2014 IEEE 13th International Symposium on Network Computing and Applications最新文献

筛选
英文 中文
Optimal Configuration for N-Dimensional Twin Torus Networks n维双环面网络的最优配置
Francisco J. Andújar, Juan A. Villar, J. L. Sánchez, F. J. Alfaro, J. Duato
{"title":"Optimal Configuration for N-Dimensional Twin Torus Networks","authors":"Francisco J. Andújar, Juan A. Villar, J. L. Sánchez, F. J. Alfaro, J. Duato","doi":"10.1109/NCA.2014.14","DOIUrl":"https://doi.org/10.1109/NCA.2014.14","url":null,"abstract":"Torus topology is one of the most common topologies used in the current largest supercomputers. Although 3D torus is widely used, recently some supercomputers in the Top500 list have been built using networks with topologies of five or six dimensions. To obtain an nD torus, 2n ports per node are needed. These ports can be offered by a single or several cards per node. In the second case, there are multiple ways of assigning the dimension and direction of the card ports. In a previous work we proposed the 3D Twin (3DT) torus which uses two 4-port cards per node, and obtained the optimal port configuration. This paper extends and generalizes that work in order to obtain the optimal port configuration when n dimensions are considered. Thus, the nDT torus topology is presented and defined, and a detailed formal analysis leads to the optimal port configuration. Finally, performance results are included.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123177263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Sharing-Aware Greedy Algorithm for Virtual Machine Maximization 一种共享感知的虚拟机贪心算法
Safraz Rampersaud, Daniel Grosu
{"title":"A Sharing-Aware Greedy Algorithm for Virtual Machine Maximization","authors":"Safraz Rampersaud, Daniel Grosu","doi":"10.1109/NCA.2014.24","DOIUrl":"https://doi.org/10.1109/NCA.2014.24","url":null,"abstract":"Service providers face multiple challenges in hosting an increasing number of virtual machine (VM) instances. Minimizing the utilization of system resources while maximizing the potential for profit are among the most common challenges. Recent studies have investigated memory reclamation techniques focused on virtual technologies, specifically page sharing, for minimizing the utilization of system resources. In this paper, we address the problem of sharing-aware VM maximization in a general sharing model which has as objective finding a subset of VMs that can be hosted by a server with a given memory capacity such that the total profit derived from hosting the subset of VMs is maximized. The sharing-aware VM maximization allocation problem has been shown to be NP-hard. Therefore, we design a greedy approximation algorithm for solving it. We determine the approximation ratio of our greedy algorithm and perform extensive experiments to investigate its performance against other VM allocation algorithms.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123797335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Resilient Hierarchical Distributed Loop Self-Scheduling Scheme for Cloud Systems 云系统中一种弹性分层分布式循环自调度方案
Yiming Han, Anthony T. Chronopoulos
{"title":"A Resilient Hierarchical Distributed Loop Self-Scheduling Scheme for Cloud Systems","authors":"Yiming Han, Anthony T. Chronopoulos","doi":"10.1109/NCA.2014.18","DOIUrl":"https://doi.org/10.1109/NCA.2014.18","url":null,"abstract":"In heterogeneous distributed cloud systems, load balance, communication and synchronization overhead must be taken considered. A hierarchical distributed loop self-scheduling scheme is effective and efficient for scientific loop applications. In this paper, we propose a resilient hierarchical distributed loop self-scheduling algorithm suitable for heterogeneous cloud systems. This algorithm is intended to enable the algorithm to continue to work in the event that some virtual machines (VMs) are too slow or cease to respond. We tested our algorithm in a heterogeneous cloud system. The results show that our algorithm can achieve normal operation and good performance.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134167787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A New Solution to Perform Automatic Meter Reading Using Unmanned Aerial Vehicle 一种利用无人机自动抄表的新方案
J. R. Neto, D. Guidoni, L. Villas
{"title":"A New Solution to Perform Automatic Meter Reading Using Unmanned Aerial Vehicle","authors":"J. R. Neto, D. Guidoni, L. Villas","doi":"10.1109/NCA.2014.33","DOIUrl":"https://doi.org/10.1109/NCA.2014.33","url":null,"abstract":"Typically, electric power companies employs a group of employees known as meter readers to collect data of energy consumption of customers. To overcome the challenges and limitations of the literature approaches, we propose an automatic meter reading system based on Unmanned Aerial Vehicle and Wireless Sensors Networks. In our approach, each electric meter has one sensor node device with wireless communication capability and the Unmanned Aerial Vehicle flies the field in a predefined way to collect data from the wireless sensor nodes without having to visit each electrical meter. Simulation results show that our approach reduces the distance to perform the readings compared to literature solutions. We also present a use case analysis considering real parameters for meter readings.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"34 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132060655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Secure Sensing over Named Data Networking 命名数据网络的安全感知
J. Burke, Paolo Gasti, N. Nathan, G. Tsudik
{"title":"Secure Sensing over Named Data Networking","authors":"J. Burke, Paolo Gasti, N. Nathan, G. Tsudik","doi":"10.1109/NCA.2014.34","DOIUrl":"https://doi.org/10.1109/NCA.2014.34","url":null,"abstract":"The anticipated proliferation of smart devices, the \"Internet of Things\" (IoT), is one of the motivations for some large-scale research efforts aiming to design a new Internet architecture. One such effort is Named-Data Networking (NDN) - a \"future internet architecture\" research project in the Information-Centric Networking (ICN) area that emphasizes efficient, scalable and secure data distribution through a shift from the host-based addressing of IP to data-centric addressing. Because of its focus on data distribution, NDN has been assumed to be poorly suited for other networking scenarios. We address efficient and secure sensing over NDN, motivated by the convergence of the IoT vision with traditional Building Automation Systems (BAS). We consider several sensing paradigms and demonstrate the use of NDN to securely interact with NDN-enabled sensors. In the process, we address some challenges caused by sensors' intermittent availability, power constraints and asynchronous communication patterns. Our results include concrete protocols that facilitate secure sensor-bound communication over NDN.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114504165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Strip Interoperability for Wireless Ad Hoc Routing Protocols 无线自组织路由协议的条带互操作性
Marco Antonio To, Gerardo Morales, S. Maag
{"title":"Strip Interoperability for Wireless Ad Hoc Routing Protocols","authors":"Marco Antonio To, Gerardo Morales, S. Maag","doi":"10.1109/NCA.2014.9","DOIUrl":"https://doi.org/10.1109/NCA.2014.9","url":null,"abstract":"Wireless Ad hoc Networks are rapidly growing in popularity because of their flexibility and wide range of applications (Indoor Communications, Intelligent Transportation, Emergency Operations, Public Safety, etc.). However, while it becomes easier to set up such networks, one of the main constraints is the heterogeneity of the nearby devices (or nodes). Moreover, it is still very difficult to make them communicate if these nodes use different routing protocols. In this paper, we present a novel approach that makes use of layer 3 protocols to guarantee interoperability between networks. We introduce the notion of Strip Interoperability, a new mechanism that aims to address this problem by creating a bridge between heterogeneous wireless ad hoc networks. An implementation of our approach through a real case study is shown to illustrate the applicability of our mechanism.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125860635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Adaptive Approach to Opportunistic Data Forwarding in Underwater Acoustic Sensor Networks 水声传感器网络中机会数据转发的自适应方法
N. Nowsheen, G. Karmakar, J. Kamruzzaman
{"title":"An Adaptive Approach to Opportunistic Data Forwarding in Underwater Acoustic Sensor Networks","authors":"N. Nowsheen, G. Karmakar, J. Kamruzzaman","doi":"10.1109/NCA.2014.41","DOIUrl":"https://doi.org/10.1109/NCA.2014.41","url":null,"abstract":"Reliable data transfer for underwater acoustic sensor networks (UASNs) is a major research challenge in applications such as pollution monitoring, oceanic data collection, and surveillance due to the long propagation delay and high error rate of the acoustic channel. To address this issue, an opportunistic data forwarding protocol was proposed which achieves high packet delivery success ratio with less routing overhead and energy consumption by selecting the next hop forwarder among a set of candidates based on its link reliability and data transfer reach ability. However, the protocol relies on fixed data hold time approach, i.e., Each node holds data packets for a fixed amount of time before a forwarder discovery process is initiated. Depending on the value of the fixed hold time and deployment contextual scenario, this may incur large end-to-end delay. Moreover, lack of consideration of network condition in hold time limits its performance. In this paper, we propose an adaptive technique to improve its performance. The adaptive approach calculates data hold time at each node dynamically considering a number of 'node and network' metrics including current buffer occupancy, delay experienced by stored data packets, arrival and service rate, neighbors' data transmissions and reachability. Simulation results show that compared with fixed hold time approach, our adaptive technique reduces end-to-end delay significantly, achieves considerably higher data delivery and less energy consumption per successful packet delivery.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124813962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Hardware Implementation of Quasigroup Encryption for SCADA Networks SCADA网络准群加密的硬件实现
W. Mahoney, Abhishek Parakh, Matthew Battey
{"title":"Hardware Implementation of Quasigroup Encryption for SCADA Networks","authors":"W. Mahoney, Abhishek Parakh, Matthew Battey","doi":"10.1109/NCA.2014.52","DOIUrl":"https://doi.org/10.1109/NCA.2014.52","url":null,"abstract":"We present an efficient hardware implementation of a quasigroup block cipher system. Power and resource comparisons are done with AES and we show that the proposed quasigroup system provides an inexpensive alternative for SCADA networks and other low powered, resource constrained devices.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117178999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Entropy Adaptive On-Line Compression 熵自适应在线压缩
S. Dolev, S. Frenkel, M. Kopeetsky
{"title":"Entropy Adaptive On-Line Compression","authors":"S. Dolev, S. Frenkel, M. Kopeetsky","doi":"10.1109/NCA.2014.31","DOIUrl":"https://doi.org/10.1109/NCA.2014.31","url":null,"abstract":"Self-Organization is based on adaptivity. Adaptivity should start with the very basic fundamental communication tasks such as encoding the information to be transmitted or stored. Obviously, the less signal transmitted the less energy in transmission used. In this paper we present a novel on-line and entropy adaptive compression scheme for streaming unbounded length inputs. The scheme extends the window dictionary Lempel-Ziv compression, is adaptive and is tailored to on-line compress inputs with non stationary entropy. Specifically, the window dictionary size is changed in an adaptive manner to fit the current best compression rate for the input. On-line Entropy Adaptive Compression scheme (EAC), that is introduced and analyzed in this paper, examines all possible sliding window sizes over the next input portion to choose the optimal window size for this portion, a size that implies the best compression ratio. The size found is then used in the actual compression of this portion. We suggest an adaptive encoding scheme, which optimizes the parameters block by block, and base the compression performance on the optimality proof of Lempel Ziv algorithm when applied to blocks. The EAC scheme was tested over files of different types (docx, ppt, jpeg, xls) and over synthesized files that were generated as segments of homogeneous Markov Chains. Our experiments demonstrate that the EAC scheme typically provides a higher compression ratio than LZ77 does, when examined in the scope of on-line per-block compression of transmitted (or compressed) files.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131379449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
RLP: A Community Detection-Based Routing Protocol for Wireless Sensor Networks RLP:一种基于社区检测的无线传感器网络路由协议
M. A. D. Paulo, M. C. Nascimento, V. Rosset
{"title":"RLP: A Community Detection-Based Routing Protocol for Wireless Sensor Networks","authors":"M. A. D. Paulo, M. C. Nascimento, V. Rosset","doi":"10.1109/NCA.2014.42","DOIUrl":"https://doi.org/10.1109/NCA.2014.42","url":null,"abstract":"In Wireless Sensor Networks (WSNs), routing remains a key issue primarily regarding to the overall energy consumption. Accordingly, the energy conservation has been addressed by a few strategies, namely cluster-based hierarchical routing protocols. Nevertheless, the load balancing and the network lifetime achieved by such strategies strongly depend on the even distribution of the cluster-heads in the network. Therefore, we propose in this paper a community detection-based routing protocol for automatically producing and evenly distributing clusters in the network. We evaluate the performance of the proposed protocol and compare it with LEACH by considering the connectivity of the sensor nodes to the cluster-heads, the routing efficiency, the event data delivery ratio and the network lifetime. According to the results, the proposed approach outperform LEACH when considering applications with strict response times.","PeriodicalId":399462,"journal":{"name":"2014 IEEE 13th International Symposium on Network Computing and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128787046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信