有关dht算法中英文翻译内容摘要:
sters, and the cyclic indices indicate different node positions in a uses cubical indices to represent a, and uses cyclic indices to represent . Consistent hash function, denoted by H, is used to generate the hash value of attributes. Locality preserving hashing function , denoted by H, is used to generate the hash value of attribute value. Thus, the ID of a resource rescID=(H,H).A node reports its available resources to the system periodically via interface Insert(rescID,rescInfo).Therefore, the information of the same attribute will be mapped to the same cluster. We call the node or the ID of the node as the root of the rescID or rescInfo. Within each cluster, each node is responsible for the information of a resource whose cyclic index falls into the ID space sector it supervises.Proposition : In LORM, given a range query [, ]for a resource where , a node that contains attribute value within [, ] must have an ID that satisfies root(H ,) ID root(H ,).Proof: In LORM with n = d nodes, a node reports its resource information using the Cycloid interface Insert((H,Ha),rescInfo). Attribute a with value will be stored in root(H,Ha) whose ID is the closest to (H,Ha). According to the locality preserving hashing, because the resource information of value v will be stored in node i that satisfies to the condition root(H ()) i root(H ()). A node uses Lookup(rescID) to query for resources,and the query is routed to the directory node for the desired resource. A multiattribute query is posed of a set of subqueries on each attribute, which are processed in parallel. For example, when a node k needs a multipleattribute resource, say CPU and 2GB memory, it sends requests Lookup(H,Hcpu,cpu, ,ip_addr(k)) and Lookup(H,mem,ip_addr(k)), which will be resolved in parallel. The queries will arrive at node a and node e, which reply to the requester node k with the requested resource information mem, ip_addr(i) where= 2 and CPU, , ip_addr(j) where =. The requester node then concatenates the results in a databaselike “join” operation based on ip addr. The results are the nodes that have desired resource by the requester. For range queries such as“”and“Freememory2GB”, in addition to responding with satisfied resource information in their own directories, node a and e forward the resource queries to their immediate successors in their own clusters. The successors repeat the same process. This process is repeated until a successor has no satisfied resource information. If the requested resource range is less than a value, then nodes forward queries to their predecessors. If the queries have lower and upper bounds such as “” and“1GBmemory2GB”, the queries will be forwarded in both directions. Cycloid has a selforganization mechanism to maintain its structure and stored objects, which helps LORM to handle dynamism with node joins and departures.IV. COMPARATIVE STUDY AND ANALYSISWe use Mercury , SWORD , MAAN as representatives of multipleDHTbased, singleDHTbased centralized and singleDHTbased decentralized classes, and analyze LORM in parison with the approaches. LORM maps resource attribute and value or string description to two levels of a hierarchical Cycloid DHT. Mercury uses multiple DHTs with one DHT responsible for each attribute and maps resource value to each DHT. SWORD maps resource information including both attribute and value in a flat DHT,and MAAN maps attribute and value separately to a flat DHT. To be parable, we use Chord for attribute hubs in Mercury, and we replace Bamboo DHT with Chord in SWORD.In Mercury, for higher efficiency of resource query, a node within one of the hubs can hold the data record while the other hubs can hold a pointer to the node. This strategy can also be applied to other methods. To make the different methods be parable, we don’t consider this strategy in the parative study. We analyze their performance in terms of structure maintenance overhead, resource information maintenance overhead, and the efficiency of resource discovery. In the analysis, we use “attribute value” to represent the locality preserving hash value of both attribute value and attribute string description. We use directory size to represent the number of resource information pieces in a directory.A . Maintenance OverheadTheorem : In a grid system with n nodes and m resource attributes, with high probability, LORM can improve the structure maintenance overhead of multipleDHTbased methods (. Mercury) by no less than m times.Proof: LORM is based on Cycloid, in which each node is responsible for maintaining d ≤ log(n) neighbors. In multipleDHTbased methods such as Mercury, each node is responsible for maintain。有关dht算法中英文翻译
相关推荐
5- 7 在指导下工作,仍有错误 5 以下 纪律性 (10%) 自觉遵守和维护公司各项规章制度 10 能遵守公司规章制度,但需要有人督导 89 纪律观念不强 ,偶尔违反公司规章制度 5- 7 经常违 反公司制度 ,被指正时态度傲慢 5 以下 成本意识 (10%) 成本意识强烈,能积极节省,避免浪费 10 具备成本意识,并能节约 89 库伦佛权威管理资料 17 有成本意识,梢有浪费 57
效果的预算,并监控实施 负责形象推广、展示会、订货会等活动的策划与监控、公司品牌市场状况及竞争品牌信息的收集分析; 负责沟通总公司品牌的终端推广与形象维护,包括店铺艺术装潢、陈列、橱窗设计等工作的总体沟通及协调 负责市场企划费用预算管理工作的制订执行、媒介资源的整合开发及维护; 负责组织实施 总公司的各种营销推广和策划活动,树立提高公司知名度并促进销售目标实现; 了解和掌握市场信息
天天有变化,年年有 流行款式、色彩,因此服装专业是一个充满感 性与灵性的结合体。 而学生对服装专业的灵性则是在大量的感知学习并运用相关技术进行操作实践中形成的。 就目前的服装专业结构制图教材而言,内容单一,根本无法满足学生学习的需要。 而多媒体和网络技术的出现弥补了教材内容单一化的问题,并为其提供了巨大的信息量,使学生的知识也日益更新化。 五、 抽象的知识变具体化
商品房买卖合同订立后,出卖人又将该房屋出卖给第三人。 解读或提示:本条是关于购房人因开发商私自将商品房设定抵押或一房 多卖的行为而无法实现商品房买卖合同目的,可以从开发商获得何种赔偿的规定。 本条解释的最大意义在于,确立了对开发商恶意违约和欺诈行为适用惩罚性赔偿责任的原则。 即购房人在可以请求解除合同、返还已付购房款及利息、赔偿损失的同时,还可以要求开发商承担不超过购房款一倍的惩罚性赔偿。