Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing最新文献

筛选
英文 中文
Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing 第九届下一代互联网计算中间件研讨会论文集
M. Matos, K. M. Göschka, P. Hung
{"title":"Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing","authors":"M. Matos, K. M. Göschka, P. Hung","doi":"10.1145/2676733","DOIUrl":"https://doi.org/10.1145/2676733","url":null,"abstract":"While dependability and security become cornerstones of the information society, they are impaired by change, imprecision, and emerging behavior due to scale, dynamism, and heterogeneity. To address these challenges for next generation Internet computing, key extrafunctional properties should not be an \"add on\" or an \"end to end task\" anymore, but rather built in by means of Middleware. \u0000 \u0000Service oriented computing, cloud computing, socio-technical systems, and Web 2.0-style applications are important steps for next generation Internet computing, but still fall short when non functional (a.k.a. extra-functional) quality properties (e.g., dependability, security, performance, and scalability) need to be addressed. The emerging Internet communication architecture (e.g., from projects on the Internet of Things, the Future Internet, etc.) also requires middleware support for delivering computing applications and services. We can see many Internet Computing systems following proprietary end-to-end solutions and being weaved with application-specific approaches. This clearly hinders re-use, which can only be successfully leveraged by Middleware-based solutions. This in turn requires new flexibility for Middleware (adaptivity, elasticity, resilience) and new ways of collaboration between Middleware and applications/services. \u0000 \u0000Therefore, extra-functional quality properties need to be addressed not only by interfacing and communication standards, but also in terms of actual mechanisms, protocols, and algorithms. Some of the challenges are the administrative heterogeneity, the loose coupling between coarsegrained operations and long-running interactions, high dynamism, and the required flexibility during run-time. Recently, massive-scale (e.g., big data, millions of participating parties in different roles) and mobility were added to the crucial challenges for Internet computing middleware. The workshop consequently comprises contributions on how specifically middleware can address the above challenges of next generation Internet computing.","PeriodicalId":276727,"journal":{"name":"Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133485178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An architecture for a smart spaces virtual machine 智能空间虚拟机的体系结构
L. A. Freitas, F. Costa, R. Rocha, Andrew A. Allen
{"title":"An architecture for a smart spaces virtual machine","authors":"L. A. Freitas, F. Costa, R. Rocha, Andrew A. Allen","doi":"10.1145/2676733.2676742","DOIUrl":"https://doi.org/10.1145/2676733.2676742","url":null,"abstract":"The growth and popularization of wireless connectivity and mobile devices have allowed the development of smart spaces that were previously only envisaged in the approach proposed by Mark Weiser. These environments are composed of many computational resources, such as devices and applications, along with user, who must be able to associate with and use these features. However, programming these environments is a challenging task, since smart spaces have a dynamic nature and heterogeneous resources, in addition to the requirement that interactions between users and resources are performed in a coordinated way. We present a new approach for smart spaces programming using Models@RunTime. To this end, we propose a high-level modeling language, called 2SML, through which the user can model the smart space with all elements that can be part of it. Models created by the users are interpreted and effected in the physical space by a model execution engine, called 2SVM, whose development is part of this work.","PeriodicalId":276727,"journal":{"name":"Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130316751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Speculative client execution in deferred update replication 延迟更新复制中的推测客户机执行
Balaji Arun, Sachin Hirve, R. Palmieri, Sebastiano Peluso, B. Ravindran
{"title":"Speculative client execution in deferred update replication","authors":"Balaji Arun, Sachin Hirve, R. Palmieri, Sebastiano Peluso, B. Ravindran","doi":"10.1145/2676733.2676738","DOIUrl":"https://doi.org/10.1145/2676733.2676738","url":null,"abstract":"Deferred Update Replication (DUR) is a powerful replication technique that allows parallelism of clients' execution while a global certification phase checks the validity of the transactional execution against workloads running on remote nodes. The well-known favorable scenario of DUR is when remote transactions rarely conflict with each other. In this paper we show that, even in this case, the conflicts happening among local application threads can significantly decrease performance. We address this problem by using speculation. We let local transactions propagate their post-execution snapshot to other local transactions before the outcome of the global certification is notified. This way, in scenarios where accesses are partitioned across nodes, we prevent local transactions from aborting each other. Through experimental study based on well-known transactional benchmarks we assess the effectiveness of the approach, gaining more than 10x using TPC-C benchmark.","PeriodicalId":276727,"journal":{"name":"Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128805964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Moana: a case for redefining the internet service abstraction Moana:一个重新定义互联网服务抽象的案例
Yan Shvartzshnaider, M. Ott
{"title":"Moana: a case for redefining the internet service abstraction","authors":"Yan Shvartzshnaider, M. Ott","doi":"10.1145/2676733.2676735","DOIUrl":"https://doi.org/10.1145/2676733.2676735","url":null,"abstract":"We introduce Moana, an information-centric middleware service for distributed applications. Moana offers a shared persistent graph-based abstraction through which applications can communicate with each other by extending and observing the shared graph. This paper describes the Moana service model as well as discusses the design goals and challenges for such a middleware to be a viable and competitive alternative to current practice.","PeriodicalId":276727,"journal":{"name":"Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116561926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a model@runtime middleware for cyber physical systems 面向网络物理系统的model@runtime中间件
Francisco Javier Acosta Padilla, F. Weis, Johann Bourcier
{"title":"Towards a model@runtime middleware for cyber physical systems","authors":"Francisco Javier Acosta Padilla, F. Weis, Johann Bourcier","doi":"10.1145/2676733.2676741","DOIUrl":"https://doi.org/10.1145/2676733.2676741","url":null,"abstract":"Cyber Physical Systems (CPS) or Internet of Things systems are typically formed by a myriad of many small interconnected devices. This underlying hardware infrastructure raises new challenges in the way we administrate the software layer of these systems. Indeed, the limited computing power and battery life of each node combined with the very distributed nature of these systems, greatly adds complexity to distributed software layer management. In this paper we propose a new middleware dedicated to CPS to enable the management of software deployment and the dynamic reconfiguration of these systems. Our middleware is inspired from the Component Based Systems and the model@runtime paradigm which has been adapted to the context of Cyber Physical Systems. We have conducted an initial evaluation on a typical Cyber Physical Systems hardware infrastructure which demonstrates the feasibility of providing a model@runtime middleware for these systems.","PeriodicalId":276727,"journal":{"name":"Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115368598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Towards efficient and accurate privacy preserving web search 迈向高效、准确的隐私保护网络搜索
Albin Petit, Sonia Ben Mokhtar, L. Brunie, H. Kosch
{"title":"Towards efficient and accurate privacy preserving web search","authors":"Albin Petit, Sonia Ben Mokhtar, L. Brunie, H. Kosch","doi":"10.1145/2676733.2676734","DOIUrl":"https://doi.org/10.1145/2676733.2676734","url":null,"abstract":"Querying Web search engines is by far the most frequent activity performed by online users and consequently the one in which they are likely to reveal a significant amount of personal information. Protecting the privacy of Web requesters is thus becoming increasingly important. This is often done by using systems that guarantee unlinkability between the requester and her query. The most effective solution to reach this objective is the use of anonymous communication protocols (e.g., onion routing [10]). However, according to [14], anonymity might not resist to machine learning attacks. Thus, an adversary could link a query to her requester's public profile. Other approaches (e.g., [8,17]) guarantee unidentifiability of the user interests by generating noise (e.g., creating covert queries or adding extra keywords). However, these solutions overload the network and decrease the accuracy of the results. We present in this paper the first contribution that combines both approaches. It allows a user to perform a private Web search resistant to machine learning attacks while slightly decreasing the relevance of the results. Our three stage architecture contains: (1) a Privacy Proxy that relies on two non-colluding servers to hide the requester identity from the search engine; (2) a Linkability Assessment that analyses the risk that a request is reassociated with the identity of the requester; (3) an Obfuscator that protects the queries which have been flagged linkable by the linkability assessment.","PeriodicalId":276727,"journal":{"name":"Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133621824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Multi-site Gargamel: optimistic synchronization for reliable geo-replicated databases 多站点格格巫:可靠的地理复制数据库的乐观同步
Pierpaolo Cincilla, Sébastien Monnet, M. Shapiro
{"title":"Multi-site Gargamel: optimistic synchronization for reliable geo-replicated databases","authors":"Pierpaolo Cincilla, Sébastien Monnet, M. Shapiro","doi":"10.1145/2676733.2676737","DOIUrl":"https://doi.org/10.1145/2676733.2676737","url":null,"abstract":"Databases scale poorly in distributed configurations. This is mainly due to the cost of concurrency control and to resource contention. The alternative of centralizing writes works well only for read-intensive workloads, whereas weakening transactional properties is problematic for application developers. In a previous work we introduced Gargamel, a middleware that spreads non-conflicting update transactions to different replicas, but still provides strong transactional guarantees. We extended Gargamel to geo-replication settings. If a data-center fails, the database remains available at other locations. We minimize the synchronization cost, synchronizing optimistically replicas at distant data-centers. The evaluations of our prototype using distant Amazon data-centers show that Gargamel improves both response time and load by an order of magnitude when contention is high (highly loaded system with bounded resources), and that in the geo-replicated case, the slow-down is negligible.","PeriodicalId":276727,"journal":{"name":"Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130518922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed event-based system with multiscoping for multiscalability 具有多作用域的分布式事件系统,可实现多可伸缩性
Léon Lim, D. Conan
{"title":"Distributed event-based system with multiscoping for multiscalability","authors":"Léon Lim, D. Conan","doi":"10.1145/2676733.2676736","DOIUrl":"https://doi.org/10.1145/2676733.2676736","url":null,"abstract":"Distributed Event-Based System (DEBS) provides a versatile solution for asynchronously exchanging data in a distributed system, loosely-coupled in space and time. The software architecture of a DEBS is composed of an over-lay network of brokers that are responsible for routing data from producers to consumers. An important issue is the cost (in terms of exchanged messages) of the installation of advertisement or subscription filters on the brokers and the cost of routing notifications. The problem is exacerbated in large and heterogeneous systems involving clouds, cloudlets, desktops, laptops, mobile phones, and smart objects of the Internet of Things (IoT). In this paper, we associate the system concept of scale (of multiscale distributed systems) with the concept of scope (of DEBS) and we introduce DEBS with multiscoping. We also extend the requirements of distributed routing to deal with multiscoping. In the context of the IoT, we show in an illustrative example that the solution allows application designers and system administrators to tag advertisements and subscriptions for semantically delimiting scopes that are superposed.","PeriodicalId":276727,"journal":{"name":"Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126820104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信