2011 IEEE 10th International Symposium on Network Computing and Applications最新文献

筛选
英文 中文
Predicting Software Anomalies Using Machine Learning Techniques 使用机器学习技术预测软件异常
Javier Alonso, L. B. Muñoz, D. Avresky
{"title":"Predicting Software Anomalies Using Machine Learning Techniques","authors":"Javier Alonso, L. B. Muñoz, D. Avresky","doi":"10.1109/NCA.2011.29","DOIUrl":"https://doi.org/10.1109/NCA.2011.29","url":null,"abstract":"In this paper, we present a detailed evaluation of a set of well-known Machine Learning classifiers in front of dynamic and non-deterministic software anomalies. The system state prediction is based on monitoring system metrics. This allows software proactive rejuvenation to be triggered automatically. Random Forest approach achieves validation errors less than 1% in comparison to the well-known ML algorithms under a valuation. In order to reduce automatically the number of monitored parameters, needed to predict software anomalies, we analyze Lasso Regularization technique jointly with the Machine Learning classifiers to evaluate how the prediction accuracy could be guaranteed within an acceptable threshold. This allows to reduce drastically (around 60% in the best case) the number of monitoring parameters. The framework, based on ML and Lasso regularization techniques, has been validated using an ecommerce environment with Apache Tomcat server, and MySql database server.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125003606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 64
Beyond Power Proportionality: Designing Power-Lean Cloud Storage 超越功率比例:设计低功耗云存储
L. Ganesh, Hakim Weatherspoon, K. Birman
{"title":"Beyond Power Proportionality: Designing Power-Lean Cloud Storage","authors":"L. Ganesh, Hakim Weatherspoon, K. Birman","doi":"10.1109/NCA.2011.27","DOIUrl":"https://doi.org/10.1109/NCA.2011.27","url":null,"abstract":"We present a power-lean storage system, where racks of servers, or even entire data center shipping containers, can be powered down to save energy. We show that racks and containers are more than the sum of their servers, and demonstrate the feasibility of designing a storage system that powers them up and down on demand further, we show that such a system would save an order of magnitude more energy than current disk-based power-proportional storage systems. Our simulation results using file system traces from the Internet Archive show over 44% energy savings, a 5x improvement over disk-based power management systems, without performance impact. We explore the tradeoffs in choosing the right unit to power off/on, and present an automated framework to compute the optimal power management unit for different scenarios.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"15 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120929436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
From a Database Management System to a Policy-Based Network Management System 从数据库管理系统到基于策略的网络管理系统
T. Su, Chen-Feng Chiu
{"title":"From a Database Management System to a Policy-Based Network Management System","authors":"T. Su, Chen-Feng Chiu","doi":"10.1109/NCA.2011.59","DOIUrl":"https://doi.org/10.1109/NCA.2011.59","url":null,"abstract":"This paper proposes a simple and low cost implementation framework for a policy-based network management (PBNM) system. The framework consists of reusing traditional network management system resources, specifying network management policies through the database language SQL, and designing a management database. It supports automatic network management policy processing. Finally, we used a simple example to test and verify our framework.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127244409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
End-to-End Data Deduplication for the Mobile Web 端到端移动Web重复数据删除
Ricardo Filipe, J. Barreto
{"title":"End-to-End Data Deduplication for the Mobile Web","authors":"Ricardo Filipe, J. Barreto","doi":"10.1109/NCA.2011.60","DOIUrl":"https://doi.org/10.1109/NCA.2011.60","url":null,"abstract":"The emergence of affordable mobile devices with rich interfaces and high-bandwidth wireless connectivity has revolutionized the mobile Web. However, such new trends also imply downloading larger data volumes from the Web, with considerable battery and, often, monetary costs that inevitably degrade user experience. The mobile Web calls for end-to-end data deduplication that is able to achieve both high precision and negligible computational cost on the battery-constrained client side. We propose dedup HTTP, a novel deduplication solution that leverages the generic approach of Cache-Based Compaction to achieve the above requirements. Using a full-fledged implementation of dedup HTTP with real workloads from popular Web sites, we obtained savings in traffic consumption of up to 94,5% when comparing to plain HTTP transfer.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122360097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Two-Party Mobile Authentication Protocols for Wireless Roaming Networks 无线漫游网络的两方移动认证协议
A. Almuhaideb, P. D. Le, B. Srinivasan
{"title":"Two-Party Mobile Authentication Protocols for Wireless Roaming Networks","authors":"A. Almuhaideb, P. D. Le, B. Srinivasan","doi":"10.1109/NCA.2011.48","DOIUrl":"https://doi.org/10.1109/NCA.2011.48","url":null,"abstract":"Mobile Internet access has significantly increased over the past few years. Roaming into foreign networks becomes necessary in order to access mobile-services. Traditionally, this done based on roaming agreement between the home network and the foreign network to extend trust for mobile users. However, secured mobile authentication is a challenge especially in two-party authentication environment where only the visited user and the foreign network get involved. This paper proposes two-party secure roaming protocols based on direct negotiation with potential foreign networks regarding quality of service, pricing and other billing related features, in order to establish service agreement and get the authorization token. The paper provides better performance to check the revocation status of the mobile user using recency evidence compare to the previously used revocation list. Identity Based Signature is used to stop impersonation attack. The security and performance analysis indicates that our protocol is resistant to well-known attacks, and it ensures efficient roaming.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127725517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Thread-Based Live Checkpointing of Virtual Machines 基于线程的虚拟机实时检查点
Vasinee Siripoonya, K. Chanchio
{"title":"Thread-Based Live Checkpointing of Virtual Machines","authors":"Vasinee Siripoonya, K. Chanchio","doi":"10.1109/NCA.2011.28","DOIUrl":"https://doi.org/10.1109/NCA.2011.28","url":null,"abstract":"Virtual machine check pointing is the mechanism to save virtual machine state to a file for later recovery. Traditional check pointing mechanisms can suffer a long delay and cause a long disruption of services since they have to stop virtual machines to save state, which could be large. In this study, a novel Thread-based Live Check pointing (TLC) mechanism is proposed. This mechanism leverages the pre-copy live migration mechanism introducing a checkpoint thread, which is responsible for the majority of the check pointing activities. While the checkpoint thread is saving the virtual machine state to persistent storage, the virtual machine thread is allowed to progress with normal execution. However, the virtual machine thread will be periodically interrupted to incrementally copy dirty memory pages to a hash table. The interruptions will occur until the final stage of check pointing is reached. This approach is implemented in KVM and its performance evaluations are conducted using NAS parallel benchmarks. Experiments show that this approach can provide high levels of virtual machine responsiveness during check pointing. It can also reduce the check pointing overheads to as low as 0.53 times of that of the traditional approach, when operating on a virtual machine running memory intensive workloads.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132832896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
An Enhanced-MDP Based Vertical Handoff Algorithm for QoS Support over Heterogeneous Wireless Networks 基于增强mdp的异构无线网络QoS支持垂直切换算法
Shusmita Anwar Sharna, M. R. Amin, M. M. Murshed
{"title":"An Enhanced-MDP Based Vertical Handoff Algorithm for QoS Support over Heterogeneous Wireless Networks","authors":"Shusmita Anwar Sharna, M. R. Amin, M. M. Murshed","doi":"10.1109/NCA.2011.49","DOIUrl":"https://doi.org/10.1109/NCA.2011.49","url":null,"abstract":"Vertical handoff plays an important role in guaranteeing users to be always connected in an overlapped multi-network environment. During the vertical handoff procedure, handoff decision is the most important step that affects the normal working of communication. An incorrect handoff decision or selection of a non-optimal network may result in undesirable effects such as higher costs, poor quality of service (QoS) experience, and even dropped communication. Among the existing vertical handoff decision algorithms, the Markov Decision Process (MDP) based algorithm by Stevens-Navarro et al. is promising due to its ability to achieve the optimal expected reward. However, the reward function used by this algorithm is flawed as it favors reducing expected number of vertical handoffs at the expense of diminished expected values of other QoS parameters. This paper presents an extended MDP based algorithm (EMDP) with novel reward function formulation. Analysis shows that EMDP outperforms the MDP based algorithm in terms of improved expected values of all QoS parameters considered while keeping the vertical handoff number reasonably low.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134072279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
SYNI - TCP Hole Punching Based on SYN Injection 基于SYN注入的SYN - TCP打孔
Sebastian Holzapfel, Matthäus Wander, Arno Wacker, Torben Weis
{"title":"SYNI - TCP Hole Punching Based on SYN Injection","authors":"Sebastian Holzapfel, Matthäus Wander, Arno Wacker, Torben Weis","doi":"10.1109/NCA.2011.66","DOIUrl":"https://doi.org/10.1109/NCA.2011.66","url":null,"abstract":"The shortage of IPv4 addresses and the very slow transition to IPv6 leads to pragmatic solutions in the Internet: today many hosts are still using IPv4 and are connected to the Internet over a Network Address Translation (NAT) router. However, there are many applications, which need inbound connections, like e.g. peer-to-peer-based systems or voice-over-IP. For such NATed hosts inbound connections usually pose a problem, since without additional measures the router filters the incoming connection attempts. These additional measures are usually referred to as NAT traversal mechanisms and hole punching is one of those techniques. In this paper we propose a new protocol for a TCP-based hole punching mechanism based on self-injecting SYN-packets in the local network stack.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133438344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Clustering SOAP Web Services on Internet Computing Using Fast Fractals 基于快速分形的互联网计算上的SOAP Web服务聚类
Dhiah Al-Shammary, I. Khalil, L. George
{"title":"Clustering SOAP Web Services on Internet Computing Using Fast Fractals","authors":"Dhiah Al-Shammary, I. Khalil, L. George","doi":"10.1109/NCA.2011.65","DOIUrl":"https://doi.org/10.1109/NCA.2011.65","url":null,"abstract":"The interoperability of Web services has resulted in its adoption for recently-emerging cloud platforms. SOAP (Simple Object Access Protocol) is considered as the main platform independent communication tool for the Cloud Web service. Generally, Cloud Web services suffer performance bottlenecks and congestions that are mainly caused by the encoding of XML messages as they are bigger than the real payloads. In this paper, Fractal clustering model is proposed to compute the Fractal clustering similarity of SOAP messages in order to cluster them and enable the aggregation of SOAP messages to significantly reduce the size of the aggregated SOAP messages. Furthermore, as Fractal is a well-known as a time-consuming technique especially for large dataset, two fast Fractal clustering models have been proposed that are aiming to reduce the required clustering time. The proposed fast Fractal models have tremendously outperformed the classical Fractal model in terms of the processing time and have outperformed both K-means and PCA combined with K-means models in terms of both the processing time and SOAP messages size reduction.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114848379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SCAN: An Efficient Decoding Algorithm for RAID-6 Codes SCAN:一种高效的RAID-6码解码算法
Jianqiang Luo, Lihao Xu
{"title":"SCAN: An Efficient Decoding Algorithm for RAID-6 Codes","authors":"Jianqiang Luo, Lihao Xu","doi":"10.1109/NCA.2011.20","DOIUrl":"https://doi.org/10.1109/NCA.2011.20","url":null,"abstract":"Recent studies show hard disk drives fail much more often in real systems than specified in their data-sheets, and RAID-5 may not be able to provide necessary reliability for practical systems. It is desirable to have disk arrays and clustered storage systems with higher data redundancy, such as RAID-6. Meanwhile, latest research also indicates that sector failures become a threat to data reliability in storage systems. As a result, disk failures in RAID-6 systems become complex, and call for efficient decoding approaches to recover data when disk failures take place. This paper proposes a simple and efficient decoding algorithm to reconstruct data from disk failures for RAID-6 systems. First, for many well known RAID-6 codes, we provide the conditions to determine the recoverability of disk failures by using Tanner graph. The covered RAID-6 codes include X-code, EVENODD, and RDP. Then, a generic failure decoding algorithm called SCAN algorithm is derived. The SCAN algorithm is able to efficiently reconstruct data for any recoverable disk failures. Extensive performance evaluation shows the SCAN algorithm achieves higher performance than Matrix Method, another general decoding algorithm. Hence, the SCAN algorithm is an attractive decoding algorithm to be integrated into RAID-6 systems.","PeriodicalId":258309,"journal":{"name":"2011 IEEE 10th International Symposium on Network Computing and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115786273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信