首页 > 最新文献

2013 27th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
CCN-TV: A Data-centric Approach to Real-Time Video Services CCN-TV:以数据为中心的实时视频服务方法
Vincenzo Ciancaglini, G. Piro, Riccardo Loti, L. Grieco, L. Liquori
Content-Centric Networking (CCN) is a promising data-centric architecture, based on in-network caching, name-driven routing, and receiver-initiated sessions, which can greatly enhance the way Internet resources are currently used, making support for a broader set of users with increasing traffic demands possible. The CCN vision is, currently, attracting the attention of many researchers across the world, since it has all the potential to become ready to the market, to be gradually deployed in the Internet of today, and to facilitate a graceful transition from a host-centric networking rationale to a more effective data-centric working behaviour. At the same time, several issues have to be investigated before CCN can be safely deployed at the Internet scale. They include routing, congestion control, caching operations, name-space planning, and application design. With reference to application-related facets, it is worth noticing that the demand for TV services is growing at an exponential rate over time, thus requiring a very careful analysis of their performance in CCN architectures. To this end, in the present contribution we deploy a CCN-TV system, capable of delivering real-time streaming TV services, and we evaluate its performance through a simulation campaign based on real-world topologies.
以内容为中心的网络(Content-Centric Networking, CCN)是一种很有前途的以数据为中心的体系结构,它基于网络内缓存、名称驱动的路由和接收方发起的会话,可以极大地增强当前使用Internet资源的方式,从而支持具有不断增长的流量需求的更广泛的用户集。目前,CCN的愿景吸引了世界各地许多研究人员的注意,因为它有可能进入市场,逐步部署到今天的互联网中,并促进从以主机为中心的网络原理到更有效的以数据为中心的工作行为的优雅过渡。与此同时,在CCN可以安全部署到互联网规模之前,必须调查几个问题。它们包括路由、拥塞控制、缓存操作、命名空间规划和应用程序设计。参考与应用相关的方面,值得注意的是,随着时间的推移,对电视服务的需求正以指数速度增长,因此需要非常仔细地分析它们在CCN架构中的性能。为此,在目前的贡献中,我们部署了一个能够提供实时流媒体电视服务的CCN-TV系统,并通过基于现实世界拓扑的模拟活动评估其性能。
{"title":"CCN-TV: A Data-centric Approach to Real-Time Video Services","authors":"Vincenzo Ciancaglini, G. Piro, Riccardo Loti, L. Grieco, L. Liquori","doi":"10.1109/WAINA.2013.19","DOIUrl":"https://doi.org/10.1109/WAINA.2013.19","url":null,"abstract":"Content-Centric Networking (CCN) is a promising data-centric architecture, based on in-network caching, name-driven routing, and receiver-initiated sessions, which can greatly enhance the way Internet resources are currently used, making support for a broader set of users with increasing traffic demands possible. The CCN vision is, currently, attracting the attention of many researchers across the world, since it has all the potential to become ready to the market, to be gradually deployed in the Internet of today, and to facilitate a graceful transition from a host-centric networking rationale to a more effective data-centric working behaviour. At the same time, several issues have to be investigated before CCN can be safely deployed at the Internet scale. They include routing, congestion control, caching operations, name-space planning, and application design. With reference to application-related facets, it is worth noticing that the demand for TV services is growing at an exponential rate over time, thus requiring a very careful analysis of their performance in CCN architectures. To this end, in the present contribution we deploy a CCN-TV system, capable of delivering real-time streaming TV services, and we evaluate its performance through a simulation campaign based on real-world topologies.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130757071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Secure Shared Group Model of Cloud Storage 云存储安全共享组模型
Ching-Hung Yeh
Cloud Computing has been envisioned as the next-wave system architectures of IT. Essentially, it can have ubiquitous access through variety of devices and applications provided by cloud service providers. In particular, cloud storage service brings benefits not only low cost and scalability, but also great appropriateness for group working, such as learning resource storage. However, the data security and privacy protection is still regarded as challenges. This paper aims the present problem, a secure shared group model of cloud storage is presented. With the using of crypto logical technology, the groups share their data security and efficiency. According to our security analysis and efficiency evaluation, the proposed model have lightweight overheads in terms of keys management as also security and confidentiality can be protected in cloud storage.
云计算已被设想为IT的下一波系统架构。从本质上讲,它可以通过云服务提供商提供的各种设备和应用程序进行无处不在的访问。特别是云存储服务带来的好处不仅是低成本和可扩展性,而且非常适合群组工作,例如学习资源存储。然而,数据安全和隐私保护仍然被视为挑战。针对这一问题,提出了一种安全的云存储共享组模型。通过使用加密技术,实现了数据的安全性和高效性。根据我们的安全性分析和效率评估,所提出的模型在密钥管理方面具有轻量级的开销,并且可以在云存储中保护安全性和机密性。
{"title":"A Secure Shared Group Model of Cloud Storage","authors":"Ching-Hung Yeh","doi":"10.1109/WAINA.2013.231","DOIUrl":"https://doi.org/10.1109/WAINA.2013.231","url":null,"abstract":"Cloud Computing has been envisioned as the next-wave system architectures of IT. Essentially, it can have ubiquitous access through variety of devices and applications provided by cloud service providers. In particular, cloud storage service brings benefits not only low cost and scalability, but also great appropriateness for group working, such as learning resource storage. However, the data security and privacy protection is still regarded as challenges. This paper aims the present problem, a secure shared group model of cloud storage is presented. With the using of crypto logical technology, the groups share their data security and efficiency. According to our security analysis and efficiency evaluation, the proposed model have lightweight overheads in terms of keys management as also security and confidentiality can be protected in cloud storage.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133484443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
All Silicon Data Center, the Energy Perspectives 全硅数据中心,能源展望
Antonio Scarfò
The energy consumption related to data centers is ever increasing, despite the significant efficiency improvements in the involved technologies and the economic crisis. Pervasive adoption of virtualization, decreasing of PUE as well as new features related to energy-efficiency are not able to stop this growth trend, mainly sustained from the explosion of cloud services in both the fixed and mobile ICT markets. One of the most important factors that contributes to the increase in the data center energy demand is the evolution of data utilization in cloud environments. Big data support is one of the main driver of this process, new data sources continuously produce huge amounts of mostly unstructured data, that should be stored in large centralized storage systems to be accessed by the cloud users and analyzed by the companies in real time. This has a disruptive effect for the energy consumption of the data center hosting the above storage resources, that's why the data need to be stored and analyzed in IOPS intensive style. Flash memory technologies can play a key role in such scenario, since they can reduce dramatically both the storage footprint and energy consumption and increase applications performances bringing appreciable economic benefits. This fundamental efficiency and performance improvement for storage architectures can't be supported by legacy technologies because they are not designed to use flash technologies but rather they are based on energy-hungry legacy mechanical disks. That is limit the energy efficiency and performance delivered by solid state disks (SSD) installed in legacy storage systems, opening the door to the development of new technologies that will be able to fully exploit the potential of flash disks. The aim of this work is presenting a brief survey about the potential of flash technologies for improving the energy efficiency of data center storage systems supporting the incoming Big Data services.
尽管相关技术和经济危机的效率显著提高,但与数据中心相关的能源消耗仍在不断增加。虚拟化的广泛采用、PUE的降低以及与能源效率相关的新功能都无法阻止这一增长趋势,这主要得益于固定和移动ICT市场中云服务的爆炸式增长。导致数据中心能源需求增加的最重要因素之一是云环境中数据利用的演变。大数据支持是这一过程的主要驱动力之一,新的数据源不断产生大量的非结构化数据,这些数据应该存储在大型集中存储系统中,供云用户访问并由公司实时分析。这对承载上述存储资源的数据中心的能耗产生了破坏性影响,这就是为什么需要以IOPS密集型的方式存储和分析数据。闪存技术可以在这种情况下发挥关键作用,因为它们可以显着减少存储空间和能源消耗,提高应用程序性能,带来可观的经济效益。传统技术无法支持存储架构的这种基本效率和性能改进,因为它们不是为使用闪存技术而设计的,而是基于耗能巨大的传统机械磁盘。这限制了传统存储系统中安装的固态硬盘(SSD)的能效和性能,为开发能够充分利用闪存盘潜力的新技术打开了大门。这项工作的目的是对闪存技术的潜力进行简要调查,以提高支持即将到来的大数据服务的数据中心存储系统的能源效率。
{"title":"All Silicon Data Center, the Energy Perspectives","authors":"Antonio Scarfò","doi":"10.1109/WAINA.2013.186","DOIUrl":"https://doi.org/10.1109/WAINA.2013.186","url":null,"abstract":"The energy consumption related to data centers is ever increasing, despite the significant efficiency improvements in the involved technologies and the economic crisis. Pervasive adoption of virtualization, decreasing of PUE as well as new features related to energy-efficiency are not able to stop this growth trend, mainly sustained from the explosion of cloud services in both the fixed and mobile ICT markets. One of the most important factors that contributes to the increase in the data center energy demand is the evolution of data utilization in cloud environments. Big data support is one of the main driver of this process, new data sources continuously produce huge amounts of mostly unstructured data, that should be stored in large centralized storage systems to be accessed by the cloud users and analyzed by the companies in real time. This has a disruptive effect for the energy consumption of the data center hosting the above storage resources, that's why the data need to be stored and analyzed in IOPS intensive style. Flash memory technologies can play a key role in such scenario, since they can reduce dramatically both the storage footprint and energy consumption and increase applications performances bringing appreciable economic benefits. This fundamental efficiency and performance improvement for storage architectures can't be supported by legacy technologies because they are not designed to use flash technologies but rather they are based on energy-hungry legacy mechanical disks. That is limit the energy efficiency and performance delivered by solid state disks (SSD) installed in legacy storage systems, opening the door to the development of new technologies that will be able to fully exploit the potential of flash disks. The aim of this work is presenting a brief survey about the potential of flash technologies for improving the energy efficiency of data center storage systems supporting the incoming Big Data services.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131316451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Early Detection Method of Service Quality Reduction Based on Linguistic and Time Series Analysis of Twitter 基于语言和时间序列分析的Twitter服务质量降低早期检测方法
K. Ikeda, Gen Hattori, C. Ono, H. Asoh, T. Higashino
This paper proposes a method for detecting service quality reduction at an early stage based on a linguistic and time series analysis of Twitter. Recently, many people post their opinions about products and service quality via social networking services, such as Twitter. The number of tweets related to service quality increases when service quality reductions such as communication failures and train delays occur. It is crucial for the service operators to recover service quality at an early stage in order to maintain customer satisfaction. Tweets can be considered as an important clue for detecting service quality reduction. In this paper, we propose a method for early detection of service quality reduction by making the best use of the Twitter platform, which includes tweets as text information and has a feature of real time communication. The proposed method consists of a linguistic analysis and time series analysis of tweets. In the linguistic analysis, semi-automatic method is proposed to construct a service specific dictionary, which is used to extract negative tweets related to the services with high accuracy. In the time series analysis, statistical modeling is used for the early and accurate anomaly detection from the time series of the negative tweets. The experimental results show that the extraction accuracy of negative tweets and the detection accuracy of service quality reduction are significantly improved.
本文提出了一种基于Twitter语言和时间序列分析的早期检测服务质量下降的方法。最近,许多人通过Twitter等社交网络服务发布他们对产品和服务质量的看法。当出现通信故障和火车延误等服务质量下降时,与服务质量相关的tweet数量会增加。对于服务经营者来说,尽早恢复服务质量是保持顾客满意的关键。Tweets可以作为检测服务质量降低的重要线索。在本文中,我们提出了一种通过充分利用Twitter平台来早期检测服务质量下降的方法,该平台将推文作为文本信息,并具有实时通信的特征。该方法包括对推文的语言分析和时间序列分析。在语言分析中,提出了半自动化的方法来构建特定于服务的字典,用于提取与服务相关的负面推文,准确率较高。在时间序列分析中,采用统计建模的方法,从负面推文的时间序列中早期准确地检测出异常。实验结果表明,该方法显著提高了负面推文的提取精度和服务质量降低的检测精度。
{"title":"Early Detection Method of Service Quality Reduction Based on Linguistic and Time Series Analysis of Twitter","authors":"K. Ikeda, Gen Hattori, C. Ono, H. Asoh, T. Higashino","doi":"10.1109/WAINA.2013.113","DOIUrl":"https://doi.org/10.1109/WAINA.2013.113","url":null,"abstract":"This paper proposes a method for detecting service quality reduction at an early stage based on a linguistic and time series analysis of Twitter. Recently, many people post their opinions about products and service quality via social networking services, such as Twitter. The number of tweets related to service quality increases when service quality reductions such as communication failures and train delays occur. It is crucial for the service operators to recover service quality at an early stage in order to maintain customer satisfaction. Tweets can be considered as an important clue for detecting service quality reduction. In this paper, we propose a method for early detection of service quality reduction by making the best use of the Twitter platform, which includes tweets as text information and has a feature of real time communication. The proposed method consists of a linguistic analysis and time series analysis of tweets. In the linguistic analysis, semi-automatic method is proposed to construct a service specific dictionary, which is used to extract negative tweets related to the services with high accuracy. In the time series analysis, statistical modeling is used for the early and accurate anomaly detection from the time series of the negative tweets. The experimental results show that the extraction accuracy of negative tweets and the detection accuracy of service quality reduction are significantly improved.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131896247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improving Secure Routing Protocols Using Additional Features 使用附加功能改进安全路由协议
J. Tornos, J. L. Salazar
MANET routing protocols have to manage different problems from those of wired routing protocols. These protocols did not implement security, so it was necessary to implement secure protocols. Secure routing protocols do not usually take into account the impact of security into the performance of the original protocol. This article shows the results obtained after implementing one of these secure protocols, ADSR, both original protocol and optimized version. After an analysis of these results, we propose a change that improves the results of the ADSR protocol.
MANET路由协议必须处理与有线路由协议不同的问题。这些协议没有实现安全性,因此有必要实现安全协议。安全路由协议通常不考虑将安全影响纳入到原有协议的性能中。本文展示了在实现其中一种安全协议ADSR后获得的结果,包括原始协议和优化版本。在对这些结果进行分析之后,我们提出了一种改进ADSR协议结果的方法。
{"title":"Improving Secure Routing Protocols Using Additional Features","authors":"J. Tornos, J. L. Salazar","doi":"10.1109/WAINA.2013.151","DOIUrl":"https://doi.org/10.1109/WAINA.2013.151","url":null,"abstract":"MANET routing protocols have to manage different problems from those of wired routing protocols. These protocols did not implement security, so it was necessary to implement secure protocols. Secure routing protocols do not usually take into account the impact of security into the performance of the original protocol. This article shows the results obtained after implementing one of these secure protocols, ADSR, both original protocol and optimized version. After an analysis of these results, we propose a change that improves the results of the ADSR protocol.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127399236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Feasibility Study on Using Low-Cost Gaming Devices for Rehabilitation 使用低成本游戏设备进行康复治疗的可行性研究
K. F. Li, A. Sevcenco
Telerehabilitation has become a reality with the advances of communication and sensing technologies. The past decade has seen much research work done in rehabilitation using sophisticated devices and complex computations. A recent research trend has emerged with the proliferation of gaming devices and sensors. This work investigates rehabilitation of wrist and arm using the affordable Nintendo Wii Remote controller with an USB-equipped personal computer. Other gaming devices such as Microsoft's Kinect are discussed. The impact of positional displacement of the controller is examined. The sensitive of the controller with respect to prescribed motions is studied. Extensive experiments performed with various controllers, motions, and people are discussed. Conclusions are drawn on the suitability of using the Wii Remote controller in rehabilitation.
随着通信和传感技术的进步,远程康复已成为现实。在过去的十年中,人们在使用复杂设备和复杂计算的康复方面做了大量的研究工作。随着游戏设备和传感器的普及,最近出现了一种研究趋势。这项工作研究了使用价格合理的任天堂Wii遥控器和配备usb的个人电脑进行手腕和手臂的康复。其他游戏设备如微软的Kinect也在讨论中。研究了控制器位置位移的影响。研究了控制器对规定运动的灵敏度。广泛的实验进行了各种控制器,运动和人进行了讨论。结论Wii遥控器在康复治疗中的适用性。
{"title":"A Feasibility Study on Using Low-Cost Gaming Devices for Rehabilitation","authors":"K. F. Li, A. Sevcenco","doi":"10.1109/WAINA.2013.262","DOIUrl":"https://doi.org/10.1109/WAINA.2013.262","url":null,"abstract":"Telerehabilitation has become a reality with the advances of communication and sensing technologies. The past decade has seen much research work done in rehabilitation using sophisticated devices and complex computations. A recent research trend has emerged with the proliferation of gaming devices and sensors. This work investigates rehabilitation of wrist and arm using the affordable Nintendo Wii Remote controller with an USB-equipped personal computer. Other gaming devices such as Microsoft's Kinect are discussed. The impact of positional displacement of the controller is examined. The sensitive of the controller with respect to prescribed motions is studied. Extensive experiments performed with various controllers, motions, and people are discussed. Conclusions are drawn on the suitability of using the Wii Remote controller in rehabilitation.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115389616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comprehensive Study of Bluetooth Fingerprinting-Based Algorithms for Localization 基于蓝牙指纹定位算法的综合研究
Li Zhang, Xiao Liu, Jie Song, C. Gurrin, Zhiliang Zhu
There is an increasing demand for indoor navigation and localization systems along with the increasing popularity of location based services in recent years. According to past researches, Bluetooth is a promising technology for indoor wireless positioning due to its cost-effectiveness and easy-to-deploy feature. This paper studied three typical fingerprinting-based positioning algorithms - kNN, Neural Networks and SVM. According to our analysis and experimental results, the kNN regression method is proven to be a good candidate for localization in real-life application. Comprehensive performance comparisons including accuracy, precision and training time are presented.
近年来,随着定位服务的日益普及,对室内导航和定位系统的需求不断增加。根据以往的研究,蓝牙因其具有成本效益和易于部署的特点,是一种很有前途的室内无线定位技术。本文研究了三种典型的基于指纹的定位算法——kNN、神经网络和支持向量机。分析和实验结果表明,kNN回归方法在实际应用中是一种很好的定位方法。给出了准确度、精密度和训练时间的综合性能比较。
{"title":"A Comprehensive Study of Bluetooth Fingerprinting-Based Algorithms for Localization","authors":"Li Zhang, Xiao Liu, Jie Song, C. Gurrin, Zhiliang Zhu","doi":"10.1109/WAINA.2013.205","DOIUrl":"https://doi.org/10.1109/WAINA.2013.205","url":null,"abstract":"There is an increasing demand for indoor navigation and localization systems along with the increasing popularity of location based services in recent years. According to past researches, Bluetooth is a promising technology for indoor wireless positioning due to its cost-effectiveness and easy-to-deploy feature. This paper studied three typical fingerprinting-based positioning algorithms - kNN, Neural Networks and SVM. According to our analysis and experimental results, the kNN regression method is proven to be a good candidate for localization in real-life application. Comprehensive performance comparisons including accuracy, precision and training time are presented.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117076256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 56
Intercloud Architecture Framework for Heterogeneous Cloud Based Infrastructure Services Provisioning On-Demand 基于异构云的基础设施服务按需供应的云间架构框架
Y. Demchenko, C. Ngo, C. D. Laat, J. A. G. Espín, S. Figuerola, Juan Rodríguez Martinez, L. M. C. Murillo, G. Landi, N. Ciulli
This paper presents on-going research to develop the Intercloud Architecture Framework (ICAF) that addresses problems in multi-provider multi-domain heterogeneous cloud based infrastructure services and applications integration and interoperability, to allow their on-demand provisioning. The paper refers to existing standards and ongoing standardisation activity in Cloud Computing, in particular, recently published NIST Cloud Computing Reference Architecture (CCRA) and ITU-T JCA-Cloud activity. The proposed ICAF defines four complementary components addressing Intercloud integration and interoperability: multi-layer Cloud Services Model that combines commonly adopted cloud service models, such as IaaS, PaaS, SaaS, in one multilayer model with corresponding inter-layer interfaces, Intercloud Control and Management Plane that supports cloud based applications interaction, Intercloud Federation Framework, and Intercloud Operations Framework. The paper briefly describes the Service delivery and lifecycle management as an important ICAF component that provides a basis for consistent management and security of the provisioned on-demand complex cloud based services. The paper describes an implementation of the Intercloud Control and Management Plane in the GEYSERS project to allow optimal provisioning of the combined Network+IT resources in the inter-cloud environment. The proposed architecture is intended to provide an architectural model for developing Intercloud middleware and in this way will facilitate clouds interoperability and integration.
本文介绍了正在进行的开发云间架构框架(ICAF)的研究,该框架解决了多提供商多域异构云基础设施服务和应用程序集成和互操作性中的问题,以允许其按需提供。该文件提到了云计算领域的现有标准和正在进行的标准化活动,特别是最近发布的NIST云计算参考架构(CCRA)和ITU-T JCA-Cloud活动。建议的ICAF定义了解决云间集成和互操作性的四个互补组件:多层云服务模型,将IaaS、PaaS、SaaS等常用云服务模型结合在一个多层模型中,并具有相应的层间接口;支持基于云的应用程序交互的云间控制和管理平面;云间联合框架和云间操作框架。本文简要地描述了作为重要的ICAF组件的服务交付和生命周期管理,它为按需提供的复杂云服务的一致性管理和安全性提供了基础。本文描述了GEYSERS项目中云间控制和管理平面的实现,以实现云间环境中网络+IT组合资源的优化配置。所建议的体系结构旨在为开发Intercloud中间件提供一个体系结构模型,并以这种方式促进云的互操作性和集成。
{"title":"Intercloud Architecture Framework for Heterogeneous Cloud Based Infrastructure Services Provisioning On-Demand","authors":"Y. Demchenko, C. Ngo, C. D. Laat, J. A. G. Espín, S. Figuerola, Juan Rodríguez Martinez, L. M. C. Murillo, G. Landi, N. Ciulli","doi":"10.1109/WAINA.2013.237","DOIUrl":"https://doi.org/10.1109/WAINA.2013.237","url":null,"abstract":"This paper presents on-going research to develop the Intercloud Architecture Framework (ICAF) that addresses problems in multi-provider multi-domain heterogeneous cloud based infrastructure services and applications integration and interoperability, to allow their on-demand provisioning. The paper refers to existing standards and ongoing standardisation activity in Cloud Computing, in particular, recently published NIST Cloud Computing Reference Architecture (CCRA) and ITU-T JCA-Cloud activity. The proposed ICAF defines four complementary components addressing Intercloud integration and interoperability: multi-layer Cloud Services Model that combines commonly adopted cloud service models, such as IaaS, PaaS, SaaS, in one multilayer model with corresponding inter-layer interfaces, Intercloud Control and Management Plane that supports cloud based applications interaction, Intercloud Federation Framework, and Intercloud Operations Framework. The paper briefly describes the Service delivery and lifecycle management as an important ICAF component that provides a basis for consistent management and security of the provisioned on-demand complex cloud based services. The paper describes an implementation of the Intercloud Control and Management Plane in the GEYSERS project to allow optimal provisioning of the combined Network+IT resources in the inter-cloud environment. The proposed architecture is intended to provide an architectural model for developing Intercloud middleware and in this way will facilitate clouds interoperability and integration.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117276704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Mobile Digcovery: A Global Service Discovery for the Internet of Things 移动发现:物联网的全球服务发现
A. Jara, Pablo López, D. Fernández, Jose F. Castillo, M. A. Zamora, A. Gómez-Skarmeta
Internet of Things (IoT) enables a homogeneous and seamless machine to machine (M2M) between any Internet-enabled devices in the real world. IoT provides global communications, access to services and information for the development of Smart Cities, environmental monitoring, bus tracking and parking. For this purpose, IoT requires scalability, extensibility, and integration of emerging resources in order to reach a suitable ecosystem for data acquisition and interaction with the citizens. This work presents a way to interact with the IoT through a homogeneous and suitable mechanism for the global resource discovery of devices and sensors on different scenarios. For discovery purpose, a infrastructure called "digcovery" is defined for maximizing efficiency and sustainability of deployments offering the framework to allow users to register/include their own sensors into a common infrastructure, and access/discover the available resources through a mobile phone. This presents how to use the smartphone capabilities, in terms of identification, geo-location and context-awareness, to access and interact with the available resources that are surrounding us.
物联网(IoT)能够在现实世界中任何支持互联网的设备之间实现同构和无缝的机器对机器(M2M)。物联网为智能城市的发展、环境监测、公交车跟踪和停车提供全球通信、服务和信息。为此,物联网需要可扩展性、可扩展性和新兴资源的整合,以便为数据采集和与市民互动建立合适的生态系统。这项工作提出了一种与物联网交互的方法,通过同质和合适的机制来发现不同场景下的设备和传感器的全球资源。为了发现目的,定义了一个称为“发现”的基础设施,以最大限度地提高部署的效率和可持续性,提供框架,允许用户将自己的传感器注册/包含到公共基础设施中,并通过移动电话访问/发现可用资源。这展示了如何使用智能手机的功能,在识别、地理定位和上下文感知方面,访问我们周围的可用资源并与之交互。
{"title":"Mobile Digcovery: A Global Service Discovery for the Internet of Things","authors":"A. Jara, Pablo López, D. Fernández, Jose F. Castillo, M. A. Zamora, A. Gómez-Skarmeta","doi":"10.1109/WAINA.2013.261","DOIUrl":"https://doi.org/10.1109/WAINA.2013.261","url":null,"abstract":"Internet of Things (IoT) enables a homogeneous and seamless machine to machine (M2M) between any Internet-enabled devices in the real world. IoT provides global communications, access to services and information for the development of Smart Cities, environmental monitoring, bus tracking and parking. For this purpose, IoT requires scalability, extensibility, and integration of emerging resources in order to reach a suitable ecosystem for data acquisition and interaction with the citizens. This work presents a way to interact with the IoT through a homogeneous and suitable mechanism for the global resource discovery of devices and sensors on different scenarios. For discovery purpose, a infrastructure called \"digcovery\" is defined for maximizing efficiency and sustainability of deployments offering the framework to allow users to register/include their own sensors into a common infrastructure, and access/discover the available resources through a mobile phone. This presents how to use the smartphone capabilities, in terms of identification, geo-location and context-awareness, to access and interact with the available resources that are surrounding us.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116375341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
A Recommendation Exchange Protocol between Smart Devices in Pervasive Computing Environment 普适计算环境下智能设备间的推荐交换协议
N. Iltaf, Abdul Ghafoor, Usman Zia
A framework to exchange structured recommendation information (Trust-AML) between smart devices in pervasive environment (Trust-AML) is proposed. The specification of Trust-AML is inspired by the design principles of other standard-izations and XML design guideline. A XML-over-UDP based recommendation exchange protocol is also proposed to share recommendation information between smart devices. Implementation of the proposed model on android smart phone using open services gateway initiative (OSGI) in presented to demonstrate the effectiveness of the protocol in pervasive computing environment.
提出了一种普适环境下智能设备间结构化推荐信息交换框架(Trust-AML)。Trust-AML规范的灵感来自于其他标准化和XML设计指南的设计原则。提出了一种基于XML-over-UDP的推荐交换协议,实现智能设备间的推荐信息共享。最后利用开放服务网关倡议(OSGI)在android智能手机上实现了该模型,验证了该协议在普适计算环境下的有效性。
{"title":"A Recommendation Exchange Protocol between Smart Devices in Pervasive Computing Environment","authors":"N. Iltaf, Abdul Ghafoor, Usman Zia","doi":"10.1109/WAINA.2013.260","DOIUrl":"https://doi.org/10.1109/WAINA.2013.260","url":null,"abstract":"A framework to exchange structured recommendation information (Trust-AML) between smart devices in pervasive environment (Trust-AML) is proposed. The specification of Trust-AML is inspired by the design principles of other standard-izations and XML design guideline. A XML-over-UDP based recommendation exchange protocol is also proposed to share recommendation information between smart devices. Implementation of the proposed model on android smart phone using open services gateway initiative (OSGI) in presented to demonstrate the effectiveness of the protocol in pervasive computing environment.","PeriodicalId":359251,"journal":{"name":"2013 27th International Conference on Advanced Information Networking and Applications Workshops","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124466747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 27th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1