The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] server(152hit)

141-152hit(152hit)

  • Deferred Locking with Buffer Validation on Demand for Client-Server Database Consistency: DL

    Hyeokmin KWON  Songchun MOON  

     
    PAPER-Databases

      Vol:
    E80-D No:7
      Page(s):
    705-716

    In client-server database management systems (DBMSs), inter-transaction caching is an effective technique for improving the performance. However, inter-transaction caching requires a cache consistency maintenance (CCM) protocol to ensure that cached copies at clients are kept mutually consistent. Such a protocol could be complex to implement and expensive to run, since several rounds of message exchange may be required. In this paper, we propose a new CCM scheme based on the primary-copy locking algorithm. In the proposed scheme, a number of lock requests and a data-shipping request are combined into a single message packet to reduce client-server interactions, which are known to be very critical to the performance of clientserver DBMSs. We examine its performance tradeoffs on the basis of a simulation model under a wide range of workloads. The performance results indicate that the proposed scheme improves the overall system throughput significantly over the caching two-phase locking and the optimistic two-phase locking scheme. Its higher performance mainly results from its lower communication overhead and lower degree of transaction blocking ratio.

  • Performance Evaluation of VEEC: The Virtual Execution Environment Control for a Remote Knowledge Base Access

    Yoshitaka FUJIWARA  Shin-ichiro OKADA  Hiroyuki TAKADOI  Toshiharu MATSUNISHI  Hiroshi OHKAMA  

     
    PAPER-Protocol

      Vol:
    E80-B No:1
      Page(s):
    81-86

    In a conventional client-server system using the satellite communications, the responsibility of the system to the client user is considerably degraded by the long transmission time between the satellite and the ground terminal as well as the relatively low data transmission rate in comparison with the ground transmission line as the Ethernet. In this paper, a new client-server control, VEEC, is proposed to solve the problem. As a result of the experimental performance studies, it is clarified that the responsibility in the client is remarkably improved when the pre-fetching mechanism of VEEC works efficiently.

  • Two Efficient Server-Aided RSA Secret Computation Protocols Against Active Attacks

    Shin-Jia HWANG  Chin-Chen CHANG  Wei-Pang YANG  

     
    PAPER-Information Security

      Vol:
    E79-A No:9
      Page(s):
    1504-1511

    For the dependent protocols to perform the server-aided RSA secret computation, the damage caused by the active attacks is greater than that by the passive attacks. Though there are two dependent proposed protocols against active attacks, the cost of the two protocols is still high. In this paper, we propose two efficient dependent protocols. Even considering the low cost of these two protocols, they can also guard against the proposed active attacks.

  • Distributed RAID Style Video Server

    Shunichiro NAKAMURA  Harumi MINEMURA  Tomohisa YAMAGUCHI  Hiroshi SHIMIZU  Takashi WATANABE  Tadanori MIZUNO  

     
    PAPER

      Vol:
    E79-B No:8
      Page(s):
    1030-1038

    In this paper, we present a distributed RAID style video server that addresses the problem of increasing video stream supplying capability in VOD systems. Distibuted RAID Stylemeans extending the RAID method usually applied to disks to the servers, so as to achieve improvements in performance and reliability. The great advantage of this architecture is that the linear performance improvement can be achieved by adding inexpensive servers of a diffusion model. We have implemented the RAID0 style and RAID4 style systems. A number of new features such as the array configuration method or the striping buffer are applied to them. A precise performance evaluation was made in a near practical environment, with more than 40 video streams. We tested the system, in both normal and degraded mode (server failure) and by checking frame drop rates as well as observing picture quality. An evaluation by simulation was also conducted. The results of the above evaluations agreed well with the calculation value, to confirm the feasibility of this architecture.

  • Using the Minimum Reservation Rate for Transmission of Pre-Encoded MPEG VBR Video Using CBR Service

    John LAUDERDALE  Danny H. K. TSANG  

     
    PAPER

      Vol:
    E79-B No:8
      Page(s):
    1023-1029

    This paper presents the system issues involved with the transmission of pre-encoded VBR MPEG video using CBR service. Conventional wisdom suggests that lossless delivery of VBR video using CBR service requires bandwidth to be reserved at the peak rate resulting in low bandwidth utilization. We calculate the minimum rate at which bandwidth must be reserved on a network in order to provide continuous playback of an MPEG encoded video bitstream. Simulation results using the frame size traces from several pre-encoded MPEG bitstreams and several buffer sizes demonstrate that this minimum reservation rateis much lower than the peak rate when a relatively small playback buffer size is used, resulting in much higher bandwidth utilization. Procedures for performing connection setup and lossless realtime video playback between the video server and the client are outlined. Methods for incorporating VCR-like features such as pauseandfast forward/reversefor Video-on-Demand (VoD) applications are presented.

  • An Efficient Storage Scheme for Multimedia Server*

    Jooyoung SON  Yanghee CHOI  

     
    PAPER

      Vol:
    E79-D No:6
      Page(s):
    712-718

    Storage system in a multimedia server must satisfy two contradicting requirements: real-timeliness and large number of parallel user requests. Efficient algorithms for data placement, disk head scheduling, and request admission control schemes are needed to support the requirements. In this paper, we propose efficient schemes to maximize system resource utilization and service availability: cyclic placement scheme, subgroup retrieval scheme, and measurement-based request admission control scheme. Performance analysis through simulation revealed that the amount of system buffers required can be reduced by 70% approximately.

  • Implementation and Performance Evalution of a Distributed Paged-Object Storage Server

    Guangyi BAI  Akifumi MAKINOUCHI  

     
    PAPER-Implementation

      Vol:
    E78-D No:11
      Page(s):
    1439-1448

    In this paper, we describe a distributed paged-object server to efficiently support the storage management for new generation database management systems. This storage server is based on distributed client/server architecture, and allows clients to directly map database files onto distributed shared virtual memory (DSVM). In this architecture, there is a server at each site and the server only supports the clients in the same site. This improves performance utilizing client machine resources and offloading the shared resourcer server machine and the network. Therefore, this architecture may avoid drawbacks such as bottleneck in a traditional centralized client/server architecture, and also may reduces network traffic and improve performance efficiency of remote file access using Net File System (NFS). Moreover, this architecture allows distributed shared objects to reside and execute anywhere and to be used by any clients on the network. A prototype system (called WAKASHI/D) is implemented under the Mach operating system. The distributed, shared, and transactional virtual memory that the system supports is either volatile or persistent and they can be accessed by user applications in a uniform way. This paper also presents a performance evaluation and analysis of WAKASHI/D to compare its centralized version WAKASHI/C and demonstrates that the distributed server has substantial performance benefits.

  • Information Leakage Measurement in a Distributed Computation Protocol

    Shin-ichi KAWAMURA  

     
    PAPER

      Vol:
    E78-A No:1
      Page(s):
    59-66

    This paper deals with the information leakage measurement in a distributed computation protocol called SASC. The SASC protocol is a kind of two-party protocol between a client and a server. The computation for RSA cryptosystem is the target of this paper. This paper shows that a secure RSA-SASC protocol proposed recently could be changed to be insecure if the client which has secret information were to complain about the computation result. This paper first clarifies how to measure the information amount which leaks through the protocol. It, then, shows an attack procedure to make use of the client's complaint. Effectiveness of the attack procedure is measured by the information theoretic measure. By using the same measure, it is shown that some attacks do not work to derive the client's secret. It is also shown that a practical countermeasure to limit the number of incorrect computation allowed is effctive to limit the leakage of the secret information to some reasonable extent.

  • Graphical Analysis for k-out-of-n: G Repairable System and Its Application

    Ikuo ARIZONO  Akihiro KANAGAWA  

     
    LETTER-Algorithms, Data Structures and Computational Complexity

      Vol:
    E77-A No:9
      Page(s):
    1560-1563

    Kumar and Billinton have presented a new technique for obtaining the steady-state probabilities from a flow graph based on Markov model. By examining the graph and choosing suitable input and output nodes, the steady-state probabilities can be obtained directly by using the flow graph. In this paper this graphical technique is applied for a k-out-of-n: G repairable system. Consequently a new derivation way of the formulae for the steady-state availability and MTBF is obtained.

  • Induction Motor Modelling Using Multi-Layer Perceptrons

    Paolo ARENA  Luigi FORTUNA  Antonio GALLO  Salvatore GRAZIANI  Giovanni MUSCATO  

     
    PAPER-Neural Nets--Theory and Applications--

      Vol:
    E76-A No:5
      Page(s):
    761-771

    Asynchronous machines are a topic of great interest in the research area of actuators. Due to the complexity of these systems and to the required performance, the modelling and control of asynchronous machines are complex questions. Problems arise when the control goals require accurate descriptions of the electric machine or when we need to identify some electrical parameters; in the models employed it becomes very hard to take into account all the phenomena involved and therefore to make the error amplitude adequately small. Moreover, it is well known that, though an efficient control strategy requires knowledge of the flux vector, direct measurement of this quantity, using ad hoc transducers, does not represent a suitable approach, because it results in expensive machines. It is therefore necessary to perform an estimation of this vector, based on adequate dynamic non-linear models. Several different strategies have been proposed in literature to solve the items in a suitable manner. In this paper the authors propose a neural approach both to derive NARMAX models for asynchronous machines and to design non-linear observers: the need to use complex models that may be inefficient for control aims is therefore avoided. The results obtained with the strategy proposed were compared with simulations obtained by considering a classical fifth-order non-linear model.

  • Models Based on the Markovian Arrival Process

    Marcel F. NEUTS  

     
    INVITED PAPER

      Vol:
    E75-B No:12
      Page(s):
    1255-1265

    This is a partly expository paper discussing how point processes with certain "bursty" features can be qualitatively modelled by the Markovian arrival process, a generalization of the Poisson or Bernoulli processes which can be used to obtain algorithmically tractable matrix solutions to a variety of problems in probability models.

  • A Study of System Resource Arrangement for a Concatenated Client Server System by Stochastic Petri Nets

    Satoshi MORIGUCHI  

     
    PAPER

      Vol:
    E75-A No:10
      Page(s):
    1360-1368

    Recent trends in down-sizing have resulted in the development of client server systems for many industries. This paper considers the application of stochastic Petri nets with general firing times for modeling of a concatenated client server system and the use of discrete-event simulation methods for stochastic Petri nets to study its behavior. This approach enables us to assess the most appropriate resource set of a concatenated client server system on the quantitative basis of the performability and the occurrence of system down conditions. Thus, system consultation, a new application of stochastic Petri nets, is presented.

141-152hit(152hit)