Pub Date : 2013-07-22DOI: 10.1109/COMPSACW.2013.79
Masayuki Matsuoka, N. Yamai, K. Okayama, K. Kawano, Motonori Nakamura, Masato Minda
In recent years, many spam mails intending for ``One-click fraud" or ``Phishing" have been sent to many unspecified e-mail users. As one anti-spam technology, URL Blacklist based on the URLs in the spam mails is well used. However, spammers have been avoiding this technique by getting many new domains, using them only in a few spam mails, and throwing them away. In this paper, we focus on the domain registration date related to the URLs in the messages in order to improve the discrimination accuracy of spam mails. Thus, we address design and implementation of the domain registration date retrieval system which obtains domain lists from some Top Level Domain registries and records registration dates for each domain in the lists. With this system, we can retrieve the registration date of a domain by DNS.
{"title":"Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination","authors":"Masayuki Matsuoka, N. Yamai, K. Okayama, K. Kawano, Motonori Nakamura, Masato Minda","doi":"10.1109/COMPSACW.2013.79","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.79","url":null,"abstract":"In recent years, many spam mails intending for ``One-click fraud\" or ``Phishing\" have been sent to many unspecified e-mail users. As one anti-spam technology, URL Blacklist based on the URLs in the spam mails is well used. However, spammers have been avoiding this technique by getting many new domains, using them only in a few spam mails, and throwing them away. In this paper, we focus on the domain registration date related to the URLs in the messages in order to improve the discrimination accuracy of spam mails. Thus, we address design and implementation of the domain registration date retrieval system which obtains domain lists from some Top Level Domain registries and records registration dates for each domain in the lists. With this system, we can retrieve the registration date of a domain by DNS.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115034156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-22DOI: 10.1109/COMPSACW.2013.40
Eun-Sun Cho, Tae-Seob Yoon, Joong-Hyun Choi, Joon-Young Paik, A. Helal
Context-aware applications should consider the devices and networks engaged in the systems, as well as the complex control and data structures in the applications. This makes it not so straightforward to understand applications and to achieve the quality of applications, without well-defined formal model adequate to the intended goals. In this paper, we propose a formal model for context aware system, which provides device behaviors with temporal features, enriched with commonly used categorization of context. Thus this model enables integrated management of the interconnected devices with context information for a context-aware system, so as to be employed for the critical purposes like safety enhancement.
{"title":"An Integrated Formal Model for Context-Aware Systems","authors":"Eun-Sun Cho, Tae-Seob Yoon, Joong-Hyun Choi, Joon-Young Paik, A. Helal","doi":"10.1109/COMPSACW.2013.40","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.40","url":null,"abstract":"Context-aware applications should consider the devices and networks engaged in the systems, as well as the complex control and data structures in the applications. This makes it not so straightforward to understand applications and to achieve the quality of applications, without well-defined formal model adequate to the intended goals. In this paper, we propose a formal model for context aware system, which provides device behaviors with temporal features, enriched with commonly used categorization of context. Thus this model enables integrated management of the interconnected devices with context information for a context-aware system, so as to be employed for the critical purposes like safety enhancement.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116245084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
User behavioural data provides important cue for deficiencies in the current software design, and points for improvement in future design. Today's web based software services providers could collect different kinds of service usage data, which is a good source of information which can help developers better understand user's behaviours. This paper takes the example of the evolution of an online dictionary services, explores answers for questions such as: what are the key indicators with regard to the quality of software product design and service content, and how to enhance new product success by understandings obtained from user behavioural data analysis. In this paper, we first summarise the possible types of web log data that can be collected so far, Then we introduce a user behaviour model generated for the dictionary domain based on user behavioural data analysis, then we discuss how data collection function shall co-evolve with the online services, and how specific data analysis approaches such as mining algorithms and statistical functions can help generate interesting analysis results of value to design decision makers.
{"title":"Understanding Requirements for Online Services Based on Users' Behavioural Data Analysis","authors":"Qing Zhou, Lin Liu","doi":"10.1109/COMPSACW.2013.8","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.8","url":null,"abstract":"User behavioural data provides important cue for deficiencies in the current software design, and points for improvement in future design. Today's web based software services providers could collect different kinds of service usage data, which is a good source of information which can help developers better understand user's behaviours. This paper takes the example of the evolution of an online dictionary services, explores answers for questions such as: what are the key indicators with regard to the quality of software product design and service content, and how to enhance new product success by understandings obtained from user behavioural data analysis. In this paper, we first summarise the possible types of web log data that can be collected so far, Then we introduce a user behaviour model generated for the dictionary domain based on user behavioural data analysis, then we discuss how data collection function shall co-evolve with the online services, and how specific data analysis approaches such as mining algorithms and statistical functions can help generate interesting analysis results of value to design decision makers.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130224321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-22DOI: 10.1109/COMPSACW.2013.133
T. Kato, Hideyuki Takahashi, K. Sasai, Yujin Lim, Hak-Man Kim, G. Kitagata, Tetsuo Kinoshita
The electricity consumption in the world is constantly increasing, and our lives become more and more dependent on electricity. There are several new paradigms proposed in the field of power grid. In Japan, especially after the Great East Japan Earthquake in March 2011, the new power system paradigms are expected to be more resilient to survive several difficulties during a disaster situation. In this paper, we focus on microgrid and propose a new multiagent-based load shedding scheme and multiagent architecture to realize the resilient power grid. We developed a prototype system to evaluate our scheme, and performed an evaluation of our proposals. The result of the evaluation shows the effectiveness of our proposals, despite of the physical uncertainty.
{"title":"Multiagent System for Priority-Based Load Shedding in Microgrid","authors":"T. Kato, Hideyuki Takahashi, K. Sasai, Yujin Lim, Hak-Man Kim, G. Kitagata, Tetsuo Kinoshita","doi":"10.1109/COMPSACW.2013.133","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.133","url":null,"abstract":"The electricity consumption in the world is constantly increasing, and our lives become more and more dependent on electricity. There are several new paradigms proposed in the field of power grid. In Japan, especially after the Great East Japan Earthquake in March 2011, the new power system paradigms are expected to be more resilient to survive several difficulties during a disaster situation. In this paper, we focus on microgrid and propose a new multiagent-based load shedding scheme and multiagent architecture to realize the resilient power grid. We developed a prototype system to evaluate our scheme, and performed an evaluation of our proposals. The result of the evaluation shows the effectiveness of our proposals, despite of the physical uncertainty.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122254663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-22DOI: 10.1109/COMPSACW.2013.113
Andrea Calvagna, E. Tramontana
A component is usually complemented with guidelines expressing its proper use, e.g. the appropriate order of calls that clients should conform to. During reuse, clients could easily alter such an order, and this could result in reused components that become unreliable, since architectural guidelines have not been honoured. Sometimes architectural guidelines are simply unknown, hence whether components are misused by clients is uncertain. This paper proposes an approach to document the architectural guidelines that client classes should comply with when reusing a component. We empower component developers to provide such guidelines, conveying design decisions, along with the code of components in such a way to be apt to automatic checks. Then, clients compliance with architectural guidelines of reused components can be automatically checked by an aspect-based tool. As a result, proper usage of reused components can be ensured, and in turn the behaviour of components should be correct. This strengthen the reliability of the resulting system. Especially for continuous evolution, having automatic conformance checks is paramount for obtaining the correct behaviour of reused components.
{"title":"Delivering Dependable Reusable Components by Expressing and Enforcing Design Decisions","authors":"Andrea Calvagna, E. Tramontana","doi":"10.1109/COMPSACW.2013.113","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.113","url":null,"abstract":"A component is usually complemented with guidelines expressing its proper use, e.g. the appropriate order of calls that clients should conform to. During reuse, clients could easily alter such an order, and this could result in reused components that become unreliable, since architectural guidelines have not been honoured. Sometimes architectural guidelines are simply unknown, hence whether components are misused by clients is uncertain. This paper proposes an approach to document the architectural guidelines that client classes should comply with when reusing a component. We empower component developers to provide such guidelines, conveying design decisions, along with the code of components in such a way to be apt to automatic checks. Then, clients compliance with architectural guidelines of reused components can be automatically checked by an aspect-based tool. As a result, proper usage of reused components can be ensured, and in turn the behaviour of components should be correct. This strengthen the reliability of the resulting system. Especially for continuous evolution, having automatic conformance checks is paramount for obtaining the correct behaviour of reused components.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130428442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-22DOI: 10.1109/COMPSACW.2013.116
Chih-Hung Chang, Chih-Wei Lu, W. Chu, Xin-Hao Huang, Dianxiang Xu, Tse-Chuan Hsu, Yu-Bin Lai
In the process of software development, software testing is a huge project, and most of the software functionality testing is complex and repetitive, should to spend a lot of cost and manpower. Therefore, you can save a lot of manpower and costs, avoid human error and improve software quality if we can achieve automated testing. In the software development process, the application of model-driven developments has grown wider recently. The main concept is to fetch all of the significant properties referring to system design, and use formal or semi-formal model to describe system in different levels of abstraction. In this paper, we apply a tool based on high level Petri Net model of automated testing -- MISTA [1](Model based Integration and System Testing Automation) to automated generate test code for system. In this paper, through capture the information of the state machine diagram describes the behavior of the system in the Unified Modeling Language. Through the eXtensible Markup Language automation converted to High Level Petri Net test model, and then using automated test code generating software MISTA generation test cases and test code of system to achieve automated testing, and save the software required for testing a large number of human costs, and the software development process from design architecture to the software testing for a bridging.
{"title":"An UML Behavior Diagram Based Automatic Testing Approach","authors":"Chih-Hung Chang, Chih-Wei Lu, W. Chu, Xin-Hao Huang, Dianxiang Xu, Tse-Chuan Hsu, Yu-Bin Lai","doi":"10.1109/COMPSACW.2013.116","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.116","url":null,"abstract":"In the process of software development, software testing is a huge project, and most of the software functionality testing is complex and repetitive, should to spend a lot of cost and manpower. Therefore, you can save a lot of manpower and costs, avoid human error and improve software quality if we can achieve automated testing. In the software development process, the application of model-driven developments has grown wider recently. The main concept is to fetch all of the significant properties referring to system design, and use formal or semi-formal model to describe system in different levels of abstraction. In this paper, we apply a tool based on high level Petri Net model of automated testing -- MISTA [1](Model based Integration and System Testing Automation) to automated generate test code for system. In this paper, through capture the information of the state machine diagram describes the behavior of the system in the Unified Modeling Language. Through the eXtensible Markup Language automation converted to High Level Petri Net test model, and then using automated test code generating software MISTA generation test cases and test code of system to achieve automated testing, and save the software required for testing a large number of human costs, and the software development process from design architecture to the software testing for a bridging.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130450049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-22DOI: 10.1109/COMPSACW.2013.53
Rahena Akhter, Rownak Jahan Chowdhury, K. Emura, T. Islam, Mohammad Shahriar Rahman, Nusrat Rubaiyat
In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacy-preserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.
{"title":"Privacy-Preserving Two-Party k-Means Clustering in Malicious Model","authors":"Rahena Akhter, Rownak Jahan Chowdhury, K. Emura, T. Islam, Mohammad Shahriar Rahman, Nusrat Rubaiyat","doi":"10.1109/COMPSACW.2013.53","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.53","url":null,"abstract":"In data mining, clustering is a well-known and useful technique. One of the most powerful and frequently used techniques is k-means clustering. Most of the privacy-preserving solutions based on cryptography proposed by different researchers in recent years are in semi-honest model, where participating parties always follow the protocol. This model is realistic in many cases. But providing stonger solutions considering malicious model would be more useful for many practical applications because it tries to protect a protocol from arbitrary malicious behavior using cryptographic tools. In this paper, we have proposed a new protocol for privacy-preserving two-party k-means clustering in malicious model. We have used threshold homomorphic encryption and non-interactive zero knowledge protocols to construct our protocol according to real/ideal world paradigm.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134094912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-22DOI: 10.1109/COMPSACW.2013.122
Xiaocao Hu, Zhiyong Feng, Shizhan Chen
Semantic annotation for Web services represents an important approach that transforms Web services into Semantic Web services. This paper analyzes the distribution of implicit semantic information to enhance the understanding about Web services. After quantifying implicit semantic information in Web services, the PCA methodology is utilized for obtaining principal components of implicit semantic information. The experiment conducted on 11836 WSDL documentations shows that almost 97 percent of implicit semantic information is distributed in inputs and outputs. Thus, the evaluation of how much implicit semantic information can be described by semantic annotation is offered.
{"title":"Analyzing Distribution of Implicit Semantic Information in Web Services","authors":"Xiaocao Hu, Zhiyong Feng, Shizhan Chen","doi":"10.1109/COMPSACW.2013.122","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.122","url":null,"abstract":"Semantic annotation for Web services represents an important approach that transforms Web services into Semantic Web services. This paper analyzes the distribution of implicit semantic information to enhance the understanding about Web services. After quantifying implicit semantic information in Web services, the PCA methodology is utilized for obtaining principal components of implicit semantic information. The experiment conducted on 11836 WSDL documentations shows that almost 97 percent of implicit semantic information is distributed in inputs and outputs. Thus, the evaluation of how much implicit semantic information can be described by semantic annotation is offered.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"224 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133356815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-22DOI: 10.1109/COMPSACW.2013.76
Yasuhiro Ohishi, Kaori Maeda, Takemi Sahara, N. Hayashi, R. Aibara
In IP mobility communications, handoff is one of critical points degrading mobile communications quality. To solve this problem, many network selection methods have been proposed. We also proposed a network selection method in handoff and multi-homing to improve IP mobility communications quality. To select the best network interface or communication medium, it is required to obtain QoS criteria such as transmission delay time and packet loss ratio. The mobile node itself may measure real-time network status to obtain the criteria, or the mobile node may obtain statistical information stored in any database on the Internet. Though the criteria collection way affects much on network selection, it is not discussed in detail in the existing research. The purpose of this paper is to consider the difference types of network selection criteria from the viewpoint of effects on IP mobility communications quality. For this purpose, we first designed and implemented two prototype systems to obtain the different types of the criteria. One is a function to measure real-time network status in a mobile node itself. The other one is to obtain the stored statistical information in the database on the Internet. Next, we compare the two kinds of criteria by some field experiments. For the experiments, we also implemented a prototype system using both functions in our proposed IP mobility architecture. Through the experimental evaluations, we showed quantitative comparison of two types of network selection criteria by satisfaction ratio of QoS required by some applications.
{"title":"Consideration of Network Selection Criteria on IP Mobility Communications Quality by Real-Time Status and/or Statistical Information","authors":"Yasuhiro Ohishi, Kaori Maeda, Takemi Sahara, N. Hayashi, R. Aibara","doi":"10.1109/COMPSACW.2013.76","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.76","url":null,"abstract":"In IP mobility communications, handoff is one of critical points degrading mobile communications quality. To solve this problem, many network selection methods have been proposed. We also proposed a network selection method in handoff and multi-homing to improve IP mobility communications quality. To select the best network interface or communication medium, it is required to obtain QoS criteria such as transmission delay time and packet loss ratio. The mobile node itself may measure real-time network status to obtain the criteria, or the mobile node may obtain statistical information stored in any database on the Internet. Though the criteria collection way affects much on network selection, it is not discussed in detail in the existing research. The purpose of this paper is to consider the difference types of network selection criteria from the viewpoint of effects on IP mobility communications quality. For this purpose, we first designed and implemented two prototype systems to obtain the different types of the criteria. One is a function to measure real-time network status in a mobile node itself. The other one is to obtain the stored statistical information in the database on the Internet. Next, we compare the two kinds of criteria by some field experiments. For the experiments, we also implemented a prototype system using both functions in our proposed IP mobility architecture. Through the experimental evaluations, we showed quantitative comparison of two types of network selection criteria by satisfaction ratio of QoS required by some applications.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133812920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-07-22DOI: 10.1109/COMPSACW.2013.108
Yasuhiro Watashiba, S. Date, H. Abe, Koheix Ichikawa, Hiroaki Yamanaka, Eiji Kawai, H. Takemura
Whether to be able to efficiently utilize the interconnect in a cluster system is a key factor in deciding the computational performance especially for a class of jobs that require intensive communications between processes. However, most of Job Management Systems (JMSs), which are deployed on cluster systems for load-balancing, do not have any mechanism that takes the pattern and requirements of communication occurred in a job into consideration, regardless of potential large impact on its performance. In this research, we explore a novel JMS that can assign computing resources to jobs submitted to the JMS from a standpoint of efficient use of both network and processor resource. More technically, in this paper, a JMS that integrates the network programming functionality of OpenFlow as Software Defined Network is proposed and discussed towards better and more efficient allocation of computing and network resources.
{"title":"An Architectural Design of a Job Management System Leveraging Software Defined Network","authors":"Yasuhiro Watashiba, S. Date, H. Abe, Koheix Ichikawa, Hiroaki Yamanaka, Eiji Kawai, H. Takemura","doi":"10.1109/COMPSACW.2013.108","DOIUrl":"https://doi.org/10.1109/COMPSACW.2013.108","url":null,"abstract":"Whether to be able to efficiently utilize the interconnect in a cluster system is a key factor in deciding the computational performance especially for a class of jobs that require intensive communications between processes. However, most of Job Management Systems (JMSs), which are deployed on cluster systems for load-balancing, do not have any mechanism that takes the pattern and requirements of communication occurred in a job into consideration, regardless of potential large impact on its performance. In this research, we explore a novel JMS that can assign computing resources to jobs submitted to the JMS from a standpoint of efficient use of both network and processor resource. More technically, in this paper, a JMS that integrates the network programming functionality of OpenFlow as Software Defined Network is proposed and discussed towards better and more efficient allocation of computing and network resources.","PeriodicalId":152957,"journal":{"name":"2013 IEEE 37th Annual Computer Software and Applications Conference Workshops","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115338601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}