首页 > 最新文献

IEEE Transactions on Services Computing最新文献

英文 中文
A Reinforcement Learning based Framework for Holistic Energy Optimization of Sustainable Cloud Data Centers 基于强化学习的可持续云数据中心整体能源优化框架
IF 8.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-11 DOI: 10.1109/tsc.2024.3495495
Daming Zhao, Jiantao Zhou, Jidong Zhai, Keqin Li
{"title":"A Reinforcement Learning based Framework for Holistic Energy Optimization of Sustainable Cloud Data Centers","authors":"Daming Zhao, Jiantao Zhou, Jidong Zhai, Keqin Li","doi":"10.1109/tsc.2024.3495495","DOIUrl":"https://doi.org/10.1109/tsc.2024.3495495","url":null,"abstract":"","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"71 1","pages":""},"PeriodicalIF":8.1,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142599217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Knowledge Search Structure for Android Malware Detection 用于安卓恶意软件检测的新型知识搜索结构
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-11 DOI: 10.1109/TSC.2024.3496333
Huijuan Zhu;Mengzhen Xia;Liangmin Wang;Zhicheng Xu;Victor S. Sheng
While the Android platform is gaining explosive popularity, the number of malicious software (malware) is also increasing sharply. Thus, numerous malware detection schemes based on deep learning have been proposed. However, they are usually suffering from the cumbersome models with complex architectures and tremendous parameters. They usually require heavy computation power support, which seriously limit their deployment on actual application environments with limited resources (e.g., mobile edge devices). To surmount this challenge, we propose a novel Knowledge Distillation (KD) structure—Knowledge Search (KS). KS exploits Neural Architecture Search (NAS) to adaptively bridge the capability gap between teacher and student networks in KD by introducing a parallelized student-wise search approach. In addition, we carefully analyze the characteristics of malware and locate three cost-effective types of features closely related to malicious attacks, namely, Application Programming Interfaces (APIs), permissions and vulnerable components, to characterize Android Applications (Apps). Therefore, based on typical samples collected in recent years, we refine features while exploiting the natural relationship between them, and construct corresponding datasets. Massive experiments are conducted to investigate the effectiveness and sustainability of KS on these datasets. Our experimental results show that the proposed method yields an accuracy of 97.89% to detect Android malware, which performs better than state-of-the-art solutions.
在Android平台获得爆炸性普及的同时,恶意软件(malware)的数量也在急剧增加。因此,人们提出了许多基于深度学习的恶意软件检测方案。然而,它们通常受到结构复杂、参数庞大的笨重模型的困扰。它们通常需要大量的计算能力支持,这严重限制了它们在资源有限的实际应用环境(例如移动边缘设备)中的部署。为了克服这一挑战,我们提出了一种新的知识蒸馏(KD)结构——知识搜索(KS)。KS利用神经结构搜索(NAS),通过引入并行的学生搜索方法,自适应地弥合KD中教师和学生网络之间的能力差距。此外,我们仔细分析了恶意软件的特征,找到了与恶意攻击密切相关的三种具有成本效益的特征,即应用程序编程接口(api)、权限和易受攻击的组件,以表征Android应用程序(app)。因此,基于近年来收集的典型样本,我们在挖掘特征之间的自然关系的同时,对特征进行细化,构建相应的数据集。我们进行了大量的实验来研究KS在这些数据集上的有效性和可持续性。实验结果表明,该方法检测Android恶意软件的准确率为97.89%,优于现有的解决方案。
{"title":"A Novel Knowledge Search Structure for Android Malware Detection","authors":"Huijuan Zhu;Mengzhen Xia;Liangmin Wang;Zhicheng Xu;Victor S. Sheng","doi":"10.1109/TSC.2024.3496333","DOIUrl":"10.1109/TSC.2024.3496333","url":null,"abstract":"While the Android platform is gaining explosive popularity, the number of malicious software (malware) is also increasing sharply. Thus, numerous malware detection schemes based on deep learning have been proposed. However, they are usually suffering from the cumbersome models with complex architectures and tremendous parameters. They usually require heavy computation power support, which seriously limit their deployment on actual application environments with limited resources (e.g., mobile edge devices). To surmount this challenge, we propose a novel Knowledge Distillation (KD) structure—Knowledge Search (KS). KS exploits Neural Architecture Search (NAS) to adaptively bridge the capability gap between teacher and student networks in KD by introducing a parallelized student-wise search approach. In addition, we carefully analyze the characteristics of malware and locate three cost-effective types of features closely related to malicious attacks, namely, Application Programming Interfaces (APIs), permissions and vulnerable components, to characterize Android Applications (Apps). Therefore, based on typical samples collected in recent years, we refine features while exploiting the natural relationship between them, and construct corresponding datasets. Massive experiments are conducted to investigate the effectiveness and sustainability of KS on these datasets. Our experimental results show that the proposed method yields an accuracy of 97.89% to detect Android malware, which performs better than state-of-the-art solutions.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3052-3064"},"PeriodicalIF":5.5,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142599258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay-Prioritized and Reliable Task Scheduling With Long-Term Load Balancing in Computing Power Networks 计算动力网络中具有长期负载平衡的延迟优先和可靠任务调度
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-11 DOI: 10.1109/TSC.2024.3495500
Renchao Xie;Li Feng;Qinqin Tang;Tao Huang;Zehui Xiong;Tianjiao Chen;Ran Zhang
In the era driven by big data and algorithms, the efficient collaboration of pervasive computing power is crucial for rapidly meeting computing demands and enhancing resource utilization. However, current mainstream end-edge-cloud collaboration faces challenges of computing isolation, adversely affecting resource efficiency and user experience. The Computing Power Network (CPN) is a novel architecture designed to sense and collaborate ubiquitous computing resources through networks. Nevertheless, the expansion of its scope and the integration of networks complicate task scheduling. To address this, we design a collaborative scheduling system that considers the joint selection of computing nodes and network links, aiming to reduce delay, enhance reliability, and ensure long-term load balance. First, we propose a delay-prioritized reliable scheduling policy based on a dual-priority mechanism for forwarding and computing. Second, we define the scheduling problem as a Constrained Markov Decision Process (CMDP) and introduce Lyapunov optimization to transform constraints into instantaneous optimizations, achieving a long-term balanced load of computing and network resources. Lastly, we employ an enhanced Deep Reinforcement Learning (DRL) approach to solve the problem. Performance evaluation demonstrates that compared to standard DRL, the proposed algorithm effectively reduces delay and improves reliability while maintaining long-term load balance, resulting in an overall performance improvement of 54.7%.
在大数据和算法驱动的时代,普适计算能力的高效协同对于快速满足计算需求和提高资源利用率至关重要。然而,当前主流的端边缘云协作面临着计算隔离的挑战,这对资源效率和用户体验产生了不利影响。计算能力网络(CPN)是一种新颖的体系结构,旨在通过网络感知和协作无处不在的计算资源。然而,其范围的扩大和网络的整合使任务调度复杂化。为了解决这一问题,我们设计了一个考虑计算节点和网络链路联合选择的协同调度系统,旨在减少延迟,提高可靠性,并确保长期负载均衡。首先,我们提出了一种基于转发和计算双优先级机制的延迟优先级可靠调度策略。其次,我们将调度问题定义为约束马尔可夫决策过程(Constrained Markov Decision Process, CMDP),并引入Lyapunov优化将约束转化为瞬时优化,实现计算资源和网络资源的长期均衡负载。最后,我们采用一种增强的深度强化学习(DRL)方法来解决这个问题。性能评估表明,与标准DRL相比,该算法在保持长期负载均衡的同时,有效地降低了时延,提高了可靠性,整体性能提升54.7%。
{"title":"Delay-Prioritized and Reliable Task Scheduling With Long-Term Load Balancing in Computing Power Networks","authors":"Renchao Xie;Li Feng;Qinqin Tang;Tao Huang;Zehui Xiong;Tianjiao Chen;Ran Zhang","doi":"10.1109/TSC.2024.3495500","DOIUrl":"10.1109/TSC.2024.3495500","url":null,"abstract":"In the era driven by big data and algorithms, the efficient collaboration of pervasive computing power is crucial for rapidly meeting computing demands and enhancing resource utilization. However, current mainstream end-edge-cloud collaboration faces challenges of computing isolation, adversely affecting resource efficiency and user experience. The Computing Power Network (CPN) is a novel architecture designed to sense and collaborate ubiquitous computing resources through networks. Nevertheless, the expansion of its scope and the integration of networks complicate task scheduling. To address this, we design a collaborative scheduling system that considers the joint selection of computing nodes and network links, aiming to reduce delay, enhance reliability, and ensure long-term load balance. First, we propose a delay-prioritized reliable scheduling policy based on a dual-priority mechanism for forwarding and computing. Second, we define the scheduling problem as a Constrained Markov Decision Process (CMDP) and introduce Lyapunov optimization to transform constraints into instantaneous optimizations, achieving a long-term balanced load of computing and network resources. Lastly, we employ an enhanced Deep Reinforcement Learning (DRL) approach to solve the problem. Performance evaluation demonstrates that compared to standard DRL, the proposed algorithm effectively reduces delay and improves reliability while maintaining long-term load balance, resulting in an overall performance improvement of 54.7%.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3359-3372"},"PeriodicalIF":5.5,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142599219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-granularity Weighted Federated Learning for Heterogeneous Edge Computing 异构边缘计算的多粒度加权联合学习
IF 8.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-11 DOI: 10.1109/tsc.2024.3495532
Yunfeng Zhao, Chao Qiu, Shangxuan Cai, Zhicheng Liu, Yu Wang, Xiaofei Wang, Qinghua Hu
{"title":"Multi-granularity Weighted Federated Learning for Heterogeneous Edge Computing","authors":"Yunfeng Zhao, Chao Qiu, Shangxuan Cai, Zhicheng Liu, Yu Wang, Xiaofei Wang, Qinghua Hu","doi":"10.1109/tsc.2024.3495532","DOIUrl":"https://doi.org/10.1109/tsc.2024.3495532","url":null,"abstract":"","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"16 1","pages":""},"PeriodicalIF":8.1,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142599218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MADRL-Based Order Dispatching in MoD Systems With Bipartite Graph Splitting 基于 MADRL 的国防部系统订单调度与双向图分割
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-11 DOI: 10.1109/TSC.2024.3495538
Shuxin Ge;Xiaobo Zhou;Tie Qiu
Mobility on-demand (MoD) systems widely use machine learning to estimate matching utilities of order-vehicle pairs to dispatch orders by bipartite matching. However, existing methods suffer from overestimation problems due to the complex interactions among order-vehicle pairs in the global bipartite graph, leading to low overall revenue and order completion rate. To fill this gap, we propose a multi-agent deep reinforcement learning (MADRL) based order dispatching method with bipartite splitting, named SplitMatch. The key idea is to split the global bipartite graph into multiple sub-bipartite graphs to overcome the overestimation problem. First, we propose a bipartite splitting theorem and prove that the optimal solution of global bipartite matching can be achieved by solving multiple sub-bipartite matching problems when certain conditions are met. Second, we design a spatial-temporal padding prediction algorithm to generate sub-bipartite graphs that satisfy this theorem, where the spatial-temporal feature of orders and vehicles is captured. Next, we propose a MADRL framework to learn the matching utility, where multi-objective, e.g., immediate revenue and quality of service (QoS), are taken into account to deal with varying action space. Finally, a series of simulations are conducted to verify the superiority of SplitMatch in terms of overall revenue and order completion rate.
按需出行(MoD)系统广泛使用机器学习来估计订单-车辆对的匹配效用,通过二部匹配来调度订单。然而,现有方法由于全局二部图中订单-车辆对之间的相互作用复杂,存在估计过高的问题,导致总体收益和订单完成率较低。为了填补这一空白,我们提出了一种基于多智能体深度强化学习(MADRL)的二部分裂排序方法,称为SplitMatch。其关键思想是将全局二部图分割成多个子二部图,以克服过估计问题。首先,我们提出了二部分裂定理,并证明了在满足一定条件的情况下,通过求解多个子二部匹配问题可以得到全局二部匹配的最优解。其次,我们设计了一种时空填充预测算法来生成满足该定理的子二部图,其中捕获了订单和车辆的时空特征。接下来,我们提出了一个MADRL框架来学习匹配实用程序,其中考虑了多目标,例如即时收入和服务质量(QoS),以处理不同的动作空间。最后,通过一系列仿真验证了SplitMatch在整体收益和订单完成率方面的优势。
{"title":"MADRL-Based Order Dispatching in MoD Systems With Bipartite Graph Splitting","authors":"Shuxin Ge;Xiaobo Zhou;Tie Qiu","doi":"10.1109/TSC.2024.3495538","DOIUrl":"10.1109/TSC.2024.3495538","url":null,"abstract":"Mobility on-demand (MoD) systems widely use machine learning to estimate matching utilities of order-vehicle pairs to dispatch orders by bipartite matching. However, existing methods suffer from overestimation problems due to the complex interactions among order-vehicle pairs in the global bipartite graph, leading to low overall revenue and order completion rate. To fill this gap, we propose a multi-agent deep reinforcement learning (MADRL) based order dispatching method with bipartite splitting, named SplitMatch. The key idea is to split the global bipartite graph into multiple sub-bipartite graphs to overcome the overestimation problem. First, we propose a bipartite splitting theorem and prove that the optimal solution of global bipartite matching can be achieved by solving multiple sub-bipartite matching problems when certain conditions are met. Second, we design a spatial-temporal padding prediction algorithm to generate sub-bipartite graphs that satisfy this theorem, where the spatial-temporal feature of orders and vehicles is captured. Next, we propose a MADRL framework to learn the matching utility, where multi-objective, e.g., immediate revenue and quality of service (QoS), are taken into account to deal with varying action space. Finally, a series of simulations are conducted to verify the superiority of SplitMatch in terms of overall revenue and order completion rate.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3914-3927"},"PeriodicalIF":5.5,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142599220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependency-Aware Task Offloading Based on Application Hit Ratio 基于应用程序命中率的依赖性感知任务卸载
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-08 DOI: 10.1109/TSC.2024.3495510
Junna Zhang;Xinxin Wang;Peiyan Yuan;Hai Dong;Pengcheng Zhang;Zahir Tari
Mobile devices commonly offload latency-sensitive applications to edge servers to meet low-latency requirements. However, existing studies overlook dependency and application hit ratio considerations, hindering effective offloading for multi-applications and multi-tasks. To this end, this article proposes a Dependent task offloading and Service placement Optimization (DSO) method to maximize the application hit ratio, thereby providing high-quality service. The proposed DSO includes Improved Multi-Agent Q-Learning (IMAQL) and greedy algorithms. IMAQL optimizes service placement via Q-learning, while the greedy algorithm schedules task offloading. Extensive experiments on public datasets demonstrate that the DSO method enhances the application hit ratio by 4.7% to 11.7% and reduces the completion time by about 3.4% to 4.9% compared to alternative approaches.
移动设备通常将对延迟敏感的应用程序卸载到边缘服务器,以满足低延迟需求。然而,现有的研究忽略了依赖关系和应用程序命中率的考虑,阻碍了多应用程序和多任务的有效卸载。为此,本文提出了一种依赖任务卸载和服务放置优化(Dependent task offloading and Service placement Optimization, DSO)方法来最大化应用程序的命中率,从而提供高质量的服务。该算法包括改进的多智能体Q-Learning (IMAQL)和贪心算法。IMAQL通过Q-learning优化服务布局,而贪婪算法调度任务卸载。在公共数据集上进行的大量实验表明,与其他方法相比,DSO方法将应用程序命中率提高了4.7%至11.7%,并将完成时间缩短了3.4%至4.9%。
{"title":"Dependency-Aware Task Offloading Based on Application Hit Ratio","authors":"Junna Zhang;Xinxin Wang;Peiyan Yuan;Hai Dong;Pengcheng Zhang;Zahir Tari","doi":"10.1109/TSC.2024.3495510","DOIUrl":"10.1109/TSC.2024.3495510","url":null,"abstract":"Mobile devices commonly offload latency-sensitive applications to edge servers to meet low-latency requirements. However, existing studies overlook dependency and application hit ratio considerations, hindering effective offloading for multi-applications and multi-tasks. To this end, this article proposes a Dependent task offloading and Service placement Optimization (DSO) method to maximize the application hit ratio, thereby providing high-quality service. The proposed DSO includes Improved Multi-Agent Q-Learning (IMAQL) and greedy algorithms. IMAQL optimizes service placement via Q-learning, while the greedy algorithm schedules task offloading. Extensive experiments on public datasets demonstrate that the DSO method enhances the application hit ratio by 4.7% to 11.7% and reduces the completion time by about 3.4% to 4.9% compared to alternative approaches.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3373-3386"},"PeriodicalIF":5.5,"publicationDate":"2024-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142596435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Orchestration of Services in Smart Manufacturing Through Automated Synthesis 通过自动合成协调智能制造中的服务
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-08 DOI: 10.1109/TSC.2024.3495521
Flavia Monti;Luciana Silo;Marco Favorito;Giuseppe De Giacomo;Francesco Leotta;Massimo Mecella
In recent decades, manufacturing practices have undergone a significant transformation, with the integration of computers and automation playing a central role. Concurrently, there has been a growing interest in utilizing intelligent techniques to effectively manage manufacturing processes. These processes entail the seamless integration of various activities across the supply chain. Given the diverse range of actors in a supply chain, each one with distinct characteristics such as cost, quality, and probability of failure, task assignment becomes a crucial challenge. In such a complex scenario, manual decision-making becomes impractical, necessitating the adoption of automated techniques to effectively address these challenges in a resilient and adaptive manner. This article proposes a service-oriented approach to model each manufacturing actor within the supply chain. Furthermore, it categorizes automated synthesis approaches for smart manufacturing on the basis of i) the characteristics of each actor, which are retrieved by their Industrial API, and ii) the goal(s) of the manufacturing process. Finally, the article evaluates three distinct approaches that implement automated synthesis techniques for composing services and generating operational plans.
近几十年来,制造实践经历了重大转变,计算机和自动化的集成发挥了核心作用。同时,人们对利用智能技术有效管理制造过程的兴趣日益浓厚。这些过程需要供应链上各种活动的无缝集成。考虑到供应链中参与者的多样性,每个参与者都有不同的特征,如成本、质量和失败概率,任务分配成为一个关键的挑战。在这样一个复杂的场景中,人工决策变得不切实际,需要采用自动化技术,以灵活和自适应的方式有效地解决这些挑战。本文提出了一种面向服务的方法来为供应链中的每个制造参与者建模。此外,它根据i)每个参与者的特征(通过其工业API检索)和ii)制造过程的目标对智能制造的自动化合成方法进行了分类。最后,本文评估了实现用于组合服务和生成操作计划的自动合成技术的三种不同方法。
{"title":"Orchestration of Services in Smart Manufacturing Through Automated Synthesis","authors":"Flavia Monti;Luciana Silo;Marco Favorito;Giuseppe De Giacomo;Francesco Leotta;Massimo Mecella","doi":"10.1109/TSC.2024.3495521","DOIUrl":"10.1109/TSC.2024.3495521","url":null,"abstract":"In recent decades, manufacturing practices have undergone a significant transformation, with the integration of computers and automation playing a central role. Concurrently, there has been a growing interest in utilizing intelligent techniques to effectively manage manufacturing processes. These processes entail the seamless integration of various activities across the supply chain. Given the diverse range of actors in a supply chain, each one with distinct characteristics such as cost, quality, and probability of failure, task assignment becomes a crucial challenge. In such a complex scenario, manual decision-making becomes impractical, necessitating the adoption of automated techniques to effectively address these challenges in a resilient and adaptive manner. This article proposes a service-oriented approach to model each manufacturing actor within the supply chain. Furthermore, it categorizes automated synthesis approaches for smart manufacturing on the basis of \u0000<italic>i)</i>\u0000 the characteristics of each actor, which are retrieved by their Industrial API, and \u0000<italic>ii)</i>\u0000 the goal(s) of the manufacturing process. Finally, the article evaluates three distinct approaches that implement automated synthesis techniques for composing services and generating operational plans.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"4069-4082"},"PeriodicalIF":5.5,"publicationDate":"2024-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10748384","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142596436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting Stragglers in Distributed Computing Systems With Task Grouping 利用任务分组开发分布式计算系统中的落伍者
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-08 DOI: 10.1109/TSC.2024.3495513
Tharindu Adikari;Haider Al-Lawati;Jason Lam;Zhenhua Hu;Stark C. Draper
We consider the problem of stragglers in distributed computing systems. Stragglers, which are compute nodes that unpredictably slow down, often increase the completion times of tasks. One common approach to mitigating stragglers is work replication, where only the first completion among replicated tasks is accepted, discarding the others. However, discarding work leads to resource wastage. In this article, we propose a method for exploiting the work completed by stragglers rather than discarding it. The idea is to increase the granularity of the assigned work, and to increase the frequency of worker updates. We show that the proposed method reduces the completion time of tasks via experiments performed on a simulated cluster as well as on Amazon EC2 with Apache Hadoop.
研究分布式计算系统中的离散者问题。离散节点是不可预测地变慢的计算节点,通常会增加任务的完成时间。减轻掉队者的一种常见方法是工作复制,在复制的任务中,只接受第一个完成的任务,丢弃其他的任务。然而,丢弃工作导致资源浪费。在这篇文章中,我们提出了一种利用掉队者完成的工作而不是丢弃它的方法。其思想是增加分配工作的粒度,并增加工作者更新的频率。我们通过在模拟集群上以及在Amazon EC2与Apache Hadoop上进行的实验表明,所提出的方法减少了任务的完成时间。
{"title":"Exploiting Stragglers in Distributed Computing Systems With Task Grouping","authors":"Tharindu Adikari;Haider Al-Lawati;Jason Lam;Zhenhua Hu;Stark C. Draper","doi":"10.1109/TSC.2024.3495513","DOIUrl":"10.1109/TSC.2024.3495513","url":null,"abstract":"We consider the problem of stragglers in distributed computing systems. Stragglers, which are compute nodes that unpredictably slow down, often increase the completion times of tasks. One common approach to mitigating stragglers is work replication, where only the first completion among replicated tasks is accepted, discarding the others. However, discarding work leads to resource wastage. In this article, we propose a method for exploiting the work completed by stragglers rather than discarding it. The idea is to increase the granularity of the assigned work, and to increase the frequency of worker updates. We show that the proposed method reduces the completion time of tasks via experiments performed on a simulated cluster as well as on Amazon EC2 with Apache Hadoop.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"3613-3626"},"PeriodicalIF":5.5,"publicationDate":"2024-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142596437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KA2SE: Key-Aggregation Authorized Searchable Encryption Scheme for Data Sharing in Wireless Sensor Networks KA2SE:用于无线传感器网络数据共享的密钥聚合授权可搜索加密方案
IF 8.1 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-04 DOI: 10.1109/tsc.2024.3491378
Haijiang Wang, Jianting Ning, Wei Wu, Chao Lin, Kai Zhang
{"title":"KA2SE: Key-Aggregation Authorized Searchable Encryption Scheme for Data Sharing in Wireless Sensor Networks","authors":"Haijiang Wang, Jianting Ning, Wei Wu, Chao Lin, Kai Zhang","doi":"10.1109/tsc.2024.3491378","DOIUrl":"https://doi.org/10.1109/tsc.2024.3491378","url":null,"abstract":"","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"87 1","pages":""},"PeriodicalIF":8.1,"publicationDate":"2024-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142580363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESTLess: Enhancing State-of-the-Art REST API Fuzzing With LLMs in Cloud Service Computing RESTLess:利用云服务计算中的 LLM 增强最新 REST API 模糊测试
IF 5.5 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-01 DOI: 10.1109/TSC.2024.3489441
Tao Zheng;Jiang Shao;Jinqiao Dai;Shuyu Jiang;Xingshu Chen;Changxiang Shen
REST API Fuzzing is an emerging approach for automated vulnerability detection in cloud services. However, existing SOTA fuzzers face challenges in generating lengthy sequences comprising high-semantic requests, so that they may hardly trigger hard-to-reach states within a cloud service. To overcome this problem, we propose RESTLess, a flexible and efficient approach with hybrid optimization strategies for REST API fuzzing enhancement. Specifically, to pass the cloud gateway syntax semantic checking, we construct a dataset of valid parameters of REST API with Large Language Model named RTSet, then utilize it to develop an efficient REST API specification semantic enhancement approach. To detect vulnerability hidden under complex API operations, we design a flexible parameter rendering order optimization algorithm to increase the length and type of request sequences. Evaluation results highlight that RESTLess manifests noteworthy enhancements in the semantic quality of generated sequences in comparison to existing tools, thereby augmenting their capabilities in detecting vulnerabilities effectively. We also apply RESTLess to nine real-world cloud service such as Microsoft Azure, Amazon Web Services, Google Cloud, etc., and detecte 38 vulnerabilities, of which 16 have been confirmed and fixed by the relevant vendors.
REST API模糊测试是一种在云服务中自动检测漏洞的新兴方法。然而,现有的SOTA模糊器在生成包含高语义请求的长序列方面面临挑战,因此它们很难触发云服务中难以到达的状态。为了克服这个问题,我们提出了一种灵活有效的REST API模糊测试增强混合优化策略RESTLess。具体而言,为了通过云网关语法语义检查,我们利用RTSet大语言模型构建了REST API有效参数的数据集,并利用该数据集开发了一种高效的REST API规范语义增强方法。为了检测复杂API操作下隐藏的漏洞,我们设计了一种灵活的参数呈现顺序优化算法,增加请求序列的长度和类型。评估结果强调,与现有工具相比,RESTLess在生成序列的语义质量方面表现出显著的增强,从而增强了它们有效检测漏洞的能力。我们还将RESTLess应用于微软Azure、亚马逊Web服务、谷歌cloud等9个真实云服务,检测到38个漏洞,其中16个已被相关厂商确认并修复。
{"title":"RESTLess: Enhancing State-of-the-Art REST API Fuzzing With LLMs in Cloud Service Computing","authors":"Tao Zheng;Jiang Shao;Jinqiao Dai;Shuyu Jiang;Xingshu Chen;Changxiang Shen","doi":"10.1109/TSC.2024.3489441","DOIUrl":"10.1109/TSC.2024.3489441","url":null,"abstract":"REST API Fuzzing is an emerging approach for automated vulnerability detection in cloud services. However, existing SOTA fuzzers face challenges in generating lengthy sequences comprising high-semantic requests, so that they may hardly trigger hard-to-reach states within a cloud service. To overcome this problem, we propose RESTLess, a flexible and efficient approach with hybrid optimization strategies for REST API fuzzing enhancement. Specifically, to pass the cloud gateway syntax semantic checking, we construct a dataset of valid parameters of REST API with Large Language Model named RTSet, then utilize it to develop an efficient REST API specification semantic enhancement approach. To detect vulnerability hidden under complex API operations, we design a flexible parameter rendering order optimization algorithm to increase the length and type of request sequences. Evaluation results highlight that RESTLess manifests noteworthy enhancements in the semantic quality of generated sequences in comparison to existing tools, thereby augmenting their capabilities in detecting vulnerabilities effectively. We also apply RESTLess to nine real-world cloud service such as Microsoft Azure, Amazon Web Services, Google Cloud, etc., and detecte 38 vulnerabilities, of which 16 have been confirmed and fixed by the relevant vendors.","PeriodicalId":13255,"journal":{"name":"IEEE Transactions on Services Computing","volume":"17 6","pages":"4225-4238"},"PeriodicalIF":5.5,"publicationDate":"2024-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142563108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Transactions on Services Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1