By Topic

Networking, Architecture and Storage (NAS), 2012 IEEE 7th International Conference on

Date 28-30 June 2012

Filter Results

Displaying Results 1 - 25 of 56
  • [Cover art]

    Publication Year: 2012 , Page(s): C4
    Request Permissions | PDF file iconPDF (639 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012 , Page(s): i
    Request Permissions | PDF file iconPDF (639 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012 , Page(s): iii
    Request Permissions | PDF file iconPDF (155 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012 , Page(s): iv
    Request Permissions | PDF file iconPDF (120 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012 , Page(s): v - ix
    Request Permissions | PDF file iconPDF (137 KB)  
    Freely Available from IEEE
  • Preface

    Publication Year: 2012 , Page(s): x - xi
    Request Permissions | PDF file iconPDF (143 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012 , Page(s): xii
    Request Permissions | PDF file iconPDF (118 KB)  
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012 , Page(s): xiii - xv
    Request Permissions | PDF file iconPDF (136 KB)  
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012 , Page(s): xvi - xviii
    Request Permissions | PDF file iconPDF (134 KB)  
    Freely Available from IEEE
  • Integrated System and Process Crash Recovery in the Loris Storage Stack

    Publication Year: 2012 , Page(s): 1 - 10
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (198 KB) |  | HTML iconHTML  

    In this paper, we look at two important failure classes in the storage stack: system crashes, where the whole system shuts down unexpectedly, and process crashes, where a part of the storage stack software fails due to an implementation bug. We investigate these two problems in the context of the Loris storage stack. We show how restoring metadata consistency can provide a common first step for re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Reliability Optimization Method Using Disk Reliability Degree and Data Heat Degree

    Publication Year: 2012 , Page(s): 11 - 20
    Request Permissions | Click to expandAbstract | PDF file iconPDF (357 KB) |  | HTML iconHTML  

    The reliability of the traditional storage system can utilize data recovery and reconstruction operations to recover data in case of the disk failure; however it will result in longer data recovery time and increase the possibility of secondary failure. Hence, reliability optimization has become one of the key subjects of storage system research. In this paper we propose a novel reliability optimi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two Efficient Partial-Updating Schemes for Erasure-Coded Storage Clusters

    Publication Year: 2012 , Page(s): 21 - 30
    Cited by:  Papers (3)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (345 KB) |  | HTML iconHTML  

    Nowadays, erasure codes have been widely used in data storage to achieve high fault-tolerance. However, compared with replica-based storage, erasure-coded system may suffer significant performance overhead in encoding, decoding and updating. Traditional updating schemes(e.g. DUM and PUM) use an individual manager node to accomplish the updating. In this paper, we propose two partial-updating schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Anomaly Detection Algorithm Based on Lossless Compression

    Publication Year: 2012 , Page(s): 31 - 38
    Request Permissions | Click to expandAbstract | PDF file iconPDF (253 KB) |  | HTML iconHTML  

    Anomaly detection is essential in network security. It has been researched for decades. Many anomaly detection methods have been proposed. Because of the simplicity of principles, statistical and Markovian methods dominate these approaches. However, their effectiveness is constrained by specific preconditions, which make them work for only appropriate data sets which satisfy their premises. Other ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing Click-Draw Based Graphical Password Scheme for Better Authentication

    Publication Year: 2012 , Page(s): 39 - 48
    Cited by:  Papers (1)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (296 KB) |  | HTML iconHTML  

    Nowadays, graphical password is being regarded as a promising alternative in network security to replace traditional text-based password in which users interact with images for authentication rather than input alphanumeric stings. In general, this image-based authentication can be classified into three categories: click-based graphical password, choice-based graphical password and draw-based graph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A General Framework of Trojan Communication Detection Based on Network Traces

    Publication Year: 2012 , Page(s): 49 - 58
    Request Permissions | Click to expandAbstract | PDF file iconPDF (285 KB) |  | HTML iconHTML  

    Because of the widespread Trojan, Internet users become more and more vulnerable to the threat of information leakage. Traditional techniques of Trojan detection were classified into two main categories: host-based and network-based. Unfortunately, existing techniques are insufficient and limited, because of the following reasons: (1)only uncover the known Trojan while inefficiently detecting nove... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Sparse Matrix Multiplication for Preconditioning and SSTA on a Many-Core Architecture

    Publication Year: 2012 , Page(s): 59 - 68
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (954 KB) |  | HTML iconHTML  

    Operations related to Sparse matrix multiplication are frequently used in scientific computing area, and these operations usually become a performance bottleneck because of their high operational complexity. For example, sparse matrix multiplying diagonal matrix (CS) is a key sub-procedure in preconditioning, and sparse matrix multiplying one-dimension block diagonal matrix (BCS) is a key sub-proc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing the Jacobi Algorithm for Solving Eigenvalues of Symmetric Matrices with CUDA

    Publication Year: 2012 , Page(s): 69 - 78
    Request Permissions | Click to expandAbstract | PDF file iconPDF (348 KB) |  | HTML iconHTML  

    Solving the eigenvalues of matrices is an open problem which is often related to scientific computation. With the increasing of the order of matrices, traditional sequential algorithms are unable to meet the needs for the calculation time. Although people can use cluster systems in a short time to solve the eigenvalues of large-scale matrices, it will bring an increase in equipment costs and power... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • C-IRR: An Adaptive Engine for Cloud Storage Provisioning Determined by Economic Models with Workload Burstiness Consideration

    Publication Year: 2012 , Page(s): 79 - 83
    Request Permissions | Click to expandAbstract | PDF file iconPDF (198 KB) |  | HTML iconHTML  

    Being the long dreamed vision of computing as a utility, cloud enables convenient and on-demand access to a large centralized pool of resources via network. The emerging of cloud storage offers a rather feasible solution to handle the sheer amount of information. It is maturing and becoming an alternative for on-premise storage. Thus, for IT enterprises with high demand of storage, a big concern i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Investigating an Open Source Cloud Storage Infrastructure for CERN-specific Data Analysis

    Publication Year: 2012 , Page(s): 84 - 88
    Cited by:  Papers (5)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (172 KB) |  | HTML iconHTML  

    We present a first case study where an open source storage cloud based on Openstack - SWIFT is used for handling data from CERN experiments using the ROOT software framework. This type of storage clouds promise to be easy to deploy and provide transparent access to data using standardized protocols. We examine the scalability and performance of the system using test cases which are derived from th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Magicube: High Reliability and Low Redundancy Storage Architecture for Cloud Computing

    Publication Year: 2012 , Page(s): 89 - 93
    Request Permissions | Click to expandAbstract | PDF file iconPDF (183 KB) |  | HTML iconHTML  

    High reliability, high performance and low (space) cost are three important priorities for storage systems. However, it's hard for a cloud storage system to fit them all because they are conflict with each other. Currently, widely used cloud storage systems, such as Google File System (GFS), Hadoop Distributed File System (HDFS) and Amazon's Simple Storage Service (S3), can well meet with high rel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CHAC: An Effective Attribute Clustering Algorithm for Large-Scale Data Processing

    Publication Year: 2012 , Page(s): 94 - 98
    Request Permissions | Click to expandAbstract | PDF file iconPDF (195 KB) |  | HTML iconHTML  

    Nowadays Hadoop has become a leading architecture for large-scale data processing. One of the efficient ways to accelerate data processing is column-oriented storage technique which has been integrated into Hadoop family recently. However, how to design an appropriate attribute clustering algorithm to achieve optimal data processing performance for column-oriented hadoop system is still a big prob... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • INBI: An Improved Network-Based Inference Recommendation Algorithm

    Publication Year: 2012 , Page(s): 99 - 103
    Request Permissions | Click to expandAbstract | PDF file iconPDF (374 KB) |  | HTML iconHTML  

    Personal recommendation based on bipartite network has gained sustained attention in recent years due to its performance outperforms the traditional collaborative filtering approach, and it is rapidly becoming an important and promising technology for constructing recommender systems. Current viewpoint is focusing on improving precision of the algorithm. In this paper, we present an improved netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimizing Bandwidth by Employing MPLS AToM with QoS Support

    Publication Year: 2012 , Page(s): 104 - 108
    Request Permissions | Click to expandAbstract | PDF file iconPDF (717 KB) |  | HTML iconHTML  

    MPLS is a growing highly scalable mechanism for the delivery of Internet services in today's high performance telecommunication networks. MPLS AToM (so called MPLS pseudowire) provides efficient bandwidth utilization between routers of network service providers for transporting Layer 2 packets over a single, integrated, MPLS VPN enabled Cloud. In this paper we propose a solution which provides fea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bitline Leakage Current Compensation Circuit for High-Performance SRAM Design

    Publication Year: 2012 , Page(s): 109 - 113
    Request Permissions | Click to expandAbstract | PDF file iconPDF (233 KB) |  | HTML iconHTML  

    The leakage current existing in the bitline of SRAM has attracted more and more concerns for the operation of high-performance SRAM design, especially with the decrease of the threshold voltage of the transistor for high-performance demand, the leakage current would increase exponentially. The increased leakage current may slowdown the performance of the read operation of SRAM because the existenc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making Garbage Collection Wear Conscious for Flash SSD

    Publication Year: 2012 , Page(s): 114 - 123
    Cited by:  Papers (2)
    Request Permissions | Click to expandAbstract | PDF file iconPDF (954 KB) |  | HTML iconHTML  

    Since NAND flash memory has certain inherent limitations like out-of-place updates and a coarse granularity of erase unit, a NAND flash memory based solid state disk needs a garbage collector to erase and recycle previously used blocks from time to time. Garbage collection, however, can significantly decrease flash SSD performance as it incurs high overhead. Various techniques have been proposed t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.