By Topic

2010 IEEE Fifth International Conference on Networking, Architecture, and Storage

15-17 July 2010

Filter Results

Displaying Results 1 - 25 of 69
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (85 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (153 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (113 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (77 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (69 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2010, Page(s):xiii - xv
    Request permission for commercial reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2010, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • Keynote speech

    Publication Year: 2010, Page(s): xvii
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (64 KB) | HTML iconHTML

    Summary form only given. In this talk, inspired by working on the Lustre cluster file system during the last ten years, we will take a tour of internal features that are required for recovery and data management to work reliably and with horizontal scaling. Scale now means handling 100's of servers and tens of thousands of clients in larger data centers, often with replicas spanning the globe. Thi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-Bounded Essential Localization for Wireless Sensor Networks

    Publication Year: 2010, Page(s):3 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (249 KB) | HTML iconHTML

    In many practical applications of wireless sensor networks, it is crucial to accomplish the localization of sensors within a given time bound. We find that the traditional definition of relative localization is inappropriate for evaluating its actual overhead. To address this problem, we define a novel problem called essential localization, and present the first rigorous study on the essential loc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Tolerant Data Collection in Heterogeneous Intelligent Monitoring Networks

    Publication Year: 2010, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    In this work, we focus on the problem of fault tolerant data collection in heterogeneous Intelligent Monitoring Networks(IMNs). IMNs are expected to have a wide range of applications in many fields such as forest monitoring, structural monitoring, and industrial plant monitoring. We present our fault tolerant data collection scheme in the hierarchical structure of IMNs. We use an interesting techn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Probabilistic Routing Protocol for Heterogeneous Sensor Networks

    Publication Year: 2010, Page(s):19 - 27
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    The past five years witnessed a rapid development in wireless sensor networks, which have been widely used in military and civilian applications. Due to different requirements in their application environment, sensors with different capacities, power, and so on are deployed. Data routing in such heterogeneous sensor networks is a challenging task. On one hand, the heterogeneous features bring abou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing the Dependability of Distributed Storage Systems Using a Two-Layer Hidden Markov Model-Based Approach

    Publication Year: 2010, Page(s):31 - 40
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (333 KB) | HTML iconHTML

    Nowadays, dependability is of paramount importance in modern distributed storage systems. A challenging issue to deploy a storage system with certain dependability requirements or improve existing systems' dependability is how to comprehensively and efficiently characterize the dependability of those systems. In this paper, we present a two-layer Hidden Markov Model (HMM) to characterize the depen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High Effective Indexing and Retrieval Method Providing Block-Level Timely Recovery to Any Point-in-Time

    Publication Year: 2010, Page(s):41 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (518 KB) | HTML iconHTML

    Block-level continuous data protection (CDP) logs every disk write operation so that the disk can be rolled back to any arbitrary point-in-time within a time window. For each update operation is time stamped and logged, the indexing for such huge amounts of records is an important and challenging problem. Unfortunately, the conventional indexing methods can not efficiently record large numbers of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fine-Grained Data Reconstruction Algorithm for Solid-State Disks

    Publication Year: 2010, Page(s):51 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB) | HTML iconHTML

    Solid-state disks (SSDs) with high I/O performance are increasingly becoming popular. To extend the life time of flash memory, one can apply wear-leveling strategies to manage data blocks. However, wear-leveling strategies certainly inevitably degrade write performance. In addition to low write performance, wear-leveling strategies make one block unwritable when one bit of this block is invalid. A... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Distributed Approach for Hidden Wormhole Detection with Neighborhood Information

    Publication Year: 2010, Page(s):63 - 72
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Ad hoc networks are promising but are vulnerable to selfish and malicious attacks. One kind of malicious attack, hidden wormhole attacks, can be mounted easily and be immune to cryptographic techniques. Wormholes distort network topology, and degrade the performance of applications such as localization and data collection. A wormhole attack is one of the most severe threats to an ad hoc network. U... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Simple Group Key Management Approach for Mobile Ad Hoc Networks

    Publication Year: 2010, Page(s):73 - 78
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (209 KB) | HTML iconHTML

    Securing communications among a group of nodes in mobile ad hoc networks (MANETs) is challenging due to the lack of trusted infrastructure. Group key management is one of the basic building blocks in securing group communications. A group key is a common secret used in cryptographic algorithms. Group key management involves creating and distributing the common secret for all group members. Change ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks

    Publication Year: 2010, Page(s):79 - 88
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (253 KB) | HTML iconHTML

    Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, etc. Basically, the DV-Hop localization mechanism can work well with the assistance of beacon nodes that have the capability of self-positioning. However, if the network is invaded by a wormhole attack, the attacker can tunn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a Reliable Distributed Secure Database System

    Publication Year: 2010, Page(s):91 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    We propose to develop a design for a reliable distributed relational database management system to safeguard sensitive information. Each day, increasingly more highly sophisticated computer attacks are occurring in the information storage systems of financial institutions, eCommerce businesses, universities, hospitals and government agencies. We urgently need to develop a secure and dependable way... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A MAP Fitting Approach with Joint Approximation Oriented to the Dynamic Resource Provisioning in Shared Data Centres

    Publication Year: 2010, Page(s):100 - 108
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (430 KB) | HTML iconHTML

    In shared data centres, accurate models of workloads are indispensable in the process of autonomic resource scheduling. Facing the problem of parameterizing the vast space of big MAPs in order to fit the real workload traces with time-varying characteristics, in this paper we propose a MAP fitting approach JAMC with joint approximation of the order moment and the lag correlation. Based on the stat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Trust Aware Grid Access Control Architecture Based on ABAC

    Publication Year: 2010, Page(s):109 - 115
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    Grid system has many great security challenges such as access control. The attribute-based access control model (ABAC) has much merits that are more flexible, fine-grained and dynamically suitable to grid environment. As an important factor in grid security, trust is increasingly applied to management of security, especially in access control. This paper puts forward a novel trust model in multi-d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Disk Array Reliability Through Expedited Scrubbing

    Publication Year: 2010, Page(s):119 - 125
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    Disk scrubbing periodically scans the contents of a disk array to detect the presence of irrecoverable read errors and reconstitute the contents of the lost blocks using the built-in redundancy of the disk array. We address the issue of scheduling scrubbing runs in disk arrays that can tolerate two disk failures without incurring a data loss, and propose to start an urgent scrubbing run of the who... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability Analysis of Declustered-Parity RAID 6 with Disk Scrubbing and Considering Irrecoverable Read Errors

    Publication Year: 2010, Page(s):126 - 134
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1144 KB) | HTML iconHTML

    We investigate the impact of Irrecoverable Read Errors (IREs) on Mean Time To Data Loss (MTTDL) of declustered-parity RAID 6 systems. By extending the analytic model to study the reliability of RAID 5 systems from Wu et. al. we obtain the MTTDL which mainly takes into account two types of data loss: data loss caused by three independent disk failures, and data loss due to a detected IRE during the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Evaluation of Two Typical RAID-6 Codes on Online Single Disk Failure Recovery

    Publication Year: 2010, Page(s):135 - 142
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1100 KB) | HTML iconHTML

    Redundant Arrays of Independent Disks RAID is a popular storage architecture with high performance and reliability. RAID-6 with a higher level of reliability based on MDS (Maximum Distance Separable) code is well studied, for its optimal storage efficiency. RAID-6 could offer continuous services in degraded mode, during the period of online failure recovery. However, the online recovery would brin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.