Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data acc...Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services.Transparency and accountability for data managed in the cloud is necessary.Specifically,when using a cloudhost service,a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data.This is a multi-party system.Three particular trust models can be used according to the credibility of these providers.This pa per describes techniques for preventing data leakage that can be used with these different models.展开更多
One of the major challenges when fabricating high gamut colour-converted micro-light-emitting diodes(LEDs)displays is severe crosstalk effect among adjacent pixels because of the wide view-angle feature of micro-LED c...One of the major challenges when fabricating high gamut colour-converted micro-light-emitting diodes(LEDs)displays is severe crosstalk effect among adjacent pixels because of the wide view-angle feature of micro-LED chips.In this study,potential factors that contribute to the crosstalk effect were systematically simulated.We observed that precisely filling the space between each micro-LED chip with a light blocking matrix(LBM)can be a promising solution to alleviate this risk.After careful investigations,a press-assisted moulding technique was demonstrated to be an effective approach of fabricating the LBM.Nevertheless,experimental observations further revealed that residual black LBM on the surface of micro-LEDs severely reduces the brightness,thereby compromising the display performance.This problem was successfully addressed by employing a plasma etching technique to efficiently extract the trapped light.Eventually,a top-emitting blue micro-LED-based backlight fine-moulded with a black LBM was developed and combined with red and green quantum dot colour-conversion layers for full-colour display.The colour gamut of our manufactured display prototype can cover as high as 122%that of the National Television Standards Committee.展开更多
Over the past decade, there has been a paradigm shift leading consumers and enterprises to the adoption of cloud computing services. Even though most cases are still in the early stages of transition, there has been a...Over the past decade, there has been a paradigm shift leading consumers and enterprises to the adoption of cloud computing services. Even though most cases are still in the early stages of transition, there has been a steady increase in the implementation of the pay-as-you-go or pay-as-you-grow models offered by cloud providers. Whether applied as an extension of virtual infrastructure, software, or platform as a service, many users are still challenged by the estimation of adequate resource allocation and the wide variations in pricing. Customers require a simple method of predicting future demand in terms of the number of nodes to be allocated in the cloud environment. In this paper, we review and discuss existing methodologies for estimating the demand for cloud nodes and their corresponding pricing policies. Based on our review, we propose a novel approach using the Hidden Markov Model to estimate the acquisition of cloud nodes.展开更多
Multi-Clock Snapshot Isolation(MCSI)is a concurrency control mechanism that implements snapshot isolation on a single-layer Non-Volatile Memory(NVM)database.It stores a single copy of data by using multi-version stora...Multi-Clock Snapshot Isolation(MCSI)is a concurrency control mechanism that implements snapshot isolation on a single-layer Non-Volatile Memory(NVM)database.It stores a single copy of data by using multi-version storage to ensure durability and runtime access.With multi-clock transaction timestamp assignment,MCSI can efficiently generate snapshots with vector clocks and use per-thread transaction status arrays to identify uncommitted versions in NVM.For evaluation,we compared MCSI with the PostgreSQL-style concurrency control used in the single-layer NVM database N2DB.The maximum transaction throughput of MCSI is 101%–195%higher than that of N2DB for the YCSB workloads,and 25%–49%higher for the TPC-C workloads.Moreover,the transaction latency of MCSI remains relatively stable as the thread count increases.With 18 worker threads,the average transaction latency of MCSI is 65%–84%lower than that of N2DB for the YCSB workloads and 16%–43%lower for the TPC-C workloads.展开更多
Non-Volatile Memory(NVM) offers byte-addressability and persistency. Because NVM can be plugged into memory and provide low latency, it offers a new opportunity to build new database systems with a single-layer storag...Non-Volatile Memory(NVM) offers byte-addressability and persistency. Because NVM can be plugged into memory and provide low latency, it offers a new opportunity to build new database systems with a single-layer storage design. A single-layer NVM-Native DataBase(N2 DB) provides zero copy and log freedom. Hence, all data are stored in NVM and there is no extra data duplication and logging during execution. N2 DB avoids complex data synchronization and logging overhead in the two-layer storage design of disk-oriented databases and in-memory databases. Garbage Collection(GC) is critical in such an NVM-based database because memory leaks on NVM are durable. Moreover, data recovery is equally essential to guarantee atomicity, consistency, isolation, and durability properties. Without logging, it is a great challenge for N2 DB to restore data to a consistent state after crashes and recoveries. This paper presents the GC and data recovery mechanisms for N2 DB. Evaluations show that the overall performance of N2 DB is up to 3:6 higher than that of InnoDB. Enabling GC reduces performance by up to 10%,but saves storage space by up to 67%. Moreover, our data recovery requires only 0:2% of the time and half of the storage space of InnoDB.展开更多
基金supported by National Basic Research (973) Program of China (2011CB302505)Natural Science Foundation of China (61373145, 61170210)+1 种基金National High-Tech R&D (863) Program of China (2012AA012600,2011AA01A203)Chinese Special Project of Science and Technology (2012ZX01039001)
文摘Despite the multifaceted advantages of cloud computing,concerns about data leakage or abuse impedes its adoption for security-sensi tive tasks.Recent investigations have revealed that the risk of unauthorized data access is one of the biggest concerns of users of cloud-based services.Transparency and accountability for data managed in the cloud is necessary.Specifically,when using a cloudhost service,a user typically has to trust both the cloud service provider and cloud infrastructure provider to properly handling private data.This is a multi-party system.Three particular trust models can be used according to the credibility of these providers.This pa per describes techniques for preventing data leakage that can be used with these different models.
基金the National Natural Science Foundation of China(51503231 and 21374136)Guangdong Innovative and Entrepreneurial Research Team Program(2013S086)the Fundamental Research Funds for the Central Universities(17lgjc03 and 18lgpy04)。
基金This work was financially supported by the Guangdong Basic and Applied Basic Research Foundation(No.2021A1515110085)Key-Area Research and Development Program of Guangdong Province(No.2019B010924003)+2 种基金Shenzhen Hong Kong Innovation Circle Joint R&D Project(SGDX20190918105201704)Shenzhen Fundamental Research Program(No.GXWD20201231165807007-20200810113811001)Shenzhen Science and Technology Research Grant(JCYJ20170818085627903).
文摘One of the major challenges when fabricating high gamut colour-converted micro-light-emitting diodes(LEDs)displays is severe crosstalk effect among adjacent pixels because of the wide view-angle feature of micro-LED chips.In this study,potential factors that contribute to the crosstalk effect were systematically simulated.We observed that precisely filling the space between each micro-LED chip with a light blocking matrix(LBM)can be a promising solution to alleviate this risk.After careful investigations,a press-assisted moulding technique was demonstrated to be an effective approach of fabricating the LBM.Nevertheless,experimental observations further revealed that residual black LBM on the surface of micro-LEDs severely reduces the brightness,thereby compromising the display performance.This problem was successfully addressed by employing a plasma etching technique to efficiently extract the trapped light.Eventually,a top-emitting blue micro-LED-based backlight fine-moulded with a black LBM was developed and combined with red and green quantum dot colour-conversion layers for full-colour display.The colour gamut of our manufactured display prototype can cover as high as 122%that of the National Television Standards Committee.
基金supported by the National Natural Science Foundation of China(Nos.61373145 and 61170210)the National High-Tech Research and Development(863)Program of China(Nos.2013AA01A213 and 2012AA012600)the National Key Basic Research and Development(973)Program of China(No.2011CB302505)
文摘Over the past decade, there has been a paradigm shift leading consumers and enterprises to the adoption of cloud computing services. Even though most cases are still in the early stages of transition, there has been a steady increase in the implementation of the pay-as-you-go or pay-as-you-grow models offered by cloud providers. Whether applied as an extension of virtual infrastructure, software, or platform as a service, many users are still challenged by the estimation of adequate resource allocation and the wide variations in pricing. Customers require a simple method of predicting future demand in terms of the number of nodes to be allocated in the cloud environment. In this paper, we review and discuss existing methodologies for estimating the demand for cloud nodes and their corresponding pricing policies. Based on our review, we propose a novel approach using the Hidden Markov Model to estimate the acquisition of cloud nodes.
基金supported by the National Key Research&Development Program of China(No.2016YFB1000504)the National Natural Science Foundation of China(Nos.61877035,61433008,61373145,and 61572280).
文摘Multi-Clock Snapshot Isolation(MCSI)is a concurrency control mechanism that implements snapshot isolation on a single-layer Non-Volatile Memory(NVM)database.It stores a single copy of data by using multi-version storage to ensure durability and runtime access.With multi-clock transaction timestamp assignment,MCSI can efficiently generate snapshots with vector clocks and use per-thread transaction status arrays to identify uncommitted versions in NVM.For evaluation,we compared MCSI with the PostgreSQL-style concurrency control used in the single-layer NVM database N2DB.The maximum transaction throughput of MCSI is 101%–195%higher than that of N2DB for the YCSB workloads,and 25%–49%higher for the TPC-C workloads.Moreover,the transaction latency of MCSI remains relatively stable as the thread count increases.With 18 worker threads,the average transaction latency of MCSI is 65%–84%lower than that of N2DB for the YCSB workloads and 16%–43%lower for the TPC-C workloads.
基金supported by the National Key Research & Development Program of China (No. 2016YFB1000504)the National Natural Science Foundation of China (Nos. 61877035, 61433008, 61373145, and 61572280)。
文摘Non-Volatile Memory(NVM) offers byte-addressability and persistency. Because NVM can be plugged into memory and provide low latency, it offers a new opportunity to build new database systems with a single-layer storage design. A single-layer NVM-Native DataBase(N2 DB) provides zero copy and log freedom. Hence, all data are stored in NVM and there is no extra data duplication and logging during execution. N2 DB avoids complex data synchronization and logging overhead in the two-layer storage design of disk-oriented databases and in-memory databases. Garbage Collection(GC) is critical in such an NVM-based database because memory leaks on NVM are durable. Moreover, data recovery is equally essential to guarantee atomicity, consistency, isolation, and durability properties. Without logging, it is a great challenge for N2 DB to restore data to a consistent state after crashes and recoveries. This paper presents the GC and data recovery mechanisms for N2 DB. Evaluations show that the overall performance of N2 DB is up to 3:6 higher than that of InnoDB. Enabling GC reduces performance by up to 10%,but saves storage space by up to 67%. Moreover, our data recovery requires only 0:2% of the time and half of the storage space of InnoDB.