期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
TEES:topology-aware execution environment service for fast and agile application deployment in HPC
1
作者 Mingtian SHAO Kai LU +3 位作者 Wanqing CHI Ruibo WANG Yiqin DAI Wenzhe ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2022年第11期1631-1645,共15页
High-performance computing(HPC)systems are about to reach a new height:exascale.Application deployment is becoming an increasingly prominent problem.Container technology solves the problems of encapsulation and migrat... High-performance computing(HPC)systems are about to reach a new height:exascale.Application deployment is becoming an increasingly prominent problem.Container technology solves the problems of encapsulation and migration of applications and their execution environment.However,the container image is too large,and deploying the image to a large number of compute nodes is time-consuming.Although the peer-to-peer(P2P)approach brings higher transmission efficiency,it introduces larger network load.All of these issues lead to high startup latency of the application.To solve these problems,we propose the topology-aware execution environment service(TEES)for fast and agile application deployment on HPC systems.TEES creates a more lightweight execution environment for users,and uses a more efficient topology-aware P2P approach to reduce deployment time.Combined with a split-step transport and launch-in-advance mechanism,TEES reduces application startup latency.In the Tianhe HPC system,TEES realizes the deployment and startup of a typical application on 17560 compute nodes within 3 s.Compared to container-based application deployment,the speed is increased by 12-fold,and the network load is reduced by 85%. 展开更多
关键词 Execution environment application deployment High-performance computing(HPC) CONTAINER Peer-to-peer(P2P) Network topology
原文传递
Exploring and Modelling IoT Offloading Policies in Edge Cloud Environments 被引量:2
2
作者 Jaber Almutairi Mohammad Aldossary 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期611-624,共14页
The Internet of Things(IoT)has recently become a popular technology that can play increasingly important roles in every aspect of our daily life.For collaboration between IoT devices and edge cloud servers,edge server... The Internet of Things(IoT)has recently become a popular technology that can play increasingly important roles in every aspect of our daily life.For collaboration between IoT devices and edge cloud servers,edge server nodes provide the computation and storage capabilities for IoT devices through the task offloading process for accelerating tasks with large resource requests.However,the quantitative impact of different offloading architectures and policies on IoT applications’performance remains far from clear,especially with a dynamic and unpredictable range of connected physical and virtual devices.To this end,this work models the performance impact by exploiting a potential latency that exhibits within the environment of edge cloud.Also,it investigates and compares the effects of loosely-coupled(LC)and orchestrator-enabled(OE)architecture.The LC scheme can smoothly address task redistribution with less time consumption for the offloading sceneries with small scale and small task requests.Moreover,the OE scheme not only outperforms the LC scheme in the large-scale tasks requests and offloading occurs but also reduces the overall time by 28.19%.Finally,to achieve optimized solutions for optimal offloading placement with different constraints,orchestration is important. 展开更多
关键词 Internet of things application deployment latency-sensitive edge orchestrator
下载PDF
Security-as-a-Service with Cyberspace Mimic Defense Technologies in Cloud
3
作者 Junchao Wang Jianmin Pang Jin Wei 《国际计算机前沿大会会议论文集》 2021年第2期129-138,共10页
Users usually focus on the application-level requirements which are quite friendly and direct to them.However,there are no existing tools automating the application-level requirements to infrastructure provisioning an... Users usually focus on the application-level requirements which are quite friendly and direct to them.However,there are no existing tools automating the application-level requirements to infrastructure provisioning and application deployment.Although some security issues have been solved during the development phase,the undiscovered vulnerabilities remain hidden threats to the application’s security.Cyberspace mimic defense(CMD)technologies can help to enhance the application’s security despite the existence of the vulnerability.In this paper,the concept of SECurity-as-a-Service(SECaaS)is proposed with CMD technologies in cloud environments.The experiment on it was implemented.It is found that the application’s security is greatly improved to meet the user’s security and performance requirements within budgets through SECaaS.The experimental results show that SECaaS can help the users to focus on application-level requirements(monetary costs,required security level,etc.)and automate the process of application orchestration. 展开更多
关键词 Cyberspace mimic defense Software diversity Security-as-a-Service Multi-compiler application deployment
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部