A Hybrid Cloud Approach for Secure Authorized Deduplication
Data deduplication is one of important data compression techniques for eliminating duplicate copies of repeating data, and has been widely used in cloud storage to reduce the amount of storage space and save bandwidth. To protect the confidentiality of ...
Algorithms and Stability Analysis for Content Distribution over Multiple Multicast Trees
The paper investigates theoretical issues in applying the universal swarming technique to efficient content distribution. In a swarming session, a file is distributed to all the receivers by having all the nodes in the session exchange file chunks. By ...
An Efficient Distributed Trust Model for Wireless Sensor Networks
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes communication behavior into account to ...
Home-Based Zero-Knowledge Multi-Copy Routing in Mobile Social Networks
A mobile social network (MSN) is a special kind of delay tolerant network (DTN) composed of mobile nodes that move around and share information with each other through their carried short-distance wireless communication devices. A main characteristic of ...
Contention Aware Energy Efficient Scheduling on Heterogeneous Multiprocessors
Energy efficiency along with enhanced performance are two important goals of scheduling on multiprocessors. This paper proposes a Contention-aware, Energy Efficient, Duplication based Mixed Integer Programming (CEEDMIP) formulation for scheduling task ...
Cost-Effective Resource Provisioning for MapReduce in a Cloud
This paper presents a new MapReduce cloud service model, Cura, for provisioning cost-effective MapReduce services in a cloud. In contrast to existing MapReduce cloud services such as a generic compute cloud or a dedicated MapReduce cloud, Cura has a ...
Diagnosis of Performance Faults in LargeScale MPI Applications via Probabilistic Progress-Dependence Inference
Debugging large-scale parallel applications is challenging. Most existing techniques provide little information about failure root causes. Further, most debuggers significantly slow down program execution, and run sluggishly with massively parallel ...
Directional Diagnosis for Wireless Sensor Networks
Network diagnosis is crucial in managing a wireless sensor network (WSN) since many network-related faults, such as node and link failures, can easily happen. Diagnosis tools usually consist of two key components, information collection and root-cause ...
Efficient Data Query in Intermittently-Connected Mobile Ad Hoc Social Networks
This work addresses the problem of how to enable efficient data query in a Mobile Ad-hoc SOcial Network (MASON), formed by mobile users who share similar interests and connect with one another by exploiting Bluetooth and/or WiFi connections. The data ...
Exploiting Rateless Codes in Cloud Storage Systems
Block-level cloud storage (BLCS) offers to users and applications the access to persistent block storage devices (virtual disks) that can be directly accessed and used as if they were raw physical disks. In this paper we devise ENIGMA, an architecture for ...
Fail-Stop Failure Algorithm-Based Fault Tolerance for Cholesky Decomposition
Cholesky decomposition is a widely used algorithm to solve linear equations with symmetric and positive definite coefficient matrix. With large matrices, this often will be performed on high performance supercomputers with a large number of processors. ...
GPU Acceleration for Simulating Massively Parallel Many-Core Platforms
Emerging massively parallel architectures such as a general-purpose processor plus many-core programmable accelerators are creating an increasing demand for novel methods to perform their architectural simulation. Most state-of-the-art simulation ...
Hotplug or Ballooning: A Comparative Study on Dynamic Memory Management Techniques for Virtual Machines
In virtualization environments, static memory allocation for virtual machines (VMs) can lead to severe service level agreement (SLA) violations or inefficient use of memory. Dynamic memory allocation mechanisms such as ballooning and memory hotplug were ...
Impact of MapReduce Policies on Job Completion Reliability and Job Energy Consumption
Recently, MapReduce has been widely employed by many companies/organizations to tackle data-intensive problems over a large-scale MapReduce cluster. To solve machine/node failure which is inevitable in a MapReduce cluster, MapReduce employs several ...
Influence Maximization on Large-Scale Mobile Social Network: A Divide-and-Conquer Method
With the proliferation of mobile devices and wireless technologies, mobile social network systems are increasingly available. A mobile social network plays an essential role as the spread of information and influence in the form of “word-of-mouth&#...
PPS: Privacy-Preserving Strategyproof Social-Efficient Spectrum Auction Mechanisms
Many spectrum auction mechanisms have been proposed for spectrum allocation problem, and unfortunately, few of them protect the bid privacy of bidders and achieve good social efficiency. In this paper, we propose PPS, a Privacy Preserving Strategyproof ...
Runtime and Architecture Support for Efficient Data Exchange in Multi-Accelerator Applications
Heterogeneous parallel computing applications often process large data sets that require multiple GPUs to jointly meet their needs for physical memory capacity and compute throughput. However, the lack of high-level abstractions in previous heterogeneous ...
Service Operator-Aware Trust Scheme for Resource Matchmaking across Multiple Clouds
This paper proposes a service operator-aware trust scheme (SOTS) for resource matchmaking across multiple clouds. Through analyzing the built-in relationship between the users, the broker, and the service resources, this paper proposes a middleware ...
Sherlock Is Around: Detecting Network Failures with Local Evidence Fusion
Traditional approaches for wireless sensor network diagnosis are mainly sink-based. They actively collect global evidences from sensor nodes to the sink so as to conduct centralized analysis at the powerful back-end. On the one hand, long distance ...
SmartSLA: Cost-Sensitive Management of Virtualized Resources for CPU-Bound Database Services
Virtualization-based multi-tenant database consolidation is an important technique for database-as-a-service (DBaaS) providers to minimize their total cost which is composed of SLA penalty cost, infrastructure cost and action cost. Due to the bursty and ...
Time-Sensitive Utility-Based Single-Copy Routing in Low-Duty-Cycle Wireless Sensor Networks
Utility-based routing is a routing scheme based on a special composite utility metric. The existing utility-based routing algorithms have not yet considered the delivery delay, so that they cannot work well in low-duty-cycle wireless sensor networks (WSNs)...
Toward Better Quality of Service Composition Based on a Global Social Service Network
Automatic service composition can create new value-added services dynamically and automatically from existing services in an envisioned service-oriented architecture. However, despite considerable progress, web-scale uptake has been significantly less ...
Cloud Computing Applications for Smart Grid: A Survey
The fast-paced development of power systems necessitates smart grids to facilitate real-time control and monitoring with bidirectional communication and electricity flows. Future smart grids are expected to have reliable, efficient, secured, and cost-...
A Comment on “Power Cost Reduction in Distributed Data Centers: A Two Time Scale Approach for Delay Tolerant Workloads”
This comment points out several mathematical errors in the proof of Therorem 3, and gives the correct expression of B<sub>3</sub>.