首页 > 最新文献

2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)最新文献

英文 中文
Improving Data Governance in Large Organizations through Ontology and Linked Data 通过本体和关联数据改善大型组织的数据治理
R. DeStefano, Lixin Tao, Keke Gai
In the past decade, the role of data has increased exponentially from something that is queried or reported on, to becoming a true corporate asset. The same time period has also seen marked growth in corporate structural complexity. This combination has lead to information management challenges, as the data moving across a multitude of systems lends itself to a higher likelihood of impacting dependent processes and systems, should something go wrong or be changed. Many enterprise data projects are faced with low success rates and consequently subject to high amounts of scrutiny as senior leadership struggles to identify return on investment. While there are many tools and methods to increase a companies' ability to govern data, this research is based on the premise that you can not govern what you do not know. This lack of awareness of the corporate data landscape impacts the ability to govern data, which in turn impacts overall data quality within organizations. This paper seeks to propose a tools and techniques for companies to better gain an awareness of the landscape of their data, processes, and organizational attributes through the use of linked data, via the Resource Description Framework (RDF) and ontology. The outcome of adopting such techniques is an increased level of data awareness within the organization, resulting in improved ability to govern corporate data assets, and in turn increased data quality.
在过去的十年中,数据的作用呈指数级增长,从查询或报告的东西,成为真正的企业资产。同一时期,企业结构的复杂性也出现了显著增长。这种组合带来了信息管理方面的挑战,因为数据在多个系统之间移动,如果出现问题或进行更改,则更有可能影响相关流程和系统。许多企业数据项目都面临着低成功率,并因此受到高层领导努力确定投资回报的大量审查。虽然有许多工具和方法可以提高公司管理数据的能力,但本研究的前提是,你无法管理你不知道的东西。缺乏对企业数据环境的认识会影响管理数据的能力,进而影响组织内的整体数据质量。本文试图通过资源描述框架(RDF)和本体,为公司提供一种工具和技术,以便通过使用关联数据,更好地了解其数据、流程和组织属性的情况。采用这种技术的结果是提高了组织内部的数据意识水平,从而提高了管理公司数据资产的能力,进而提高了数据质量。
{"title":"Improving Data Governance in Large Organizations through Ontology and Linked Data","authors":"R. DeStefano, Lixin Tao, Keke Gai","doi":"10.1109/CSCloud.2016.47","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.47","url":null,"abstract":"In the past decade, the role of data has increased exponentially from something that is queried or reported on, to becoming a true corporate asset. The same time period has also seen marked growth in corporate structural complexity. This combination has lead to information management challenges, as the data moving across a multitude of systems lends itself to a higher likelihood of impacting dependent processes and systems, should something go wrong or be changed. Many enterprise data projects are faced with low success rates and consequently subject to high amounts of scrutiny as senior leadership struggles to identify return on investment. While there are many tools and methods to increase a companies' ability to govern data, this research is based on the premise that you can not govern what you do not know. This lack of awareness of the corporate data landscape impacts the ability to govern data, which in turn impacts overall data quality within organizations. This paper seeks to propose a tools and techniques for companies to better gain an awareness of the landscape of their data, processes, and organizational attributes through the use of linked data, via the Resource Description Framework (RDF) and ontology. The outcome of adopting such techniques is an increased level of data awareness within the organization, resulting in improved ability to govern corporate data assets, and in turn increased data quality.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122556802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Energy-Aware Optimal Task Assignment for Mobile Heterogeneous Embedded Systems in Cloud Computing 云计算中移动异构嵌入式系统的能量感知优化任务分配
Keke Gai, Meikang Qiu, Hui Zhao, Meiqin Liu
Recent quick expansions of mobile heterogeneous embedded systems have led to a remarkable hardware upgrade that support multiple core processors. The energy consumption is becoming greater along with the computation capacity grows. Cloud computing is considered one of the solutions to mitigating energy costs. However, the simply offloading the computations to the remote side cannot efficiently reduce the energy consumptions when the energy costs caused by wireless communications are greater than it is on mobile devices. In this paper, we focus on the problem of energy wastes when tasks are assigned to remote cloud servers or heterogeneous core processors. Our solution aims to minimize the total energy cost of the mobile heterogeneous embedded systems by using an optimal task assignment to heterogeneous cores and mobile clouds. The propose model is named as Energy-Aware Heterogeneous Resource Management Model (EA-HRM2), which is supported by a main algorithm Optimal Heterogeneous Task Assignment (OHTA) algorithm. Our experimental evaluations have proved our approach is effective to save energy when deploying heterogenous embedded systems in mobile cloud systems.
最近移动异构嵌入式系统的快速扩展导致了支持多核处理器的显著硬件升级。随着计算能力的增长,能耗也越来越大。云计算被认为是降低能源成本的解决方案之一。然而,当无线通信带来的能源成本大于移动设备时,简单地将计算卸载到远程端并不能有效地降低能耗。在本文中,我们重点研究了当任务分配给远程云服务器或异构核心处理器时的能源浪费问题。我们的解决方案旨在通过对异构核心和移动云使用最优任务分配来最小化移动异构嵌入式系统的总能源成本。该模型被命名为能量感知异构资源管理模型(EA-HRM2),该模型的主要算法是最优异构任务分配(OHTA)算法。我们的实验评估证明,当在移动云系统中部署异构嵌入式系统时,我们的方法可以有效地节省能源。
{"title":"Energy-Aware Optimal Task Assignment for Mobile Heterogeneous Embedded Systems in Cloud Computing","authors":"Keke Gai, Meikang Qiu, Hui Zhao, Meiqin Liu","doi":"10.1109/CSCloud.2016.48","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.48","url":null,"abstract":"Recent quick expansions of mobile heterogeneous embedded systems have led to a remarkable hardware upgrade that support multiple core processors. The energy consumption is becoming greater along with the computation capacity grows. Cloud computing is considered one of the solutions to mitigating energy costs. However, the simply offloading the computations to the remote side cannot efficiently reduce the energy consumptions when the energy costs caused by wireless communications are greater than it is on mobile devices. In this paper, we focus on the problem of energy wastes when tasks are assigned to remote cloud servers or heterogeneous core processors. Our solution aims to minimize the total energy cost of the mobile heterogeneous embedded systems by using an optimal task assignment to heterogeneous cores and mobile clouds. The propose model is named as Energy-Aware Heterogeneous Resource Management Model (EA-HRM2), which is supported by a main algorithm Optimal Heterogeneous Task Assignment (OHTA) algorithm. Our experimental evaluations have proved our approach is effective to save energy when deploying heterogenous embedded systems in mobile cloud systems.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131252118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Shortest Processing Time First Algorithm for Hadoop Hadoop的最短处理时间优先算法
Laurent Bobelin, P. Martineau, Di Zhao, Haiwu He
Big data has revealed itself as a powerful tool for many sectors ranging from science to business. Distributed data-parallel computing is then common nowadays: using a large number of computing and storage resources makes possible data processing of a yet unknown scale. But to develop large-scale distributed big data processing, we have to tackle many challenges. One of the most complex is scheduling. As it is known to be an optimal online scheduling policy when it comes to minimize the average flowtime, Shortest Processing Time First (SPT) is a classic scheduling policy used in many systems. We then decided to integrate this policy into Hadoop, a framework for big data processing, and realize an implementation prototype. This paper describes this integration, as well as tests results obtained on our testbed.
从科学到商业,大数据已经成为许多领域的强大工具。分布式数据并行计算现在很常见:使用大量的计算和存储资源使得未知规模的数据处理成为可能。但要发展大规模分布式大数据处理,还需要解决许多挑战。其中最复杂的是日程安排。当涉及到最小化平均流时间时,它被认为是最优的在线调度策略,因此最短处理时间优先(SPT)是许多系统中使用的经典调度策略。然后我们决定将这个策略集成到Hadoop这个大数据处理框架中,并实现一个实现原型。本文描述了这种集成,以及在我们的测试平台上得到的测试结果。
{"title":"Shortest Processing Time First Algorithm for Hadoop","authors":"Laurent Bobelin, P. Martineau, Di Zhao, Haiwu He","doi":"10.1109/CSCloud.2016.12","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.12","url":null,"abstract":"Big data has revealed itself as a powerful tool for many sectors ranging from science to business. Distributed data-parallel computing is then common nowadays: using a large number of computing and storage resources makes possible data processing of a yet unknown scale. But to develop large-scale distributed big data processing, we have to tackle many challenges. One of the most complex is scheduling. As it is known to be an optimal online scheduling policy when it comes to minimize the average flowtime, Shortest Processing Time First (SPT) is a classic scheduling policy used in many systems. We then decided to integrate this policy into Hadoop, a framework for big data processing, and realize an implementation prototype. This paper describes this integration, as well as tests results obtained on our testbed.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"427 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133888501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Controlling a Car Through OBD Injection 通过OBD喷射控制汽车
Yu Zhang, Binbin Ge, Xiang Li, Bin Shi, Bo Li
Internet of vehicles(IOV) is an application of Internet of things in Intelligent Transport System, and has attracted high attention of researchers. IOV brings network connectivity to traditional vehicles, while also introduces security risks. This paper presents experimental analysis on the security of vehicles with Internet connections and propose an approach to Controlling a Car Through OBD Injection. In the experiments, we successfully penetrated several types of cars in a wireless way. We also put out a multi-level safety model of cars, which divides cars into different groups and gives analysis and explanations of each group. All of these things are done for indicating a point of view that traditional cars are not safe enough on information security. It is surely risky to put a car without the ability to resist the attack of informational ways into the Internet of vehicles.
车联网(IOV)是物联网在智能交通系统中的应用,受到了研究人员的高度关注。车联网为传统车辆带来网络连接的同时,也带来了安全隐患。本文对联网车辆的安全性进行了实验分析,提出了一种通过OBD注入控制汽车的方法。在实验中,我们成功地通过无线方式渗透了几种类型的汽车。我们还提出了多层次的汽车安全模型,将汽车划分为不同的类别,并对每个类别进行了分析和解释。所有这些事情都是为了表明传统汽车在信息安全方面不够安全的观点。将一辆没有抵抗信息攻击能力的汽车放入汽车互联网肯定是有风险的。
{"title":"Controlling a Car Through OBD Injection","authors":"Yu Zhang, Binbin Ge, Xiang Li, Bin Shi, Bo Li","doi":"10.1109/CSCloud.2016.42","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.42","url":null,"abstract":"Internet of vehicles(IOV) is an application of Internet of things in Intelligent Transport System, and has attracted high attention of researchers. IOV brings network connectivity to traditional vehicles, while also introduces security risks. This paper presents experimental analysis on the security of vehicles with Internet connections and propose an approach to Controlling a Car Through OBD Injection. In the experiments, we successfully penetrated several types of cars in a wireless way. We also put out a multi-level safety model of cars, which divides cars into different groups and gives analysis and explanations of each group. All of these things are done for indicating a point of view that traditional cars are not safe enough on information security. It is surely risky to put a car without the ability to resist the attack of informational ways into the Internet of vehicles.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"617 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116211260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Cyber Security, a Threat to Cyber Banking in South Africa: An Approach to Network and Application Security 网络安全,对南非网络银行的威胁:网络和应用安全的途径
Thierry Mbah Mbelli, B. Dwolatzky
This paper looks at cyber security threats to cyber banking in South Africa. Cyber-attacks on information systems, especially financial systems have been a common phenomenon in recent times. This phenomenon has spurred financial institutions in South Africa to look at risk management as a crucial entity in their business model. Continuous investment in up-to-date security measures and technologies helps to prevent heavy financial and information loses that may be caused by cyber-attacks. The growth of cyber-crimes is becoming a serious economic issue to South African organizations in particular and the country as a whole. This paper begins by analyzing the various cyber threats involved in cyber banking. Secondly, it proposes a cyber-banking security architecture, with the boundary and application security. The boundary security architecture comprises of four components and the application security proposes strategies to avoid vulnerabilities. Lastly this paper proposes a cyber-banking security framework to be adopted by financial institutions.
本文着眼于南非网络银行面临的网络安全威胁。近年来,对信息系统,特别是金融系统的网络攻击已成为一种普遍现象。这一现象促使南非的金融机构将风险管理视为其商业模式中的一个关键实体。不断投资于最新的安全措施和技术,有助防止因网络攻击而造成严重的财务和信息损失。网络犯罪的增长正成为南非组织乃至整个国家的严重经济问题。本文首先分析了网络银行所涉及的各种网络威胁。其次,提出了网络银行的安全体系结构,包括边界安全和应用安全。边界安全体系结构由四个部分组成,应用安全提出了避免漏洞的策略。最后,本文提出了一个可供金融机构采用的网络银行安全框架。
{"title":"Cyber Security, a Threat to Cyber Banking in South Africa: An Approach to Network and Application Security","authors":"Thierry Mbah Mbelli, B. Dwolatzky","doi":"10.1109/CSCloud.2016.18","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.18","url":null,"abstract":"This paper looks at cyber security threats to cyber banking in South Africa. Cyber-attacks on information systems, especially financial systems have been a common phenomenon in recent times. This phenomenon has spurred financial institutions in South Africa to look at risk management as a crucial entity in their business model. Continuous investment in up-to-date security measures and technologies helps to prevent heavy financial and information loses that may be caused by cyber-attacks. The growth of cyber-crimes is becoming a serious economic issue to South African organizations in particular and the country as a whole. This paper begins by analyzing the various cyber threats involved in cyber banking. Secondly, it proposes a cyber-banking security architecture, with the boundary and application security. The boundary security architecture comprises of four components and the application security proposes strategies to avoid vulnerabilities. Lastly this paper proposes a cyber-banking security framework to be adopted by financial institutions.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122395959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
A Correctness Verification Method for C Programs Based on VCC 一种基于VCC的C程序正确性验证方法
Hongliang Liang, Daijie Zhang, Xiaoxiao Pei, Xiaodong Jia, Guangyuan Li, Jiuyun Xu
The correctness of implementation codes is important especially for safety-critical software usually written in C programming language. We present a correctness verification method (CVM for short) for C codes based on an automatic theorem proving tool-VCC, and propose a specification simplification method to im-prove the correctness and readability of verification specification codes. Using CVM method, the scheduling module of a real-time operating system FreeRTOS6.1.1 is verified, which shows the feasibility and effectiveness when CVM method is applied to the real production software. Experiments show that the CVM method is feasible and effective in verifying the correctness the C codes, and the specification simplification method is also effective.
实现代码的正确性非常重要,特别是对于通常用C编程语言编写的安全关键软件。本文提出了一种基于自动定理证明工具vcc的C代码正确性验证方法(简称CVM),并提出了一种规范简化方法来提高验证规范代码的正确性和可读性。利用CVM方法对实时操作系统FreeRTOS6.1.1的调度模块进行了验证,验证了将CVM方法应用于实际生产软件的可行性和有效性。实验表明,CVM方法在验证C代码正确性方面是可行和有效的,规范简化方法也是有效的。
{"title":"A Correctness Verification Method for C Programs Based on VCC","authors":"Hongliang Liang, Daijie Zhang, Xiaoxiao Pei, Xiaodong Jia, Guangyuan Li, Jiuyun Xu","doi":"10.1109/CSCloud.2016.30","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.30","url":null,"abstract":"The correctness of implementation codes is important especially for safety-critical software usually written in C programming language. We present a correctness verification method (CVM for short) for C codes based on an automatic theorem proving tool-VCC, and propose a specification simplification method to im-prove the correctness and readability of verification specification codes. Using CVM method, the scheduling module of a real-time operating system FreeRTOS6.1.1 is verified, which shows the feasibility and effectiveness when CVM method is applied to the real production software. Experiments show that the CVM method is feasible and effective in verifying the correctness the C codes, and the specification simplification method is also effective.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117075795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Reinforcement Learning-Based Mixed Job Scheduler Scheme for Cloud Computing under SLA Constraint SLA约束下基于强化学习的云计算混合作业调度方案
Zhiping Peng, Delong Cui, Yuanjia Ma, Jianbin Xiong, Bo Xu, Weiwei Lin
Job scheduling is a necessary prerequisite for performance optimization and resource management in the cloud computing system. Focusing on accurate scaled cloud computing environment and efficient job scheduling under Virtual Machine (VM) resource and Server Level Agreement (SLA) constraints, we introduce the architecture of cloud computing platform and optimization job scheduling scheme in this study. The system model is comprised of clearly defined separate constituent parts, including portal, job scheduler, and resources pool. By analyzing the execution process of user jobs, we designed a novel job scheduling scheme based on reinforcement learning to minimize the makespan and Average Waiting Time (AWT) under the VM resource and deadline constraints, and employ parallel multi-age parallel technologies to balance the exploration and exploitation in learning process and accelerate the convergence of Q-learning algorithm. Both statistical and numerical analysis results demonstrate the efficiency of the proposed job scheduling scheme.
作业调度是云计算系统进行性能优化和资源管理的必要前提。针对云计算环境在虚拟机(VM)资源和服务器级别协议(SLA)约束下的精确伸缩和高效作业调度问题,介绍了云计算平台的体系结构和优化作业调度方案。系统模型由明确定义的独立组成部分组成,包括门户、作业调度器和资源池。通过对用户作业执行过程的分析,设计了一种基于强化学习的作业调度方案,在虚拟机资源和截止时间约束下最小化makespan和平均等待时间(AWT),并采用并行多年龄并行技术平衡学习过程中的探索和利用,加快Q-learning算法的收敛速度。统计分析和数值分析结果都证明了所提出的作业调度方案的有效性。
{"title":"A Reinforcement Learning-Based Mixed Job Scheduler Scheme for Cloud Computing under SLA Constraint","authors":"Zhiping Peng, Delong Cui, Yuanjia Ma, Jianbin Xiong, Bo Xu, Weiwei Lin","doi":"10.1109/CSCloud.2016.16","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.16","url":null,"abstract":"Job scheduling is a necessary prerequisite for performance optimization and resource management in the cloud computing system. Focusing on accurate scaled cloud computing environment and efficient job scheduling under Virtual Machine (VM) resource and Server Level Agreement (SLA) constraints, we introduce the architecture of cloud computing platform and optimization job scheduling scheme in this study. The system model is comprised of clearly defined separate constituent parts, including portal, job scheduler, and resources pool. By analyzing the execution process of user jobs, we designed a novel job scheduling scheme based on reinforcement learning to minimize the makespan and Average Waiting Time (AWT) under the VM resource and deadline constraints, and employ parallel multi-age parallel technologies to balance the exploration and exploitation in learning process and accelerate the convergence of Q-learning algorithm. Both statistical and numerical analysis results demonstrate the efficiency of the proposed job scheduling scheme.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"42 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132236905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A New Block-Based Data Distribution Mechanism in Cloud Computing 云计算中一种新的基于块的数据分发机制
Chandrima Dadi, P. Yi, Zongming Fei, Hui Lu
Cloud computing is a new paradigm that provides computing, storage and networking services to end users. Data distribution for cloud computing is different from that in traditional content distribution networks in that it has a direct implication on efficiency of using cloud resources. In this paper we propose a new block-based data distribution mechanism for cloud computing. Instead of using the whole file as a unit of delivery, we divide a file into blocks to improve the efficiency. We design a scheduling algorithm to manage the delivery of blocks to all receivers. The novel aspect of the algorithm is that it can achieve constant distribution time no matter how many receivers need to get the file. We further analyze the overhead caused by dividing a file into blocks. The performance results show that our mechanism can significantly reduce the distribution time, compared with the traditional method and a non-block-based method.
云计算是一种为最终用户提供计算、存储和网络服务的新模式。云计算的数据分发与传统内容分发网络的数据分发不同,它直接影响到云资源的使用效率。本文提出了一种新的基于块的云计算数据分发机制。我们不再使用整个文件作为交付单元,而是将文件分成块来提高效率。我们设计了一种调度算法来管理向所有接收器发送块。该算法的新颖之处在于,无论需要多少个接收方获取文件,它都可以实现恒定的分发时间。我们进一步分析将文件划分为块所造成的开销。性能结果表明,与传统方法和非基于块的方法相比,我们的机制可以显著缩短分发时间。
{"title":"A New Block-Based Data Distribution Mechanism in Cloud Computing","authors":"Chandrima Dadi, P. Yi, Zongming Fei, Hui Lu","doi":"10.1109/CSCloud.2016.25","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.25","url":null,"abstract":"Cloud computing is a new paradigm that provides computing, storage and networking services to end users. Data distribution for cloud computing is different from that in traditional content distribution networks in that it has a direct implication on efficiency of using cloud resources. In this paper we propose a new block-based data distribution mechanism for cloud computing. Instead of using the whole file as a unit of delivery, we divide a file into blocks to improve the efficiency. We design a scheduling algorithm to manage the delivery of blocks to all receivers. The novel aspect of the algorithm is that it can achieve constant distribution time no matter how many receivers need to get the file. We further analyze the overhead caused by dividing a file into blocks. The performance results show that our mechanism can significantly reduce the distribution time, compared with the traditional method and a non-block-based method.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125928775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scalable Fog Computing with Service Offloading in Bus Networks 总线网络中具有服务分流的可扩展雾计算
Dongdong Ye, Maoqiang Wu, Shensheng Tang, Rong Yu
With the rapid increase of mobile devices, the computing load of roadside cloudlets is fast growing. When the computation tasks of the roadside cloudlet reach the limit, the overload may generate heat radiation problem and unacceptable delay to mobile users. In this paper, we leverage the characteristics of buses and propose a scalable fog computing paradigm with servicing offloading in bus networks. The bus fog servers not only provide fog computing services for the mobile users on bus, but also are motivated to accomplish the computation tasks offloaded by roadside cloudlets. By this way, the computing capability of roadside cloudlets is significantly extended. We consider an allocation strategy using genetic algorithm (GA). With this strategy, the roadside cloudlets spend the least cost to offload their computation tasks. Meanwhile, the user experience of mobile users are maintained. The simulations validate the advantage of the propose scheme.
随着移动设备的快速增加,路边云的计算负荷也在快速增长。当路边云的计算任务达到极限时,过载可能会对移动用户产生热辐射问题和不可接受的延迟。在本文中,我们利用总线的特点,提出了一个可扩展的雾计算范式,在总线网络中提供服务卸载。公交雾服务器不仅为公交车上的移动用户提供雾计算服务,而且还会主动完成路边云所卸载的计算任务。通过这种方式,大大扩展了路边云的计算能力。研究了一种基于遗传算法的分配策略。使用这种策略,路边云以最少的成本卸载它们的计算任务。同时,维护移动用户的用户体验。仿真结果验证了该方案的优越性。
{"title":"Scalable Fog Computing with Service Offloading in Bus Networks","authors":"Dongdong Ye, Maoqiang Wu, Shensheng Tang, Rong Yu","doi":"10.1109/CSCloud.2016.34","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.34","url":null,"abstract":"With the rapid increase of mobile devices, the computing load of roadside cloudlets is fast growing. When the computation tasks of the roadside cloudlet reach the limit, the overload may generate heat radiation problem and unacceptable delay to mobile users. In this paper, we leverage the characteristics of buses and propose a scalable fog computing paradigm with servicing offloading in bus networks. The bus fog servers not only provide fog computing services for the mobile users on bus, but also are motivated to accomplish the computation tasks offloaded by roadside cloudlets. By this way, the computing capability of roadside cloudlets is significantly extended. We consider an allocation strategy using genetic algorithm (GA). With this strategy, the roadside cloudlets spend the least cost to offload their computation tasks. Meanwhile, the user experience of mobile users are maintained. The simulations validate the advantage of the propose scheme.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
A Semantic Approach to Intelligent and Personal Tutoring System 智能个性化辅导系统的语义化研究
Maria Sette, Lixin Tao, Keke Gai, Ning Jiang
Cyberlearning is challenged by the lack of personal and assessment-driven learning, and students are often puzzled by the lack of instructor guidance and feedback, the huge volume and diversity of the learning materials, and thelack of the ability to zoom in from the general concepts to the more specific ones, or the opposite. Intelligent tutoring systems are needed to improve the cyberlearning quality. One of the major difficulties is knowledge representation. The current industry standard is to use Web Ontology Language (OWL) for representing knowledge structure. But OWL only supports one "first-class" relation, "is-a", between the concepts, and different knowledge areas usually need different custom relations to describe the relations among the concepts. For example "part-of" and time dependency are important relations torepresent most engineering knowledge bodies. OWL has to use object properties to emulate such custom relations, leading to awkward knowledge representation hard for domain experts to code, validate and use such knowledge bases. This research uses Pace University's extension to OWL, named Knowledge Graph (KG), to support knowledge representation with custom relations. The instructors can use Pace University extended Protege IDE to declare and apply custom relations in a single document. The instructor teaching experience is also coded in the KG to better support custom learning order by students with different backgrounds. The prototype of a knowledge-driven tutoring system was designed and implemented to illustrate how the KG supports integrated assessments, using assessment results to custom student learning order or material, and let the students freely navigate in the knowledge space from general to specific or the opposite, and following various custom relations. A web technology tutorial is used to validate the design and effectiveness of this approach.
网络学习面临的挑战是缺乏个人和评估驱动的学习,学生经常被缺乏讲师的指导和反馈、学习材料的巨大数量和多样性、缺乏从一般概念到更具体概念的放大能力或相反的能力所困惑。提高网络学习质量需要智能辅导系统。其中一个主要的困难是知识表示。目前的行业标准是使用Web Ontology Language (OWL)来表示知识结构。但是OWL只支持概念之间的一个“一级”关系“is-a”,并且不同的知识领域通常需要不同的自定义关系来描述概念之间的关系。例如,“部分”和时间依赖关系是表示大多数工程知识体的重要关系。OWL必须使用对象属性来模拟这样的自定义关系,这使得领域专家难以编码、验证和使用这样的知识库。本研究使用佩斯大学对OWL的扩展知识图谱(Knowledge Graph, KG)来支持基于自定义关系的知识表示。教师可以使用Pace University扩展的Protege IDE在单个文档中声明和应用自定义关系。教师的教学经验也被编码在KG中,以更好地支持不同背景的学生自定义学习顺序。设计并实现了知识驱动型辅导系统的原型,以说明KG如何支持综合评估,利用评估结果定制学生的学习顺序或材料,让学生在知识空间中自由导航,从一般到特定或相反,遵循各种定制关系。一个网络技术教程被用来验证这种方法的设计和有效性。
{"title":"A Semantic Approach to Intelligent and Personal Tutoring System","authors":"Maria Sette, Lixin Tao, Keke Gai, Ning Jiang","doi":"10.1109/CSCloud.2016.50","DOIUrl":"https://doi.org/10.1109/CSCloud.2016.50","url":null,"abstract":"Cyberlearning is challenged by the lack of personal and assessment-driven learning, and students are often puzzled by the lack of instructor guidance and feedback, the huge volume and diversity of the learning materials, and thelack of the ability to zoom in from the general concepts to the more specific ones, or the opposite. Intelligent tutoring systems are needed to improve the cyberlearning quality. One of the major difficulties is knowledge representation. The current industry standard is to use Web Ontology Language (OWL) for representing knowledge structure. But OWL only supports one \"first-class\" relation, \"is-a\", between the concepts, and different knowledge areas usually need different custom relations to describe the relations among the concepts. For example \"part-of\" and time dependency are important relations torepresent most engineering knowledge bodies. OWL has to use object properties to emulate such custom relations, leading to awkward knowledge representation hard for domain experts to code, validate and use such knowledge bases. This research uses Pace University's extension to OWL, named Knowledge Graph (KG), to support knowledge representation with custom relations. The instructors can use Pace University extended Protege IDE to declare and apply custom relations in a single document. The instructor teaching experience is also coded in the KG to better support custom learning order by students with different backgrounds. The prototype of a knowledge-driven tutoring system was designed and implemented to illustrate how the KG supports integrated assessments, using assessment results to custom student learning order or material, and let the students freely navigate in the knowledge space from general to specific or the opposite, and following various custom relations. A web technology tutorial is used to validate the design and effectiveness of this approach.","PeriodicalId":410477,"journal":{"name":"2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114368330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1