Search For:

Displaying 1-50 out of 60 total
Availability Modeling and Analysis of Autonomous In-Door WSNs
Found in: IEEE International Conference on Mobile Adhoc and Sensor Systems Conference
By Safwan Al-Omari, Weisong Shi
Issue Date:October 2007
pp. 1-9
Availability analysis and modeling in autonomous and remotely administered systems that are composed of cheap and failure-prone components is vital to redundancy management, which includes the prediction of the required number of components and the way the...
 
An Adaptive Rescheduling Strategy for Grid Workflow Applications
Found in: Parallel and Distributed Processing Symposium, International
By Zhifeng Yu, Weisong Shi
Issue Date:March 2007
pp. 115
Scheduling is the key to the performance of grid workflow applications. Various strategies are proposed, including static scheduling strategies which map jobs to resources before execution time, or dynamic alternatives which schedule individual job only wh...
 
Dual-JT: Toward the high availability of JobTracker in Hadoop
Found in: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom)
By Jian Wan,Minggang Liu,Xixiang Hu,Zujie Ren,Jilin Zhang,Weisong Shi,Wei Wu
Issue Date:December 2012
pp. 263-268
MapReduce is a state-of-the-art computation paradigm that is becoming widely used for processing large-scale datasets. Hadoop is an open-source implementation of MapReduce and follows a masterCslave architecture. This architecture makes Hadoop suffer from ...
 
Workload characterization on a production Hadoop cluster: A case study on Taobao
Found in: 2012 IEEE International Symposium on Workload Characterization (IISWC)
By Zujie Ren,Xianghua Xu,Jian Wan,Weisong Shi,Min Zhou
Issue Date:November 2012
pp. 3-13
MapReduce is becoming the state-of-the-art computing paradigm for processing large-scale datasets on a large cluster with tens or thousands of nodes. It has been widely used in various fields such as e-commerce, Web search, social networks, and scientific ...
 
Anole: A Case for Energy-Aware Mobile Application Design
Found in: 2012 41st International Conference on Parallel Processing Workshops (ICPPW)
By Hui Chen,Bing Luo,Weisong Shi
Issue Date:September 2012
pp. 232-238
Battery lifetime, which is one of the most significant user experiences for mobile devices, strongly restricts the functional design of hardware architecture and applications. Among all the aspects of energy saving for mobile devices, energy-aware applicat...
 
WaxElephant: A Realistic Hadoop Simulator for Parameters Tuning and Scalability Analysis
Found in: 2012 Seventh ChinaGrid Annual Conference (ChinaGrid)
By Zujie Ren,Zhijun Liu,Xianghua Xu,Jian Wan,Weisong Shi,Min Zhou
Issue Date:September 2012
pp. 9-16
MapReduce is becoming the state-of-the-art computation paradigm for processing large-scale datasets on a large cluster with tens or thousands of nodes. Hadoop, an open-source implementation of MapReduce framework, has gained much popularity due to its high...
 
Experimental Analysis of Application Specific Energy Efficiency of Data Centers with Heterogeneous Servers
Found in: 2012 IEEE 5th International Conference on Cloud Computing (CLOUD)
By Grace Metri,Soumyasudharsan Srinivasaraghavan,Weisong Shi,Monica Brockmeyer
Issue Date:June 2012
pp. 786-793
Energy efficiency is an important issue for data centers given the amount of energy they consume yearly. However, there is still a gap of understanding of how exactly the application type and the heterogeneity of servers and their configuration impact the ...
 
The Design and Analysis of Thermal-Resilient Hard-Real-Time Systems
Found in: Real-Time and Embedded Technology and Applications Symposium, IEEE
By Pradeep M. Hettiarachchi,Nathan Fisher,Masud Ahmed,Le Yi Wang,Shinan Wang,Weisong Shi
Issue Date:April 2012
pp. 67-76
We address the challenge of designing predictable real-time systems in an unpredictable thermal environment where environmental temperature may dynamically change (e.g., implantable medical devices). Towards this challenge, we propose a control-theoretic d...
 
Optimizing Web Browser on Many-Core Architectures
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Lingjun Fan,Weisong Shi,Shibin Tang,Chenggang Yan,Dongrui Fan
Issue Date:October 2011
pp. 173-178
As more and more Web applications emerging on sever end today, the Web browser on client end has become a host of a variety of applications other than just rendering static Web pages. This leads to more and more performance requirements of a Web browser, f...
 
SyncViews: Toward Consistent User Views in Cloud-Based File Synchronization Services
Found in: ChinaGrid, Annual Conference
By Xianqiang Bao,Nong Xiao,Weisong Shi,Fang Liu,Huajian Mao,Hang Zhang
Issue Date:August 2011
pp. 89-96
As more and more individuals have multiple computing devices, how to maintain the consistency of user files stored on multiple devices becomes a challenge. Cloud-based file synchronization services (FSS), e.g., Drop box and iFolder, are promising approache...
 
Incremental Sensor Node Deployment for Low Cost and Highly Available WSNs
Found in: Mobile Ad-hoc and Sensor Networks, International Conference on
By Safwan Al-Omari, Weisong Shi
Issue Date:December 2010
pp. 91-96
We attack the sensor network deployment problem. We define the deployment problem as the problem of deciding how many sensor nodes should be deployed in the sensor field over how many phases during its lifetime. We target the optimal deployment strategy th...
 
Trust and Reputation Management
Found in: IEEE Internet Computing
By Ling Liu, Weisong Shi
Issue Date:September 2010
pp. 10-13
Trust and reputation management research is highly interdisciplinary, involving researchers from networking and communication, data management and information systems, e-commerce and service computing, artificial intelligence, and game theory, as well as t...
 
Improving resource efficiency in data centers using reputation-based resource selection
Found in: International Conference on Green Computing
By Tung Nguyen, Weisong Shi
Issue Date:August 2010
pp. 389-396
Nowadays, data centers are consuming a lot of energy but not in an efficient fashion. Much of energy is wasted. There are several types of energy waste at different levels including infrastructure-, machine- and system-level waste. The former two levels ha...
 
Wukong: Toward a Cloud-Oriented File Service for Mobile Devices
Found in: Services Computing, IEEE International Conference on
By Huajian Mao, Nong Xiao, Weisong Shi, Yutong Lu
Issue Date:July 2010
pp. 498-505
Along with the rapid growth of heterogeneous cloud services and network technologies, more mobile devices use cloud storage services to enlarge the capacity and share data in our daily lives. We commonly use cloud storage service clients in a straight forw...
 
HACK: A Health-Based Access Control Mechanism for Dynamic Enterprise Environments
Found in: Computational Science and Engineering, IEEE International Conference on
By Chenjia Wang, Kevin P. Monaghan, Weisong Shi
Issue Date:August 2009
pp. 795-801
Current access control schemes focus on the user and their rights and privileges relating to the access to bothinitiating functionality and accessing information. This approach, while appropriate with respect to access control for the user, misses a very i...
 
A Planner-Guided Scheduling Strategy for Multiple Workflow Applications
Found in: Parallel Processing Workshops, International Conference on
By Zhifeng Yu, Weisong Shi
Issue Date:September 2008
pp. 1-8
Workflow applications are gaining popularity in recent years because of the prevalence of cluster environments. Many algorithms have been developed since, however most static algorithms are designed in the problem domain of scheduling single workflow appli...
 
Adaptive Secure Access to Remote Services
Found in: Services Computing, IEEE International Conference on
By Hanping Lufei, Weisong Shi, Vipin Chaudhary
Issue Date:July 2008
pp. 173-181
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RPC-based services to SOAP-based Web services. Likewise, the proliferation of m...
 
FlexFetch: A History-Aware Scheme for I/O Energy Saving in Mobile Computing
Found in: Parallel Processing, International Conference on
By Feng Chen, Song Jiang, Weisong Shi, Weikuan Yu
Issue Date:September 2007
pp. 10
Extension of battery lifetime has always been a major issue for mobile computing. While more and more data are involved in mobile computing, energy consumption caused by I/O operations becomes increasingly large. In a pervasive computing environment, the r...
 
A Novel Topology Discovery Service for Self-Organized WSNs
Found in: Wireless Algorithms,Systems and Applications, International Conference on
By Safwan Al-Omari, Weisong Shi
Issue Date:August 2007
pp. 213-218
We propose a topology discovery service, which is a network service that promotes the concept of cross-layer design. The topology service, which is the fundamental of any self-organized and self-healing WSN, maintains several topology parameters that descr...
 
Modeling Data Consistency in Wireless Sensor Networks
Found in: Distributed Computing Systems Workshops, International Conference on
By Kewei Sha, Weisong Shi
Issue Date:June 2007
pp. 16
With the rapid growth of wireless sensor systems deployment, data quality has become a critical issue to the success of these applications. In this paper, we first raise the data quality problem in WSN. Then, we propose a novel metric, data consistency, to...
 
Enforcing Privacy Using Symmetric Random Key-Set in Vehicular Networks
Found in: Autonomous Decentralized Systems, International Symposium on
By Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert, Tao Zhang
Issue Date:March 2007
pp. 344-351
Vehicular networks have attracted extensive attentions in recent years for their promises in improving safety and enabling other value-added services. Security and privacy are two integrated issues in the deployment of vehicular networks. Privacy-preservin...
 
Redundancy-Aware Topology Management in Wireless Sensor Networks
Found in: International Conference on Collaborative Computing: Networking, Applications and Worksharing
By S. Al-Omari, Weisong Shi
Issue Date:November 2006
pp. 57
Extending the lifetime of wireless sensor networks remains the most challenging and demanding requirement that impedes large-scale deployments. Studies show that considerable energy saving can be achieved only by putting a node's radio into full sleep mode...
 
On the Effects of Consistency in Data Operations in Wireless Sensor Networks
Found in: Parallel and Distributed Systems, International Conference on
By Kewei Sha, Weisong Shi
Issue Date:July 2006
pp. 195-202
In battery powered systems such as wireless sensor networks, energy eficiency is one of the most important system design goals. In this paper, energy eficiency is examined from the perspective of data consistency, which includes both temporal consistency a...
 
Shubac: a searchable P2P network utilizing dynamic paths for client/server anonymity
Found in: Parallel and Distributed Processing Symposium, International
By A. Brodie, Cheng-Zhong Xu, Weisong Shi
Issue Date:April 2006
pp. 426
A general approach to achieve anonymity on P2P networks is to construct an indirect path between client and server for each data transfer. The indirection, together with randomness in the selection of intermediate nodes, provides a guarantee of anonymity t...
 
Preserving source location privacy in monitoring-based wireless sensor networks
Found in: Parallel and Distributed Processing Symposium, International
By Yong Xi,L. Schwiebert, Weisong Shi
Issue Date:April 2006
pp. 425
While a wireless sensor network is deployed to monitor certain events and pinpoint their locations, the location information is intended only for legitimate users. However, an eavesdropper can monitor the traffic and deduce the approximate location of moni...
 
Performance evaluation of rating aggregation algorithms in reputation systems
Found in: International Conference on Collaborative Computing: Networking, Applications and Worksharing
By Zhengqiang Liang, Weisong Shi
Issue Date:December 2005
pp. 10 pp.
Ratings (also known as recommendations, referrals, and feedbacks) provide an efficient and effective way to build trust relationship amongst peers in open environments. The key to the success of ratings is the rating aggregation algorithm. Several rating a...
 
Personalized Email Management at Network Edges
Found in: IEEE Internet Computing
By Jayashree Ravi, Weisong Shi, Cheng-Zhong Xu
Issue Date:March 2005
pp. 54-60
A new technique for managing and disseminating Web-based email prefetches messages and generates dynamic pages displaying them at the network edge. Compared to other popular Web-based email servers, the PACE //au: spell out?// prototype shows an improved p...
 
PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing
Found in: Hawaii International Conference on System Sciences
By Zhengqiang Liang, Weisong Shi
Issue Date:January 2005
pp. 201b
Building a good cooperation in the P2P resource sharing is a fundamental and challenging research topic because of peer anonymity, peer independence, high dynamics of peer behaviors and network conditions, and the absence of an effective security mechanism...
   
QueryAgent: A General Query Processing Tool for Sensor Networks
Found in: Parallel Processing Workshops, International Conference on
By Weisong Shi, Sivakumar Sellamuthu, Kewei Sha, Loren Schwiebert
Issue Date:August 2004
pp. 488-495
Sensor networks are promising in many applications; however, we have not yet seen its wide acceptance and deployment. We envision that a big obstacle to solving this dilemma is the lack of an easily usable tool for applications scientists to manage and use...
 
Application-Aware Service Differentiation in PAWNs
Found in: Parallel Processing, International Conference on
By Hanping Lufei, Sivakumar Sellamuthu,, Sharun Santhosh, Weisong Shi
Issue Date:August 2004
pp. 415-422
We have witnessed the increasing demand for pervasive Internet access from public area wireless networks (PAWNs). The diverse service requirements from end users necessitate an efficient service differentiation mechanism, which should satisfy two goals: en...
 
Peer-to-Peer Web Caching: Hype or Reality?
Found in: Parallel and Distributed Systems, International Conference on
By Yonggen Mao, Zhaoming Zhu, Weisong Shi
Issue Date:July 2004
pp. 171
In this paper, we systematically examine the design space of peer-to-peer Web caching systems in three orthogonal dimensions: the caching algorithm, the document lookup algorithm, and the peer granularity. Based on the observation that the traditional URL-...
 
Cegor: An Adaptive Distributed File System for Heterogeneous Network Environments
Found in: Parallel and Distributed Systems, International Conference on
By Weisong Shi, Sharun Santhosh, Hanping Lufei
Issue Date:July 2004
pp. 145
Distributed file systems have been extensively studied in the past, but they are still far from wide acceptance over heterogeneous network environments. Most traditional network file systems target the tight-couple high-speed networks only, and do not work...
 
SEE: A Service Execution Environment for Edge Services
Found in: Internet Applications, IEEE Workshop on
By Vikrant Mastoli, Valmik Desai, Weisong Shi
Issue Date:June 2003
pp. 61
The increasing mismatch between the low-bandwidth, resource characteristics of wireless mobile devices and the high-bandwidth expectations of many content-rich services drives the demand for deploying content-oriented services along the data path between t...
 
LOBOT: Low-Cost, Self-Contained Localization of Small-Sized Ground Robotic Vehicles
Found in: IEEE Transactions on Parallel and Distributed Systems
By Guoxing Zhan, Weisong Shi
Issue Date:April 2013
pp. 744-753
It is often important to obtain the real-time location of a small-sized ground robotic vehicle when it performs autonomous tasks either indoors or outdoors. We propose and implement LOBOT, a low-cost, self-contained localization system for small-sized grou...
 
A Two-Tiered On-Demand Resource Allocation Mechanism for VM-Based Data Centers
Found in: IEEE Transactions on Services Computing
By Ying Song,Yuzhong Sun,Weisong Shi
Issue Date:January 2013
pp. 116-129
In a shared virtual computing environment, dynamic load changes as well as different quality requirements of applications in their lifetime give rise to dynamic and various capacity demands, which results in lower resource utilization and application quali...
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Found in: IEEE Transactions on Dependable and Secure Computing
By Guoxing Zhan,Weisong Shi,Julia Deng
Issue Date:March 2012
pp. 184-197
The multihop routing in wireless sensor networks (WSNs) offers little protection against identity deception through replaying routing information. An adversary can exploit this defect to launch various harmful or even devastating attacks against the routin...
 
Where does the power go in a computer system: Experimental analysis and implications
Found in: International Green Computing Conference and Workshops
By Hui Chen, Shinan Wang, Weisong Shi
Issue Date:July 2011
pp. 1-6
In the last few years the power dissipation problem of computer systems has attracted more and more attention. A lot of work has been done to decrease power dissipation and increase energy efficiency. We are still, however, not observing significant decrea...
 
In Cloud, Can Scientific Communities Benefit from the Economies of Scale?
Found in: IEEE Transactions on Parallel and Distributed Systems
By Lei Wang,Jianfeng Zhan,Weisong Shi,Yi Liang
Issue Date:February 2012
pp. 296-303
The basic idea behind cloud computing is that resource providers offer elastic resources to end users. In this paper, we intend to answer one key question to the success of cloud computing: in cloud, can small-to-medium scale scientific communities benefit...
 
Adaptive Secure Access to Remote Services in Mobile Environments
Found in: IEEE Transactions on Services Computing
By Hanping Lufei, Weisong Shi, Vipin Chaudhary
Issue Date:January 2008
pp. 49-61
Since the inception of service-oriented computing paradigm, we have witnessed a plethora of services deployed across a broad spectrum of applications, ranging from conventional RPC-based services to SOAP-based Web services. Likewise, the proliferation of m...
 
Running Real Applications on Software DSMs
Found in: High-Performance Computing in the Asia-Pacific Region, International Conference on
By Weiwu Hu, Fuxin Zhang, Li Ren, Weisong Shi, Zhimin Tang
Issue Date:May 2000
pp. 148
This paper introduces our experiences with some real applications on the home-based software DSM JIAJIA and discusses techniques of parallelizing a sequential program to run on software DSM. It categorizes parallel program segments into five patterns: sing...
 
Adaptive Write Detection in Home-Based Software DSMs
Found in: High-Performance Distributed Computing, International Symposium on
By Weiwu Hu, Weisong Shi, Zhimin Tang
Issue Date:August 1999
pp. 27
Write detection is essential in multiple-writer protocols to identify writes to shared pages so that these writes can be correctly propagated. Software DSMs that implement multiple-writer protocol normally employ the virtual memory page fault to detect wri...
 
Dynamic Task Migration in Home-based Software DSM Systems
Found in: High-Performance Distributed Computing, International Symposium on
By Weisong Shi, Weiwu Hu, Zhimin Tang, M. Rasit Eskicioglu
Issue Date:August 1999
pp. 20
Dynamic task migration is an effective strategy to maximize the performance and resource utilization in meta-computing environments. Traditionally, however, a
 
Dynamic Computation Scheduling for Load Balancing in Home-Based Software DSMs
Found in: Parallel Architectures, Algorithms, and Networks, International Symposium on
By Weisong Shi, Zhimin Tang
Issue Date:June 1999
pp. 248
Load balancing is a critical issue for achieving good performance in any parallel and distributed systems. However, this issue is neglected in the research area of software DSMs in the past decade. In this paper, we present and evaluate a dynamic computati...
 
Reducing System Overheads in Home-based Software DSMs
Found in: Parallel Processing Symposium, International
By Weiwu Hu, Weisong Shi, Zhimin Tang
Issue Date:April 1999
pp. 167
Software DSM systems suffer from the high communication and coherence-induced overheads that limit performance. This paper introduces our efforts in reducing system overheads of a home-based software DSM called JIAJIA. Three measures, including eliminating...
 
Evaluation of the JIAJIA Software DSM System on High Performance Computer Architectures
Found in: Hawaii International Conference on System Sciences
By M. Rasit Eskicioglu, T. Anthony Marsland, Weiwu Hu, Weisong Shi
Issue Date:January 1999
pp. 8012
Distributed Shared Memory (DSM) combines the scalability of loosely coupled multicomputer systems with the ease of usability of tightly coupled multiprocessors, and allows transparent replication and caching of data. DSM has received much attention in the ...
   
Energy-aware Scheduling of MapReduce Jobs for Big Data Applications
Found in: IEEE Transactions on Parallel and Distributed Systems
By Lena Mashayekhy,Mahyar Movahed Nejad,Daniel Grosu,Quan Zhang,Weisong Shi
Issue Date:February 2015
pp. 1
The majority of large-scale data intensive applications executed by data centers are based on MapReduce or its opensource implementation, Hadoop. Such applications are executed on large clusters requiring large amounts of energy, making the energy costs a ...
 
Workload Analysis, Implications, and Optimization on a Production Hadoop Cluster: A Case Study on Taobao
Found in: IEEE Transactions on Services Computing
By Zujie Ren,Jian Wan,Weisong Shi,Xianghua Xu,Min Zhou
Issue Date:April 2014
pp. 307-321
Understanding the characteristics of MapReduce workloads in a Hadoop cluster is the key to making optimal configuration decisions and improving the system efficiency and throughput. However, workload analysis on a Hadoop cluster, particularly in a large-sc...
 
Myrinet-Based High Performance Communication Library for Software DSMs
Found in: High-Performance Computing in the Asia-Pacific Region, International Conference on
By Yongjie Mao, Weisong Shi, Mingfa Zhu
Issue Date:May 2000
pp. 94
User-level networking (ULN) is now becoming an important technology to expose the high performance of network hardware, which is advancing much faster than communication software. The exposure of all underlying memory management to high-level software give...
 
Efficient Multidestination Multicast on Regular Router-Based Networks
Found in: High-Performance Computing in the Asia-Pacific Region, International Conference on
By Zhiyu Zhou, Weisong Shi, Zhimin Tang
Issue Date:May 2000
pp. 82
Multidestination message passing is attractive in multicast communication because it reduces software overheads at processor nodes effectively. Combining the best features of two existing approaches: tree-based multicast and multidestination message passin...
 
Low power cache architectures with hybrid approach of filtering unnecessary way accesses
Found in: Proceedings of the 2013 International Workshop on Programming Models and Applications for Multicores and Manycores (PMAM '13)
By Dongrui Fan, Lingjun Fan, Shinan Wang, Weisong Shi, Yasong Zheng
Issue Date:February 2013
pp. 93-99
Power has been a big issue in processor design for several years. As caches account for more and more CPU die area and power, this paper presents using filtering unnecessary way accesses to reduce dynamic power consumption of unified L2 cache shared by ins...
     
 1  2 Next >>