Yuzhong Sun

Yuzhong Sun
Chinese Academy of Sciences | CAS · Institute of Computing Technology

PhD

About

71
Publications
13,126
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
631
Citations
Introduction
My research interests focus on system software design and analysis in the distributed computing such as cloud computing and data computing in terms of higher performance and lower energy or power, especially in case of supporting large-scale machine learning distributed training.

Publications

Publications (71)
Article
Full-text available
Server consolidation based on virtualization technology simplifies system administration, reduces the cost of power and physical infrastructure, and improves resource utilizations in today’s service-oriented Internet data centers. How many servers for the underlying physical infrastructure are saved via server consolidation in virtualized data cent...
Article
Full-text available
High energy cost is a big challenge faced by the current data centers, wherein computing energy and cooling energy are main contributors to such cost. Consolidating workload onto fewer servers decreases the computing energy. However, it may result in thermal hotspots which typically consume greater cooling energy. Thus the tradeoff between computin...
Article
Parallel imaging is a technique to shorten the acquisition time by reducing the data size in phase encoding direction. Compressed Sensing is a technique to improve the performance of parallel imaging based reconstruction methods such as l1-regularized SPIRiT by adding the regularization term, which leads to frequent calculations of Discrete Wavelet...
Conference Paper
In this paper, we present a clinically pediatric disease prediction system based on a new efficient hybrid knowledge graph. Firstly, we automatically extract a set of triples by modeling and analyzing 1454 clinically pediatric cases, building a weighted knowledge graph based Naïve Bayes. Secondly, to extract new prediction opportunities from hetero...
Article
Full-text available
The cloud operating system (cloud OS) is used for managing the cloud resources such that they can be used effectively and efficiently. And also it is the duty of cloud OS to provide convenient interface for users and applications. However, these two goals are often conflicting because convenient abstraction usually needs more computing resources. T...
Conference Paper
Online monitoring, providing the real-time status information of servers, is indispensable for the management of distributed systems, e.g. failure detection and resource scheduling. The main design challenges for distributed monitoring systems include scalability, fine granularity, reliability and low overheads. And the challenges are growing with...
Article
Full-text available
Outsourcing jobs to a public cloud is a cost-effective way to address the problem of satisfying the peak resource demand when the local cloud has insufficient resources. In this paper, we studied the management of deadline-constrained bag-of-tasks jobs on hybrid clouds. We presented a binary nonlinear programming (BNP) problem to model the hybrid c...
Article
Full-text available
Outsourcing jobs to a public cloud is a cost-effective way to address the problem of satisfying the peak resource demand when the local cloud has insufficient resources. In this paper, we study on managing deadline-constrained bag-of-tasks jobs on hybrid clouds. We present a binary nonlinear programming (BNP) problem to model the hybrid cloud manag...
Article
Full-text available
Server consolidation based on virtualization technology simplifies system administration and improves energy efficiency by improving resource utilizations and reducing the physical machine (PM) number in contemporary service-oriented data centers. The elasticity of Internet applications changes the consolidation technologies from addressing virtual...
Conference Paper
Outsourcing jobs to a public cloud is a cost-effective way to address the problem of satisfying the peak resource demand when the local cloud has insufficient resources. In this paper, we study on managing deadline-constrained bag-of-tasks jobs on hybrid clouds. We present a binary nonlinear programming (BNP) problem to model the hybrid cloud manag...
Conference Paper
Real-time monitoring, providing the real-time status information of servers, is indispensable for the management of distributed systems, e.g. failure detection and resource scheduling. The scalability of fine-grained monitoring faces more and more severe challenges with scaling up distributed systems. The real-time compression which suppresses remo...
Conference Paper
Speculative and clone execution are existing techniques to overcome the problems of task stragglers and performance degradation in heterogeneous clusters for big data processing. In this paper, we propose an alternative approach to solving the problems based on analysis results of profiling and the relations of the system parameters. Our approach a...
Conference Paper
With the fusion of cloud computing and virtualization technology, system security under virtualization becomes a key point in recent research. As a foundational technology to construct a secure system, virtual machine introspection receives more attention than ever. Almost all of the existing virtual machine monitors take the privileged virtual mac...
Conference Paper
Live migration of virtual machines(VMs) is widely used for system management in virtualized servers. When the loads increase and SLAs of some applications are violated, dynamic migration of virtual machines across physical machines (PMs) has the potential to ensure a high level of meeting the SLAs. Because of consuming extra CPU and bandwidth, appl...
Conference Paper
Virtualization can provide significant benefits in virtualized data centers by enabling efficient and effective live migration to ensure service level agreement(SLA). Most of existing studies make decision on which bad virtual machines (VMs) should be migrated to which appropriate physical machines (PMs) in terms of resource utilizations. However,...
Article
In order to reduce cost and improve efficiency, many data centers adopt virtualization solutions. The advent of virtualization allows multiple virtual machines hosted on a single physical server. However, this poses new challenges for resource management. Web workloads which are dominant in data centers are known to vary dynamically with time. In o...
Conference Paper
Full-text available
Virtualization has been widely adopted in data centers for improving efficiency and flexibility. Multiple applications are co-hosted in virtualized data centers. In order to meet the Service Level Agreements (SLA), how to allocate resources for multiple applications is an important and challenging task, especially when dealing with fluctuating work...
Article
Full-text available
Web workloads are known to vary dynamically with time which poses a challenge to resource allocation among the applications. In this paper, we argue that the existing dynamic resource allocation based on resource utilization has some drawbacks in virtualized servers. Dynamic resource allocation directly based on real-time user experience is more re...
Conference Paper
In current social computing system, not only hardware but also software experiences a directly discarded mode. Such directly discarded mode may result in huge waste. The major challenge in green computing is the recyclability of the computing system. In order to address this challenge in the software field, this paper proposes a design idea of gree...
Article
With the increasing demand and the wide application of high performance commodity multi-core processors, both the quantity and scale of data centers grow dramatically and they bring heavy energy consumption. Researchers and engineers have applied much effort to reducing hardware energy consumption, but software is the true consumer of power and ano...
Conference Paper
When visiting cloud computing platforms, users are very concerned about the security of their personal data. Current cloud computing platforms have not provided a virtual computing environment which is fully trusted by users. Meanwhile, the management domain of cloud computing platform is subject to malicious attacks, which can seriously affect the...
Conference Paper
Full-text available
A cloud computing provider can dynamically allocate virtual machines (VM) based on the needs of the customers, while maintaining the privileged access to the Management Virtual Machine that directly manages the hardware and supports the guest VMs. The customers must trust the cloud providers to protect the confidentiality and integrity of their app...
Article
Virtual machine technology can provide high server utilization and service consolidation on an individual physical machine, and gains acceptance in diverse fields. In a growing number of contexts, many situations require high-performance network virtualization. Paravirtualized network system adopts split driver model, and uses dynamic shared memory...
Article
With the rapid development of virtualization technology, virtual machine (VM) is widely used by cloud computing – the more and more popular computing paradigm. Thus, in order to guarantee the security of cloud computing, it is necessary to securely identify the kernel of VM, the software stack running on VM and the hardware platform which VM relies...
Article
Full-text available
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing platform, as well as the service efficiency on such computing platform. At the same time, according to our knowledge, the design the...
Conference Paper
Full-text available
The trend of using virtualization for server consolidation is more and more popular in enterprise data center. However, on- demand resource allocation among the concurrent hosted ser- vices in such a virtualized environment is still a challenge. In order to optimize resource allocation among services in data center, this paper proposes a multi-tier...
Conference Paper
Virtual machine technology has played an important role in data center. Distributed services deployed in multiple virtual machines, may reside on one physical machine. This situation requires an efficient inter-domain communication channel with transparency and security principles ensured. Although current inter-domain mechanism has gained a much b...
Conference Paper
Full-text available
With virtual machine technology, distributed services deployed in multiple cooperative virtual m achines, such as multi-tier web services, may reside on one physical machine. This situation requires an efficient inter -domain communication channel, and meanwhile transparency and security should be guaranteed, for diverse existing distributed applic...
Conference Paper
Full-text available
Server consolidation based on virtualization technology will simplify system administration, reduce the cost of power and physical infrastructure, and improve utilization in today's Internet-service-oriented enterprise data centers. How much power and how many servers for the underlying physical infrastructure are saved via server consolidation in...
Conference Paper
Full-text available
In order to provide high resource utilization and QoS assurance inutility computing hosting concurrently various services, this paper proposes aservice computing framework-RAINBOW for VM(Virtual Machine)-basedutility computing. In RAINBOW, we present a priority-based resourcescheduling scheme including resource flowing algorithms (RFaVM) to optimiz...
Article
Purpose – As a peer-to-peer scalable anonymous communication system, WonGoo is a tradeoff between anonymity and efficiency. Usually, the longer the path, the stronger the anonymity, but at the same time the heavier the overhead. WonGoo lengthens the anonymity path and reduces the overhead, providing strong anonymity and high efficiency with layered...
Conference Paper
In order to optimize the using of server resources which host different services such as Web services, this paper describes an adaptive and dynamic resource flowing scheme amongst VMs in a VM-based utility computing environment called ADVM (adaptive and dynamic virtual machine). In our scheme, VMs adjust their resources (CPU and memory) adaptively...
Conference Paper
Trend towards providing heterogeneous services concurrently by ISPs and low utilization of servers make it necessary to consolidate various services computing into a single platform. In such a shared environment, meeting application-level QoS goals and avoiding interaction among services become challenges as each application consumes different amou...
Conference Paper
Some popular computing technologies, such as ubiquitous computing, grid computing and thin-client computing, bring people to a much more distributed and pervasive computing environment. Based on these innovative technologies, a distributed virtual personal computing (DVPC) paradigm is coming into being. One of the fundamental challenges in the DVPC...
Conference Paper
In this paper, we propose four general queueing models based on input and server distributions, to analyze a special grid system, VEGA grid system version 1.1 (VEGA1.1). The mean queue lengths and mean waiting times of these models are deduced. The two classic applications, the computing-oriented application (blast computing) and online transaction...
Conference Paper
Full-text available
Grid technologies promise to bring the grid users high performance. Consequently, scheduling is being becoming a crucial problem. Herd behavior is a common phenomenon, which causes the severe performance decrease in grid environment with respect to bad scheduling behaviors. In this paper, on the basis of the theoretical results of the homogeneous b...
Conference Paper
Full-text available
Many peer-to-peer anonymity protocols have been proposed in recent years. One of the key challenges in designing such protocols is peer discovery, especially in decentralized unstructured peer-to-peer systems. In this paper, we propose a gossip algorithm for peer discovery based upon node local in-degree (GPDL), using only limited knowledge of the...
Conference Paper
With the dramatic development of grid technologies, performance analysis and prediction of grid systems is increasingly significant to develop a variety of new grid technologies. The VEGA grid, a new grid infrastructure developed by Institute of Computing Technology, CAS, views a grid as a distributed computer system. In this paper, we propose some...
Conference Paper
Privacy and anonymity on the Internet are gaining increasing attention from both the scientific and the large Internet user community. WonGoo is a peer-to-peer scalable anonymous communication system that provides strong anonymity and high efficiency with layered encryption and random forwarding. It reduces the message overhead and lengthens the co...
Conference Paper
Anonymity likes company. Hence peer-to-peer networks, represented by Tarzan and MorphMix, have become a significant paradigm for anonymous communications because they are scaleable, self-organizing and reliable. However, little work has been done on how to build a peer-to-peer anonymous overlay network. To address this problem, we propose the follo...
Conference Paper
Full-text available
Resource discovery is crucial to efficient deployment of a grid system whose dynamic, heterogeneous characteristics make it difficult. In this paper, Vega Infrastructure for Resource Discovery (VIRD) is developed, then augmented with new features (i.e., some new algorithms) to build a C/S (client/server) and P2P (peer-to-peer) hybrid resource disco...
Conference Paper
Full-text available
The multiple genome sequence alignment problem falls in the domain of problems that can be parallelized to address large sequence lengths. Although there is communication required for the computation of the aligned sequences, the proper distribution can reduce the overall problem to a set of tasks to be solved independently and then merged. A paral...
Conference Paper
In 2004 Golle, Jakobsson, Juels and Syverson presented a new encryption scheme called the universal re-encryption [GJJS04] for mixnets [Cha81] which was extended by Gomulkiewicz et al. [GKK04]. We discover that this scheme and its extension both are insecure against a chosen ciphertext attack proposed by Pfitzmann in 1994 [Pfi94]. Another drawback...
Conference Paper
Rapid advances in network and computer technologies are making networked computers, organized in the form of grid, an appealing vehicle for cost-effective parallel computing. But how to handle efficiently the communications in scheduling is still a main obstacle to using these resources. In this paper, we tackle this problem by partitioning resourc...
Conference Paper
With the development of the computer system architectures and the computing technologies, the traditional tight-coupling computer systems face challenges. The loose-coupling computer architecture based on the grid computing concept show its superiorities. In this paper, the challenges in building loose-coupling computer architecture are discussed f...
Conference Paper
The mobile grid users accessing to grid services has become a normally paradigm for getting grid resources. To improve their working productivity in dynamic and open grid environment it should provide the mobile grid users an access-point decoupled and access-time decoupled way to access grid services. In development of the VEGA Grid, corresponding...
Conference Paper
Full-text available
Hotfile is a user level file management system. It wraps GridFTP and GASS or any other file transfer protocol compatible with hotfile structure into a unified vegafile protocol. Based on virtual grid file layer and a set of basic grid file operations, users can access grid file without knowing the physical transport protocol of the file. Test resul...
Conference Paper
Full-text available
Recent work towards a standard based, service oriented Grid represents the convergence of distributed computing technologies from e-Science and e-Commerce communities. A global service management system in such context is required to achieve efficient resource sharing and collaborative service provisioning. This paper presents VEGA system software,...
Conference Paper
Full-text available
When adopting the mediator architecture to integrate distributed, autonomous, relational model based database sources, mappings from the source schema to the global schema may become inconsistent when the relational source schema or the global schema evolves. Without mapping adaptation, users may access no data or wrong data. In the paper, we propo...
Conference Paper
Summary form only given. Here we present two efficient coherence protocols for data grid applications. The data intensive grid applications often adopt the replica strategy to solve the data access bottleneck. It is important to keep coherence among all replicas of a copy of large amount of data. The first strategy for coherence is called lazy copy...
Conference Paper
Anonymous communications are indispensable to protect users' privacy in open networks such as the Internet. Yet current Internet protocols provide no support for masking the identity of communication endpoints. In this paper, we describe WonGoo, a peer-to-peer, scalable communication protocol that provides strong anonymity and high efficiency with...
Conference Paper
Full-text available
Traditional information systems are usually predefined, closed systems with fixed structures, thus do not support on-line expansion. Such systems can not meet the rapidly changing requirements. In this paper the essence of on-line expansion is studied. Definitions about service grid and some basic properties such as input-output consistency, runnin...
Article
Full-text available
this paper, we present a hierarchical method for broadcast over clusters of SMPs (CSMPs) connected by switches under the one-port model. A broadcast over CSMPs consists of three levels, one for a sub-broadcast in each SMP node, one for a sub-broadcast within each of switches called intra-switch broadcast, and one for a sub-broadcast among switches...
Conference Paper
Full-text available
In this paper, we present a hierarchical method for broadcast on clusters of symmetric multiprocessors (CSMPs) connected by switches with one-port model. We focus on the inter-switch broadcast that forms the core part of a broadcast on CSMPs. The proposed broadcast method is based on single-source shortest path minimum-cost l)anning tree (SSS-MST)....
Article
Full-text available
In this paper, we propose an efficient barrier synchronization scheme on networks with arbitrary topologies. We first present a distributed method in building a barrier routing tree. The barrier messages can be delivered adaptively according to the hierarchy of the established barrier tree to void congestion and faulty nodes in the network. We then...
Article
Full-text available
In this paper, we introduce a family of scalable interconnection network topologies, named Recursive Cube of Rings (RCR), which are recursively constructed by adding ring edges to a cube. RCRs possess many desirable topological properties in building scalable parallel machines, such as fixed degree, small diameter, wide bisection width, symmetry, f...
Conference Paper
Full-text available
With respect to scalability and arbitrary topologies of the underlying networks in multiprogramming and multithread environments, fault tolerance in acknowledged ATAB and concurrent communications become a challenge to reliable general wormhole routing multicomputers with arbitrary topologies. In this paper, the virtual ring tree (VRT) is proposed...
Article
We introduce a family of scalable interconnection network topologies, named Ring-Bisection Networks (RBNs), which are recursively constructed by adding ring edges to a cube. RBNs possess many desirable topological properties in building scalable parallel machines, such as fixed degree, small diameter, large bisection width, and symmetry. A general...
Conference Paper
Full-text available
In this paper, we present a new efficient hybrid time synchronization scheme for a mesh or torus interconnection networks, called ROCTS. ROCTS comprises two levels, one for the lower level that is implemented over a special high-speed ring array, one for the mesh or torus network. In ROCTS, the second network we construct is different from the past...
Conference Paper
This paper characterizes the structure and resource requirements of the NAS Parallel Benchmarks (NPB), a popular benchmark suite used to evaluate various parallel computers. The phase parallel model is used to obtain parameter values for memory, I/O, and communication latency and bandwidth requirements. These quantitative parameters are useful in t...
Conference Paper
This paper presents an efficient parallel algebraic algorithm to implement ATPG for combinational circuits using the Boolean satisfiability on a distributed computing environment. The Path-Oriented Expanded Implication Graph (POEIG) of a combinational circuit is taken as a heuristic guide to improve the traditional stochastic calculation of the Boo...
Article
【Abstract】Thin-client computation advocates ,the separation of application GUI and ,the processing logic as well as the ,centralization of the processing, hence to enhance the resource utilization, decrease the systemcost, and improvethe systemsecu rity. This paper introduces SmartTerm, an ultra-thin-client forthe distributeddesktop- like computing...

Network

Cited By

Projects

Projects (2)
Project
Working on two projects, one for machine-learning based log analysis project from MOST, another one for machine doctor via simulating doctor thinking. Welcome to collaboration.