首页 > 最新文献

2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)最新文献

英文 中文
Integrating Real and Digital Games with Data Analytics for Water Consumption Behavioral Change: A Demo 将真实和数字游戏与水消费行为改变的数据分析相结合:演示
P. Fraternali, G. Baroffio, C. Pasini, Luca Galli, I. Micheel, J. Novak, A. Rizzoli
The demo showcases the SmartH2O platform1, a system for water demand management based on an original mix of data analytics and behavioral science. SmartH2O collects consumption data from the automatic meter infrastructure of a (water) utility and allows customers access them in a Web portal, where they can see information about their actual and forecasted consumption, compare with the neighborhood, and obtain personalized water saving tips and leak alerts. Engagement is reinforced through a unique mix of in-app gamification techniques, digital educational games and real board games, which provide a rich set of behavior change stimuli to all household members. Lab tests show good acceptance and engagement by pilot users, deployment to a large set of consumers is scheduled shortly.
该演示展示了SmartH2O平台1,这是一个基于数据分析和行为科学的原始混合的水需求管理系统。SmartH2O从(水)公用事业公司的自动仪表基础设施收集消费数据,并允许客户通过门户网站访问这些数据,在那里他们可以看到他们实际和预测的消费信息,与邻居进行比较,并获得个性化的节水提示和泄漏警报。通过应用内游戏化技术、数字教育游戏和真正的桌面游戏的独特组合,为所有家庭成员提供了丰富的行为改变刺激,从而增强了用户粘性。实验室测试显示,试点用户接受度和参与度很高,很快就会部署到大量用户中。
{"title":"Integrating Real and Digital Games with Data Analytics for Water Consumption Behavioral Change: A Demo","authors":"P. Fraternali, G. Baroffio, C. Pasini, Luca Galli, I. Micheel, J. Novak, A. Rizzoli","doi":"10.1109/UCC.2015.68","DOIUrl":"https://doi.org/10.1109/UCC.2015.68","url":null,"abstract":"The demo showcases the SmartH2O platform1, a system for water demand management based on an original mix of data analytics and behavioral science. SmartH2O collects consumption data from the automatic meter infrastructure of a (water) utility and allows customers access them in a Web portal, where they can see information about their actual and forecasted consumption, compare with the neighborhood, and obtain personalized water saving tips and leak alerts. Engagement is reinforced through a unique mix of in-app gamification techniques, digital educational games and real board games, which provide a rich set of behavior change stimuli to all household members. Lab tests show good acceptance and engagement by pilot users, deployment to a large set of consumers is scheduled shortly.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125144949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Bursting with Possibilities -- An Empirical Study of Credit-Based Bursting Cloud Instance Types 爆发的可能性——基于信用的爆发云实例类型的实证研究
P. Leitner, Joel Scheuner
We study the performance and cost efficiency as perceived by the end user of a specific class of Infrastructure-as-a-Service (IaaS) cloud instances, namely credit-based bursting instances. This class of instance types has been introduced by Amazon EC2 in summer 2014, and behaves on a fundamental level differently than any other existing instance type, either from EC2 or other vendors. We introduce a basic formal model for fostering the understanding and analysis of these types, and empirically study their performance in practice. Further, we compare the performance of credit-based bursting cloud instance types to existing general-purpose types, and derive potential use cases for practitioners. Our results indicate that bursting instance types are cost-efficient for CPU-bound applications with an average utilization of less than 40%, as well as for non-critical IO-bound applications. Finally, we also discuss a simple boosting scheme that enables practitioners to improve the cost efficiency of their bursting instance usage under given constraints.
我们研究了特定类别的基础设施即服务(IaaS)云实例(即基于信用的爆发实例)的最终用户所感知的性能和成本效率。这类实例类型是在2014年夏天由Amazon EC2引入的,它的行为在基本层面上不同于任何其他现有的实例类型,无论是来自EC2还是其他供应商。我们引入了一个基本的形式化模型来促进对这些类型的理解和分析,并实证研究了它们在实践中的表现。此外,我们将基于信用的爆发云实例类型的性能与现有的通用类型进行了比较,并为从业者导出了潜在的用例。我们的结果表明,对于平均利用率低于40%的cpu绑定应用程序以及非关键io绑定应用程序,突发实例类型具有成本效益。最后,我们还讨论了一种简单的增强方案,使从业者能够在给定约束下提高其突发实例使用的成本效率。
{"title":"Bursting with Possibilities -- An Empirical Study of Credit-Based Bursting Cloud Instance Types","authors":"P. Leitner, Joel Scheuner","doi":"10.1109/UCC.2015.39","DOIUrl":"https://doi.org/10.1109/UCC.2015.39","url":null,"abstract":"We study the performance and cost efficiency as perceived by the end user of a specific class of Infrastructure-as-a-Service (IaaS) cloud instances, namely credit-based bursting instances. This class of instance types has been introduced by Amazon EC2 in summer 2014, and behaves on a fundamental level differently than any other existing instance type, either from EC2 or other vendors. We introduce a basic formal model for fostering the understanding and analysis of these types, and empirically study their performance in practice. Further, we compare the performance of credit-based bursting cloud instance types to existing general-purpose types, and derive potential use cases for practitioners. Our results indicate that bursting instance types are cost-efficient for CPU-bound applications with an average utilization of less than 40%, as well as for non-critical IO-bound applications. Finally, we also discuss a simple boosting scheme that enables practitioners to improve the cost efficiency of their bursting instance usage under given constraints.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"42 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120846963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
SLAM: SLA Monitoring Framework for Federated Cloud Services SLAM:联邦云服务的SLA监控框架
Saadeldin Moustafa, Khalid Elgazzar, Patrick Martin, Marwa A. Elsayed
This paper presents SLAM, a customizable platform-independent SLA monitoring framework for federated cloud services. It supports monitoring of distributed nodes and hosts using an agent-based model. The framework generates monitoring templates according to the SLA terms that describe monitoring requirements and creates monitoring reports based on these generated templates. In addition, we propose a service benchmarking approach that can compare similar services offered by different providers without deploying monitoring agents on the providers' sites.
本文介绍了SLAM,一种用于联邦云服务的可定制的独立于平台的SLA监视框架。它支持使用基于代理的模型监视分布式节点和主机。框架根据描述监视需求的SLA术语生成监视模板,并基于这些生成的模板创建监视报告。此外,我们提出了一种服务基准测试方法,该方法可以比较不同提供者提供的类似服务,而无需在提供者的站点上部署监视代理。
{"title":"SLAM: SLA Monitoring Framework for Federated Cloud Services","authors":"Saadeldin Moustafa, Khalid Elgazzar, Patrick Martin, Marwa A. Elsayed","doi":"10.1109/UCC.2015.90","DOIUrl":"https://doi.org/10.1109/UCC.2015.90","url":null,"abstract":"This paper presents SLAM, a customizable platform-independent SLA monitoring framework for federated cloud services. It supports monitoring of distributed nodes and hosts using an agent-based model. The framework generates monitoring templates according to the SLA terms that describe monitoring requirements and creates monitoring reports based on these generated templates. In addition, we propose a service benchmarking approach that can compare similar services offered by different providers without deploying monitoring agents on the providers' sites.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130705949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
CloudSimDisk: Energy-Aware Storage Simulation in CloudSim CloudSimDisk: CloudSim中的能量感知存储模拟
B. Louis, Karan Mitra, S. Saguna, C. Åhlund
The cloud computing paradigm is continually evolving, and with it, the size and the complexity of its infrastructure. Assessing the performance of a cloud environment is an essential but an arduous task. Further, the energy consumed by data centers is steadily increasing and major components such as the storage systems need to be more energy efficient. Cloud simulation tools have proved quite useful to study these issues. However, these simulation tools lack mechanisms to study energy efficient storage in cloud systems. This paper contributes in the area of cloud computing by extending the widely used cloud simulator CloudSim. In this paper, we propose CloudSimDisk, a scalable module for modeling and simulation of energy-aware storage in cloud systems. We show how CloudSimDisk can be used to simulate energy-aware storage, and can be extended to study new algorithms for energy-awareness in cloud systems. Our simulation results proved to be in accordance with the analytical models that were developed to model energy consumption of hard disk drives in cloud systems. The source code of CloudSimDisk is also made available for the research community for further testing and development.
云计算范式在不断发展,其基础设施的规模和复杂性也在不断发展。评估云环境的性能是一项必要但艰巨的任务。此外,数据中心消耗的能源正在稳步增加,存储系统等主要组件需要提高能源效率。云模拟工具已被证明对研究这些问题非常有用。然而,这些模拟工具缺乏研究云系统中节能存储的机制。本文通过对云模拟器CloudSim的扩展,在云计算领域做出了自己的贡献。在本文中,我们提出了CloudSimDisk,一个可扩展的模块,用于云系统中能量感知存储的建模和仿真。我们展示了如何使用CloudSimDisk来模拟能量感知存储,并可以扩展到研究云系统中能量感知的新算法。我们的仿真结果被证明与用于模拟云系统中硬盘驱动器能耗的分析模型是一致的。CloudSimDisk的源代码也可供研究社区进一步测试和开发。
{"title":"CloudSimDisk: Energy-Aware Storage Simulation in CloudSim","authors":"B. Louis, Karan Mitra, S. Saguna, C. Åhlund","doi":"10.1109/UCC.2015.15","DOIUrl":"https://doi.org/10.1109/UCC.2015.15","url":null,"abstract":"The cloud computing paradigm is continually evolving, and with it, the size and the complexity of its infrastructure. Assessing the performance of a cloud environment is an essential but an arduous task. Further, the energy consumed by data centers is steadily increasing and major components such as the storage systems need to be more energy efficient. Cloud simulation tools have proved quite useful to study these issues. However, these simulation tools lack mechanisms to study energy efficient storage in cloud systems. This paper contributes in the area of cloud computing by extending the widely used cloud simulator CloudSim. In this paper, we propose CloudSimDisk, a scalable module for modeling and simulation of energy-aware storage in cloud systems. We show how CloudSimDisk can be used to simulate energy-aware storage, and can be extended to study new algorithms for energy-awareness in cloud systems. Our simulation results proved to be in accordance with the analytical models that were developed to model energy consumption of hard disk drives in cloud systems. The source code of CloudSimDisk is also made available for the research community for further testing and development.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125118457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments 隐形数据库:在不可信的云环境中确保用户控制的查询
Josef Spillner, Martin Beck, A. Schill, T. Bohnert
Sensitive data is increasingly being hosted online in ubiquitous cloud storage services. Recent advances in multi-cloud service integration through provider multiplexing and data dispersion have alleviated most of the associated risks for hosting files which are retrieved by users for further processing. However, for structured data managed in databases, many issues remain, including the need to perform operations directly on the remote data to avoid costly transfers. In this paper, we motivate the need for distributed stealth databases which combine properties from structure-preserving dispersed file storage for capacity-saving increased availability with emerging work on structure-preserving encryption for on-demand increased confidentiality with controllable performance degradation. We contribute an analysis of operators executing in map-reduce or map-carry-reduce phases and derive performance statistics. Our prototype, StealthDB, demonstrates that for typical amounts of personal structured data, stealth databases are a convincing concept for taming untrusted and unsafe cloud environments.
越来越多的敏感数据被托管在无处不在的云存储服务中。通过提供商多路复用和数据分散,多云服务集成方面的最新进展减轻了托管文件的大部分相关风险,这些文件由用户检索以进行进一步处理。然而,对于在数据库中管理的结构化数据,仍然存在许多问题,包括需要直接对远程数据执行操作,以避免代价高昂的传输。在本文中,我们激发了对分布式隐身数据库的需求,该数据库结合了保持结构的分散文件存储的特性,以节省容量,提高可用性,以及在保持结构的加密方面的新兴工作,以实现随需增加的机密性和可控的性能退化。我们分析了在map-reduce或map-carry-reduce阶段执行的运算符,并得出了性能统计数据。我们的原型StealthDB表明,对于典型的个人结构化数据量,隐形数据库对于驯服不可信和不安全的云环境是一个令人信服的概念。
{"title":"Stealth Databases: Ensuring User-Controlled Queries in Untrusted Cloud Environments","authors":"Josef Spillner, Martin Beck, A. Schill, T. Bohnert","doi":"10.1109/UCC.2015.44","DOIUrl":"https://doi.org/10.1109/UCC.2015.44","url":null,"abstract":"Sensitive data is increasingly being hosted online in ubiquitous cloud storage services. Recent advances in multi-cloud service integration through provider multiplexing and data dispersion have alleviated most of the associated risks for hosting files which are retrieved by users for further processing. However, for structured data managed in databases, many issues remain, including the need to perform operations directly on the remote data to avoid costly transfers. In this paper, we motivate the need for distributed stealth databases which combine properties from structure-preserving dispersed file storage for capacity-saving increased availability with emerging work on structure-preserving encryption for on-demand increased confidentiality with controllable performance degradation. We contribute an analysis of operators executing in map-reduce or map-carry-reduce phases and derive performance statistics. Our prototype, StealthDB, demonstrates that for typical amounts of personal structured data, stealth databases are a convincing concept for taming untrusted and unsafe cloud environments.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Is Cloud Storage Ready? A Comprehensive Study of IP-Based Storage Systems 云存储准备好了吗?基于ip的存储系统综合研究
Zhonghong Ou, Zhen-Huan Hwang, Feng Chen, Ren Wang, Antti Ylä-Jääski
Traditionally, network storage systems have mainly been dominated by two IP-based storage technologies, i.e., Network Attached Storage (NAS) and Storage Area Network (SAN). In recent years, cloud based storage (e.g., Amazon S3) has gained growing popularity for its high flexibility and cross-platform compatibility. Many enterprises are considering to replace traditional storage systems with cloud-based systems. Evaluating such a transition demands a systematic study on understanding the performance behaviours of the emerging cloud storage. To fill in this gap, in this paper, we conduct a comprehensive study on the three storage systems with realistic network conditions. Specifically, we select one representative from each category for comparison, i.e., Network File System (NFS) from NAS, Internet Small Computer System Interface (iSCSI) from SAN, and OpenStack Swift from cloud storage. We build a testbed and develop a suite of micro-benchmarks to study the impact of network complexities. Through a set of experiments and detailed analysis, we make several key observations: (1) iSCSI excels under good network conditions, e.g., in local area networks (LANs) where network delay and packet loss are trivial, (2) NFS and Swift are more suitable for complex networks such as wireless networks and Internet environment, (3) Swift is a viable replacement for NFS in all scenarios we investigate, and (4) system configuration on the client side impacts storage performance significantly and deserves adequate attention. We hope our findings can not only shed light on storage service design and optimizations, but also encourage more research on emerging storage technologies.
传统上,网络存储系统主要由两种基于ip的存储技术所主导,即NAS (network Attached storage)和SAN (storage Area network)。近年来,基于云的存储(例如Amazon S3)因其高灵活性和跨平台兼容性而越来越受欢迎。许多企业正在考虑用基于云的系统取代传统的存储系统。评估这种转变需要对理解新兴云存储的性能行为进行系统的研究。为了填补这一空白,本文对现实网络条件下的三种存储系统进行了全面的研究。具体来说,我们从每个类别中选择一个代表进行比较,即NAS中的网络文件系统(NFS), SAN中的互联网小型计算机系统接口(iSCSI)和云存储中的OpenStack Swift。我们建立了一个测试平台,并开发了一套微基准测试来研究网络复杂性的影响。通过一系列实验和详细的分析,我们得出了几个关键的观察结果:(1) iSCSI在良好的网络条件下表现出色,例如在局域网(lan)中,网络延迟和丢包是微不足道的;(2)NFS和Swift更适合于复杂的网络,例如无线网络和互联网环境;(3)Swift在我们研究的所有场景中都是NFS的可行替代品;(4)客户端系统配置对存储性能的影响很大,值得足够关注。我们希望我们的发现不仅可以为存储服务的设计和优化提供启发,还可以鼓励对新兴存储技术的更多研究。
{"title":"Is Cloud Storage Ready? A Comprehensive Study of IP-Based Storage Systems","authors":"Zhonghong Ou, Zhen-Huan Hwang, Feng Chen, Ren Wang, Antti Ylä-Jääski","doi":"10.1109/UCC.2015.14","DOIUrl":"https://doi.org/10.1109/UCC.2015.14","url":null,"abstract":"Traditionally, network storage systems have mainly been dominated by two IP-based storage technologies, i.e., Network Attached Storage (NAS) and Storage Area Network (SAN). In recent years, cloud based storage (e.g., Amazon S3) has gained growing popularity for its high flexibility and cross-platform compatibility. Many enterprises are considering to replace traditional storage systems with cloud-based systems. Evaluating such a transition demands a systematic study on understanding the performance behaviours of the emerging cloud storage. To fill in this gap, in this paper, we conduct a comprehensive study on the three storage systems with realistic network conditions. Specifically, we select one representative from each category for comparison, i.e., Network File System (NFS) from NAS, Internet Small Computer System Interface (iSCSI) from SAN, and OpenStack Swift from cloud storage. We build a testbed and develop a suite of micro-benchmarks to study the impact of network complexities. Through a set of experiments and detailed analysis, we make several key observations: (1) iSCSI excels under good network conditions, e.g., in local area networks (LANs) where network delay and packet loss are trivial, (2) NFS and Swift are more suitable for complex networks such as wireless networks and Internet environment, (3) Swift is a viable replacement for NFS in all scenarios we investigate, and (4) system configuration on the client side impacts storage performance significantly and deserves adequate attention. We hope our findings can not only shed light on storage service design and optimizations, but also encourage more research on emerging storage technologies.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Intercloud Control and Management Plane with XMPP 使用XMPP的云间控制和管理平面
Peter Membrey, Y. Demchenko
This paper introduces XMPP and suggests how this technology might be used to help implement Intercloud communication. It gives an introduction to XMPP and how the architecture fits together as well as a discussion of the services it provides 'out of the box'. It then discusses secondary benefits of the protocol and highlights how XMPP could be an appropriate base protocol for implementing the Intercloud Control and Management Plane. This is followed by discussion of early results from a research project that looks at the ease of extending XMPP and the tractability of the standardization process.
本文介绍了XMPP,并建议如何使用该技术帮助实现云间通信。它介绍了XMPP以及该体系结构如何组合在一起,并讨论了它提供的“开箱即用”服务。然后讨论了该协议的次要好处,并强调了XMPP如何成为实现云间控制和管理平面的适当基础协议。随后讨论了一个研究项目的早期结果,该项目着眼于扩展XMPP的便利性和标准化过程的可跟踪性。
{"title":"Intercloud Control and Management Plane with XMPP","authors":"Peter Membrey, Y. Demchenko","doi":"10.1109/UCC.2015.84","DOIUrl":"https://doi.org/10.1109/UCC.2015.84","url":null,"abstract":"This paper introduces XMPP and suggests how this technology might be used to help implement Intercloud communication. It gives an introduction to XMPP and how the architecture fits together as well as a discussion of the services it provides 'out of the box'. It then discusses secondary benefits of the protocol and highlights how XMPP could be an appropriate base protocol for implementing the Intercloud Control and Management Plane. This is followed by discussion of early results from a research project that looks at the ease of extending XMPP and the tractability of the standardization process.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121167066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Origin and Trustworthiness of Data in Smart City Applications 智慧城市应用中数据的来源与可信度
Aseel Alkhelaiwi, D. Grigoras
Mobile devices and their sensors facilitate the development of a large range of environment-sensing applications and systems. Crowd sensing is used to feed smart city applications with anonymous but still relevant data. The quality and success of smart city applications depend on several aspects of user involvement, such as data trust and information about data origin. However, with the anonymity and openness of crowd sensing, smart city applications are exposed to untrustworthy and malicious data that can lead to poor decisions. In this paper, we propose a cloud architecture for smart city applications that includes, as a core service, a reputation system for evaluating the trustworthiness of crowd sensing data. This service will run locally, as close to the crowd as possible, for example, on wireless local area network (WLAN) access points (AP). Additionally, data stored in the cloud is traceable by its origin information.
移动设备及其传感器促进了大范围环境传感应用和系统的发展。人群感知被用来为智慧城市应用程序提供匿名但仍然相关的数据。智慧城市应用的质量和成功取决于用户参与的几个方面,例如数据信任和数据来源信息。然而,由于人群感知的匿名性和开放性,智慧城市应用暴露在不可信和恶意的数据中,可能导致糟糕的决策。在本文中,我们提出了一种智慧城市应用的云架构,其中包括作为核心服务的声誉系统,用于评估人群感知数据的可信度。此服务将在本地运行,尽可能靠近人群,例如,在无线局域网(WLAN)接入点(AP)上运行。此外,存储在云中的数据可以通过其原始信息进行跟踪。
{"title":"The Origin and Trustworthiness of Data in Smart City Applications","authors":"Aseel Alkhelaiwi, D. Grigoras","doi":"10.1109/UCC.2015.60","DOIUrl":"https://doi.org/10.1109/UCC.2015.60","url":null,"abstract":"Mobile devices and their sensors facilitate the development of a large range of environment-sensing applications and systems. Crowd sensing is used to feed smart city applications with anonymous but still relevant data. The quality and success of smart city applications depend on several aspects of user involvement, such as data trust and information about data origin. However, with the anonymity and openness of crowd sensing, smart city applications are exposed to untrustworthy and malicious data that can lead to poor decisions. In this paper, we propose a cloud architecture for smart city applications that includes, as a core service, a reputation system for evaluating the trustworthiness of crowd sensing data. This service will run locally, as close to the crowd as possible, for example, on wireless local area network (WLAN) access points (AP). Additionally, data stored in the cloud is traceable by its origin information.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123840690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using Big Data Analytics for Authorship Authentication of Arabic Tweets 使用大数据分析进行阿拉伯语推文的作者身份验证
Jafar Albadarneh, Bashar Talafha, M. Al-Ayyoub, B. Zaqaibeh, Mohammad Al-Smadi, Y. Jararweh, E. Benkhelifa
Authorship authentication of a certain text is concerned with correctly attributing it to its author based on its contents. It is a very important problem with deep root in history as many classical texts have doubtful attributions. The information age and ubiquitous use of the Internet is further complicating this problem and adding more dimensions to it. We are interested in the modern version of this problem where the text whose authorship needs authentication is an online text found in online social networks. Specifically, we are interested in the authorship authentication of tweets. This is not the only challenging aspect we consider here. Another challenging aspect is the language of the tweets. Most current works and existing tools support English. We chose to focus on the very important, yet largely understudied, Arabic language. Finally, we add another challenging aspect to the problem at hand by addressing it at a very large scale. We present our effort to employ big data analytics to address the authorship authentication problem of Arabic tweets. We start by crawling a dataset of more than 53K tweets distributed across 20 authors. We then use preprocessing steps to clean the data and prepare it for analysis. The next step is to compute the feature vectors of each tweet. We use the Bag-Of-Words (BOW) approach and compute the weights using the Term Frequency-Inverse Document Frequency (TF-IDF). Then, we feed the dataset to a Naive Bayes classifier implemented on a parallel and distributed computing framework known as Hadoop. To the best of our knowledge, none of the previous works on authorship authentication of Arabic text addressed the unique challenges associated with (1) tweets and (2) large-scale datasets. This makes our work unique on many levels. The results show that the testing accuracy is not very high (61.6%), which is expected in the very challenging setting that we consider.
文本的作者身份认证是指根据文本的内容,正确地将文本归属于作者。这是一个有着深厚历史渊源的重要问题,因为许多经典文本都有可疑的出处。信息时代和互联网的普遍使用使这个问题进一步复杂化,并增加了更多的维度。我们感兴趣的是这个问题的现代版本,其作者身份需要认证的文本是在线社交网络中发现的在线文本。具体来说,我们对tweet的作者身份验证感兴趣。这并不是我们在这里考虑的唯一具有挑战性的方面。另一个具有挑战性的方面是推文的语言。大多数当前的作品和现有的工具支持英语。我们选择把重点放在非常重要、但在很大程度上未被充分研究的阿拉伯语上。最后,我们通过在非常大的范围内解决问题,为手头的问题增加了另一个具有挑战性的方面。我们展示了我们的努力,采用大数据分析来解决阿拉伯语推文的作者身份认证问题。我们首先爬取分布在20位作者的超过53K条推文的数据集。然后,我们使用预处理步骤来清理数据并为分析做准备。下一步是计算每条推文的特征向量。我们使用词袋(BOW)方法,并使用术语频率-逆文档频率(TF-IDF)计算权重。然后,我们将数据集提供给在并行和分布式计算框架Hadoop上实现的朴素贝叶斯分类器。据我们所知,以前关于阿拉伯文本作者身份认证的工作都没有解决与(1)推文和(2)大规模数据集相关的独特挑战。这使得我们的工作在很多层面上都是独一无二的。结果表明,测试精度不是很高(61.6%),这在我们考虑的非常具有挑战性的设置中是预期的。
{"title":"Using Big Data Analytics for Authorship Authentication of Arabic Tweets","authors":"Jafar Albadarneh, Bashar Talafha, M. Al-Ayyoub, B. Zaqaibeh, Mohammad Al-Smadi, Y. Jararweh, E. Benkhelifa","doi":"10.1109/UCC.2015.80","DOIUrl":"https://doi.org/10.1109/UCC.2015.80","url":null,"abstract":"Authorship authentication of a certain text is concerned with correctly attributing it to its author based on its contents. It is a very important problem with deep root in history as many classical texts have doubtful attributions. The information age and ubiquitous use of the Internet is further complicating this problem and adding more dimensions to it. We are interested in the modern version of this problem where the text whose authorship needs authentication is an online text found in online social networks. Specifically, we are interested in the authorship authentication of tweets. This is not the only challenging aspect we consider here. Another challenging aspect is the language of the tweets. Most current works and existing tools support English. We chose to focus on the very important, yet largely understudied, Arabic language. Finally, we add another challenging aspect to the problem at hand by addressing it at a very large scale. We present our effort to employ big data analytics to address the authorship authentication problem of Arabic tweets. We start by crawling a dataset of more than 53K tweets distributed across 20 authors. We then use preprocessing steps to clean the data and prepare it for analysis. The next step is to compute the feature vectors of each tweet. We use the Bag-Of-Words (BOW) approach and compute the weights using the Term Frequency-Inverse Document Frequency (TF-IDF). Then, we feed the dataset to a Naive Bayes classifier implemented on a parallel and distributed computing framework known as Hadoop. To the best of our knowledge, none of the previous works on authorship authentication of Arabic text addressed the unique challenges associated with (1) tweets and (2) large-scale datasets. This makes our work unique on many levels. The results show that the testing accuracy is not very high (61.6%), which is expected in the very challenging setting that we consider.","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124616532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A Study of YouTube Recommendation Graph Based on Measurements and Stochastic Tools 基于测量和随机工具的YouTube推荐图研究
Y. Portilla, Alexandre Reiffers, E. Altman, R. E. Azouzi
The Youtube recommendation is one the most important view source of a video. In this paper, we focus on the recommendation system in boosting the popularity of videos. We first construct a graph that captures the recommendation system in Youtube and study empirically the relationship between the number of views of a video and the average number of views of the videos in its recommendation list. We then consider a random walker on the recommendation graph, i.e. a random user that browses through videos such that the video it chooses to watch is selected randomly among the videos in the recommendation list of the previous video it watched. We study the stability properties of this random process and we show that the trajectory obtained does not contain cycles if the number of videos in the recommendation list is small (which is the case if the computer's screen is small).
Youtube推荐是视频最重要的观看来源之一。在本文中,我们主要研究推荐系统在提高视频流行度方面的作用。我们首先构建了一个捕获Youtube推荐系统的图,并经验地研究了视频的观看次数与其推荐列表中视频的平均观看次数之间的关系。然后我们考虑推荐图上的随机漫步者,即随机用户浏览视频,其选择观看的视频是在其观看的前一个视频的推荐列表中随机选择的。我们研究了这个随机过程的稳定性,并证明了如果推荐列表中的视频数量很少(这是计算机屏幕很小的情况),得到的轨迹不包含循环。
{"title":"A Study of YouTube Recommendation Graph Based on Measurements and Stochastic Tools","authors":"Y. Portilla, Alexandre Reiffers, E. Altman, R. E. Azouzi","doi":"10.1109/UCC.2015.77","DOIUrl":"https://doi.org/10.1109/UCC.2015.77","url":null,"abstract":"The Youtube recommendation is one the most important view source of a video. In this paper, we focus on the recommendation system in boosting the popularity of videos. We first construct a graph that captures the recommendation system in Youtube and study empirically the relationship between the number of views of a video and the average number of views of the videos in its recommendation list. We then consider a random walker on the recommendation graph, i.e. a random user that browses through videos such that the video it chooses to watch is selected randomly among the videos in the recommendation list of the previous video it watched. We study the stability properties of this random process and we show that the trajectory obtained does not contain cycles if the number of videos in the recommendation list is small (which is the case if the computer's screen is small).","PeriodicalId":381279,"journal":{"name":"2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125001545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2015 IEEE/ACM 8th International Conference on Utility and Cloud Computing (UCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1