On Jul.20,2017,the Ministry of Housing and Urban-Rural Development and other 8 state authorities including the National Development and Reform Commission,the Ministry of Public Security,the Ministry of Finance,the Min...On Jul.20,2017,the Ministry of Housing and Urban-Rural Development and other 8 state authorities including the National Development and Reform Commission,the Ministry of Public Security,the Ministry of Finance,the Ministry of Land and Resources,the People’s Bank of China,the State Administration of Taxation,the State Administration for Industry and Commerce,and the China Securities展开更多
In Bernard Malamud's works,the theme of alienation occurs repeatedly.This article tries to make a review of the "alienation" theme in Malamud's four novels,Dubin's Lives,A New Life,The Tenants,an...In Bernard Malamud's works,the theme of alienation occurs repeatedly.This article tries to make a review of the "alienation" theme in Malamud's four novels,Dubin's Lives,A New Life,The Tenants,and The Fixer.展开更多
Social imbalance and obsolescence of the built environment has emerged in large sized housing estates in metropolises. In particular, the requirement of such planned housing areas has not matched public service provid...Social imbalance and obsolescence of the built environment has emerged in large sized housing estates in metropolises. In particular, the requirement of such planned housing areas has not matched public service provided by the infrastructure. On not only physical but also social aspect of local communities of this kind of housing area have a lot of problems while it also has a lot of good characteristics. A representative one is that age of the tenants is rising very swiftly and it makes the local community imbalanced. Nowadays many countries including Japan have tackled problems concerning housing estates constructed during the mass housing era and try to search for ways to reactivate so-called new town areas by utilisation of existing environmental resources such as building stock and ample green open space. In Japan many elemental technologies have been developed in order to utilise existing building stock. However, how to combine these technologies and new holistic methods for reactivation are still underdeveloped. Therefore, it is very important to fred these ways and to make a comprehensive plan for rehabilitation of these areas. The first purpose of our study is to develop and clarify how to organise and integrate many kinds of elemental techniques and the holistic measures for the improvement of both social and physical environment in suburban mass housing estates. Subsequently we try to reorganise proper relations between human settlements and the various service provision for those regions. Our last focus is put on searching for new ways to raise the value of existing housing environment. Our conclusion intends to indicate important of the master plan and its execution, where mass housing estates progress for the physical and social improvement.展开更多
Multi-tenancy architecture (MTA) is often used in Software-as-a-Service (SaaS) and the central idea is that multiple tenant applications can be developed using components stored in the SaaS infrastructure. Recentl...Multi-tenancy architecture (MTA) is often used in Software-as-a-Service (SaaS) and the central idea is that multiple tenant applications can be developed using components stored in the SaaS infrastructure. Recently, MTA has been extended to allow a tenant application to have its own sub-tenants, where the tenant application acts like a SaaS infrastructure. In other words, MTA is extended to STA (Sub-Tenancy Architecture). In STA, each tenant application needs not only to develop its own functionalities, but also to prepare an infrastructure to allow its sub-tenants to develop customized applications. This paper applies Crowdsourcing as the core to STA component in the development life cycle. In addition, to discovering adequate fit tenant developers or components to help build and compose new components, dynamic and static ranking models are proposed. Furthermore, rank computation architecture is presented to deal with the case when the number of tenants and components becomes huge. Finally, experiments are performed to demonstrate that the ranking models and the rank computation architecture work as design.展开更多
The Tenant of Wildfell Hall,firstly published in 1848,was the second and final novel of Anne Brontë,the youngest of the Brontësisters,telling a story of the mysterious young widow Helen Huntingdon,who flees ...The Tenant of Wildfell Hall,firstly published in 1848,was the second and final novel of Anne Brontë,the youngest of the Brontësisters,telling a story of the mysterious young widow Helen Huntingdon,who flees her abusive husband and hides with her son at Wildfell Hall.Just as most contemporary critic defines it as one of the first feminist novels,the overall characterization of Helen sends a strong message of the empowerment of women.What confuses modern readers,however,is the subtle confrontation between the empowerment and its subversion.Thus,this paper conducts an in-depth analysis of the text concerning Anne's empow⁃erment of Helen and the corresponding subversion of the established empowerment before unveiling the fundamental cause of such arrangement with a view of shedding light on the comprehension of Anne Brontë's belief in universal social issues.展开更多
Virtual Machine(VM) allocation for multiple tenants is an important and challenging problem to provide efficient infrastructure services in cloud data centers. Tenants run applications on their allocated VMs, and th...Virtual Machine(VM) allocation for multiple tenants is an important and challenging problem to provide efficient infrastructure services in cloud data centers. Tenants run applications on their allocated VMs, and the network distance between a tenant's VMs may considerably impact the tenant's Quality of Service(Qo S). In this study, we define and formulate the multi-tenant VM allocation problem in cloud data centers, considering the VM requirements of different tenants, and introducing the allocation goal of minimizing the sum of the VMs' network diameters of all tenants. Then, we propose a Layered Progressive resource allocation algorithm for multi-tenant cloud data centers based on the Multiple Knapsack Problem(LP-MKP). The LP-MKP algorithm uses a multi-stage layered progressive method for multi-tenant VM allocation and efficiently handles unprocessed tenants at each stage. This reduces resource fragmentation in cloud data centers, decreases the differences in the Qo S among tenants, and improves tenants' overall Qo S in cloud data centers. We perform experiments to evaluate the LP-MKP algorithm and demonstrate that it can provide significant gains over other allocation algorithms.展开更多
A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile...A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile applications for millions of users by taking advantage of the scale and flexibility of shared physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data and applications in shared data centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used n a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet nspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for ntelligence flow processing to protect from possible network attacks inside a data center network展开更多
文摘On Jul.20,2017,the Ministry of Housing and Urban-Rural Development and other 8 state authorities including the National Development and Reform Commission,the Ministry of Public Security,the Ministry of Finance,the Ministry of Land and Resources,the People’s Bank of China,the State Administration of Taxation,the State Administration for Industry and Commerce,and the China Securities
文摘In Bernard Malamud's works,the theme of alienation occurs repeatedly.This article tries to make a review of the "alienation" theme in Malamud's four novels,Dubin's Lives,A New Life,The Tenants,and The Fixer.
文摘Social imbalance and obsolescence of the built environment has emerged in large sized housing estates in metropolises. In particular, the requirement of such planned housing areas has not matched public service provided by the infrastructure. On not only physical but also social aspect of local communities of this kind of housing area have a lot of problems while it also has a lot of good characteristics. A representative one is that age of the tenants is rising very swiftly and it makes the local community imbalanced. Nowadays many countries including Japan have tackled problems concerning housing estates constructed during the mass housing era and try to search for ways to reactivate so-called new town areas by utilisation of existing environmental resources such as building stock and ample green open space. In Japan many elemental technologies have been developed in order to utilise existing building stock. However, how to combine these technologies and new holistic methods for reactivation are still underdeveloped. Therefore, it is very important to fred these ways and to make a comprehensive plan for rehabilitation of these areas. The first purpose of our study is to develop and clarify how to organise and integrate many kinds of elemental techniques and the holistic measures for the improvement of both social and physical environment in suburban mass housing estates. Subsequently we try to reorganise proper relations between human settlements and the various service provision for those regions. Our last focus is put on searching for new ways to raise the value of existing housing environment. Our conclusion intends to indicate important of the master plan and its execution, where mass housing estates progress for the physical and social improvement.
文摘Multi-tenancy architecture (MTA) is often used in Software-as-a-Service (SaaS) and the central idea is that multiple tenant applications can be developed using components stored in the SaaS infrastructure. Recently, MTA has been extended to allow a tenant application to have its own sub-tenants, where the tenant application acts like a SaaS infrastructure. In other words, MTA is extended to STA (Sub-Tenancy Architecture). In STA, each tenant application needs not only to develop its own functionalities, but also to prepare an infrastructure to allow its sub-tenants to develop customized applications. This paper applies Crowdsourcing as the core to STA component in the development life cycle. In addition, to discovering adequate fit tenant developers or components to help build and compose new components, dynamic and static ranking models are proposed. Furthermore, rank computation architecture is presented to deal with the case when the number of tenants and components becomes huge. Finally, experiments are performed to demonstrate that the ranking models and the rank computation architecture work as design.
文摘The Tenant of Wildfell Hall,firstly published in 1848,was the second and final novel of Anne Brontë,the youngest of the Brontësisters,telling a story of the mysterious young widow Helen Huntingdon,who flees her abusive husband and hides with her son at Wildfell Hall.Just as most contemporary critic defines it as one of the first feminist novels,the overall characterization of Helen sends a strong message of the empowerment of women.What confuses modern readers,however,is the subtle confrontation between the empowerment and its subversion.Thus,this paper conducts an in-depth analysis of the text concerning Anne's empow⁃erment of Helen and the corresponding subversion of the established empowerment before unveiling the fundamental cause of such arrangement with a view of shedding light on the comprehension of Anne Brontë's belief in universal social issues.
基金supported in part by the National Key Basic Research and Development (973) Program of China (No. 2011CB302600)the National Natural Science Foundation of China (No. 61222205)+1 种基金the Program for New Century Excellent Talents in Universitythe Fok Ying-Tong Education Foundation (No. 141066)
文摘Virtual Machine(VM) allocation for multiple tenants is an important and challenging problem to provide efficient infrastructure services in cloud data centers. Tenants run applications on their allocated VMs, and the network distance between a tenant's VMs may considerably impact the tenant's Quality of Service(Qo S). In this study, we define and formulate the multi-tenant VM allocation problem in cloud data centers, considering the VM requirements of different tenants, and introducing the allocation goal of minimizing the sum of the VMs' network diameters of all tenants. Then, we propose a Layered Progressive resource allocation algorithm for multi-tenant cloud data centers based on the Multiple Knapsack Problem(LP-MKP). The LP-MKP algorithm uses a multi-stage layered progressive method for multi-tenant VM allocation and efficiently handles unprocessed tenants at each stage. This reduces resource fragmentation in cloud data centers, decreases the differences in the Qo S among tenants, and improves tenants' overall Qo S in cloud data centers. We perform experiments to evaluate the LP-MKP algorithm and demonstrate that it can provide significant gains over other allocation algorithms.
基金supported in part by the National Key Basic Research and Development(973)Program of China(Nos.2013CB228206 and 2012CB315801)the National Natural Science Foundation of China(Nos.61233016 and 61140320)+1 种基金supported by the Intel Research Council with the title of "Security Vulnerability Analysis based on Cloud Platform with Intel IA Architecture"Huawei Corp
文摘A data center is an infrastructure that supports Internet service. Cloud comput the face of the Internet service infrastructure, enabling even small organizations to quickly ng is rapidly changing build Web and mobile applications for millions of users by taking advantage of the scale and flexibility of shared physical infrastructures provided by cloud computing. In this scenario, multiple tenants save their data and applications in shared data centers, blurring the network boundaries between each tenant in the cloud. In addition, different tenants have different security requirements, while different security policies are necessary for different tenants. Network virtualization is used to meet a diverse set of tenant-specific requirements with the underlying physical network enabling multi-tenant datacenters to automatically address a large and diverse set of tenants requirements. In this paper, we propose the system implementation of vCNSMS, a collaborative network security prototype system used n a multi-tenant data center. We demonstrate vCNSMS with a centralized collaborative scheme and deep packet nspection with an open source UTM system. A security level based protection policy is proposed for simplifying the security rule management for vCNSMS. Different security levels have different packet inspection schemes and are enforced with different security plugins. A smart packet verdict scheme is also integrated into vCNSMS for ntelligence flow processing to protect from possible network attacks inside a data center network