首页 > 最新文献

2022 International Conference on Service Science (ICSS)最新文献

英文 中文
Overbooking-enabled Virtual Machine Deployment Approach in Mobile Edge Computing 移动边缘计算中启用超额预订的虚拟机部署方法
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00041
Bingyi Hu, Jixun Gao, Quanzhen Huang, Huaichen Wang, Yanxin Hu, Jialei Liu, Yanmin Ge
Mobile Edge Computing (MEC) integrates computing, storage and other resources on the edge of the network and constructs a unified user service platform. Then, according to the principle of nearest service, MEC responds to the task requests of the edge nodes in time and effectively processes them. In MEC, edge servers are virtualized into several slots so that resources can be shared among different mobile users. However, there are many unpredictable risks in MEC, these risks can cause edge servers to fail, the virtual machine deployed in the server slot fails and the task cannot be executed normally. The introduction of primary-backup virtual machines solves this problem well. However, when the primary virtual machine is working normally, its backup virtual machine is idle, this will result in a waste of resources. In order to improve the resource utilization of the system, this paper firstly overbooks the backup virtual machine reasonably, and then formulates the virtual machine deployment problem as a combinatorial optimization problem. Finally, Virtual Machine Deployment Algorithm (VMDA) is proposed based on genetic algorithm. With the increase of the number of algorithm iterations and the population size of the virtual machine deployment scheme, there may be more optimal virtual machine deployment scheme individuals in the population. Therefore, the algorithm can obtain the approximate optimal value of resource utilization within the risk range allowed by the system, and the algorithm is compared with two other typical bin packing algorithms. The results confirm that VMDA outperforms the other two algorithms.
移动边缘计算(MEC)将网络边缘的计算、存储等资源进行整合,构建统一的用户服务平台。然后,MEC根据最近服务原则,及时响应边缘节点的任务请求,并对其进行有效处理。在MEC中,边缘服务器被虚拟化到多个插槽中,以便在不同的移动用户之间共享资源。但是,MEC中存在许多不可预测的风险,这些风险可能导致边缘服务器故障,服务器插槽中部署的虚拟机故障,任务无法正常执行。主备份虚拟机的引入很好地解决了这个问题。但是,当主虚拟机正常工作时,其备份虚拟机处于空闲状态,会造成资源的浪费。为了提高系统的资源利用率,本文首先合理超量备份虚拟机,然后将虚拟机部署问题表述为组合优化问题。最后,提出了基于遗传算法的虚拟机部署算法(VMDA)。随着算法迭代次数的增加和虚拟机部署方案种群规模的增大,种群中可能存在更多的最优虚拟机部署方案个体。因此,该算法可以在系统允许的风险范围内获得资源利用率的近似最优值,并与另外两种典型的装箱算法进行了比较。结果表明,VMDA算法优于其他两种算法。
{"title":"Overbooking-enabled Virtual Machine Deployment Approach in Mobile Edge Computing","authors":"Bingyi Hu, Jixun Gao, Quanzhen Huang, Huaichen Wang, Yanxin Hu, Jialei Liu, Yanmin Ge","doi":"10.1109/ICSS55994.2022.00041","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00041","url":null,"abstract":"Mobile Edge Computing (MEC) integrates computing, storage and other resources on the edge of the network and constructs a unified user service platform. Then, according to the principle of nearest service, MEC responds to the task requests of the edge nodes in time and effectively processes them. In MEC, edge servers are virtualized into several slots so that resources can be shared among different mobile users. However, there are many unpredictable risks in MEC, these risks can cause edge servers to fail, the virtual machine deployed in the server slot fails and the task cannot be executed normally. The introduction of primary-backup virtual machines solves this problem well. However, when the primary virtual machine is working normally, its backup virtual machine is idle, this will result in a waste of resources. In order to improve the resource utilization of the system, this paper firstly overbooks the backup virtual machine reasonably, and then formulates the virtual machine deployment problem as a combinatorial optimization problem. Finally, Virtual Machine Deployment Algorithm (VMDA) is proposed based on genetic algorithm. With the increase of the number of algorithm iterations and the population size of the virtual machine deployment scheme, there may be more optimal virtual machine deployment scheme individuals in the population. Therefore, the algorithm can obtain the approximate optimal value of resource utilization within the risk range allowed by the system, and the algorithm is compared with two other typical bin packing algorithms. The results confirm that VMDA outperforms the other two algorithms.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116448935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalizing STNU to Model Non-functional Constraints for Business Processes 将STNU泛化为业务流程的非功能约束建模
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00024
Jun Peng, Jingwei Zhu, L. Zhang
Due to its ease of use, the notion of Simple Temporal Networks with Uncertainty (STNU) has been successfully used in verifying temporal constraints of business processes. Considering the universality of non-functional attributes, it is significant to generalize STNU in characterizing these non-functional constraints, resulting in a better expressiveness to support process modeling and business applications. In this paper, we leverage STNU to such a level by using abstract algebra on STNU. It results in a general non-functional constraint modeling and verification method in business process management (BPM), from the original temporal constraints to broader qualitative and quantitative ones, which is not yet supported with STNU in the BPM. Based on the proposed method, we demonstrate the capability of verifying dynamic controllability (DC) for these non-functional attributes, such as satisfaction, reputation grade, etc.
由于其易于使用,具有不确定性的简单时态网络(STNU)的概念已成功地用于验证业务流程的时态约束。考虑到非功能性属性的普遍性,在描述这些非功能性约束时对STNU进行泛化是很重要的,这样可以更好地表达以支持流程建模和业务应用程序。在本文中,我们通过在STNU上使用抽象代数来利用STNU达到这样的水平。它在业务流程管理(BPM)中产生了一种通用的非功能约束建模和验证方法,从原始的时间约束到更广泛的定性和定量约束,BPM中尚不支持STNU。基于该方法,我们证明了对非功能属性(如满意度、声誉等级等)的动态可控性(DC)的验证能力。
{"title":"Generalizing STNU to Model Non-functional Constraints for Business Processes","authors":"Jun Peng, Jingwei Zhu, L. Zhang","doi":"10.1109/ICSS55994.2022.00024","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00024","url":null,"abstract":"Due to its ease of use, the notion of Simple Temporal Networks with Uncertainty (STNU) has been successfully used in verifying temporal constraints of business processes. Considering the universality of non-functional attributes, it is significant to generalize STNU in characterizing these non-functional constraints, resulting in a better expressiveness to support process modeling and business applications. In this paper, we leverage STNU to such a level by using abstract algebra on STNU. It results in a general non-functional constraint modeling and verification method in business process management (BPM), from the original temporal constraints to broader qualitative and quantitative ones, which is not yet supported with STNU in the BPM. Based on the proposed method, we demonstrate the capability of verifying dynamic controllability (DC) for these non-functional attributes, such as satisfaction, reputation grade, etc.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124712160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Congestion Detection and Link Control via Feedback in RDMA Transmission RDMA传输中基于反馈的拥塞检测和链路控制
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00010
Tianshi Wang, Hongwei Kan, Qibo Sun, Shan Xiao, Shangguang Wang
Researchers and practitioners are exploiting Remote Direct Memory Access (RDMA) technology to improve the efficiency of distributed machine learning and meet the demands of data-center applications. RDMA requires lossless network link to fully unleash its power. RDMA Over Converged Ethernet (RoCE) v2 focuses on congestion control, but fails to achieve efficient packet loss recovery; Improved RoCE NIC (IRN) addresses this issue based on RoCEv2, but does not use the Priority-based Flow Control (PFC) to maintain the advantage of RoCEv2 in detecting congestion. This paper proposes a method of congestion detection and link control via feedback in RDMA transmission, namely Feedback Data Flow Control (FDFC), that does not rely on PFC. FDFC detects and controls the link condition in real time to achieve the goals of precise detection, congestion control, and efficient packet loss recovering.
研究人员和实践者正在利用远程直接内存访问(RDMA)技术来提高分布式机器学习的效率,满足数据中心应用的需求。RDMA需要网络链路无损,才能充分发挥其威力。RDMA Over Converged Ethernet (RoCE) v2侧重于拥塞控制,但无法实现高效的丢包恢复;改进的RoCE NIC (IRN)在RoCEv2的基础上解决了这个问题,但没有使用基于优先级的流量控制(PFC)来保持RoCEv2在检测拥塞方面的优势。本文提出了一种在RDMA传输中通过反馈进行拥塞检测和链路控制的方法,即反馈数据流控制(feedback Data Flow control, FDFC),它不依赖于pfc,实时检测和控制链路状态,以达到精确检测、拥塞控制和高效丢包恢复的目的。
{"title":"Congestion Detection and Link Control via Feedback in RDMA Transmission","authors":"Tianshi Wang, Hongwei Kan, Qibo Sun, Shan Xiao, Shangguang Wang","doi":"10.1109/ICSS55994.2022.00010","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00010","url":null,"abstract":"Researchers and practitioners are exploiting Remote Direct Memory Access (RDMA) technology to improve the efficiency of distributed machine learning and meet the demands of data-center applications. RDMA requires lossless network link to fully unleash its power. RDMA Over Converged Ethernet (RoCE) v2 focuses on congestion control, but fails to achieve efficient packet loss recovery; Improved RoCE NIC (IRN) addresses this issue based on RoCEv2, but does not use the Priority-based Flow Control (PFC) to maintain the advantage of RoCEv2 in detecting congestion. This paper proposes a method of congestion detection and link control via feedback in RDMA transmission, namely Feedback Data Flow Control (FDFC), that does not rely on PFC. FDFC detects and controls the link condition in real time to achieve the goals of precise detection, congestion control, and efficient packet loss recovering.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128087272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Scheduling Technology of Computing Power Network Driven by Knowledge Graph 知识图驱动的计算能力网络自动调度技术
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00032
Yanheng Bi, Yingchi Long, Yanzheng Jin, Shengwen Zheng, Huaiyuan Liu, Hongzhi Wang
In recent years, the demand for computing resources of AI industry is urgent because of the data explosion, which promoted the construction of computing power networks in the new era for operators. From the cloud network era to today's computing power network, stricter requirements are proposed to ensure the efficiency and security of computing services. Despite computing power scheduling technologies such as on-demand edge computing and efficient compute first network, knowledge graph techniques for graphs are less explored. As a new technology that can express the relationship between nodes in the graph extremely easily, knowledge graph has a natural advantage in expressing feature information of computing nodes in computing power network. Therefore, a novel knowledge graph representation for the architecture of computing power networks is proposed. And the knowledge graph of the computing power network is constructed by using the knowledge representation method. The scheduling tasks of computing power network is automatically executed by the proposed knowledge driven method based on the constructed knowledge graph. Different with the current scheduling technology of computing power network, the model will theoretically become more and more efficient and accurate with continuously addition of knowledge.
近年来,由于数据爆炸,人工智能行业对计算资源的需求十分迫切,这推动了运营商构建新时代的计算能力网络。从云网络时代到今天的计算能力网络,对计算服务的效率和安全性提出了更严格的要求。尽管有计算能力调度技术,如按需边缘计算和高效计算优先网络,但对图的知识图技术的探索较少。知识图作为一种非常容易表达图中节点之间关系的新技术,在表达计算能力网络中计算节点的特征信息方面具有天然的优势。为此,提出了一种新的计算能力网络体系结构的知识图表示方法。并采用知识表示的方法构建了计算能力网络的知识图。提出的知识驱动方法基于构建的知识图自动执行计算能力网络的调度任务。与目前的计算能力网络调度技术不同,随着知识的不断增加,该模型在理论上会变得越来越高效和准确。
{"title":"Automatic Scheduling Technology of Computing Power Network Driven by Knowledge Graph","authors":"Yanheng Bi, Yingchi Long, Yanzheng Jin, Shengwen Zheng, Huaiyuan Liu, Hongzhi Wang","doi":"10.1109/ICSS55994.2022.00032","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00032","url":null,"abstract":"In recent years, the demand for computing resources of AI industry is urgent because of the data explosion, which promoted the construction of computing power networks in the new era for operators. From the cloud network era to today's computing power network, stricter requirements are proposed to ensure the efficiency and security of computing services. Despite computing power scheduling technologies such as on-demand edge computing and efficient compute first network, knowledge graph techniques for graphs are less explored. As a new technology that can express the relationship between nodes in the graph extremely easily, knowledge graph has a natural advantage in expressing feature information of computing nodes in computing power network. Therefore, a novel knowledge graph representation for the architecture of computing power networks is proposed. And the knowledge graph of the computing power network is constructed by using the knowledge representation method. The scheduling tasks of computing power network is automatically executed by the proposed knowledge driven method based on the constructed knowledge graph. Different with the current scheduling technology of computing power network, the model will theoretically become more and more efficient and accurate with continuously addition of knowledge.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130479958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
MRNN-SA: A Multi-dimensional Time Series Fault Prediction Service for Power Equipment through Self-attention Network 基于自关注网络的电力设备多维时间序列故障预测服务
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00039
Yongyan Yang, Lihong Yang, Mengda Xing
In recent years, as the business of the smart grid grows, the requirements for intelligent maintenance have become significant in the domain. One such typical application is fault prediction service for power equipment. However, traditional solutions to fault prediction have inherent limitations, because they cannot simultaneously employ patterns from global or partial segments and exclude irrelevant features from time series data. In this paper for power equipment, we propose a novel fault prediction service on multi-dimensional time series by a deep-learning model called MRNN-SA. Extensive experiments and a case study show our service can distinctly improve prediction performance on real-world sensory data from power transformers and database servers.
近年来,随着智能电网业务的不断发展,对智能维护的需求日益突出。其中一个典型的应用就是电力设备的故障预测服务。然而,传统的故障预测方法存在固有的局限性,因为它们不能同时使用全局或局部分段的模式,并从时间序列数据中排除不相关的特征。本文针对电力设备,提出了一种基于深度学习模型MRNN-SA的多维时间序列故障预测服务。大量的实验和案例研究表明,我们的服务可以显著提高来自电力变压器和数据库服务器的真实感官数据的预测性能。
{"title":"MRNN-SA: A Multi-dimensional Time Series Fault Prediction Service for Power Equipment through Self-attention Network","authors":"Yongyan Yang, Lihong Yang, Mengda Xing","doi":"10.1109/ICSS55994.2022.00039","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00039","url":null,"abstract":"In recent years, as the business of the smart grid grows, the requirements for intelligent maintenance have become significant in the domain. One such typical application is fault prediction service for power equipment. However, traditional solutions to fault prediction have inherent limitations, because they cannot simultaneously employ patterns from global or partial segments and exclude irrelevant features from time series data. In this paper for power equipment, we propose a novel fault prediction service on multi-dimensional time series by a deep-learning model called MRNN-SA. Extensive experiments and a case study show our service can distinctly improve prediction performance on real-world sensory data from power transformers and database servers.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132175946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed machine learning based link allocation strategy * 基于分布式机器学习的链路分配策略*
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00044
Yi Yang, Mingkang Song, Jianming Zhou, Peng Dai, Tenghui Ke, Weidong Li, Zhengguan Wu, Xiayan Zheng, Xijin Li
In the field of machine learning, a machine learning system with multiple nodes is usually used, and each node is used to perform a machine learning distributed training process for a part of the data that is allocated to it and provide a server by performing the machine learning distributed training process. The obtained training result, its machine learning data needs to be transmitted through the network. This paper proposes a link allocation method for distributed machine learning. For machine learning computing nodes distributed across domains, due to inconsistencies in link distance, node performance, and link load, the traffic distribution between computing nodes is unbalanced. Aiming at the complex computing requirements of distributed machine learning, a link pre-allocation method is proposed, which establishes a central server-link-node topology map, integrates link resources, and determines the logical distance of nodes. For the synchronously distributed machine learning training set, preallocate transmission link resources and initiate transmission according to the remaining storage capacity of nodes. In order to improve the network utilization efficiency in the process of machine learning, it can break through the influence of large network transmission delay on the efficiency of distributed machine learning.
在机器学习领域中,通常使用具有多个节点的机器学习系统,每个节点对分配给它的一部分数据执行机器学习分布式训练过程,并通过执行机器学习分布式训练过程提供服务器。得到的训练结果,其机器学习数据需要通过网络进行传输。提出了一种用于分布式机器学习的链路分配方法。对于跨域分布的机器学习计算节点,由于链路距离、节点性能和链路负载的不一致,导致计算节点之间的流量分配不均衡。针对分布式机器学习复杂的计算需求,提出了一种链路预分配方法,该方法建立中央服务器-链路-节点拓扑图,整合链路资源,确定节点之间的逻辑距离。对于同步分布式的机器学习训练集,根据节点的剩余存储容量,预先分配传输链路资源,并启动传输。为了提高机器学习过程中的网络利用效率,可以突破大网络传输延迟对分布式机器学习效率的影响。
{"title":"Distributed machine learning based link allocation strategy *","authors":"Yi Yang, Mingkang Song, Jianming Zhou, Peng Dai, Tenghui Ke, Weidong Li, Zhengguan Wu, Xiayan Zheng, Xijin Li","doi":"10.1109/ICSS55994.2022.00044","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00044","url":null,"abstract":"In the field of machine learning, a machine learning system with multiple nodes is usually used, and each node is used to perform a machine learning distributed training process for a part of the data that is allocated to it and provide a server by performing the machine learning distributed training process. The obtained training result, its machine learning data needs to be transmitted through the network. This paper proposes a link allocation method for distributed machine learning. For machine learning computing nodes distributed across domains, due to inconsistencies in link distance, node performance, and link load, the traffic distribution between computing nodes is unbalanced. Aiming at the complex computing requirements of distributed machine learning, a link pre-allocation method is proposed, which establishes a central server-link-node topology map, integrates link resources, and determines the logical distance of nodes. For the synchronously distributed machine learning training set, preallocate transmission link resources and initiate transmission according to the remaining storage capacity of nodes. In order to improve the network utilization efficiency in the process of machine learning, it can break through the influence of large network transmission delay on the efficiency of distributed machine learning.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129717510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probing the Mystery of Cryptocurrency Exchange: The Case Study Based on Mt.Gox 探究加密货币交易之谜:以Mt.Gox为例
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00053
Yuanjun Ding, Weili Chen
The birth of Bitcoin has created the cryptocurrency exchange, the average daily trading volume of cryptocurrency exchanges is now more than 100 billion. Cryptocurrency exchanges serve as a place for users to exchange cryptocurrencies, acting as a bridge between the blockchain ecosystem and the real world. Based on the transaction mechanism, cryptocurrency exchanges can be divided into centralized exchanges(CEXs) and decentralized exchanges(DEXs). CEXs still hold the dominant position, and we focus on Mt.Gox with the leaked dataset. By preprocessing the data, a usable internal dataset was obtained. To better study CEX, we further provide a comprehensive analysis of Mt.Gox based on three types of records and conclude its characteristics. Finally, we propose a matching method for on-chain and off-chain data, which restores the complete transaction path of the transaction account and some strange transaction phenomena are discovered. The results of this experiment showed that our algorithm can find addresses on blockchain and de-anonymize to a certain extent.
比特币的诞生催生了加密货币交易所,目前加密货币交易所的日均交易量已超过1000亿。加密货币交易所是用户交换加密货币的场所,是区块链生态系统与现实世界之间的桥梁。根据交易机制,加密货币交易所可以分为集中式交易所(cex)和分散式交易所(DEXs)。cex仍然占据主导地位,我们关注的是数据集泄露的Mt.Gox。通过对数据进行预处理,得到了可用的内部数据集。为了更好地研究Mt.Gox,我们进一步在三类记录的基础上对Mt.Gox进行综合分析,总结其特征。最后,我们提出了一种链上和链下数据的匹配方法,该方法恢复了交易账户的完整交易路径,并发现了一些奇怪的交易现象。实验结果表明,我们的算法可以在区块链上找到地址并进行一定程度的去匿名化。
{"title":"Probing the Mystery of Cryptocurrency Exchange: The Case Study Based on Mt.Gox","authors":"Yuanjun Ding, Weili Chen","doi":"10.1109/ICSS55994.2022.00053","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00053","url":null,"abstract":"The birth of Bitcoin has created the cryptocurrency exchange, the average daily trading volume of cryptocurrency exchanges is now more than 100 billion. Cryptocurrency exchanges serve as a place for users to exchange cryptocurrencies, acting as a bridge between the blockchain ecosystem and the real world. Based on the transaction mechanism, cryptocurrency exchanges can be divided into centralized exchanges(CEXs) and decentralized exchanges(DEXs). CEXs still hold the dominant position, and we focus on Mt.Gox with the leaked dataset. By preprocessing the data, a usable internal dataset was obtained. To better study CEX, we further provide a comprehensive analysis of Mt.Gox based on three types of records and conclude its characteristics. Finally, we propose a matching method for on-chain and off-chain data, which restores the complete transaction path of the transaction account and some strange transaction phenomena are discovered. The results of this experiment showed that our algorithm can find addresses on blockchain and de-anonymize to a certain extent.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"04 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129354181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IoTDM4BPMN: An IoT-Enhanced Decision Making Framework for BPMN 2.0 物联网增强的BPMN 2.0决策框架
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00022
Yusuf Kirikkayis, Florian Gallik, M. Reichert
The relevance of the Internet of Things (IoT) for Business Process Management (BPM) support is increasing. IoT devices enable the collection and exchange of data over the Internet, whereby each physical device is uniquely identifiable through its embedded computing system. BPM, in turn, is concerned with analyzing, discovering, modeling, executing, and monitoring (digitized) business processes. By enhancing BPM systems with IoT capabilities, real-world data can be gathered and considered during process execution to enhance process monitoring as well as IoT-driven decision making. In this context, the aggregation of low-level IoT data into high-level process-relevant data constitutes a fundamental step towards IoT-driven decisions in business processes. This paper presents IoT Decision Making for Business Process Model and Notation (IoTDM4BPMN) a web-based framework for modeling, executing, and monitoring IoT-driven decisions in real-time. We give insights into the design and implementation of IoTDM4BPMN and provide a case study as a first validation that applies IoTDM4BPMN to the modeling, executing, and monitoring of a real-world IoT-driven decision process.
物联网(IoT)与业务流程管理(BPM)支持的相关性正在增加。物联网设备能够在互联网上收集和交换数据,通过其嵌入式计算系统,每个物理设备都是唯一可识别的。而BPM则关注于分析、发现、建模、执行和监视(数字化)业务流程。通过增强具有物联网功能的BPM系统,可以在流程执行期间收集和考虑实际数据,以增强流程监控以及物联网驱动的决策制定。在这种情况下,将低级物联网数据聚合为高级流程相关数据构成了在业务流程中实现物联网驱动决策的基本步骤。本文介绍了物联网业务流程模型和符号的决策制定(IoTDM4BPMN),这是一个基于web的框架,用于实时建模、执行和监控物联网驱动的决策。我们深入了解了IoTDM4BPMN的设计和实现,并提供了一个案例研究,作为将IoTDM4BPMN应用于现实世界物联网驱动决策过程的建模、执行和监控的首次验证。
{"title":"IoTDM4BPMN: An IoT-Enhanced Decision Making Framework for BPMN 2.0","authors":"Yusuf Kirikkayis, Florian Gallik, M. Reichert","doi":"10.1109/ICSS55994.2022.00022","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00022","url":null,"abstract":"The relevance of the Internet of Things (IoT) for Business Process Management (BPM) support is increasing. IoT devices enable the collection and exchange of data over the Internet, whereby each physical device is uniquely identifiable through its embedded computing system. BPM, in turn, is concerned with analyzing, discovering, modeling, executing, and monitoring (digitized) business processes. By enhancing BPM systems with IoT capabilities, real-world data can be gathered and considered during process execution to enhance process monitoring as well as IoT-driven decision making. In this context, the aggregation of low-level IoT data into high-level process-relevant data constitutes a fundamental step towards IoT-driven decisions in business processes. This paper presents IoT Decision Making for Business Process Model and Notation (IoTDM4BPMN) a web-based framework for modeling, executing, and monitoring IoT-driven decisions in real-time. We give insights into the design and implementation of IoTDM4BPMN and provide a case study as a first validation that applies IoTDM4BPMN to the modeling, executing, and monitoring of a real-world IoT-driven decision process.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130639301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HRET: Heterogeneous Information Network for Recommendation in testing and inspection HRET:面向检测推荐的异构信息网络
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00038
Liwen Zhang, Weiping Li, Tong Mo, Weijie Chu
With the help of the sufficiency of heterogeneous information, heterogeneous information network(HIN) has been treated as the most advanced method to extract complex semantic data in recommender system. But it is still an empty field for some traditional industries such as testing and inspection industry, which mainly adopt the similarity-based collaborative filtering(CF) method. But it will make a huge waste of the rich heterogeneous auxiliary data, which could be fully utilized by HIN based method. Especially for testing and inspection industry, the profession will help the model to find a more accurate match between the user and business. In this work, we succeeded in building up a HIN embedding approach for recommendation, and design a unique network structure for testing and inspection industry, which both utilize the rich underlying information and properly solve the specialty problem in a professional industry, different from normal recommender scenario. An intensive experiment on the real world data set shows the performance of the model.
借助异构信息的充分性,异构信息网络(HIN)被认为是提取推荐系统中复杂语义数据的最先进的方法。但对于一些传统行业,如测试和检验行业来说,这仍然是一个空白领域,这些行业主要采用基于相似度的协同过滤(CF)方法。但这将极大地浪费丰富的异构辅助数据,而基于HIN的方法可以充分利用这些数据。特别是对于测试和检验行业,专业人士将帮助模型在用户和企业之间找到更准确的匹配。本文成功构建了一种HIN嵌入推荐方法,并设计了一种独特的测试检测行业网络结构,既利用了丰富的底层信息,又能很好地解决专业行业中不同于普通推荐场景的专业性问题。在实际数据集上的大量实验表明了该模型的性能。
{"title":"HRET: Heterogeneous Information Network for Recommendation in testing and inspection","authors":"Liwen Zhang, Weiping Li, Tong Mo, Weijie Chu","doi":"10.1109/ICSS55994.2022.00038","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00038","url":null,"abstract":"With the help of the sufficiency of heterogeneous information, heterogeneous information network(HIN) has been treated as the most advanced method to extract complex semantic data in recommender system. But it is still an empty field for some traditional industries such as testing and inspection industry, which mainly adopt the similarity-based collaborative filtering(CF) method. But it will make a huge waste of the rich heterogeneous auxiliary data, which could be fully utilized by HIN based method. Especially for testing and inspection industry, the profession will help the model to find a more accurate match between the user and business. In this work, we succeeded in building up a HIN embedding approach for recommendation, and design a unique network structure for testing and inspection industry, which both utilize the rich underlying information and properly solve the specialty problem in a professional industry, different from normal recommender scenario. An intensive experiment on the real world data set shows the performance of the model.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123090004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Smart Contract-based Service Platform for Trustworthy Crowd Funding and Crowd Innovation 基于智能合约的可信赖众筹与众创服务平台
Pub Date : 2022-05-01 DOI: 10.1109/ICSS55994.2022.00048
Wenjie Teng, Hanchuan Xu, Zhe Huang, Yunwen Bai, Zhongjie Wang
Crowd funding and crowd innovation can boost creativity of creators at a low cost. However, how to protect rights and benefits of relative stakeholders during the process in a credible way remains a problem. By introducing fungible tokens, non-fungible tokens and on-chain governance based on blockchain, we propose a set of smart contracts supporting crowd funding and crowd innovation to better reward participants and govern the process in a trusted way. Furthermore, based on these smart contracts, we abstract and encapsulate a series of common operations and implement a service platform for trustworthy crowd funding and crowd innovation.
众筹和众创可以以较低的成本激发创作者的创造力。然而,在此过程中如何以可信的方式保护相关利益相关者的权益仍然是一个问题。通过引入可替代代币、不可替代代币和基于区块链的链上治理,我们提出了一套支持众筹和众创的智能合约,以更好地奖励参与者,并以可信的方式治理过程。进一步,基于这些智能合约,我们将一系列常见的操作进行抽象和封装,实现一个可信赖的众筹和众创服务平台。
{"title":"A Smart Contract-based Service Platform for Trustworthy Crowd Funding and Crowd Innovation","authors":"Wenjie Teng, Hanchuan Xu, Zhe Huang, Yunwen Bai, Zhongjie Wang","doi":"10.1109/ICSS55994.2022.00048","DOIUrl":"https://doi.org/10.1109/ICSS55994.2022.00048","url":null,"abstract":"Crowd funding and crowd innovation can boost creativity of creators at a low cost. However, how to protect rights and benefits of relative stakeholders during the process in a credible way remains a problem. By introducing fungible tokens, non-fungible tokens and on-chain governance based on blockchain, we propose a set of smart contracts supporting crowd funding and crowd innovation to better reward participants and govern the process in a trusted way. Furthermore, based on these smart contracts, we abstract and encapsulate a series of common operations and implement a service platform for trustworthy crowd funding and crowd innovation.","PeriodicalId":327964,"journal":{"name":"2022 International Conference on Service Science (ICSS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 International Conference on Service Science (ICSS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1