2009 Fourth ChinaGrid Annual Conference最新文献

筛选
英文 中文
Multi-objective Optimization Approaches Using a CE-ACO Inspired Strategy to Improve Grid Jobs Scheduling 基于CE-ACO的多目标优化方法改进网格作业调度
2009 Fourth ChinaGrid Annual Conference Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.40
Y. Hu, Bin Gong
{"title":"Multi-objective Optimization Approaches Using a CE-ACO Inspired Strategy to Improve Grid Jobs Scheduling","authors":"Y. Hu, Bin Gong","doi":"10.1109/ChinaGrid.2009.40","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.40","url":null,"abstract":"Grid scheduling is one of the most crucial issue in a grid environment because it strongly affects the performance of the whole system. Taking into account that the issue of allocating jobs on resources is a combinatorial optimization problem, a NP-complete problem, several heuristics have been proposed to provide good performance. In this paper, the proposed approach considers a stochastic optimization called the cross entropy method. The CE method is used to tackle efficiently the initialization sensitiveness problem associated with ant colony algorithm for multi-objective scheduling, which accelerates the convergence rate and improves the ability of searching an optimum solution. Simulation shows that it performs better than the ACO in the integrated performances.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121939089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
To Improve Throughput via Multi-pathing and Parallel TCP on Each Path 通过多路径和并行TCP在每条路径上提高吞吐量
2009 Fourth ChinaGrid Annual Conference Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.32
Jinyu Zhang, Yongzhe Gui, Cheng Liu, Xiaoming Li
{"title":"To Improve Throughput via Multi-pathing and Parallel TCP on Each Path","authors":"Jinyu Zhang, Yongzhe Gui, Cheng Liu, Xiaoming Li","doi":"10.1109/ChinaGrid.2009.32","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.32","url":null,"abstract":"Parallel TCP, which opens multiple TCP connections over a single direct path, and Multi-Pathing, which concurrently uses multiple disjointed paths to transfer data, have both been proved to be effective methods to improve end-to-end throughput. How much throughput can we ultimately achieve between a source and a destination if we use multiple overlay paths and open multiple TCP connections on each used path? In order to find all possible overlay paths of good quality between a source and a destination, a path probing process similar to the path discovery protocol of IEEE 802.5 is started by the destination. A probing packet(a TCP connection request followed by padding data) is flooded across an overlay between the destination and the source. Intermediate overlay nodes selectively accept and forward probing packets. If a probing pack is accepted, a corresponding TCP connection is created. Trade-offs then are made between reducing the probing traffic and keeping multiple TCP connections on each path. The source strips data into small packets and adaptively assigns them to selected overlay paths according to the changing quality of each path. This proposed data transfer technology is evaluated within an overlay that consists of 15 servers on the Internet in China, across 3 different autonomous systems. Experiments show that with this technology, 54% of the measured samples yield a throughput larger than 60Mb/s, which is 60% of the bandwidth that could be possibly obtained(the access bandwidth is 100Mb/s for all servers). Comparing with direct path and Parallel TCP, only less than 1% and 25% of the measured samples reach the same level of throughput respectively.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127657753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Heuristic Method for Web-Service Program Security Testing 一种启发式web服务程序安全测试方法
2009 Fourth ChinaGrid Annual Conference Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.10
Gang Zhao, Weimin Zheng, Jinjing Zhao, Hua Chen
{"title":"An Heuristic Method for Web-Service Program Security Testing","authors":"Gang Zhao, Weimin Zheng, Jinjing Zhao, Hua Chen","doi":"10.1109/ChinaGrid.2009.10","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.10","url":null,"abstract":"The security of the web-service program is a very significant facet in the grid computing environment. A fuzzer is a program that attempts to discover security vulnerabilities by sending random input to an application. How to efficiently reduce the fuzzing data scale with the assurance of high fuzzing veracity and vulnerability coverage is a very important issue for its effective practice. In this paper, aimed at the web-service program, a new heuristic method for fuzzing data generation named as H-Fuzzing is be presented, which has high program executing path coverage with the information from the static analysis and dynamic property of the program. The main thought of H-Fuzzing is collecting the information of the key branch predications and building its relations with the input variables in order to supervise the dimension reducing of the fuzzing data aggregation.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133153561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
KeyOnto: A Hybrid Knowledge Retrieval Model in Law Semantic Web 关键词:法律语义网中的混合知识检索模型
2009 Fourth ChinaGrid Annual Conference Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.19
Biao Fan, Guangqiang Liu, Tao Liu, H. Hu, Xiaoyong Du
{"title":"KeyOnto: A Hybrid Knowledge Retrieval Model in Law Semantic Web","authors":"Biao Fan, Guangqiang Liu, Tao Liu, H. Hu, Xiaoyong Du","doi":"10.1109/ChinaGrid.2009.19","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.19","url":null,"abstract":"This paper proposes a hybrid knowledge retrieval model KeyOnto, which combines ontology based knowledge retrieval model with traditional Vector Space Model (VSM). KeyOnto model makes use of domain ontology to organize and structure knowledge resources. Documents and queries are represented by concepts and term vectors respectively. Furthermore, ontology based query expansion called K2CM, is introduced to get expanded concepts of a query. Domain specific terms are used to form a term vector for queries and documents. Basing on these vectors, we can evaluate term similarity and concept similarity respectively, and integrate them together. Domain specific thesaurus is used to assist knowledge retrieval. Experiments show that compared with each single model, KeyOnto model improves precision of query result.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130248928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Double Redundant Fault-Tolerance Service Routing Model in ESB ESB中的双冗余容错服务路由模型
2009 Fourth ChinaGrid Annual Conference Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.22
Bin Wu, Shijun Liu, Wei Cui
{"title":"Double Redundant Fault-Tolerance Service Routing Model in ESB","authors":"Bin Wu, Shijun Liu, Wei Cui","doi":"10.1109/ChinaGrid.2009.22","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.22","url":null,"abstract":"With the development of the Service Oriented Architecture (SOA), the Enterprise Service Bus (ESB) is becoming more and more important in the management of mass services. The main function of it is service routing which focuses on delivery of message among different services. At present, some routing patterns have been implemented to finish the messaging, but they are all static configuration service routing. Once one service fails in its operation, the whole service system will not be able to detect such fault, so the whole business function will also fail finally. In order to solve this problem, we present a double redundant fault tolerant service routing model. This model has its own double redundant fault tolerant mechanism and algorithm to guarantee that if the original service fails, another replica service that has the same function will return the response message instead automatically. The service requester will receive the response message transparently without taking care where it comes from. Besides, the state of failed service will be recorded for service management. At the end of this article, we evaluated the performance of double redundant fault tolerant service routing model. Our analysis shows that, by importing double redundant fault tolerance, we can improve the fault-tolerant capability of the services routing apparently. It will solve the limitation of existent static service routing and ensure the reliability of messaging in SOA.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134453500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Application of Virtual Machines on System Security 虚拟机在系统安全中的应用
2009 Fourth ChinaGrid Annual Conference Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.45
Siqin Zhao, Kang Chen, Weimin Zheng
{"title":"The Application of Virtual Machines on System Security","authors":"Siqin Zhao, Kang Chen, Weimin Zheng","doi":"10.1109/ChinaGrid.2009.45","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.45","url":null,"abstract":"It is very important to protect critical resources such as private data and code in computer systems. It is promising to protect private data and to improve the system security by leveraging the isolation attribute of virtual machine(VM). The isolation attribute of VM is provided by Virtual Machine Monitor (VMM) that runs in higher priority than guest OSes. If the critical components are isolated in VMs,access control can be enforced or attestation can be made when the subject is accessing via VMs. In this way, VMs can improve the security level of critical components such as OS, kernel, data, and applications. For computer system security, VMs can be used to detect malware intrusions and to protect critical components, which can be implemented by integrating detection or protection mechanism in either VMM or VMs. Authentication is required to create trustful VMs. This paper surveys technologies related of using virtual machines to enhance system security.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131277172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
GridDEV: A Platform for Service Grid Evaluation GridDEV:一个服务网格评估平台
2009 Fourth ChinaGrid Annual Conference Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.37
Hongbo Tian, Xiaoshe Dong, Siyuan Ma, Bingyi Li, Feifei Liu
{"title":"GridDEV: A Platform for Service Grid Evaluation","authors":"Hongbo Tian, Xiaoshe Dong, Siyuan Ma, Bingyi Li, Feifei Liu","doi":"10.1109/ChinaGrid.2009.37","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.37","url":null,"abstract":"GridDEV is a DEVS-based platform for evaluation of service grid. Through the analysis of SOA, we characterize important features of service grid and select four components as the base of grid modeling. With DSDEVS, this paper models the basic components selected, as well as the relationships between them. As a result, the model fully formalizes the gird system;hence facilitates the design and optimization of grid services. Based on this model, we map the DEVS component into elements of simulator development library SimGrid, and construct the platform GridDEV for grid performance and reliability evaluation.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"601 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131775129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Performance of xVM Virtual Machine Based on HPCC 基于HPCC的xVM虚拟机性能研究
2009 Fourth ChinaGrid Annual Conference Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.36
Tiezhu Zhao, Yi-Hang Ding, Verdi March, Shoubin Dong, S. See
{"title":"Research on the Performance of xVM Virtual Machine Based on HPCC","authors":"Tiezhu Zhao, Yi-Hang Ding, Verdi March, Shoubin Dong, S. See","doi":"10.1109/ChinaGrid.2009.36","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.36","url":null,"abstract":"The virtual machine (VM) technology has received an increasing interest a spotlight both in the industry and the research communities. Although the potential advantages of virtualization in HPC workloads have been documented, the potential impact to application performance in HPC environments is not clearly understood. This paper presents a study on performance evaluation of virtual HPC systems using High Performance Computing Challenge (HPCC) benchmark suite and xVM as the workload representative and VM technology, respectively. Based on the extended AHP (Analytic Hierarchy Process) method, we propose an efficient performance evaluation model based on extended AHP and analyze the results and quantify the performance overhead of xVM in terms of compute, memory, and network overhead. Our analysis shows that the computational and network performance in HVM is slightly better and the memory performance is significantly better compared to paravirtualization.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
RAS-M: Resource Allocation Strategy Based on Market Mechanism in Cloud Computing 基于市场机制的云计算资源配置策略
2009 Fourth ChinaGrid Annual Conference Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.41
Xindong You, Xianghua Xu, Jian Wan, Dong-Jin Yu
{"title":"RAS-M: Resource Allocation Strategy Based on Market Mechanism in Cloud Computing","authors":"Xindong You, Xianghua Xu, Jian Wan, Dong-Jin Yu","doi":"10.1109/ChinaGrid.2009.41","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.41","url":null,"abstract":"Resource management is one of the main issues in Cloud Computing. In order to improve resource utilization of large Data Centers while delivering services with higher QoS to Cloud Clients, a resource allocation strategy based on market (RAS-M) is proposed. Firstly, the architecture and the market model of RAS-M are constructed, in which a QoS-refection utility function is designed according to different resource requirements of the Cloud Client, the equilibrium state of RAS-M is defined and the proof of its optimality is given. Secondly, GA-based price adjusted algorithm is introduced to deal with the problem of achieving the equilibrium state of RAS-M. Finally, RAS-M is implemented upon Xen to reallocate the VM’s weight. Experiments results obtained by setting different parameters show that RAS-M can achieve the equilibrium state approximately, that is, demand and supply is balanced nearly, which validates RAS-M is effective and practicable, and is capable of achieving its goal.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123746825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信