Adaptive redundant residue system for cloud computing: a processor-oblivious and fault-oblivious technology
|
|
- Scott Lloyd
- 8 years ago
- Views:
Transcription
1 Adaptive redundant residue system for cloud computing: a processor-oblivious and fault-oblivious technology Jean-Louis ROCH INRIA MOAIS team, LIG lab. Grenoble Université, France Joint work with C. Pernet [1], T. Roche [1, 4], S. Varrette [3, 2], S. Jafar [2], A. Krings [2], B. Cunche [4], M. Khonji[1], T. Stalinski[1] Computer Science Dept, University of Western Ontario Monday January 24, 2011
2 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination
3 Context: High Performance Interactive Computation INRIA - LIG Moais team Performance: multi-criteria trade-off computation latency and computation bandwidth Application domains: interactive simulations (latency), computer algebra (bandwidth),...
4 HPC platforms From low computation latency to high computation bandwidth Parallel chips & multi/many-core architectures: multicore cpu, GP-GPU, FPGA, MPSoCs Servers: Multi-processor with sharedi memory (CPUs + GPUs+...) Clusters: 72% of top 500 machines, Heterogeneous (CPUs + GPUs +...) E.g. Tianhe-1A, ranked 1 in TOP500 nov 2010: 4.7 PFlops Global computing platforms: grids, P2P, clouds E.g. BOINC : in April 2010= 5.1 PFlops
5 Cloud / Global computing platforms Applications Data sharing (1980 s), Data storage, Computation (1990 s) Unbound computation bandwidth Volunteer Computing: steal idle cycles through the Internet Folding@Home 5 PFLOPS, as of March 17, 2009 MilkyWay@Home PFLOPS, as of April 2010 Thanks to GPUs!
6 Grid or cloud? Beyond computation bandwidth, two important criteria: granularity: how small is the smallest bit of computational resource that you can buy; speed of scaling: how long it takes to increase the size of available resources.
7 Global computing architecture and trust Open platforms are subject to attacks: machine badly configured, over clocking, malicious programs, client patched and redistributed: possibly large scale Parallel Application f1 f4 f1 f2 f3 f4 f5 s1 s1 s2 f3 f2 user INTERNET s2 f5
8 Global computing architecture and trust Open platforms are subject to attacks: machine badly configured, over clocking, malicious programs, client patched and redistributed: possibly large scale Parallel Application f1 f4 f1 f2 f3 f4 f5 s1 s1 s2 f3 f2 user modified result INTERNET hacker s2 f5
9 Global computing platforms: drawbacks Peers volatility Peers can join/leave at any time. Faults, crashes As the number of nodes increases, the number of faults, process crashes increases as well. Trust in Peers Malicious Peers (intentionally or infected by malwares). Random Crashes Random Forgeries Byzantine behaviour (e.g., Peers collusion)
10 Related work: trusting the Cloud Volatility Replication, (partial) Re-execution, Checkpoint/restart Trust Challenges / blacklisting [Sramenta&ak 01] Replication of tasks: BOINC: credit evaluation Byzantine agreement: n processes for n/3 faulty (one-third faulty replicas [Lamport82s] ) Check / Verification using postconditions (on the output) [Blum97]
11 Related work: trusting the Cloud Volatility Replication, (partial) Re-execution, Checkpoint/restart Trust Challenges / blacklisting [Sramenta&ak 01] expensive Replication of tasks: BOINC: credit evaluation Attacks can be adjusted Byzantine agreement: n processes for n/3 faulty (one-third faulty replicas [Lamport82s] ) often expensive Check / Verification using postconditions (on the output) [Blum97] not always possible
12 Related work: trusting the Cloud Without trust assumptions, basic properties (eg integrity, atomicity, weak consistency,...) cannot be guaranteed But, by maintaining a small amount of trusted memory and trusted computation units, well-known cryptographic methods reduce the need for trust in the storage [Cachin&al. ACM SIGACT 2009] integrity by storing small hash (hash tree for huge data) authentication of data proofs of retrievability (POR) and of data possession (PDP)
13 Considered cloud computing platform = Two disjoint set of resources: U: The cloud, unreliable R: Resources blindly trusted by the user (reliable), but with limited computation bandwidth interconnected through a stable memory Safe Resources Controler Verifier Checkpoint Server Unsafe Resources Grid INTERNET user
14 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination
15 How to take benefit of the Cloud for HPiC? Performance and correction Performance: massive parallelism (work depth) workstealing, adaptive scheduling [Leiserson&al. 2007] Correction of the results: proof verifications on R (e.g. randomized checking) Fault tolerance: to support resilience and/or errors ABFT: Algorithm Based Fault Tolerance
16 Execution time model on the cloud Resource average computation Total computation Usage type bandwidth per proc bandwidth Cloud U Π U Π tot U Client R Π R Π tot R bandwidth: number of unit operations per second computation certification Bound on the time required for computation+certification Based on work-stealing, with high probability [Bender-Rabin02] : Execution time W ( ) c Dc Π tot + O + W ( ) r Dr Π U U Π tot + O. Π R R Notations and target context: W c (resp. D c ) = total work (resp. depth) executed on the cloud U; W r (resp. D r ) = total work (resp. depth) executed on the client R; Target context: W c = O(W 1+ɛ 1 ); D c W c ; W r, D r D c. Correction: may be computed either on R, or on U, or on both.
17 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination
18 ABFT: Algorithmic Based Fault Tolerance Idea: incorporate redundancy in the algorithm [Huang&Abraham 98] [Saha 2006] [Dongarra & al. 2006] use properties specific to the problem
19 ABFT: Algorithmic Based Fault Tolerance Idea: incorporate redundancy in the algorithm [Huang&Abraham 98] [Saha 2006] [Dongarra & al. 2006] use properties specific to the problem Example: Matrix-vector product A u ua
20 ABFT: Algorithmic Based Fault Tolerance Idea: incorporate redundancy in the algorithm [Huang&Abraham 98] [Saha 2006] [Dongarra & al. 2006] use properties specific to the problem Example: Matrix-vector product A Id R u ua x
21 ABFT: Algorithmic Based Fault Tolerance Idea: incorporate redundancy in the algorithm [Huang&Abraham 98] [Saha 2006] [Dongarra & al. 2006] use properties specific to the problem Example: Matrix-vector product A Id R u ua x pre-compute the product B = A [ I R ] compute x = ub in parallel decode/correct x
22 Summary Typical considered global computation Interactive computation between R (reliable) and the cloud U (unreliable); On U: Computations loosely coupled and fault tolerant On R: submission of the computation correction (if not too much errors) verification (if not too much errors) homorphic residue system
23 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination
24 Homomorphic residue system One-to-one mapping Φ from E to E 1... E n that preserves the algebraic structure Φ : x x 1,... x n : projection Φ 1 (x 1,..., x n ): lifting For a fixed computation P (straight-line program): For input x: Φ(P x ) = Φ(P) x1,..., Φ(P) xn. Classical examples: residue number/polynomial systems: Polynomials: Φ(Q) = (Q(a 1 ),..., Q ( a n )) [evaluation/interpolation] Integers: Φ(x) = (x mod a 1,..., x mod a n ) a 1,..., a n : residue number system (relatively prime)
25 Integers: Chinese remainder algorithm Z/(n 1... n k )Z Z/n 1 Z Z/n k Z Computation of y = f (x) over Z begin Compute a bound β on max( f ); Pick n 1,... n k, pairwise prime, s.t. n 1... n k > β; for i = 1... k do Compute y i = f (x mod n i ) mod n i Compute y = CRT(y 1,..., y k ) end i CRT : Z/n 1 Z Z/n k Z Z/(n 1... n k )Z (x 1,..., x k ) k i=1 x iπ i Y i mod Π Π = k i=1 n i where Π i = Π/n i Y i = Π 1 i mod n i
26 Integers: Chinese remainder algorithm Z/(n 1... n k )Z Z/n 1 Z Z/n k Z Computation of y = f (x) over Z begin Compute a bound β on max( f ); Pick n 1,... n k, pairwise prime, s.t. n 1... n k > β; for i = 1... k do Compute y i = f (x mod n i ) mod n i ; /* Evaluation */ Compute y = CRT(y 1,..., y k ); /* Interpolation */ end i CRT : Z/n 1 Z Z/n k Z Z/(n 1... n k )Z (x 1,..., x k ) k i=1 x iπ i Y i mod Π Π = k i=1 n i where Π i = Π/n i Y i = Π 1 i mod n i
27 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a
28 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 Q Q j i (X a j ) j i (a i a j )
29 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 Q Q j i (X a j ) j i (a i a j ) Integers N mod m Evaluate N in m N = k i=1 a i j i m j( j i m j) 1[m i ]
30 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 Q Q j i (X a j ) j i (a i a j ) Integers N mod m Evaluate N in m N = k i=1 a i j i m j( j i m j) 1[m i ] Analogy: complexities over Z over K [X] For a program with T algebr. algebraic operations: size of coefficients O ( log result T algebr. ) degree of polynomials O ( deg(result) T algebr. )
31 Chinese remaindering and evaluation/interpolation Evaluate P in a Reduce P modulo X a Polynomials Evaluation: P mod X a Evaluate P in a Interpolation: P = k i=1 Q Q j i (X a j ) j i (a i a j ) Integers N mod m Evaluate N in m N = k i=1 a i j i m j( j i m j) 1[m i ] Analogy: complexities over Z over K [X] For a program with T algebr. algebraic operations: size of coefficients O ( log result T algebr. ) det(n, A ) = O (n log A n ω ) degree of polynomials O ( deg(result) T algebr. ) det(n, d) = O (nd n ω )
32 Early termination Classic Chinese remaindering bound β on the result Choice of the n i : such that n 1... n k > β deterministic algorithm
33 Early termination Classic Chinese remaindering bound β on the result Choice of the n i : such that n 1... n k > β deterministic algorithm Early termination For each new modulo n i : reconstruct y i = f (x) mod n 1 n i If y i = y i 1 terminated if n i chosen at random: randomized algorithm (Monte Carlo)
34 Early termination Classic Chinese remaindering bound β on the result Choice of the n i : such that n 1... n k > β deterministic algorithm Early termination For each new modulo n i : reconstruct y i = f (x) mod n 1 n i If y i = y i 1 terminated if n i chosen at random: randomized algorithm (Monte Carlo) Advantage: Adaptive number of moduli depending on the output value Interesting when pessimistic bound: sparse/structured matrices,... no bound available
35 Redundant residues codes Principle: Chinese remaindering based parallelization Byzantines faults affecting some modular computations Fault tolerant reconstruction Algorithm Based Fault Tolerance (ABFT)
36 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination
37 Mandelbaum algorithm over Z Chinese Remainder Theorem x Z x 1 x 2... x k where p 1 p k > x and x i = x mod p i i
38 Mandelbaum algorithm over Z Chinese Remainder Theorem x Z x 1 x 2... x k x k+1... x n where p 1 p n > x and x i = x mod p i i
39 Mandelbaum algorithm over Z Chinese Remainder Theorem x Z x 1 x 2... x k x k+1... x n where p 1 p n > x and x i = x mod p i i Definition { (n, k)-code: C = { x < p1... p (x 1,..., x n ) Z p1 Z pn s.t.!x, k x i = x mod p i i }
40 Principle Property X C iff X < Π k. Π n = p 1 p n p 1 p 2... p k p k+1... p n Π k = p 1 p k Redundancy : r = n k
41 Principle Transmission Channel Computation
42 Principle Noisy Transmission Channel Unsecured Computation
43 Principle Noisy Transmission Channel Unsecured Computation Input A Encoding A = (A 1,... A n) Computation Solution x < M n x < M k x = (r 1,..., r n) Correction x = (x 1,..., x n) Decoding
44 Properties of the code Error model: Error: E = X X Error support: I = {i 1... n, E 0 mod p i } Impact of the error: Π F = i I p i
45 Properties of the code Error model: Error: E = X X Error support: I = {i 1... n, E 0 mod p i } Impact of the error: Π F = i I p i Detects up to r errors: If X = X + E with X C, #I r, X > Π k. Redundancy r = n k, distance: r + 1 can correct up to r 2 errors in theory More complicated in practice...
46 Correction i / I : E mod p i = 0 E is a multiple of Π V : E = Z Π V = Z i / I gcd(e, Π) = Π V Mandelbaum 78: rational reconstruction X = X E = X Z Π v X Π = X Π Z Π F X Π Z Π F 1 2Π 2 F Z Π F = E X Π is a convergent of Π rational reconstruction of X mod Π
47 Correction capacity Mandelbaum 78: 1 symbol = 1 residue Polynomial algorithm if e (n k) log p min log 2 log p max+log p min worst case: exponential (random perturbation) Goldreich Ron Sudan 99 weighted residues equivalent Guruswami Sahai Sudan 00 invariably polynomial time
48 Correction capacity Mandelbaum 78: 1 symbol = 1 residue Polynomial algorithm if e (n k) log p min log 2 log p max+log p min worst case: exponential (random perturbation) Goldreich Ron Sudan 99 weighted residues equivalent Guruswami Sahai Sudan 00 invariably polynomial time Interpretation: Errors have variable weights depending on their impact Π F = i I p i Example: X = 20, p 1 = 2, p 2 = 3, p 3 = error on X mod 2, or X mod 3, can be corrected but not on X mod 101
49 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination
50 Analogy with Reed Solomon Gao02 Reed-Solomon decoding by extended Euclidean Alg: Chinese Remaindering over K [X] p i = X a i Encoding = evaluation in a i Decoding = interpolation Correction = Extended Euclidean algorithm étendu
51 Analogy with Reed Solomon Gao02 Reed-Solomon decoding by extended Euclidean Alg: Chinese Remaindering over K [X] p i = X a i Encoding = evaluation in a i Decoding = interpolation Correction = Extended Euclidean algorithm étendu Generalization for p i of degrees > 1 Variable impact, depending on the degree of p i Necessary unification [Sudan 01,...]
52 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination
53 Generalized point of view: amplitude code Over a Euclidean ring A with a Euclidean function ν Distance : A A R + (x, y) i x y[p i ] log 2 ν (P i ) Definition (n,k) amplitude code C = {x A : ν(x) < κ}, n = log 2 Π, k = log 2 κ.
54 Generalized point of view: amplitude code Over a Euclidean ring A with a Euclidean function ν Distance : A A R + (x, y) i x y[p i ] log 2 ν (P i ) Definition (n,k) amplitude code C = {x A : ν(x) < κ}, n = log 2 Π, k = log 2 κ. Property (Quasi MDS) d > n k in general, and d n k + 1 over K [X]. correction rate = maximal amplitude of an error that can be corrected
55 Advantages Generalization over any Euclidean ring Natural representation of the amount of information No need to sort moduli Finer correction capacities
56 Advantages Generalization over any Euclidean ring Natural representation of the amount of information No need to sort moduli Finer correction capacities Adaptive decoding: taking advantage of all the available redundancy Early termination: with no a priori knowledge of a bound on the result
57 Interpretation of Mandelbaum s algorithm Remark Rational reconstruction Algorithm Partial Extended Euclidean Property The Extended Euclidean Algorithm, applied to (E, Π) and to (X = X + E, Π), performs the same first iterations until r i < Π V. u i 1 E + v i 1 Π = Π v u i E + v i Π = 0 u i 1 X + v i 1 Π = r i 1 u i X + v i Π = r i u i X = r i
58 Amplitude decoding, with static correction capacity Amplitude based decoder over R Data: Π, X Data: τ R + τ < ν(π) 2 : bound on the maximal error amplitude Result: X R: corrected message s.t. ν(x)4τ 2 ν(π) begin α 0 = 1, β 0 = 0, r 0 = Π; α 1 = 0, β 1 = 1, r 1 = X ; i = 1; while (ν(r i ) > ν(π)/2τ) do Let r i 1 = q i r i + r i+1 be the Euclidean division of r i 1 by r i ; α i+1 = α i 1 q i α i ; β i+1 = β i 1 q i β i ; i = i + 1; return X = r i β i end reaches the quasi-maximal correction capacity
59 reaches the quasi-maximal correction capacity requires a a priori knowledge of τ How to make the correction capacity adaptive? Amplitude decoding, with static correction capacity Amplitude based decoder over R Data: Π, X Data: τ R + τ < ν(π) 2 : bound on the maximal error amplitude Result: X R: corrected message s.t. ν(x)4τ 2 ν(π) begin α 0 = 1, β 0 = 0, r 0 = Π; α 1 = 0, β 1 = 1, r 1 = X ; i = 1; while (ν(r i ) > ν(π)/2τ) do Let r i 1 = q i r i + r i+1 be the Euclidean division of r i 1 by r i ; α i+1 = α i 1 q i α i ; β i+1 = β i 1 q i β i ; i = i + 1; return X = r i β i end
60 Adaptive approach Multiple goals: With a fixed n, the correction capacity depends on a bound on X pessimistic estimate how to take advantage of all the available redundancy? redondance effective utilisable X borne sur X redondance utilisee
61 Adaptive approach Multiple goals: With a fixed n, the correction capacity depends on a bound on X pessimistic estimate how to take advantage of all the available redundancy? redondance effective utilisable X borne sur X redondance utilisee Allow early termination: variable n and unknown bound
62 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination
63 A first adaptive approach Termination criterion in the Extended Euclidean alg.: α i+1 Π β i+1 E = 0 E = α i+1 Π/β i+1 test if β j divides Π check if X satisfies:ν(x) ν(π) 4ν(β j ) 2 But several candidates are possible discrimination by a post-condition on the result
64 A first adaptive approach Termination criterion in the Extended Euclidean alg.: α i+1 Π β i+1 E = 0 E = α i+1 Π/β i+1 test if β j divides Π check if X satisfies:ν(x) ν(π) 4ν(β j ) 2 But several candidates are possible discrimination by a post-condition on the result Example x = 23 with 0 error x = 2 with 1 error p i x i 2 3 2
65 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X
66 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X
67 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X
68 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i.
69 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X 2 g X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g
70 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X 2 g X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g
71 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X 2 g X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g
72 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X 2 g X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g
73 Detecting a gap α i Π β i (X + E) = r i α i Π β i E = r i + β i X r i β i X 2 g X = r i /β i At the final iteration: ν(r i ) ν(β i X) If necessary, a gap appears between r i 1 and r i. Introduce a blank 2 g in order to detect a gap > 2 g Property Loss of correction capacity: very small in practice Test of the divisibility for the remaining candidates Strongly reduces the number of divisibility tests
74 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination
75 Experiments Size of the error g = 2 1/446 1/765 1/1118 2/1183 2/4165 1/7907 g = 3 1/244 1/414 1/576 2/1002 2/2164 1/4117 g = 5 1/53 1/97 1/153 2/262 1/575 1/1106 g = 10 1/1 1/3 1/9 1/14 1/26 1/35 g = 20 1/1 1/1 1/1 1/1 1/1 1/1 Table: Number of remaining candidates after the gap detection: c /d means d candidates with a gap > 2 g, and c of them passed the divisibility test. n 6001 (3000 moduli), κ 201 (100 moduli).
76 Experiments Divisibility Gap g=2 Gap g=5 Gap g=10 Threshold T= Time (s) Size of the errors Figure: Comparison for n (m = 1300 moduli of 20 bits), κ 6001 (300 moduli) and τ (about 500 moduli).
77 Experiments 5 Time (s) Gap g=5 Gap g=7 Gap g=10 Gap g=20 Threshold T= Size of the errors Figure: Comparison for n (m = moduli of 20 bits), κ (8500 moduli) and τ (500 moduli). Gap: Euclidean Algorithm down to the end overhead
78 Plan Introduction High performance computing and cloud Related works on trusting the clouds Cloud computing and performance ABFT Redundant residue codes Homomorphic residue system Over Z: Mandelbaum algorithm Over K[X]: Reed Solomon point of view Generalization Adaptive approach First approach and the gap Experiments Early termination
79 Early termination Input Output X Master Secured workers Fork tasks P2P workers Empty or X residues Certifier List of candidates Decoder Y CRT Lifter Figure: Fault tolerant distributed computation with early termination
80 Conclusion Residue systems : technology suited to cloud computing: parallelism, fault-tolerant, verification New metric for redundant residue codes: Unification with finer bounds on the correction capacities Enables adaptive decoding Adaptative decoding and early termination Gap method: limited overhead, better performances Framework for interactive computing with a cloud Perspective ABFT in exact linear algebra, determinant [LinBox] ABFT with (exact) floating point arithmetic Theoretical efficiency of the gap method, Generalization to adaptive list decoding [Sudan, Guruswami]
81 Jean-Louis Roch s References for this talk Majid Khonji, Clément Pernet, Jean-Louis Roch, Thomas Roche, and Thomas Stalinski. Output-sensitive decoding for redundant residue systems. In ISSAC 10: Proceedings of the 2010 International Symposium on Symbolic and Algebraic Computation, pages , New York, NY, USA, Jul ACM. Axel W. Krings, Jean-Louis Roch, Samir Jafar, and Séebastien Varrette. A Probabilistic Approach for Task and Result Certification of Large-scale Distributed Applications in Hostile Environments. In European Grid Conference EGC 2005 ( Amsterdam, The Netherlands, February Springer-Verlag, LNCS. Jean-Louis Roch and Sébastien Varrette. Probabilistic Certification of Divide & Conquer Algorithms on Global Computing Platforms. Application to Fault-Tolerant Exact Matrix-Vector Product. In Parallel Symbolic Computation 07 (PASCO 07), London, Ontario, Canada, July ACM. Thomas Roche, Jean-Louis Roch, and Matthieu Cunche. Algorithm-based fault tolerance applied to P2P computing networks. In The First International Conference on Advances in P2P Systems, pages , Sliema, Malta, Oct IEEE.
The Advantages and Disadvantages of Network Computing Nodes
Big Data & Scripting storage networks and distributed file systems 1, 2, in the remainder we use networks of computing nodes to enable computations on even larger datasets for a computation, each node
More informationHow To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
More informationNotes 11: List Decoding Folded Reed-Solomon Codes
Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,
More informationBounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances
Bounded Cost Algorithms for Multivalued Consensus Using Binary Consensus Instances Jialin Zhang Tsinghua University zhanggl02@mails.tsinghua.edu.cn Wei Chen Microsoft Research Asia weic@microsoft.com Abstract
More informationSECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING
SECURE AND TRUSTY STORAGE SERVICES IN CLOUD COMPUTING Saranya.V 1, Suganthi.J 2, R.G. Suresh Kumar 3 1,2 Master of Technology, Department of Computer Science and Engineering, Rajiv Gandhi College of Engineering
More informationTowards a compliance audit of SLAs for data replication in Cloud storage
Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud
More informationLecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
More informationData Storage Security in Cloud Computing
Data Storage Security in Cloud Computing Manoj Kokane 1, Premkumar Jain 2, Poonam Sarangdhar 3 1, 2, 3 Government College of Engineering and Research, Awasari, Pune, India Abstract: Cloud computing is
More informationTHE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0
THE NUMBER OF REPRESENTATIONS OF n OF THE FORM n = x 2 2 y, x > 0, y 0 RICHARD J. MATHAR Abstract. We count solutions to the Ramanujan-Nagell equation 2 y +n = x 2 for fixed positive n. The computational
More informationFunctional-Repair-by-Transfer Regenerating Codes
Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can
More informationPrimality Testing and Factorization Methods
Primality Testing and Factorization Methods Eli Howey May 27, 2014 Abstract Since the days of Euclid and Eratosthenes, mathematicians have taken a keen interest in finding the nontrivial factors of integers,
More informationU.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra
U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory
More informationIndex Terms Cloud Storage Services, data integrity, dependable distributed storage, data dynamics, Cloud Computing.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Privacy - Preserving
More informationModélisation et résolutions numérique et symbolique
Modélisation et résolutions numérique et symbolique via les logiciels Maple et Matlab Jeremy Berthomieu Mohab Safey El Din Stef Graillat Mohab.Safey@lip6.fr Outline Previous course: partial review of what
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) PERCEIVING AND RECOVERING DEGRADED DATA ON SECURE CLOUD
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976- ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 4,
More informationAlgorithm-Based Secure and Fault Tolerant Outsourcing of Matrix Computations
Algorithm-Based Secure and Fault Tolerant Outsourcing of Matrix Computations Amrit Kumar, Jean-Louis Roch To cite this version: Amrit Kumar, Jean-Louis Roch. Algorithm-Based Secure and Fault Tolerant Outsourcing
More informationShort Programs for functions on Curves
Short Programs for functions on Curves Victor S. Miller Exploratory Computer Science IBM, Thomas J. Watson Research Center Yorktown Heights, NY 10598 May 6, 1986 Abstract The problem of deducing a function
More informationData Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System
Data Storage Security in Cloud Computing for Ensuring Effective and Flexible Distributed System 1 K.Valli Madhavi A.P vallimb@yahoo.com Mobile: 9866034900 2 R.Tamilkodi A.P tamil_kodiin@yahoo.co.in Mobile:
More informationFault-Tolerant Computing
Fault-Tolerant Computing Software Design Methods Nov.. 2007 Algorithm Design Methods Slide 1 About This Presentation This presentation has been prepared for the graduate course ECE 257A (Fault-Tolerant
More informationNetwork Coding for Distributed Storage
Network Coding for Distributed Storage Alex Dimakis USC Overview Motivation Data centers Mobile distributed storage for D2D Specific storage problems Fundamental tradeoff between repair communication and
More informationCloud Data Storage Services Considering Public Audit for Security
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 1 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationComputing Cubic Fields in Quasi-Linear Time
Computing Cubic Fields in Quasi-Linear Time K. Belabas Département de mathématiques (A2X) Université Bordeaux I 351, cours de la Libération, 33405 Talence (France) belabas@math.u-bordeaux.fr Cubic fields
More informationA Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation
PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris
More informationRemote Data Integrity Checking for Public Clouds
IBM Student Workshop for Frontiers of Cloud Computing 01 Remote Data Integrity Checking for Public Clouds Bo (Irvine) Chen Department of Computer Science New Jersey Institute of Technology joint work with
More informationThe Lattice Project: A Multi-Model Grid Computing System. Center for Bioinformatics and Computational Biology University of Maryland
The Lattice Project: A Multi-Model Grid Computing System Center for Bioinformatics and Computational Biology University of Maryland Parallel Computing PARALLEL COMPUTING a form of computation in which
More informationOffline sorting buffers on Line
Offline sorting buffers on Line Rohit Khandekar 1 and Vinayaka Pandit 2 1 University of Waterloo, ON, Canada. email: rkhandekar@gmail.com 2 IBM India Research Lab, New Delhi. email: pvinayak@in.ibm.com
More informationFAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING
FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING Hussain Al-Asaad and Alireza Sarvi Department of Electrical & Computer Engineering University of California Davis, CA, U.S.A.
More informationSignatures for Content Distribution with Network Coding
Signatures for Content Distribution with Network Coding Fang Zhao, Ton Kalker, Muriel Médard, and Keesook J. Han Lab for Information and Decision Systems MIT, Cambridge, MA 02139, USA E-mail: zhaof/medard@mit.edu
More informationThe van Hoeij Algorithm for Factoring Polynomials
The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial
More informationApplied Algorithm Design Lecture 5
Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design
More informationNetwork File Storage with Graceful Performance Degradation
Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed
More informationOn the Placement of Management and Control Functionality in Software Defined Networks
On the Placement of Management and Control Functionality in Software Defined Networks D.Tuncer et al. Department of Electronic & Electrical Engineering University College London, UK ManSDN/NfV 13 November
More informationParallel Computing. Benson Muite. benson.muite@ut.ee http://math.ut.ee/ benson. https://courses.cs.ut.ee/2014/paralleel/fall/main/homepage
Parallel Computing Benson Muite benson.muite@ut.ee http://math.ut.ee/ benson https://courses.cs.ut.ee/2014/paralleel/fall/main/homepage 3 November 2014 Hadoop, Review Hadoop Hadoop History Hadoop Framework
More informationRSA Attacks. By Abdulaziz Alrasheed and Fatima
RSA Attacks By Abdulaziz Alrasheed and Fatima 1 Introduction Invented by Ron Rivest, Adi Shamir, and Len Adleman [1], the RSA cryptosystem was first revealed in the August 1977 issue of Scientific American.
More informationStorage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
More informationMiddleware and Distributed Systems. System Models. Dr. Martin v. Löwis. Freitag, 14. Oktober 11
Middleware and Distributed Systems System Models Dr. Martin v. Löwis System Models (Coulouris et al.) Architectural models of distributed systems placement of parts and relationships between them e.g.
More information7. Some irreducible polynomials
7. Some irreducible polynomials 7.1 Irreducibles over a finite field 7.2 Worked examples Linear factors x α of a polynomial P (x) with coefficients in a field k correspond precisely to roots α k [1] of
More informationAn Overview of Common Adversary Models
An Overview of Common Adversary Karl Palmskog palmskog@kth.se 2012-03-29 Introduction Requirements of Software Systems 1 Functional Correctness: partial, termination, liveness, safety,... 2 Nonfunctional
More informationA simple and fast algorithm for computing exponentials of power series
A simple and fast algorithm for computing exponentials of power series Alin Bostan Algorithms Project, INRIA Paris-Rocquencourt 7815 Le Chesnay Cedex France and Éric Schost ORCCA and Computer Science Department,
More informationLecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
More informationA Survey of Cloud Computing Guanfeng Octides
A Survey of Cloud Computing Guanfeng Nov 7, 2010 Abstract The principal service provided by cloud computing is that underlying infrastructure, which often consists of compute resources like storage, processors,
More informationLecture 4 Online and streaming algorithms for clustering
CSE 291: Geometric algorithms Spring 2013 Lecture 4 Online and streaming algorithms for clustering 4.1 On-line k-clustering To the extent that clustering takes place in the brain, it happens in an on-line
More informationHow Efficient can Memory Checking be?
How Efficient can Memory Checking be? Cynthia Dwork 1, Moni Naor 2,, Guy N. Rothblum 3,, and Vinod Vaikuntanathan 4, 1 Microsoft Research 2 The Weizmann Institute of Science 3 MIT 4 IBM Research Abstract.
More informationAn Ecient Dynamic Load Balancing using the Dimension Exchange. Ju-wook Jang. of balancing load among processors, most of the realworld
An Ecient Dynamic Load Balancing using the Dimension Exchange Method for Balancing of Quantized Loads on Hypercube Multiprocessors * Hwakyung Rim Dept. of Computer Science Seoul Korea 11-74 ackyung@arqlab1.sogang.ac.kr
More informationTwo Topics in Parametric Integration Applied to Stochastic Simulation in Industrial Engineering
Two Topics in Parametric Integration Applied to Stochastic Simulation in Industrial Engineering Department of Industrial Engineering and Management Sciences Northwestern University September 15th, 2014
More informationInternational Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
More informationConcrete Security of the Blum-Blum-Shub Pseudorandom Generator
Appears in Cryptography and Coding: 10th IMA International Conference, Lecture Notes in Computer Science 3796 (2005) 355 375. Springer-Verlag. Concrete Security of the Blum-Blum-Shub Pseudorandom Generator
More informationDecentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu
More informationPublic Key Cryptography and RSA. Review: Number Theory Basics
Public Key Cryptography and RSA Murat Kantarcioglu Based on Prof. Ninghui Li s Slides Review: Number Theory Basics Definition An integer n > 1 is called a prime number if its positive divisors are 1 and
More informationMTAT.07.003 Cryptology II. Digital Signatures. Sven Laur University of Tartu
MTAT.07.003 Cryptology II Digital Signatures Sven Laur University of Tartu Formal Syntax Digital signature scheme pk (sk, pk) Gen (m, s) (m,s) m M 0 s Sign sk (m) Ver pk (m, s)? = 1 To establish electronic
More informationLoad Balancing. Load Balancing 1 / 24
Load Balancing Backtracking, branch & bound and alpha-beta pruning: how to assign work to idle processes without much communication? Additionally for alpha-beta pruning: implementing the young-brothers-wait
More informationEnsuring Data Storage Security in Cloud Computing
Ensuring Data Storage Security in Cloud Computing Cong Wang 1, Qian Wang 1, Kui Ren 1, and Wenjing Lou 2 1 ECE Department, Illinois Institute of Technology 2 ECE Department, Worcester Polytechnic Institute
More informationFaster deterministic integer factorisation
David Harvey (joint work with Edgar Costa, NYU) University of New South Wales 25th October 2011 The obvious mathematical breakthrough would be the development of an easy way to factor large prime numbers
More informationEfficient Data Replication Scheme based on Hadoop Distributed File System
, pp. 177-186 http://dx.doi.org/10.14257/ijseia.2015.9.12.16 Efficient Data Replication Scheme based on Hadoop Distributed File System Jungha Lee 1, Jaehwa Chung 2 and Daewon Lee 3* 1 Division of Supercomputing,
More informationDigital Signatures. Murat Kantarcioglu. Based on Prof. Li s Slides. Digital Signatures: The Problem
Digital Signatures Murat Kantarcioglu Based on Prof. Li s Slides Digital Signatures: The Problem Consider the real-life example where a person pays by credit card and signs a bill; the seller verifies
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 ISSN 2229-5518
International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 349 Load Balancing Heterogeneous Request in DHT-based P2P Systems Mrs. Yogita A. Dalvi Dr. R. Shankar Mr. Atesh
More informationCost-Performance of Fault Tolerance in Cloud Computing
Cost-Performance of Fault Tolerance in Cloud Computing Y.M. Teo,2, B.L. Luong, Y. Song 2 and T. Nam 3 Department of Computer Science, National University of Singapore 2 Shanghai Advanced Research Institute,
More informationA Trust Evaluation Model for QoS Guarantee in Cloud Systems *
A Trust Evaluation Model for QoS Guarantee in Cloud Systems * Hyukho Kim, Hana Lee, Woongsup Kim, Yangwoo Kim Dept. of Information and Communication Engineering, Dongguk University Seoul, 100-715, South
More informationA New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
More informationMapReduce and Distributed Data Analysis. Sergei Vassilvitskii Google Research
MapReduce and Distributed Data Analysis Google Research 1 Dealing With Massive Data 2 2 Dealing With Massive Data Polynomial Memory Sublinear RAM Sketches External Memory Property Testing 3 3 Dealing With
More informationBuilding an energy dashboard. Energy measurement and visualization in current HPC systems
Building an energy dashboard Energy measurement and visualization in current HPC systems Thomas Geenen 1/58 thomas.geenen@surfsara.nl SURFsara The Dutch national HPC center 2H 2014 > 1PFlop GPGPU accelerators
More informationIMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS
Volume 2, No. 3, March 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE
More informationVerifying Remote Data Integrity in Peer-to-Peer Data Storage: a Comprehensive Survey of Protocols
PPNA-251 1 Verifying Remote Integrity in Peer-to-Peer Storage: a Comprehensive Survey of Protocols Nouha Oualha *, Jean Leneutre and Yves Roudier * CEA, LIST Communicating Systems Laboratory Bât. 451 PC
More informationA Proposal for Authenticated Key Recovery System 1
A Proposal for Authenticated Key Recovery System 1 Tsuyoshi Nishioka a, Kanta Matsuura a, Yuliang Zheng b,c, and Hideki Imai b a Information & Communication Business Div. ADVANCE Co., Ltd. 5-7 Nihombashi
More informationEmbedding more security in digital signature system by using combination of public key cryptography and secret sharing scheme
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-3 E-ISSN: 2347-2693 Embedding more security in digital signature system by using combination of public
More informationSurvey on Load Rebalancing for Distributed File System in Cloud
Survey on Load Rebalancing for Distributed File System in Cloud Prof. Pranalini S. Ketkar Ankita Bhimrao Patkure IT Department, DCOER, PG Scholar, Computer Department DCOER, Pune University Pune university
More informationRethinking SIMD Vectorization for In-Memory Databases
SIGMOD 215, Melbourne, Victoria, Australia Rethinking SIMD Vectorization for In-Memory Databases Orestis Polychroniou Columbia University Arun Raghavan Oracle Labs Kenneth A. Ross Columbia University Latest
More informationCHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY
January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.
More informationObject Request Reduction in Home Nodes and Load Balancing of Object Request in Hybrid Decentralized Web Caching
2012 2 nd International Conference on Information Communication and Management (ICICM 2012) IPCSIT vol. 55 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V55.5 Object Request Reduction
More informationComments on "public integrity auditing for dynamic data sharing with multi-user modification"
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers Faculty of Engineering and Information Sciences 2016 Comments on "public integrity auditing for dynamic
More informationPolarization codes and the rate of polarization
Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,
More informationBreaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
More informationVictor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart
More informationEnhancing Data Security in Cloud Storage Auditing With Key Abstraction
Enhancing Data Security in Cloud Storage Auditing With Key Abstraction 1 Priyadharshni.A, 2 Geo Jenefer.G 1 Master of engineering in computer science, Ponjesly College of Engineering 2 Assistant Professor,
More informationA new binary floating-point division algorithm and its software implementation on the ST231 processor
19th IEEE Symposium on Computer Arithmetic (ARITH 19) Portland, Oregon, USA, June 8-10, 2009 A new binary floating-point division algorithm and its software implementation on the ST231 processor Claude-Pierre
More informationBasic Algorithms In Computer Algebra
Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,
More informationRessources management and runtime environments in the exascale computing era
Ressources management and runtime environments in the exascale computing era Guillaume Huard MOAIS and MESCAL INRIA Projects CNRS LIG Laboratory Grenoble University, France Guillaume Huard MOAIS and MESCAL
More informationEnsuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication
Ensuring Data Storage Security in Cloud Computing By IP Address Restriction & Key Authentication Sanjay Kumar Baghel Mtech Scholar, CSE, CSIT DURG Sanju5878@gmail.com Bhupesh Kumar Dewangan Assistant Professor,CSE,
More informationRSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES
RSA BASED CPDP WITH ENCHANCED CLUSTER FOR DISTRUBED CLOUD STORAGE SERVICES 1 MD ISMAIL Z, 2 ASHFAQUE AHAMED K. 1 PG Scholar,Department of Computer Science, C.Abdul Hakeem College Of Arts and Science,Melvisharam.
More informationRSA and Primality Testing
and Primality Testing Joan Boyar, IMADA, University of Southern Denmark Studieretningsprojekter 2010 1 / 81 Correctness of cryptography cryptography Introduction to number theory Correctness of with 2
More informationA Robust and Secure Overlay Storage Scheme Based on Erasure Coding
A Robust and Secure Overlay Storage Scheme Based on Erasure Coding Chuanyou Li Yun Wang School of Computer Science and Engineering, Southeast University Key Lab of Computer Network and Information Integration,
More informationJournal of Theoretical and Applied Information Technology 20 th July 2015. Vol.77. No.2 2005-2015 JATIT & LLS. All rights reserved.
EFFICIENT LOAD BALANCING USING ANT COLONY OPTIMIZATION MOHAMMAD H. NADIMI-SHAHRAKI, ELNAZ SHAFIGH FARD, FARAMARZ SAFI Department of Computer Engineering, Najafabad branch, Islamic Azad University, Najafabad,
More informationFrom Factorial Designs to Hilbert Schemes
From Factorial Designs to Hilbert Schemes Lorenzo Robbiano Università di Genova Dipartimento di Matematica Lorenzo Robbiano (Università di Genova) Factorial Designs and Hilbert Schemes Genova, June 2015
More informationModern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
More informationWrite a technical report Present your results Write a workshop/conference paper (optional) Could be a real system, simulation and/or theoretical
Identify a problem Review approaches to the problem Propose a novel approach to the problem Define, design, prototype an implementation to evaluate your approach Could be a real system, simulation and/or
More informationIndex Terms: Cloud Computing, Cloud Security, Mitigation Attack, Service Composition, Data Integrity. 1. Introduction
Real-Time Service Composition and Deployment for Secure Computing in Cloud Environment R. Ushadevi 1, V. Rajamani 2 1 Research Scholar, Department of Computer Applications, St. Peter s University, Chennai
More informationA Novel Approach to combine Public-key encryption with Symmetric-key encryption
Volume 1, No. 4, June 2012 ISSN 2278-1080 The International Journal of Computer Science & Applications (TIJCSA) RESEARCH PAPER Available Online at http://www.journalofcomputerscience.com/ A Novel Approach
More informationHow To Balance In Cloud Computing
A Review on Load Balancing Algorithms in Cloud Hareesh M J Dept. of CSE, RSET, Kochi hareeshmjoseph@ gmail.com John P Martin Dept. of CSE, RSET, Kochi johnpm12@gmail.com Yedhu Sastri Dept. of IT, RSET,
More informationATheoryofComplexity,Conditionand Roundoff
ATheoryofComplexity,Conditionand Roundoff Felipe Cucker Berkeley 2014 Background L. Blum, M. Shub, and S. Smale [1989] On a theory of computation and complexity over the real numbers: NP-completeness,
More informationPolynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
More informationDimensioning an inbound call center using constraint programming
Dimensioning an inbound call center using constraint programming Cyril Canon 1,2, Jean-Charles Billaut 2, and Jean-Louis Bouquard 2 1 Vitalicom, 643 avenue du grain d or, 41350 Vineuil, France ccanon@fr.snt.com
More informationCSC2420 Fall 2012: Algorithm Design, Analysis and Theory
CSC2420 Fall 2012: Algorithm Design, Analysis and Theory Allan Borodin November 15, 2012; Lecture 10 1 / 27 Randomized online bipartite matching and the adwords problem. We briefly return to online algorithms
More informationDynamic Resource Pricing on Federated Clouds
Dynamic Resource Pricing on Federated Clouds Marian Mihailescu and Yong Meng Teo Department of Computer Science National University of Singapore Computing 1, 13 Computing Drive, Singapore 117417 Email:
More informationSpeeding Up RSA Encryption Using GPU Parallelization
2014 Fifth International Conference on Intelligent Systems, Modelling and Simulation Speeding Up RSA Encryption Using GPU Parallelization Chu-Hsing Lin, Jung-Chun Liu, and Cheng-Chieh Li Department of
More informationA Real-Time Primary-Backup Replication Service
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 10, NO. 6, JUNE 1999 533 A Real-Time Primary-Backup Replication Service Hengming Zou, Student Member, IEEE, and Farnam Jahanian, Member, IEEE
More informationA Practical Approach of Storage Strategy for Grid Computing Environment
A Practical Approach of Storage Strategy for Grid Computing Environment Kalim Qureshi Abstract -- An efficient and reliable fault tolerance protocol plays an important role in making the system more stable.
More informationSecure Data transfer in Cloud Storage Systems using Dynamic Tokens.
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens. P.Srinivas *,K. Rajesh Kumar # M.Tech Student (CSE), Assoc. Professor *Department of Computer Science (CSE), Swarnandhra College of Engineering
More informationDynamic Load Balancing in a Network of Workstations
Dynamic Load Balancing in a Network of Workstations 95.515F Research Report By: Shahzad Malik (219762) November 29, 2000 Table of Contents 1 Introduction 3 2 Load Balancing 4 2.1 Static Load Balancing
More informationCIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
More information= 2 + 1 2 2 = 3 4, Now assume that P (k) is true for some fixed k 2. This means that
Instructions. Answer each of the questions on your own paper, and be sure to show your work so that partial credit can be adequately assessed. Credit will not be given for answers (even correct ones) without
More information