks","authors":"Stefan Werner, C. Reinke, Sven Groppe, V. Linnemann","doi":"10.1109/PDCAT.2011.15","DOIUrl":"https://doi.org/10.1109/PDCAT.2011.15","url":null,"abstract":"While the paradigm of service oriented architectures and also the concept of service migration has been adapted to wireless sensor networks recently, the consistency demands of stateful service migration have not yet been considered in depth. Many services, for example for the aggregation of data or alarm services, require strict consistency when being migrated from one sensor node to another. In previous papers, we described how atomic commit protocols can be used to guarantee strict consistency of migrated services. Additional communication is required to achieve strict consistency. Therefore we varied the network conditions (i.e. loss rate, density) to determine the best solution in different situations. Finally we designed an adaptive approach which uses the ideal combination of transaction protocol and routing protocol to reduce the communication overhead and save energy to increase the lifetime of wireless sensor network deployments.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guaranteed Scheduling for (m,k)-firm Deadline-Constrained Real-Time Tasks on Multiprocessors","authors":"Yeonhwa Kong, Hyeonjoong Cho","doi":"10.1109/PDCAT.2011.44","DOIUrl":"https://doi.org/10.1109/PDCAT.2011.44","url":null,"abstract":"We present a guaranteed real-time scheduling algorithm for multiple real-time tasks subject to (m,k)-firm deadlines on homogeneous multiprocessors. The scheduling objective of the proposed algorithm is to provide guaranteed performance by bounding the probability of missing (m,k)-firm deadline constraints while improving the probability of deadline satisfactions as much as possible. This goal is established to satisfy the minimum requirements expressed by (m,k)-firm deadlines and simultaneously provide the best possible quality of service. We analytically establish that the proposed algorithm provides assurance on the bounded probability of missing (m,k)-firm constraints. Experimental studies validate our analytical results and confirm the effectiveness and superiority of the proposed scheme in achieving our scheduling objective.","PeriodicalId":137617,"journal":{"name":"2011 12th International Conference on Parallel and Distributed Computing, Applications and Technologies","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}