By Topic

Networking, Architecture and Storage (NAS), 2011 6th IEEE International Conference on

Date 28-30 July 2011

Filter Results

Displaying Results 1 - 25 of 58
  • [Front cover]

    Publication Year: 2011, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (161 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2011, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2011, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (139 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2011, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2011, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2011, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2011, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Program Committee Members

    Publication Year: 2011, Page(s):xii - xv
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • ThinStore: Out-of-Band Virtualization with Thin Provisioning

    Publication Year: 2011, Page(s):1 - 10
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    Traditional storage virtualization systems are faced with the problem of poor storage utilizations, leading to expensive capital expenditures and high energy consumptions. To address this issue, we design and implement Thin Store, an out-of-band virtualization system that supports thin provisioning of storage resources. Thin Store automatically allocates storage capacity only when new data is writ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Virtual Machine Provisioning in Elastic Multi-tier Cloud Platforms

    Publication Year: 2011, Page(s):11 - 19
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (326 KB) | HTML iconHTML

    Virtual machines are allocated on demand in virtualized cloud platforms to provide flexible and reliable services. The major difficulty lies in satisfying the conflicting objectives of reducing response time while lowering resource costs. In this paper, a mathematical multi-tier framework for virtual machine allocation is proposed, which can be used to capture the performance of the cloud platform... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hybrid Co-scheduling Optimizations for Concurrent Applications in Virtualized Environments

    Publication Year: 2011, Page(s):20 - 29
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    Concurrent applications in virtualized environments (VE) encounter synchronization problems such as Lock Holder Preemption (LHP). Hybrid co-scheduling is an effective approach to address such problems. However, the contention and exclusiveness between multiple concurrent domains in hybrid co-scheduling cause a serious performance degradation and unfairness. To keep the benefits brought by hybrid c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transition from IPv4 to IPv6: A Translation Approach

    Publication Year: 2011, Page(s):30 - 39
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1022 KB) | HTML iconHTML

    IPv4 addresses are already depleted in IANA and will be soon exhausted in RIR while more clients are pouring into the Internet. IPv6, as the only available next generation Internet protocol, is still not commercially successful because a scheme that could solve the migration of IPv4 resources to IPv6 network, as well as mutual communication between the two incompatible protocols, has not been full... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying Modified TAM to Privacy Setting Tools on SNS

    Publication Year: 2011, Page(s):40 - 44
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    The technology acceptance model (TAM) proposes that perceived usefulness and perceived ease of use can predict that whether an information technology will be accepted and used by people. In this research, we were trying to find out dominant factors which could be predictors to the usage of privacy setting tools on Social Networking Sites (SNS) based on TAM. We used a modified TAM to take usefulnes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Entropy to Classify Traffic More Deeply

    Publication Year: 2011, Page(s):45 - 52
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (287 KB) | HTML iconHTML

    The network community always pays its attention to find better methods for traffic classification, which is crucial for Internet Service Providers (ISPs) to provide better QoS for users. Prior works on traffic classification mainly focus their attentions on dividing Internet traffic into different categories based on application layer protocols (such as HTTP, Bit Torrent etc.). Making traffic clas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Request Load Balancing for Highly Skewed Traffic in P2P Networks

    Publication Year: 2011, Page(s):53 - 62
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (843 KB) | HTML iconHTML

    Request balancing is an important issue in P2P networks, as requests or accesses are typically not distributed evenly among the items. Some of the items may account for a large ratio of the overall requests, e.g., in case of extremely popular videos. In this paper, we present a combination of two approaches to overcome an uneven request distribution even if there is highly skewed traffic. These ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Probabilistic Acknowledgment Mechanism for Wireless Sensor Networks

    Publication Year: 2011, Page(s):63 - 72
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (267 KB) | HTML iconHTML

    The inherently unreliable communication infrastructure compel WSN protocols to employ error control mechanisms. Traditionally, error control is achieved by a retransmission scheme using acknowledgment mechanisms. WSN architectures are severely resource constrained and the additional energy expense of transmitting error control messages can seriously degrade network lifetime. In this paper, we anal... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Preventive Traffic Adaptation Model for Wireless Mesh Networks Using Fuzzy Logic

    Publication Year: 2011, Page(s):73 - 81
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1686 KB) | HTML iconHTML

    Nowadays, real time traffic over wireless networks is increasing sharply. In addition, network scale is larger due to new facilities as offered by wireless mesh networks. However, the differences between (1) the infrastructure capacities, (2) the end users devices technologies, (3) the number of users, and (4) the number of real time applications are implying the need of more dynamic quality of se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Allocation in Heterogeneous Disk Arrays

    Publication Year: 2011, Page(s):82 - 91
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB) | HTML iconHTML

    We consider the allocation of Virtual Arrays (VAs)with different RAID levels in a Heterogeneous Disk Array (HDA). This is expected to provide significant cost savings by consolidating multiple disk arrays into one. Disk load balancing across disk arrays is a by-product of HDA. We provide an example of potential performance benefits expected from HDA. The number of Virtual Disks (VDs) required to m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance, Reliability, and Performability Aspects of Hierarchical RAID

    Publication Year: 2011, Page(s):92 - 101
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (365 KB) | HTML iconHTML

    We consider a two level Hierarchical RAID: HRAIDk/ℓ with MDS erasure coding, so that it tolerates k node and ℓ disk failures per node with the minimum redundancy level. With no controller failures WRAIDk/ℓ tolerates all (k + 1)(ℓ + 1) - 1 disk failures, while the maximum number of disk failures tolerated in an array with N nodes and M disks per node is N × ȑ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comprehensive Study on RAID-6 Codes: Horizontal vs. Vertical

    Publication Year: 2011, Page(s):102 - 111
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (557 KB) | HTML iconHTML

    The RAID-6 architecture is playing an increasingly important role in modern storage systems. There are generally two kinds of RAID-6 codes, horizontal codes and vertical codes. Horizontal codes have been extensively studied and widely implemented, while vertical codes have not gained the equal attention. In this paper, we investigate the state-of-the-art horizontal and vertical RAID-6 codes and se... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PDRS: A New Recovery Scheme Application for Vertical RAID-6 Code

    Publication Year: 2011, Page(s):112 - 121
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1386 KB) | HTML iconHTML

    As the technique developing, some important problems in storage systems have been solved appropriately. A good example is the development of RAID-6 code techinque, the appear of it has greatly improved the reliability, availability of modern storage systems. Some best known vertical RAID-6 code like P-code and X-code has acquire optimal or near optimal performance in encoding, decoding and update.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • JVM Virtual Method Invoking Optimization Based on CAM Table

    Publication Year: 2011, Page(s):122 - 129
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (354 KB) | HTML iconHTML

    In Java programs, it needs to use the information of the method type to resolve the virtual method dynamically, which restricts the performance greatly. Currently, the solution is mainly the technique of inline caching, which can be divided into two categories: monomorphic inline caching and polymorphic inline caching. Because of the simple implementation of monomorphic inline caching, it is more ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Scalable Application Checkpointing with Parallel File System Delegation

    Publication Year: 2011, Page(s):130 - 139
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (875 KB) | HTML iconHTML

    The ever-increasing scale of modern high-performance computing (HPC) systems presents a variety of challenges to the parallel file system (PFS) based storage in these systems. The scalability of application check pointing is a particularly important challenge because it is critical to the reliability of computing and it often dominates the I/Os in a HPC system. When a large number of parallel proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • TMTLS: Combine TM with TLS to Limit the Memory Contentions and Exploit the Parallelism in the Long-Running Transactions

    Publication Year: 2011, Page(s):140 - 148
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (279 KB) | HTML iconHTML

    As more threads added to execute the multi-threaded applications in the many-core era, memory contentions among different threads impose a severe challenge to both the programmability and performance. Existing studies show that Transactional Memory (TM) is able to solve the programmability problem and scale well on the fine-grained applications in the SPLASH-2 benchmark suite. As more investigatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance and Power Analysis of ATI GPU: A Statistical Approach

    Publication Year: 2011, Page(s):149 - 158
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (577 KB) | HTML iconHTML

    We present a comprehensive study on the performance and power consumption of a recent ATI GPU. By employing a rigorous statistical model to analyze execution behaviors of representative general-purpose GPU (GPGPU) applications, we conduct insightful investigations on the target GPU architecture. Our results demonstrate that the GPU execution throughput and the power dissipation are dependent on di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.