Catálogo de publicaciones - libros

Compartir en
redes sociales


Parallel and Distributed Processing and Applications: 5th International Symposium, ISPA 2007 Niagara Falls, Canada, August 29-31, 2007 Proceedings

Ivan Stojmenovic ; Ruppa K. Thulasiram ; Laurence T. Yang ; Weijia Jia ; Minyi Guo ; Rodrigo Fernandes de Mello (eds.)

En conferencia: 5º International Symposium on Parallel and Distributed Processing and Applications (ISPA) . Niagara Falls, ON, Canada . August 28, 2007 - September 1, 2007

Resumen/Descripción – provisto por la editorial

No disponible.

Palabras clave – provistas por la editorial

Computer System Implementation; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Information Systems Applications (incl. Internet); System Performance and Evaluation; Software Engineering

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 SpringerLink

Información

Tipo de recurso:

libros

ISBN impreso

978-3-540-74741-3

ISBN electrónico

978-3-540-74742-0

Editor responsable

Springer Nature

País de edición

Reino Unido

Fecha de publicación

Información sobre derechos de publicación

© Springer-Verlag Berlin Heidelberg 2007

Tabla de contenidos

Processing Global XQuery Queries Based on Static Query Decomposition

Jong-Hyun Park; Ji-Hoon Kang

The concept of XML views is proposed to integrate heterogeneous data sources in XML, and a global XML view can represent the distributed heterogeneous data sources as single XML document. XQuery is one of the standard query languages for searching XML data. How to process efficiently of global XQuery queries, which are written under a global XML view, emerges as a new research topic. Popular techniques of distributed query processing are based on decomposition, and static decomposition is one of the processing techniques for the traditional query language. However, XQuery has a complex syntax such as FOR clauses that are not supported by other query languages, and its structural complexity causes some considerations for the decomposition of global XQuery queries. In this paper, we propose a method to decompose a global XQuery query into local XQuery queries and to construct the result of the global XQuery query from the results of the local XQuery queries.

- Datamining and Databases | Pp. 326-336

Formal Verification and Performance Evaluation of User Query Pattern-Based Relational Schema-to-XML Schema Translation Algorithm

Jinhyung Kim; Dongwon Jeong; Doo-Kwon Baik

This paper describes formal verification and quantitative performance evaluation for validating of query pattern-based relational schema-to-XML Schema translation (QP-T) algorithm. Many translation algorithms such as FT, NeT, CoT, ConvRel, and VP-T have been introduced on structural and/or semantic aspect for exact and effective translation. However, conventional algorithms consider only explicit referential integrity specified by relational schema or limitations regarding on reflection of implicit referential integrity information. It causes several problems such as incorrect translation, abnormal relational model transition, and so on. The QP-T algorithm analyzes query pattern and extract implicit referential integrities by interrelationship of equi-join in user queries. The QP-T algorithm can make up for weak points of the VP-T algorithm and create more exact XML Schema as a result by using with VP-T algorithm together.

- Datamining and Databases | Pp. 337-346

Adaptive Processing for Continuous Query over Data Stream

Misook Bae; Buhyun Hwang; Jiseung Nam

Stream applications such as sensor data processing, financial tickers and Internet traffic analysis require that information, naturally, occur as a stream of data values. Due to a late and out-of-order arrival of infinite, unbound and multiple input streams, processing continuous queries over them may lead to producing an incorrect answer or delaying query execution. Hence to minimize this waiting time, previous works have used timeout technique without considering the frequency of timeouts. It results in decreasing the accuracy of query execution results, since the more the frequency of timeouts, the more the loss of data. We propose an AP-STO method using StB that stores operator’s state and a window time-out method based on the waiting time for the next tuple by resetting the size of a window according to the frequency of timeouts. It reduces a data lost rate and increases the tuples output-rate. We compare AP-STO method with an existing method and use output-rate and response time as criteria for performance evaluation. Our proposed method shows a substantial improvement in system performance in terms of the accuracy of query execution and the increment of tuples output-rate per a query due to the reduction in loss rate of data.

- Datamining and Databases | Pp. 347-358

Parallel Computation of Closed Itemsets and Implication Rule Bases

Jean François Djoufak Kengue; Petko Valtchev; Clémentin Tayou Djamegni

Formal concept analysis has been successfully applied as a data mining framework whereby target patterns come in the form of intent families and implication bases. Since their extraction is a challenging task, especially for large datasets, parallel techniques should be helpful in reducing the computational effort and increasing the scalability of the approach. In this paper we describe a way to parallelize a recent divide-and-conquer method computing both the intents and the implication basis of dataset. Wile intents admit a straightforward computation, adding the basis — whose definition is recursive — poses harder problems, in particular, for parallel design. A first, and by no means final, solution relies on a partition of the basis that allows the crucial and inherently sequential step of redundancy removal to be nevertheless split into parallel subtasks. A prototype implementation of our method, called , shows a nearly linear acceleration w.r.t. its sequential counter-part.

- Datamining and Databases | Pp. 359-370

An Optimal Share Transfer Problem on Secret Sharing Storage Systems

Toshiyuki Miyamoto; Sadatoshi Kumagai

We have been developing a secure and reliable distributed storage system, which uses a secret sharing scheme. In order to efficiently store data in the system, this paper introduces an optimal share transfer problem, and proves it to be, generally, NP-hard. It is also shown that the problem can be resolved into a Steiner tree problem. Finally, through computational experiments we perform the comparison of heuristic algorithms for the Steiner tree problem.

- Datamining and Databases | Pp. 371-382

Deadline and Throughput-Aware Control for Request Processing Systems

Pedro Furtado; Ricardo Antunes

Congestion Control is a necessary tool in Transaction Processing Systems (TPS), to avoid excessive degradation of response times. But it should have an autonomic behavior, adapting automatically to request characteristics to deliver the best possible service. Given that every request has either explicit or implicit deadlines (maximum acceptable response times), we analyze strategies that target request deadlines and throughput. These include maximum throughput seeker strategies, strategies using feedback control on miss rate and an additional proposal for preventive control of miss rates and throughput. Another goal of our proposal is for the control to be external and it should not rely on analytic models for control (because the predictions may be erroneous due to physical system issues). We analyze and compare alternative designs for the control including our own proposals and related ones. Our experiments consider both varied request inter-arrival and duration distributions and a real transaction processing benchmark.

- Datamining and Databases | Pp. 383-394

Cluster Recovery for Fault Tolerance of Spatial Database Cluster in Sensor Networks

Byeong-Seob You; Gyung-Bae Kim; Hae-Young Bae

In sensor networks, a huge amount of data is collected by millions of sensors and small mobile devices need to be processed fast. And database which stores those data always should be able to response for any requirement. Spatial database cluster provides high performance and high availability. That suits sensor networks because spatial database cluster can efficiently manage and process much amount of data. The previous system, however, should write external logs every transaction for high availability in all nodes. So, all of update transactions are slowly processed because of writing external logs. Also, recovery time of the failed node is increased because external logs for all of database are written in only single storage. In this paper, we propose the cluster recovery of spatial database cluster. The proposed method has cluster logs in each table unit for consistency among nodes. Also, the cluster log is written just in case any node is failed. Therefore the proposed method is processed more fast because all update transactions don’t write cluster logs. And the proposed method provides fast recovery because each table can be recovered concurrently.

- Datamining and Databases | Pp. 395-406

A Secure Energy-Efficient Routing Protocol for WSN

Al-Sakib Khan Pathan; Choong Seon Hong

The intent of this paper is to propose an energy-efficient routing protocol with data transmission security for wireless sensor networks. We create an energy and distance aware sink-rooted tree in the network which is used for secure data transmissions from the source sensors to the base station. We mainly focus on ensuring authenticity and confidentiality of the sensor reports by adopting one-way hash chain and pre-loaded shared secret keys. To achieve data freshness, there is an optional key refreshment mechanism in our protocol. Along with the detailed description of our protocol, we present an analysis and performance evaluation of our proposal.

- Fault Tolerance and Security | Pp. 407-418

Designing Scalable Self-healing Key Distribution Schemes with Revocation Capability

Ratna Dutta; Sourav Mukhopadhyay

Self-healing key distribution is a potential candidate to establish session keys for secure communication to large and dynamic groups in highly mobile, volatile and hostile wireless network, where frequent membership changes may be necessary and ability to revoke users during certain exchanges is desirable. The main property of self-healing key distribution scheme is that even if during a certain session some broadcast messages are lost due to network faults, the users are capable of recovering lost session keys on their own, without requesting additional transmission from the group manager. In this paper, we propose a scalable self-healing key distribution with revocation capability. Our proposed scheme has improvement in storage overhead over the previous approaches with the same communication cost required by the most optimal previous scheme. The scheme is supported by a proper security analysis in an appropriate security model. We prove that it is unconditionally secure and achieve both forward secrecy and backward secrecy. Our proposed self-healing key distribution is not restricted to sessions in phase. Besides, we develop a construction for self-healing key distribution that enables key recovery from a single broadcast message.

- Fault Tolerance and Security | Pp. 419-430

Key Predistribution Using Partially Balanced Designs in Wireless Sensor Networks

Sushmita Ruj; Bimal Roy

We propose two deterministic key predistribution schemes in a Wireless Sensor Network (WSN), in which sensor nodes are deployed randomly. Both the schemes are based on Partially Balanced Incomplete Block Designs (PBIBD). An important feature of our scheme is that every pair of nodes can communicate directly, making communication faster and efficient. The number of keys per node is of the order of , where is the number of nodes in the network. Our second design has the added advantage that we can introduce new nodes in the network keeping the key pool fixed. We study the resiliency of the network under node compromise and show that our designs give better results than the existing ones.

- Fault Tolerance and Security | Pp. 431-445