首页 > 最新文献

2009 Fourth ChinaGrid Annual Conference最新文献

英文 中文
A Collaborative Filtering Recommendation Model Using Polynomial Regression Approach 基于多项式回归的协同过滤推荐模型
Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.34
Houkun Zhu, Yuan Luo, Chuliang Weng, Minglu Li
In gird environment, collaborative filtering (CF) could be used for security recommendation when grid users face plenty of unknown security grid services. Also, CF recommender systems could be employed in the virtual machines managing platform to measure the creditability of each virtual machine. In this study, a polynomial regression based recommendation model on the basis of typical user-based CF is built to make security recommendation. In the model, a cluster of recommendation algorithms based on polynomial regression are derived according to various regression orders and dataset sizes. From our experiments, three significant conclusions are discovered in this model. Firstly, algorithms with lower regression orders make better predictions. Secondly, among algorithms with each fixed regression order, the best one satisfies that its dataset size is equal to its regression order in general. Thirdly, selecting appropriate regression order and dataset size could enhance recommendation quality.
在网格环境中,当网格用户面临大量未知的安全网格服务时,协同过滤(CF)可以用于安全推荐。此外,CF推荐系统可以应用于虚拟机管理平台中,对每个虚拟机的可信度进行度量。本研究在典型的基于用户的CF的基础上,构建了基于多项式回归的推荐模型进行安全推荐。在该模型中,根据不同的回归顺序和数据集大小,导出了基于多项式回归的推荐算法聚类。从实验中,我们发现了三个重要的结论。首先,回归阶数越低的算法预测效果越好。其次,在每个固定回归顺序的算法中,最好的算法通常满足其数据集大小与其回归顺序相等。第三,选择合适的回归顺序和数据集大小可以提高推荐质量。
{"title":"A Collaborative Filtering Recommendation Model Using Polynomial Regression Approach","authors":"Houkun Zhu, Yuan Luo, Chuliang Weng, Minglu Li","doi":"10.1109/ChinaGrid.2009.34","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.34","url":null,"abstract":"In gird environment, collaborative filtering (CF) could be used for security recommendation when grid users face plenty of unknown security grid services. Also, CF recommender systems could be employed in the virtual machines managing platform to measure the creditability of each virtual machine. In this study, a polynomial regression based recommendation model on the basis of typical user-based CF is built to make security recommendation. In the model, a cluster of recommendation algorithms based on polynomial regression are derived according to various regression orders and dataset sizes. From our experiments, three significant conclusions are discovered in this model. Firstly, algorithms with lower regression orders make better predictions. Secondly, among algorithms with each fixed regression order, the best one satisfies that its dataset size is equal to its regression order in general. Thirdly, selecting appropriate regression order and dataset size could enhance recommendation quality.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122768206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Data-Intensive Workflow Scheduling Algorithm for Grid Computing 网格计算中一种数据密集型工作流调度算法
Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.30
Meng Xu, Li-zhen Cui, Haiyang Wang, Yanbing Bi, Ji Bian
The data-intensive workflow in scientific and enterprise grids has gained popularity in recent times. Data-intensive workflow needs to access, process and transfer large datasets that may each be replicated on different data hosts. Because of the large data sets, the execution time is bounded by the cost of data transfer. Minimizing the time of transferring these datasets to the computational resources where the tasks of workflow are executed requires that appropriate computational and data resources be selected. In this paper, we introduce an algorithm MDTT to select the resource set which the task should be mapped. Our experiments show that our algorithm is able to minimize the total makespan of data-intensive workflow and the time of data transferring.
近年来,科学和企业网格中的数据密集型工作流越来越受欢迎。数据密集型工作流需要访问、处理和传输可能在不同数据主机上复制的大型数据集。由于数据集很大,执行时间受到数据传输成本的限制。为了最大限度地减少将这些数据集传输到执行工作流任务的计算资源的时间,需要选择适当的计算和数据资源。在本文中,我们引入了一种MDTT算法来选择任务需要映射的资源集。实验表明,该算法能够最大限度地减少数据密集型工作流的总完工时间和数据传输时间。
{"title":"A Data-Intensive Workflow Scheduling Algorithm for Grid Computing","authors":"Meng Xu, Li-zhen Cui, Haiyang Wang, Yanbing Bi, Ji Bian","doi":"10.1109/ChinaGrid.2009.30","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.30","url":null,"abstract":"The data-intensive workflow in scientific and enterprise grids has gained popularity in recent times. Data-intensive workflow needs to access, process and transfer large datasets that may each be replicated on different data hosts. Because of the large data sets, the execution time is bounded by the cost of data transfer. Minimizing the time of transferring these datasets to the computational resources where the tasks of workflow are executed requires that appropriate computational and data resources be selected. In this paper, we introduce an algorithm MDTT to select the resource set which the task should be mapped. Our experiments show that our algorithm is able to minimize the total makespan of data-intensive workflow and the time of data transferring.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
STBucket: A Self-Tuning Bucket Index in DAS Paradigm STBucket: DAS范式中的自调优桶索引
Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.38
Haocong Wang, Xiaoyong Du, Jieping Wang, Pingping Yang
In the Database-As-a-Service (DAS) paradigm, data owners outsource their data to the third-party service provider. Since the service provider is untrusted, the data should be encrypted before outsourced. Various approaches have been proposed to query on encrypted data, among which bucket based method is effective. However, previous researches just look at the data distribution with respect to a given workload, which is ineffective in changing workload behaviors. In this paper, we propose a Self-Tuning Bucket scheme: STBucket. By gathering and analyzing query feedback, STBucket achieves adaptation to workload through online bucket splitting and merging. Experimental results show that STBucket is workload aware and performs well with reasonable overhead.)
在数据库即服务(DAS)范例中,数据所有者将其数据外包给第三方服务提供者。由于服务提供者不受信任,因此应该在外包之前对数据进行加密。对加密数据的查询提出了多种方法,其中基于桶的方法是一种有效的方法。然而,以往的研究只关注给定工作负载下的数据分布,这对于改变工作负载行为是无效的。在本文中,我们提出了一个自调优桶方案:STBucket。通过收集和分析查询反馈,STBucket通过在线桶拆分和合并实现对工作负载的适应。实验结果表明,STBucket具有工作负载感知能力,在合理的开销下性能良好。
{"title":"STBucket: A Self-Tuning Bucket Index in DAS Paradigm","authors":"Haocong Wang, Xiaoyong Du, Jieping Wang, Pingping Yang","doi":"10.1109/ChinaGrid.2009.38","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.38","url":null,"abstract":"In the Database-As-a-Service (DAS) paradigm, data owners outsource their data to the third-party service provider. Since the service provider is untrusted, the data should be encrypted before outsourced. Various approaches have been proposed to query on encrypted data, among which bucket based method is effective. However, previous researches just look at the data distribution with respect to a given workload, which is ineffective in changing workload behaviors. In this paper, we propose a Self-Tuning Bucket scheme: STBucket. By gathering and analyzing query feedback, STBucket achieves adaptation to workload through online bucket splitting and merging. Experimental results show that STBucket is workload aware and performs well with reasonable overhead.)","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127476409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Realcouse2.0: From Fully Connected Topology to Multiple Overlapping Stars Realcouse2.0:从完全连接的拓扑到多个重叠的星星
Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.17
Jinyu Zhang, Xiaoming Li
We present the second version of Realcourse. Realcourse is a cooperative Internet video publishing and delivery system used by more than thirty Chinese universities to share course videos. The design of Realcourse bears the following assumptions 1) the system is supposed to consists of hundreds of unreliable but controllable servers where temporal failures are common, permanent failures are rare, 2) videos are concurrently uploaded to local servers but their metadata are broadcasted to all servers, 3) users are connected to and served by local servers but should be able to watch all the videos in the system in a seamless and efficient fashion. Realcourse has gone through two versions. In Realcourse1.0, all servers were treated equal and fully connected by messaging channels. In order to maintain a consistent global directory among servers, each server informs all others of local update operations through the message channels. The fully connected server topology poses a great challenge to system management with respect to failures. To solve this problem, Realcourse2.0 adopts a server topology of multiple overlapping stars by 1) replacing direct broadcast with relayed-broadcast, in which message is first sent to a relay server and then forwarded to all other servers, 2) partitioning the global directory into sub-trees, each sub-tree is then fully replicated to a group of selected servers while groups may overlap with each other. This paper explains why such a change is necessary and how it was done. Realcourse has been operational since December 2003. Today, more than 5000 videos are served. We constantly observe about 10000 unique user IP addresses each day.
我们介绍Realcourse的第二个版本。Realcourse是中国三十多所大学合作的网络视频发布和发布系统,用于共享课程视频。Realcourse的设计基于以下假设:1)系统应该由数百台不可靠但可控的服务器组成,其中暂时故障很常见,永久故障很少;2)视频同时上传到本地服务器,但其元数据被广播到所有服务器;3)用户连接到本地服务器并提供服务,但应该能够以无缝和高效的方式观看系统中的所有视频。Realcourse经历了两个版本。在Realcourse1.0中,所有服务器都被平等对待,并通过消息传递通道完全连接。为了在服务器之间维护一致的全局目录,每个服务器通过消息通道通知所有其他服务器本地更新操作。完全连接的服务器拓扑在故障方面对系统管理提出了很大的挑战。为了解决这个问题,Realcourse2.0采用了多重叠星的服务器拓扑,1)用中继广播代替直接广播,消息先发送到中继服务器,然后转发到所有其他服务器;2)将全局目录划分为子树,每个子树被完全复制到一组选定的服务器上,而组之间可能会重叠。本文解释了为什么这样的变化是必要的,以及它是如何完成的。Realcourse自2003年12月开始运营。如今,该网站提供了超过5000个视频。我们每天持续观察大约10000个唯一的用户IP地址。
{"title":"Realcouse2.0: From Fully Connected Topology to Multiple Overlapping Stars","authors":"Jinyu Zhang, Xiaoming Li","doi":"10.1109/ChinaGrid.2009.17","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.17","url":null,"abstract":"We present the second version of Realcourse. Realcourse is a cooperative Internet video publishing and delivery system used by more than thirty Chinese universities to share course videos. The design of Realcourse bears the following assumptions 1) the system is supposed to consists of hundreds of unreliable but controllable servers where temporal failures are common, permanent failures are rare, 2) videos are concurrently uploaded to local servers but their metadata are broadcasted to all servers, 3) users are connected to and served by local servers but should be able to watch all the videos in the system in a seamless and efficient fashion. Realcourse has gone through two versions. In Realcourse1.0, all servers were treated equal and fully connected by messaging channels. In order to maintain a consistent global directory among servers, each server informs all others of local update operations through the message channels. The fully connected server topology poses a great challenge to system management with respect to failures. To solve this problem, Realcourse2.0 adopts a server topology of multiple overlapping stars by 1) replacing direct broadcast with relayed-broadcast, in which message is first sent to a relay server and then forwarded to all other servers, 2) partitioning the global directory into sub-trees, each sub-tree is then fully replicated to a group of selected servers while groups may overlap with each other. This paper explains why such a change is necessary and how it was done. Realcourse has been operational since December 2003. Today, more than 5000 videos are served. We constantly observe about 10000 unique user IP addresses each day.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132038048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identity-Based Sequential Aggregate Signature from RSA RSA中基于身份的顺序聚合签名
Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.20
Bennian Dou, Hong Zhang, Chungen Xu, Mu Han
Sequential aggregate signature (SAS) schemes allow multiple signers to sequentially produce a short signature of different messages and also allow signers to attest to these messages as well as the order in which they signed. Identity-based signature (IBS) schemes allow a signer to sign a message, in which the signature can be verified by his identity. At CCS 2007, Boldyreva et al. proposed an identity-based sequential aggregate signature from pairings on elliptic curves, which have the merits of both SAS and IBS schemes. In this paper, we present and prove secure an identity-based sequential aggregate signature scheme, which is not based on pairings but based on RSA.
顺序聚合签名(SAS)方案允许多个签名者依次生成不同消息的短签名,还允许签名者验证这些消息以及他们签名的顺序。基于身份的签名(IBS)方案允许签名者签署消息,其中签名可以通过他的身份进行验证。在CCS 2007上,Boldyreva等人提出了一种基于身份的椭圆曲线上配对的顺序聚合签名,该签名具有SAS和IBS方案的优点。本文提出并证明了一个基于RSA而不是基于配对的基于身份的顺序聚合签名方案的安全性。
{"title":"Identity-Based Sequential Aggregate Signature from RSA","authors":"Bennian Dou, Hong Zhang, Chungen Xu, Mu Han","doi":"10.1109/ChinaGrid.2009.20","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.20","url":null,"abstract":"Sequential aggregate signature (SAS) schemes allow multiple signers to sequentially produce a short signature of different messages and also allow signers to attest to these messages as well as the order in which they signed. Identity-based signature (IBS) schemes allow a signer to sign a message, in which the signature can be verified by his identity. At CCS 2007, Boldyreva et al. proposed an identity-based sequential aggregate signature from pairings on elliptic curves, which have the merits of both SAS and IBS schemes. In this paper, we present and prove secure an identity-based sequential aggregate signature scheme, which is not based on pairings but based on RSA.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127430245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
On the Security of Certificateless Authenticated Key Agreement Protocol (CL-AK) for Grid Computing 网格计算无证书认证密钥协议(CL-AK)的安全性研究
Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.13
Mengbo Hou, Qiuliang Xu
Grid Security Infrastructure (GSI) provides an efficient mechanism to solve security problems using conventional public key infrastructure (PKI). The notion of certificateless public key cryptography gives another efficient cryptographic primitive to support Grid security services. In the recent work, Wang et al. proposed the first certificateless authentication and key agreement protocol (CL-AK) for Grid computing based on the Diffie-Hellman key agreement protocol and certificateless public key cryptography, which fits well with the GSI and provides a more lightweight key management approach for entity or data authentication and confidential protection. The authors declare that the protocol achieves many security goals. However, we found the scheme cannot withstand key compromise impersonation attack and key replicating attack, thus it doesn’t possess some desirable security attributes, such as key compromise impersonation resilience and key integrity. We analyze the key replicating attack against the protocol in the BR93 security model in more detail.
网格安全基础设施(GSI)为解决传统公钥基础设施(PKI)的安全问题提供了一种有效的机制。无证书公钥加密的概念提供了另一种有效的加密原语来支持网格安全服务。在最近的工作中,Wang等人在Diffie-Hellman密钥协议和无证书公钥加密的基础上提出了网格计算的第一个无证书认证和密钥协议(CL-AK),该协议与GSI非常契合,为实体或数据的认证和保密保护提供了一种更轻量级的密钥管理方法。作者宣称该协议实现了许多安全目标。然而,我们发现该方案不能抵御密钥泄露模拟攻击和密钥复制攻击,因此不具备一些理想的安全属性,如密钥泄露模拟弹性和密钥完整性。详细分析了BR93安全模型中针对协议的密钥复制攻击。
{"title":"On the Security of Certificateless Authenticated Key Agreement Protocol (CL-AK) for Grid Computing","authors":"Mengbo Hou, Qiuliang Xu","doi":"10.1109/ChinaGrid.2009.13","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.13","url":null,"abstract":"Grid Security Infrastructure (GSI) provides an efficient mechanism to solve security problems using conventional public key infrastructure (PKI). The notion of certificateless public key cryptography gives another efficient cryptographic primitive to support Grid security services. In the recent work, Wang et al. proposed the first certificateless authentication and key agreement protocol (CL-AK) for Grid computing based on the Diffie-Hellman key agreement protocol and certificateless public key cryptography, which fits well with the GSI and provides a more lightweight key management approach for entity or data authentication and confidential protection. The authors declare that the protocol achieves many security goals. However, we found the scheme cannot withstand key compromise impersonation attack and key replicating attack, thus it doesn’t possess some desirable security attributes, such as key compromise impersonation resilience and key integrity. We analyze the key replicating attack against the protocol in the BR93 security model in more detail.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123406837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed Metadata Management Based on Hierarchical Bloom Filters in Data Grid 基于数据网格分层Bloom过滤器的分布式元数据管理
Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.15
Shihua Chen, Xiaomeng Huang, Pengzhi Xu, Weimin Zheng
Distributed metadata management is an important issue in the design and implementation of Data Grid. The key challenge lies in the strategies of metadata synchronization and the representation of the distributed metadata. We have designed a Hierarchical Bloom Filter, which consists of two level Bloom filters, to facilitate the metadata management. A Recent Bloom Filter at the top level is based on the list of recent accessed files while a Summary Bloom Filter at the bottom level represents the set of entire files. Furthermore, we propose a novel update scheme to make Recent Bloom Filters synchronized among metadata servers. Each metadata server could use the Hierarchical Bloom Filters to reduce the update frequency and the network overhead. The experimental results show that the Hierarchical Bloom Filters improve the performance and scalability of Data Grid markedly.
分布式元数据管理是数据网格设计和实现中的一个重要问题。关键的挑战在于元数据的同步策略和分布式元数据的表示。为了便于元数据的管理,我们设计了一个分层的Bloom Filter,它由两个层次的Bloom Filter组成。最近的布隆过滤器在顶层是基于最近访问的文件列表,而摘要布隆过滤器在底层表示整个文件的集合。此外,我们提出了一种新的更新方案,使最近的布隆过滤器在元数据服务器之间同步。每个元数据服务器都可以使用分层布隆过滤器来降低更新频率和网络开销。实验结果表明,分层布隆滤波器显著提高了数据网格的性能和可扩展性。
{"title":"Distributed Metadata Management Based on Hierarchical Bloom Filters in Data Grid","authors":"Shihua Chen, Xiaomeng Huang, Pengzhi Xu, Weimin Zheng","doi":"10.1109/ChinaGrid.2009.15","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.15","url":null,"abstract":"Distributed metadata management is an important issue in the design and implementation of Data Grid. The key challenge lies in the strategies of metadata synchronization and the representation of the distributed metadata. We have designed a Hierarchical Bloom Filter, which consists of two level Bloom filters, to facilitate the metadata management. A Recent Bloom Filter at the top level is based on the list of recent accessed files while a Summary Bloom Filter at the bottom level represents the set of entire files. Furthermore, we propose a novel update scheme to make Recent Bloom Filters synchronized among metadata servers. Each metadata server could use the Hierarchical Bloom Filters to reduce the update frequency and the network overhead. The experimental results show that the Hierarchical Bloom Filters improve the performance and scalability of Data Grid markedly.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116226796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ontology Based Semantic Relation Verification for TCM Semantic Grid 基于本体的中医语义网格语义关系验证
Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.35
Xiaogang Zhang, Huajun Chen, Jun Ma, Jinhuo Tao
Traditional Chinese Medicine (TCM) Semantic Grid is an application of Semantic Grid technique in TCM domain. It comprises TCM ontology and TCM Databases as data resources and Dart Search, Dart Query etc. as TCM application. This paper reports an ontology engineering component of the TCM Semantic Grid. Although ontology engineering has gained significant progress, ontology construction still mainly depends on manual work and tends to be mistaken prone. In this paper, we introduce a semantic relation verification method based on both domain ontology and domain publications. A modified vector space model is used to extract semantic relations from domain publications, which is particularly useful when the semantic relation cannot be extracted directly. Association rule learning method is used to distinguish significant relations from trivial ones. Further verification method is used to give user recommendations of relation types. We use Traditional Chinese Medicine Language System, domain ontology for Traditional Chinese Medicine, and relevant publications to validate our approach. But our method is not limited to this field. In fact, any data source that can be extracted into relevant instance pairs is applicable.
中医语义网格是语义网格技术在中医领域的一种应用。它以中医本体和中医数据库为数据资源,以中医应用程序为检索、查询等。本文报道了中医语义网格的本体工程组件。虽然本体工程已经取得了很大的进展,但本体的构建仍然主要依靠人工,容易出错。本文提出了一种基于领域本体和领域出版物的语义关系验证方法。采用改进的向量空间模型从领域出版物中提取语义关系,在不能直接提取语义关系时特别有用。采用关联规则学习方法区分重要关系和不重要关系。使用进一步的验证方法向用户推荐关系类型。我们使用中医语言系统、中医领域本体和相关出版物来验证我们的方法。但是我们的方法并不局限于这个领域。实际上,任何可以提取到相关实例对中的数据源都是适用的。
{"title":"Ontology Based Semantic Relation Verification for TCM Semantic Grid","authors":"Xiaogang Zhang, Huajun Chen, Jun Ma, Jinhuo Tao","doi":"10.1109/ChinaGrid.2009.35","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.35","url":null,"abstract":"Traditional Chinese Medicine (TCM) Semantic Grid is an application of Semantic Grid technique in TCM domain. It comprises TCM ontology and TCM Databases as data resources and Dart Search, Dart Query etc. as TCM application. This paper reports an ontology engineering component of the TCM Semantic Grid. Although ontology engineering has gained significant progress, ontology construction still mainly depends on manual work and tends to be mistaken prone. In this paper, we introduce a semantic relation verification method based on both domain ontology and domain publications. A modified vector space model is used to extract semantic relations from domain publications, which is particularly useful when the semantic relation cannot be extracted directly. Association rule learning method is used to distinguish significant relations from trivial ones. Further verification method is used to give user recommendations of relation types. We use Traditional Chinese Medicine Language System, domain ontology for Traditional Chinese Medicine, and relevant publications to validate our approach. But our method is not limited to this field. In fact, any data source that can be extracted into relevant instance pairs is applicable.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"66 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120924702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Load Balancing on the Exchanged Hypercube 交换Hypercube上的负载均衡
Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.8
Chong Yao, Keqiu Li, Kai Lin, Yanming Shen
The Exchanged Hypercube is an interconnection network which is obtained by systemically removing some links from a binary hypercube. In parallel systems, load balancing is a very important factor which can affect the performance of the whole system. So distributing tasks evenly on processors is essential for multiprocessor computing systems. Based on the classical DE-based algorithm, in this paper we propose a load balancing algorithm for the Exchanged Hypercube architecture. We also theoretically prove the correctness of the proposed algorithm. Finally, we use a case study to further explain our algorithm.
交换超立方体是一个互连网络,它是通过系统地从二进制超立方体中移除一些链路而获得的。在并行系统中,负载均衡是影响整个系统性能的一个重要因素。因此,对于多处理器计算系统来说,在处理器上均匀分配任务是必不可少的。本文在经典的基于de算法的基础上,提出了一种适用于交换超立方体架构的负载均衡算法。从理论上证明了算法的正确性。最后,我们用一个案例来进一步解释我们的算法。
{"title":"Load Balancing on the Exchanged Hypercube","authors":"Chong Yao, Keqiu Li, Kai Lin, Yanming Shen","doi":"10.1109/ChinaGrid.2009.8","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.8","url":null,"abstract":"The Exchanged Hypercube is an interconnection network which is obtained by systemically removing some links from a binary hypercube. In parallel systems, load balancing is a very important factor which can affect the performance of the whole system. So distributing tasks evenly on processors is essential for multiprocessor computing systems. Based on the classical DE-based algorithm, in this paper we propose a load balancing algorithm for the Exchanged Hypercube architecture. We also theoretically prove the correctness of the proposed algorithm. Finally, we use a case study to further explain our algorithm.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129036178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CampusWare: An Easy-to-Use, Efficient and Portable Grid Middleware for Compute-Intensive Applications 校园软件:一个易于使用,高效和便携的网格中间件,用于计算密集型应用
Pub Date : 2009-08-21 DOI: 10.1109/ChinaGrid.2009.25
Dong Wang, Jinlei Jiang, Yongwei Wu, Guangwen Yang
This paper describes the design and implementation of CampusWare, a lightweight grid middleware for the compute-intensive applications in campus environment. Though there are many grid middlewares available, they are unnecessarily complex for use in the campus environment where the main applications are compute-intensive, and the main requirements are the convenience and efficiency in clusters management and job submissions. To deal with the problem, CampusWare proposes a “fast job” concept and provides a two-layer middleware architecture as well as a three-layer user account hierarchy. Compared with the existing grid middlewares, its deployment, configuration and usage are all simplified, which makes it easy-to-use, efficient and portable.
本文介绍了一种轻量级网格中间件CampusWare的设计与实现,该中间件是针对校园环境中计算密集型应用的。尽管有许多可用的网格中间件,但它们对于在校园环境中使用来说过于复杂,因为校园环境中的主要应用程序是计算密集型的,并且主要要求是集群管理和作业提交的便利性和高效性。为了解决这个问题,CampusWare提出了一个“快速作业”的概念,并提供了一个两层中间件架构和一个三层用户帐户层次结构。与现有的网格中间件相比,它的部署、配置和使用都进行了简化,使其易于使用、高效、便携。
{"title":"CampusWare: An Easy-to-Use, Efficient and Portable Grid Middleware for Compute-Intensive Applications","authors":"Dong Wang, Jinlei Jiang, Yongwei Wu, Guangwen Yang","doi":"10.1109/ChinaGrid.2009.25","DOIUrl":"https://doi.org/10.1109/ChinaGrid.2009.25","url":null,"abstract":"This paper describes the design and implementation of CampusWare, a lightweight grid middleware for the compute-intensive applications in campus environment. Though there are many grid middlewares available, they are unnecessarily complex for use in the campus environment where the main applications are compute-intensive, and the main requirements are the convenience and efficiency in clusters management and job submissions. To deal with the problem, CampusWare proposes a “fast job” concept and provides a two-layer middleware architecture as well as a three-layer user account hierarchy. Compared with the existing grid middlewares, its deployment, configuration and usage are all simplified, which makes it easy-to-use, efficient and portable.","PeriodicalId":212445,"journal":{"name":"2009 Fourth ChinaGrid Annual Conference","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130201026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 Fourth ChinaGrid Annual Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1