首页 > 最新文献

2012 IEEE Ninth International Conference on e-Business Engineering最新文献

英文 中文
The Business Model Ontology for Web 2.0 Websites Web 2.0网站的商业模型本体
Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.31
Yun Liu
The bursting of the dot-com bubble marked a turning point for the web. New kinds of websites sprung up and brought users different experiences, especially in user participation and openness. But academic journals have placed less emphasis on applications of Web 2.0 for business use. This paper tries to develop the business model of these new kinds of websites using ontology approach, which stresses the importance of the social network. Furthermore, this paper suggests using this business model to guide the development of the Web 2.0 website.
互联网泡沫的破裂标志着互联网的一个转折点。新型网站如雨后春笋般涌现,给用户带来了不同的体验,尤其是在用户参与度和开放性方面。但是学术期刊很少强调Web 2.0的商业应用。本文尝试用本体的方法开发这些新型网站的商业模式,强调了社交网络的重要性。进一步,本文建议使用这种商业模式来指导Web 2.0网站的开发。
{"title":"The Business Model Ontology for Web 2.0 Websites","authors":"Yun Liu","doi":"10.1109/ICEBE.2012.31","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.31","url":null,"abstract":"The bursting of the dot-com bubble marked a turning point for the web. New kinds of websites sprung up and brought users different experiences, especially in user participation and openness. But academic journals have placed less emphasis on applications of Web 2.0 for business use. This paper tries to develop the business model of these new kinds of websites using ontology approach, which stresses the importance of the social network. Furthermore, this paper suggests using this business model to guide the development of the Web 2.0 website.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117063894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Scalable and Elastic Business Event Processing System 一个可伸缩和弹性的业务事件处理系统
Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.58
Ming Li, Liangzhao Zeng
The event processing system discussed in this paper updates target objects' state according to corresponding events. It is widely used in areas such as activity monitoring, business process automation, and business object state management. Existing event driven systems usually employ centralized single-server architecture, which is not scalable, elastic or robust enough to handle highly dynamic workload. In this paper, we propose a cloud-based event driven system that is highly scalable and elastic, and can tolerate even severe system failures. Our event driven system takes advantage of cloud technologies and adopts a completely distributed architecture. It therefore can scale to large number of servers in the cloud quickly with minimum administration overhead. Results from extensive evaluations show that our system's performance grows almost linearly with the number of servers in the system. Our system performs more than one order of magnitude better than a full-replication-based distributed event driven system of the same system scale.
本文讨论的事件处理系统根据相应的事件更新目标对象的状态。它广泛用于活动监视、业务流程自动化和业务对象状态管理等领域。现有的事件驱动系统通常采用集中式单服务器架构,这种架构不具备可伸缩性、弹性或健壮性,无法处理高度动态的工作负载。在本文中,我们提出了一个基于云的事件驱动系统,它具有高度的可伸缩性和弹性,甚至可以容忍严重的系统故障。我们的事件驱动系统利用了云技术,采用了完全分布式的架构。因此,它可以以最小的管理开销快速扩展到云中的大量服务器。广泛评估的结果表明,我们的系统性能随着系统中服务器数量的增加几乎呈线性增长。我们的系统比相同系统规模的基于完全复制的分布式事件驱动系统的性能要好一个数量级以上。
{"title":"A Scalable and Elastic Business Event Processing System","authors":"Ming Li, Liangzhao Zeng","doi":"10.1109/ICEBE.2012.58","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.58","url":null,"abstract":"The event processing system discussed in this paper updates target objects' state according to corresponding events. It is widely used in areas such as activity monitoring, business process automation, and business object state management. Existing event driven systems usually employ centralized single-server architecture, which is not scalable, elastic or robust enough to handle highly dynamic workload. In this paper, we propose a cloud-based event driven system that is highly scalable and elastic, and can tolerate even severe system failures. Our event driven system takes advantage of cloud technologies and adopts a completely distributed architecture. It therefore can scale to large number of servers in the cloud quickly with minimum administration overhead. Results from extensive evaluations show that our system's performance grows almost linearly with the number of servers in the system. Our system performs more than one order of magnitude better than a full-replication-based distributed event driven system of the same system scale.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123331251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Empirical Study of Customer Loyalty to Internet Banking in China 中国网上银行客户忠诚度的实证研究
Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.16
Yongbing Jiao, Jian Yang, Zhanfeng Zhu
The rapid development of information technology and the severe competition of the bank industry make the internet banking become a new service channel for Chinese banks to acquire new customers and to retain the existing customers. Because the larger part of the profit in internet banking is from the existing customers, Chinese banks have been making their great efforts in order to win the market share by means of retaining loyal customers in recent years. Meanwhile, the studies as to the factors affecting the customer loyalty to internet banking are arousing the interest and attention of more and more scholars in China. This study is to try to find the factors affecting customer loyalty in internet banking, i.e., to investigate the roles of trust and satisfaction in customer loyalty to internet banking in China theoretically and empirically. A model is built with customer loyalty as the endogenous variable, with service quality, brand image and perceived value as exogenous variables, and with satisfaction and trust as mediating variables. Based on data from a sample of 429 internet banking customers collected through a field and an online survey, the results find all the causal relationships in the model significant by using structural equation modeling. Theoretical and managerial implications are provided at the end of the study.
信息技术的飞速发展和银行业竞争的激烈,使得网上银行成为我国银行获取新客户和保留现有客户的一种新的服务渠道。由于网上银行的大部分利润来自于现有客户,近年来,中国各银行一直在努力通过留住忠实客户来赢得市场份额。与此同时,网上银行客户忠诚度影响因素的研究也引起了国内越来越多学者的兴趣和关注。本研究试图寻找影响网上银行客户忠诚的因素,即从理论和实证两方面考察信任和满意度在中国网上银行客户忠诚中的作用。以顾客忠诚度为内生变量,以服务质量、品牌形象和感知价值为外生变量,以满意度和信任为中介变量构建模型。通过实地调查和网络调查,对429个网络银行客户样本进行数据分析,采用结构方程模型,发现模型中的因果关系均显著。在研究的最后提供了理论和管理意义。
{"title":"An Empirical Study of Customer Loyalty to Internet Banking in China","authors":"Yongbing Jiao, Jian Yang, Zhanfeng Zhu","doi":"10.1109/ICEBE.2012.16","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.16","url":null,"abstract":"The rapid development of information technology and the severe competition of the bank industry make the internet banking become a new service channel for Chinese banks to acquire new customers and to retain the existing customers. Because the larger part of the profit in internet banking is from the existing customers, Chinese banks have been making their great efforts in order to win the market share by means of retaining loyal customers in recent years. Meanwhile, the studies as to the factors affecting the customer loyalty to internet banking are arousing the interest and attention of more and more scholars in China. This study is to try to find the factors affecting customer loyalty in internet banking, i.e., to investigate the roles of trust and satisfaction in customer loyalty to internet banking in China theoretically and empirically. A model is built with customer loyalty as the endogenous variable, with service quality, brand image and perceived value as exogenous variables, and with satisfaction and trust as mediating variables. Based on data from a sample of 429 internet banking customers collected through a field and an online survey, the results find all the causal relationships in the model significant by using structural equation modeling. Theoretical and managerial implications are provided at the end of the study.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125306465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Approximate Keyword-based Search over Encrypted Cloud Data 基于加密云数据的近似关键字搜索
Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.46
Ayad Ibrahim, Hai Jin, A. Yassin, Deqing Zou
To protect the privacy, users have to encrypt their sensitive data before outsourcing it to the cloud. However, the traditional encryption schemes are inadequate since they make the application of indexing and searching operations more challenging tasks. Accordingly, searchable encryption systems are developed to conduct search operations over a set of encrypted data. Unfortunately, these systems only allow their clients to perform an exact search but not approximate search, an important need for all the current information retrieval systems. Recently, an increased attention has been paid to the approximate searchable encryption systems to find keywords that match the submitted queries approximately. Our work focuses on constructing a flexible secure index that allows the cloud server to perform the approximate search operations without revealing the content of the query trapdoor or the index content. Specifically, the most recently cryptographic primitive, order preserving symmetric encryption (OPSE), has been employed to protect our keywords. Our proposed scheme divides the search operation into two steps. The first step finds the candidate list in terms of secure pruning codes. In particular, we have developed two methods to construct these pruning codes. The second step uses a semi honest third party to determine the best matching keyword depending on secure similarity function. We intend to reveal as little information as possible to that third party. We hope that developing such a system will enhance the utilization of retrieval information systems and make these systems more user-friendly.
为了保护隐私,用户必须在将敏感数据外包到云端之前对其进行加密。然而,传统的加密方案是不够的,因为它们使索引和搜索操作的应用更具挑战性。因此,开发了可搜索的加密系统以对一组加密数据进行搜索操作。不幸的是,这些系统只允许其客户执行精确搜索,而不允许执行近似搜索,这是当前所有信息检索系统的一个重要需求。近年来,人们越来越关注近似可搜索加密系统,以寻找与提交的查询近似匹配的关键字。我们的工作重点是构建一个灵活的安全索引,该索引允许云服务器执行近似搜索操作,而不会泄露查询陷门的内容或索引内容。具体来说,最近的密码原语,保序对称加密(OPSE),已被用于保护我们的关键字。我们提出的方案将搜索操作分为两个步骤。第一步根据安全修剪代码找到候选列表。特别是,我们开发了两种方法来构建这些修剪代码。第二步使用半诚实的第三方根据安全相似度函数确定最佳匹配关键字。我们打算向第三方透露尽可能少的信息。我们希望开发这样一个系统将提高检索信息系统的利用率,并使这些系统更加用户友好。
{"title":"Approximate Keyword-based Search over Encrypted Cloud Data","authors":"Ayad Ibrahim, Hai Jin, A. Yassin, Deqing Zou","doi":"10.1109/ICEBE.2012.46","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.46","url":null,"abstract":"To protect the privacy, users have to encrypt their sensitive data before outsourcing it to the cloud. However, the traditional encryption schemes are inadequate since they make the application of indexing and searching operations more challenging tasks. Accordingly, searchable encryption systems are developed to conduct search operations over a set of encrypted data. Unfortunately, these systems only allow their clients to perform an exact search but not approximate search, an important need for all the current information retrieval systems. Recently, an increased attention has been paid to the approximate searchable encryption systems to find keywords that match the submitted queries approximately. Our work focuses on constructing a flexible secure index that allows the cloud server to perform the approximate search operations without revealing the content of the query trapdoor or the index content. Specifically, the most recently cryptographic primitive, order preserving symmetric encryption (OPSE), has been employed to protect our keywords. Our proposed scheme divides the search operation into two steps. The first step finds the candidate list in terms of secure pruning codes. In particular, we have developed two methods to construct these pruning codes. The second step uses a semi honest third party to determine the best matching keyword depending on secure similarity function. We intend to reveal as little information as possible to that third party. We hope that developing such a system will enhance the utilization of retrieval information systems and make these systems more user-friendly.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126371201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Advanced Rapid Alert System for Food Safety 先进的食品安全快速警报系统
Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.66
W. Y. Law, Dickson K. W. Chiu, Haiyang Hu, Yi Zhuang, Hua Hu
Globalization of food production has increased the possibility of public health incidents, involving food contaminated with pathogens or chemicals. In recent years, food poisoning and improper handling of food has caused food safety incidents of international concern. Therefore, rapid access and exchange of food safety alerts is crucial for maintaining consumer confidence in the food supply. In this paper, we introduce an Advanced Rapid Alert System (ARAS) to effectively deliver food safety alerts in a timely manner with structured information to identify affected trades related to problematic food lots and prevent them from selling as soon as possible. The ARAS requires information integration from various government departments and public services through Web services and Service Oriented Architecture (SOA), such as maintaining the databases of food lot, laboratory test results, and food tradesâ information. The ARAS also interacts with the call center through alert mechanisms to integrate incident reporting processes. Moreover, smart phones act as ARAS clients to receive alerts anytime anywhere. Our case study demonstrates the effectiveness of information management through the use of Web services, alerts, and mobile devices in our ARAS framework.
粮食生产的全球化增加了公共卫生事件发生的可能性,这些事件涉及被病原体或化学品污染的食品。近年来,食物中毒和食物处理不当引发了国际关注的食品安全事件。因此,快速获取和交换食品安全警报对于维持消费者对食品供应的信心至关重要。在本文中,我们引入了一个先进的快速警报系统(ARAS),以有效地及时发出食品安全警报,并提供结构化信息,以识别与问题食品批次相关的受影响行业,并尽快阻止他们销售。ARAS需要通过Web服务和面向服务的体系结构(SOA)来集成来自各个政府部门和公共服务的信息,例如维护食品批号数据库、实验室测试结果数据库和食品贸易信息数据库。ARAS还通过警报机制与呼叫中心进行交互,以集成事件报告流程。此外,智能手机充当ARAS客户端,随时随地接收警报。我们的案例研究演示了通过在我们的ARAS框架中使用Web服务、警报和移动设备进行信息管理的有效性。
{"title":"An Advanced Rapid Alert System for Food Safety","authors":"W. Y. Law, Dickson K. W. Chiu, Haiyang Hu, Yi Zhuang, Hua Hu","doi":"10.1109/ICEBE.2012.66","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.66","url":null,"abstract":"Globalization of food production has increased the possibility of public health incidents, involving food contaminated with pathogens or chemicals. In recent years, food poisoning and improper handling of food has caused food safety incidents of international concern. Therefore, rapid access and exchange of food safety alerts is crucial for maintaining consumer confidence in the food supply. In this paper, we introduce an Advanced Rapid Alert System (ARAS) to effectively deliver food safety alerts in a timely manner with structured information to identify affected trades related to problematic food lots and prevent them from selling as soon as possible. The ARAS requires information integration from various government departments and public services through Web services and Service Oriented Architecture (SOA), such as maintaining the databases of food lot, laboratory test results, and food tradesâ information. The ARAS also interacts with the call center through alert mechanisms to integrate incident reporting processes. Moreover, smart phones act as ARAS clients to receive alerts anytime anywhere. Our case study demonstrates the effectiveness of information management through the use of Web services, alerts, and mobile devices in our ARAS framework.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133223415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Usage of Network Bandwidth in the Cloud Architecture 云架构下网络带宽的有效利用
Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.62
Rick C. S. Chen, Chung-Ting Kao, Hui-Kuang Chung
The cloud computing emphasizes that any resources can be services provided to users. For IaaS, virtualization technologies leverage the use of hardware to serve users without complicated applying procedures. As we know, any physical resources, such as CPU, memory or bandwidth, are precious in general so that they should be used as well as possible. Many researches hence are booming aiming at performance enhancement, especially for cloud networking. The paper presents hardware and software-based concepts to let virtual machines use bandwidth of physical machines under best-effort provisioning. The result can benefit IaaS architecture running from less waste of bandwidth.
云计算强调任何资源都可以作为服务提供给用户。对于IaaS,虚拟化技术利用硬件为用户提供服务,而无需复杂的应用程序。正如我们所知,任何物理资源,如CPU、内存或带宽,通常都是宝贵的,因此应该尽可能地利用它们。因此,许多针对性能增强的研究正在蓬勃发展,特别是针对云网络。本文提出了基于硬件和软件的概念,使虚拟机在尽力而为的情况下使用物理机的带宽。其结果可以使IaaS架构从更少的带宽浪费中受益。
{"title":"Efficient Usage of Network Bandwidth in the Cloud Architecture","authors":"Rick C. S. Chen, Chung-Ting Kao, Hui-Kuang Chung","doi":"10.1109/ICEBE.2012.62","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.62","url":null,"abstract":"The cloud computing emphasizes that any resources can be services provided to users. For IaaS, virtualization technologies leverage the use of hardware to serve users without complicated applying procedures. As we know, any physical resources, such as CPU, memory or bandwidth, are precious in general so that they should be used as well as possible. Many researches hence are booming aiming at performance enhancement, especially for cloud networking. The paper presents hardware and software-based concepts to let virtual machines use bandwidth of physical machines under best-effort provisioning. The result can benefit IaaS architecture running from less waste of bandwidth.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128889811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology and Tool Design for Building Return on Investment Models for IT Transformations 为IT转换建立投资回报模型的方法和工具设计
Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.37
Chang-Shing Perng, Rong N. Chang
For any IT transformation with significant investment, economic analysis is essential for justifying the risks and expenditures. Much cost modeling has been done for various types of IT transformations, each looks into the unique aspects of the concerned domains. This paper takes a different direction and proposes a general methodology named PANROI for quickly constructing ROI/TCO models to be used in the field. A declarative language, Excedo, is proposed for expressing the model logic and building the user interface. We present a case study on building an ROI model for cloud computing using the methodology and Excedo.
对于任何具有重大投资的IT转换,经济分析对于证明风险和支出是必要的。已经为各种类型的IT转换进行了大量的成本建模,每一种都着眼于相关领域的独特方面。本文采取了不同的方向,提出了一种名为PANROI的通用方法,用于快速构建ROI/TCO模型。提出了一种声明性语言Excedo,用于表达模型逻辑和构建用户界面。我们提出了一个使用该方法和Excedo构建云计算ROI模型的案例研究。
{"title":"Methodology and Tool Design for Building Return on Investment Models for IT Transformations","authors":"Chang-Shing Perng, Rong N. Chang","doi":"10.1109/ICEBE.2012.37","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.37","url":null,"abstract":"For any IT transformation with significant investment, economic analysis is essential for justifying the risks and expenditures. Much cost modeling has been done for various types of IT transformations, each looks into the unique aspects of the concerned domains. This paper takes a different direction and proposes a general methodology named PANROI for quickly constructing ROI/TCO models to be used in the field. A declarative language, Excedo, is proposed for expressing the model logic and building the user interface. We present a case study on building an ROI model for cloud computing using the methodology and Excedo.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126982721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design Dynamic Data Allocation Scheduler to Improve MapReduce Performance in Heterogeneous Clouds 设计动态数据分配调度器以提高异构云环境下MapReduce的性能
Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.50
Shin-Jer Yang, Yi-Ru Chen, Yung-Ming Hsieh
This paper conducts a thorough research on one of the critical technologies in cloud computing, MapReduce programming model. Some of past research results showed that their methods can be executed through allocating identical tasks to each cloud node for enhancing MapReduce performance. However, such allocations are not applicable for the environment of heterogeneous cloud. Due to the different computing power and system resources between the nodes, such uniform distribution of tasks will lower the performance between nodes, and hence this paper makes improvement on the original speculative execution method of Hadoop and LATE Scheduler by proposing a new scheduling scheme known as Dynamic Data Allocation Scheduler (DDAS). DDAS adopts more accurate methods to determine the response time and backup task that affect the system, which is expected to enhance the success ratio of backup tasks and thereby to effectively increase the system ability to respond. Three different simulation experiments are performed and the using of DDAS scheme proves that that DDAS can reduce 30%, 18% and 21% of execution time relative to Hadoop. Also, the DDAS shows a more accurate speculative execution and reasonable allocation of backup tasks. Hence, DDAS can effectively enhance the performance of MapReduce processing in heterogeneous Cloud environment.
本文对云计算的关键技术之一MapReduce编程模型进行了深入的研究。过去的一些研究结果表明,他们的方法可以通过向每个云节点分配相同的任务来执行,以提高MapReduce的性能。但是,这种分配方式并不适用于异构云环境。由于节点之间的计算能力和系统资源不同,这种任务的均匀分布会降低节点之间的性能,因此本文对Hadoop和LATE Scheduler原有的推测执行方法进行了改进,提出了一种新的调度方案动态数据分配调度(Dynamic Data Allocation Scheduler, DDAS)。DDAS采用更精确的方法来确定影响系统的响应时间和备份任务,期望提高备份任务的成功率,从而有效地提高系统的响应能力。通过三种不同的仿真实验,DDAS方案的使用证明DDAS方案相对于Hadoop可以减少30%、18%和21%的执行时间。此外,DDAS还显示了更准确的推测执行和合理的备份任务分配。因此,DDAS可以有效地提高异构云环境下MapReduce的处理性能。
{"title":"Design Dynamic Data Allocation Scheduler to Improve MapReduce Performance in Heterogeneous Clouds","authors":"Shin-Jer Yang, Yi-Ru Chen, Yung-Ming Hsieh","doi":"10.1109/ICEBE.2012.50","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.50","url":null,"abstract":"This paper conducts a thorough research on one of the critical technologies in cloud computing, MapReduce programming model. Some of past research results showed that their methods can be executed through allocating identical tasks to each cloud node for enhancing MapReduce performance. However, such allocations are not applicable for the environment of heterogeneous cloud. Due to the different computing power and system resources between the nodes, such uniform distribution of tasks will lower the performance between nodes, and hence this paper makes improvement on the original speculative execution method of Hadoop and LATE Scheduler by proposing a new scheduling scheme known as Dynamic Data Allocation Scheduler (DDAS). DDAS adopts more accurate methods to determine the response time and backup task that affect the system, which is expected to enhance the success ratio of backup tasks and thereby to effectively increase the system ability to respond. Three different simulation experiments are performed and the using of DDAS scheme proves that that DDAS can reduce 30%, 18% and 21% of execution time relative to Hadoop. Also, the DDAS shows a more accurate speculative execution and reasonable allocation of backup tasks. Hence, DDAS can effectively enhance the performance of MapReduce processing in heterogeneous Cloud environment.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115584354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Resource Oriented Composite Transactions 面向资源的复合交易
Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.51
R. Liu, Xin Sheng Mao
Composite transaction is a set of two or more related transactions managed in a coordinated logical unit of work. Composite transaction can span multiple data sources or multiple databases. Sometime, we use composite transaction only because we want to split long transactions into short transactions for less lock and more concurrency. In a very large scale distributed system, all of these are valid reasons to use composite transactions. There are different models for composite transaction. Distributed transaction model is widely used in practice since XA specification was released in 1991. However XA specification is notorious for heavy performance cost. To deal with internet scale transaction systems, we have to have some compromised solutions for both performance and consistency considerations. In this paper, we described the methodology and transaction programming model to simplify the system design and provide several guidelines for very large scale distributed transaction systems. We also described the differences between this design model and existing models for composite transaction including distributed transactions (XA 2PC), Sagas and federated transactions. Our design model is practicable and supports true concurrency. It targets at a special type of composite transactions named "Resource Oriented Composite Transaction" (ROCT) which is very common in banking systems, e-commerce systems, airline ticket-sale system, and etc. And our new transaction programming model can be widely used for this type of composite transactions.
复合事务是在一个协调的逻辑工作单元中管理的两个或多个相关事务的集合。复合事务可以跨越多个数据源或多个数据库。有时,我们使用复合事务只是因为我们想把长事务拆分成短事务,以减少锁和提高并发性。在超大规模的分布式系统中,所有这些都是使用复合事务的正当理由。复合事务有不同的模型。自 1991 年发布 XA 规范以来,分布式事务模型在实践中被广泛使用。不过,XA 规范因性能代价高而臭名昭著。要处理互联网规模的事务系统,我们必须在性能和一致性两方面都有一些折中的解决方案。在本文中,我们介绍了简化系统设计的方法和事务编程模型,并为超大规模分布式事务系统提供了若干指导。我们还描述了该设计模型与现有的复合事务模型(包括分布式事务(XA 2PC)、Sagas 和联合事务)之间的区别。我们的设计模型切实可行,支持真正的并发性。它针对的是一种名为 "面向资源的复合事务"(ROCT)的特殊类型的复合事务,这种事务在银行系统、电子商务系统、机票销售系统等中非常常见。我们的新事务编程模型可广泛用于这类复合事务。
{"title":"Resource Oriented Composite Transactions","authors":"R. Liu, Xin Sheng Mao","doi":"10.1109/ICEBE.2012.51","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.51","url":null,"abstract":"Composite transaction is a set of two or more related transactions managed in a coordinated logical unit of work. Composite transaction can span multiple data sources or multiple databases. Sometime, we use composite transaction only because we want to split long transactions into short transactions for less lock and more concurrency. In a very large scale distributed system, all of these are valid reasons to use composite transactions. There are different models for composite transaction. Distributed transaction model is widely used in practice since XA specification was released in 1991. However XA specification is notorious for heavy performance cost. To deal with internet scale transaction systems, we have to have some compromised solutions for both performance and consistency considerations. In this paper, we described the methodology and transaction programming model to simplify the system design and provide several guidelines for very large scale distributed transaction systems. We also described the differences between this design model and existing models for composite transaction including distributed transactions (XA 2PC), Sagas and federated transactions. Our design model is practicable and supports true concurrency. It targets at a special type of composite transactions named \"Resource Oriented Composite Transaction\" (ROCT) which is very common in banking systems, e-commerce systems, airline ticket-sale system, and etc. And our new transaction programming model can be widely used for this type of composite transactions.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131479280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unified Threat Management System Approach for Securing SME's Network Infrastructure 中小企业网络基础设施安全的统一威胁管理系统方法
Pub Date : 2012-09-09 DOI: 10.1109/ICEBE.2012.36
Saqib Ali, Maitham H. Al Lawati, Syed J. Naqvi
For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEâs), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure threats and have proposed an approach for securing SMEâs network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible threats.
在过去的几十年里,对于许多大大小小的实体来说,信息系统和技术已经成为其业务的一个组成部分,并在急剧改变和经常改进其业务流程方面发挥了重要作用。随着计算机越来越多地融入我们的商业组织,我们最终会把机密、重要的商业和敏感信息留在电脑上。一般来说,较大的组织拥有技术专长和资源来更好地保护计算服务。然而,中小型企业(sme)通常缺乏平台、基础设施、技术专长和所需的财务资源,无法利用现代安全技术进行计算服务。本文讨论了网络安全的重要性,分析了对网络基础设施的不同类型的威胁,可用于减轻网络基础设施威胁的不同方法,并提出了保护中小企业网络基础设施的方法。该方法建议将统一威胁管理(UTM)作为保护网络的第一道防线,它基于每个分配交换机层之间的链接,提供基于区域的监控系统,以防止网络受到任何可能的威胁。
{"title":"Unified Threat Management System Approach for Securing SME's Network Infrastructure","authors":"Saqib Ali, Maitham H. Al Lawati, Syed J. Naqvi","doi":"10.1109/ICEBE.2012.36","DOIUrl":"https://doi.org/10.1109/ICEBE.2012.36","url":null,"abstract":"For many smaller and larger entities over the last couple of decades, information systems and technologies have become an integral part of their operations and played a major role in drastically changing and often improving their business processes. As computers become more and more integrated into our business organizations, we end up leaving and storing confidential, vital business and sensitive information on them. In general, larger organizations have the technical expertise and resources to better secure computing services. The Small to Medium Enterprises (SMEâs), however, often lack the platforms, infrastructure, technical expertise, and the required financial resources to be able to utilize modern secure technologies for computing services. This paper discussed the importance of network security, analyzed different type of threats to network infrastructure, different methodologies that can be used to mitigate network infrastructure threats and have proposed an approach for securing SMEâs network infrastructure. This approach suggested Unified Threat Management (UTM) as the first line of protection to the network, based on the links between each distribution switch layers which offers a zone based monitoring and controlling system to prevent the network from any possible threats.","PeriodicalId":166304,"journal":{"name":"2012 IEEE Ninth International Conference on e-Business Engineering","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124963000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2012 IEEE Ninth International Conference on e-Business Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1