首页 > 最新文献

2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

英文 中文
SOA-Based Simulation Framework: A Way to Simulation Composability 基于soa的仿真框架:实现仿真可组合性的一种方法
Yang Shi, D. Zhang, M. Xiao, Ming-hua Lu
A novel simulation framework based on Service-Oriented Architecture(SOA) is proposed to meet the new requirements for simulation compos ability, this framework is open and is propitious to integration with other systems. A simulation platform is constructed using component-based software engineering to test the feasibility of SOA-based framework, the implementation of simulation service layer and simulation application layer of simulation platform are also expatiated in details. As a case study, a simulation context for warfare simulation is conducted and experiment results shows that this platform provides the capability of simulation compos ability and reuse ability in the level of binary code.
为满足仿真组合能力的新要求,提出了一种基于面向服务体系结构(SOA)的仿真框架,该框架具有开放性,便于与其他系统集成。采用基于构件的软件工程构建了仿真平台,对基于soa框架的可行性进行了验证,并对仿真平台的仿真服务层和仿真应用层的实现进行了详细的阐述。以仿真环境为例进行了仿真研究,实验结果表明,该平台提供了二进制码级的仿真组合能力和复用能力。
{"title":"SOA-Based Simulation Framework: A Way to Simulation Composability","authors":"Yang Shi, D. Zhang, M. Xiao, Ming-hua Lu","doi":"10.1109/CyberC.2012.46","DOIUrl":"https://doi.org/10.1109/CyberC.2012.46","url":null,"abstract":"A novel simulation framework based on Service-Oriented Architecture(SOA) is proposed to meet the new requirements for simulation compos ability, this framework is open and is propitious to integration with other systems. A simulation platform is constructed using component-based software engineering to test the feasibility of SOA-based framework, the implementation of simulation service layer and simulation application layer of simulation platform are also expatiated in details. As a case study, a simulation context for warfare simulation is conducted and experiment results shows that this platform provides the capability of simulation compos ability and reuse ability in the level of binary code.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124766507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delay-minimized Energy-efficient Data Aggregation in Wireless Sensor Networks 无线传感器网络中时延最小化的高能效数据聚合
Huu Nghia Le, V. Zalyubovskiy, Hyunseung Choo
Data aggregation is a fundamental problem in wireless sensor networks that has attracted great attention in recent years. To design a data aggregation scheme, delay and energy efficiencies are two crucial issues that require much consideration. In this paper, we propose a distributed, energy-efficient algorithm for collecting data from all sensor nodes with minimum latency called Delay-minimized Energy-efficient Data Aggregation algorithm (DEDA). The DEDA algorithm minimizes data aggregation latency by building a delay-efficient network structure. At the same time, it also considers the distances between network nodes for saving sensor transmission power and network energy. Energy consumption is also well-balanced between sensors to achieve an acceptable network lifetime. The simulation results show that the scheme could significantly decrease data aggregation delay and obtain a reasonable network lifetime compared with other approaches.
数据聚合是近年来备受关注的无线传感器网络中的一个基本问题。在设计数据聚合方案时,延迟和能量效率是需要考虑的两个关键问题。在本文中,我们提出了一种分布式、节能的算法,以最小的延迟从所有传感器节点收集数据,称为延迟最小化节能数据聚合算法(DEDA)。DEDA算法通过构建一个延迟高效的网络结构来最小化数据聚合延迟。同时,还考虑了网络节点之间的距离,以节省传感器传输功率和网络能量。传感器之间的能量消耗也很好地平衡,以实现可接受的网络寿命。仿真结果表明,与其他方法相比,该方案可以显著降低数据聚合延迟,并获得合理的网络生存时间。
{"title":"Delay-minimized Energy-efficient Data Aggregation in Wireless Sensor Networks","authors":"Huu Nghia Le, V. Zalyubovskiy, Hyunseung Choo","doi":"10.1109/CyberC.2012.73","DOIUrl":"https://doi.org/10.1109/CyberC.2012.73","url":null,"abstract":"Data aggregation is a fundamental problem in wireless sensor networks that has attracted great attention in recent years. To design a data aggregation scheme, delay and energy efficiencies are two crucial issues that require much consideration. In this paper, we propose a distributed, energy-efficient algorithm for collecting data from all sensor nodes with minimum latency called Delay-minimized Energy-efficient Data Aggregation algorithm (DEDA). The DEDA algorithm minimizes data aggregation latency by building a delay-efficient network structure. At the same time, it also considers the distances between network nodes for saving sensor transmission power and network energy. Energy consumption is also well-balanced between sensors to achieve an acceptable network lifetime. The simulation results show that the scheme could significantly decrease data aggregation delay and obtain a reasonable network lifetime compared with other approaches.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127697430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Design and Evaluation of En-LEACH Routing Protocol for Wireless Sensor Network 无线传感器网络En-LEACH路由协议的设计与评价
Suyog Pawar, Prabha Kasliwal
A wireless network consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments like civil and military applications. The data collected by each sensor is communicated through the network to a single processing centre called base station that uses all reported data to determine characteristics of the environment or detect an event. Clustering sensors into groups, so that sensors communicate information only to local cluster-heads and then the cluster heads communicate the aggregated information to the processing center, may save a lot of energy. LEACH is clustering based protocol that utilizes randomized rotation of local cluster-heads to evenly distribute the energy load among the sensors in the network. LEACH uses localized coordination to enable scalability and robustness for dynamic networks, and incorporates data fusion into the routing protocol to reduce the amount of information that must be transferred to the base station. But LEACH is based on the assumption that each sensor nodes contain equal amount of energy which is not valid in real scenarios Enhanced LEACH protocol (En-LEACH) has been adaptable to handle non-uniform energy distribution characteristic of a dynamic sensor network.
由大量具有低功耗收发器的小型传感器组成的无线网络可以成为在民用和军事应用等各种环境中收集数据的有效工具。每个传感器收集的数据通过网络传输到一个称为基站的处理中心,该中心使用所有报告的数据来确定环境特征或检测事件。将传感器分组,使传感器只与本地簇头通信,由簇头将聚合后的信息传递给处理中心,可以节省大量的能源。LEACH是一种基于聚类的协议,它利用局部簇头的随机旋转将能量负载均匀地分配给网络中的传感器。LEACH使用局部协调来实现动态网络的可扩展性和鲁棒性,并将数据融合纳入路由协议,以减少必须传输到基站的信息量。但LEACH是基于每个传感器节点包含相等能量的假设,这在实际场景中是无效的,增强LEACH协议(En-LEACH)已经适应于处理动态传感器网络能量分布不均匀的特点。
{"title":"Design and Evaluation of En-LEACH Routing Protocol for Wireless Sensor Network","authors":"Suyog Pawar, Prabha Kasliwal","doi":"10.1109/CyberC.2012.89","DOIUrl":"https://doi.org/10.1109/CyberC.2012.89","url":null,"abstract":"A wireless network consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments like civil and military applications. The data collected by each sensor is communicated through the network to a single processing centre called base station that uses all reported data to determine characteristics of the environment or detect an event. Clustering sensors into groups, so that sensors communicate information only to local cluster-heads and then the cluster heads communicate the aggregated information to the processing center, may save a lot of energy. LEACH is clustering based protocol that utilizes randomized rotation of local cluster-heads to evenly distribute the energy load among the sensors in the network. LEACH uses localized coordination to enable scalability and robustness for dynamic networks, and incorporates data fusion into the routing protocol to reduce the amount of information that must be transferred to the base station. But LEACH is based on the assumption that each sensor nodes contain equal amount of energy which is not valid in real scenarios Enhanced LEACH protocol (En-LEACH) has been adaptable to handle non-uniform energy distribution characteristic of a dynamic sensor network.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130205973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making 基于免疫进化和多准则决策的网络生存性评价模型
Wang Chunlei, Fang Lan, Dai Yi-qi, Ming Liang, Miao Qing, Wang Dongxia
Network survivability has the characteristics of complexity, dynamic evolution and uncertainty, which has become one of the most important indicators of evaluating network performance. Network survivability evaluation is a process of confirming the degree to which the network survivability technology and mechanism can defend network threats. Firstly, it needs to extract useful information from the actual system and establish the model, then the model is analyzed and necessary information is extracted. Finally, the survivability characteristics of the network can be measured and evaluated based on the model and extracted information. Current network security research lacks of models and methods which guide network survivability evaluation effectively. In this paper, we firstly describe the elements of network survivability evaluation model and their relationships, then propose a network survivability evaluation model based on evolutionary computation which includes the immune evolutionary algorithm for network survivability metric weight solving and network survivability evaluation method based on multiple criteria decision making. Finally, the correctness and effectiveness of the proposed model is validated through experimental analysis.
网络生存性具有复杂性、动态演化性和不确定性等特点,已成为评价网络性能的重要指标之一。网络生存性评估是对网络生存性技术和机制抵御网络威胁的能力进行评估的过程。首先从实际系统中提取有用的信息,建立模型,然后对模型进行分析,提取必要的信息。最后,基于模型和提取的信息对网络的生存性特征进行测量和评价。目前的网络安全研究缺乏有效指导网络生存性评估的模型和方法。本文首先描述了网络生存性评价模型的要素及其相互关系,在此基础上提出了一种基于进化计算的网络生存性评价模型,该模型包括网络生存性度量权值求解的免疫进化算法和基于多准则决策的网络生存性评价方法。最后,通过实验分析验证了所提模型的正确性和有效性。
{"title":"Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making","authors":"Wang Chunlei, Fang Lan, Dai Yi-qi, Ming Liang, Miao Qing, Wang Dongxia","doi":"10.1109/CYBERC.2012.37","DOIUrl":"https://doi.org/10.1109/CYBERC.2012.37","url":null,"abstract":"Network survivability has the characteristics of complexity, dynamic evolution and uncertainty, which has become one of the most important indicators of evaluating network performance. Network survivability evaluation is a process of confirming the degree to which the network survivability technology and mechanism can defend network threats. Firstly, it needs to extract useful information from the actual system and establish the model, then the model is analyzed and necessary information is extracted. Finally, the survivability characteristics of the network can be measured and evaluated based on the model and extracted information. Current network security research lacks of models and methods which guide network survivability evaluation effectively. In this paper, we firstly describe the elements of network survivability evaluation model and their relationships, then propose a network survivability evaluation model based on evolutionary computation which includes the immune evolutionary algorithm for network survivability metric weight solving and network survivability evaluation method based on multiple criteria decision making. Finally, the correctness and effectiveness of the proposed model is validated through experimental analysis.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117016895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Service Layer and Axioms for User Access to the Cloud by Means of Ontologies 用户通过本体访问云的服务层和公理
Lilliam N. Robinson-Oses, Miguel Vargas-Lombardo
Cloud Computing is a model that habilitates the access to a group of computer services that are offered according to the needs of the users. Also, layers have been developed in order to sectorize and manage the offered services while maintaining the interrelation between the layers by using ontologies. Referring to the above-mentioned, we suggest creating a new layer in cloud computing that enables you to manage user log-ins to applications that are housed in the cloud. User management is developed through ontologies using the axioms that identify the privileges that users have, the axioms are represented in Ontology Web Language (OWL) and Resource Description Framework (RDF).
云计算是一种模型,它使访问根据用户需求提供的一组计算机服务成为可能。此外,层的开发是为了对提供的服务进行分区和管理,同时通过使用本体维护层之间的相互关系。参考上述内容,我们建议在云计算中创建一个新的层,使您能够管理安装在云中的应用程序的用户登录。用户管理是通过本体开发的,使用识别用户拥有的特权的公理,这些公理在本体Web语言(OWL)和资源描述框架(RDF)中表示。
{"title":"Service Layer and Axioms for User Access to the Cloud by Means of Ontologies","authors":"Lilliam N. Robinson-Oses, Miguel Vargas-Lombardo","doi":"10.1109/CyberC.2012.27","DOIUrl":"https://doi.org/10.1109/CyberC.2012.27","url":null,"abstract":"Cloud Computing is a model that habilitates the access to a group of computer services that are offered according to the needs of the users. Also, layers have been developed in order to sectorize and manage the offered services while maintaining the interrelation between the layers by using ontologies. Referring to the above-mentioned, we suggest creating a new layer in cloud computing that enables you to manage user log-ins to applications that are housed in the cloud. User management is developed through ontologies using the axioms that identify the privileges that users have, the axioms are represented in Ontology Web Language (OWL) and Resource Description Framework (RDF).","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126948892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting the Effect of NAND Flash-Memory SSD on Filesystem Design NAND闪存SSD对文件系统设计的影响
Jaechun No, Sung-Soon Park
This paper focuses on I/O optimizations of N-hybrid (New-Form of hybrid), which provides a hybrid file system space constructed on SSD and HDD. Although the promising potentials of SSD, such as the absence of mechanical moving overhead and high random I/O throughput, have drawn a lot of attentions from IT enterprises, its high ratio of cost/capacity makes it less desirable to build a large-scale data storage subsystem composed of only SSDs. In this paper, we present N-hybrid that attempts to integrate the strengths of SSD and HDD, to offer a single, large hybrid file system space. Several experiments were conducted to verify the performance of N-hybrid.
本文主要研究N-hybrid (New-Form of hybrid)的I/O优化,它提供了一个在SSD和HDD上构建的混合文件系统空间。虽然SSD没有机械移动开销和高随机I/O吞吐量等优点吸引了IT企业的关注,但其高成本/容量比使得仅由SSD组成的大规模数据存储子系统不太可取。在本文中,我们提出了N-hybrid,它试图集成SSD和HDD的优势,以提供一个单一的、大的混合文件系统空间。通过实验验证了n -杂交种的性能。
{"title":"Exploiting the Effect of NAND Flash-Memory SSD on Filesystem Design","authors":"Jaechun No, Sung-Soon Park","doi":"10.1109/CyberC.2012.93","DOIUrl":"https://doi.org/10.1109/CyberC.2012.93","url":null,"abstract":"This paper focuses on I/O optimizations of N-hybrid (New-Form of hybrid), which provides a hybrid file system space constructed on SSD and HDD. Although the promising potentials of SSD, such as the absence of mechanical moving overhead and high random I/O throughput, have drawn a lot of attentions from IT enterprises, its high ratio of cost/capacity makes it less desirable to build a large-scale data storage subsystem composed of only SSDs. In this paper, we present N-hybrid that attempts to integrate the strengths of SSD and HDD, to offer a single, large hybrid file system space. Several experiments were conducted to verify the performance of N-hybrid.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121737020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Electromagnetic Wave Effect on Human Health: Challenges for Developing Countries 电磁波对人类健康的影响:发展中国家面临的挑战
B. Anyaka, U. B. Akuru
Several studies abound on electromagnetic field (EMF) radiation and its adverse impact on human health with majority of the conclusions resulting from these studies being positive. To this end, a number of sources have been identified to emit levels of EMF radiation such as power transmission lines, base transmitter stations (BTS), mobile phones and many household appliances, some of which have been classified as extremely low frequency (ELF) non-ionizing radiating devices. The global system of mobile telecommunications (GSM) revolution supports to a large extent the proliferation of mobile phones and random BTS siting in developing countries of which EMF emissions can assume very dangerous dimensions for human health. This study is undertaken to investigate the dilemma posed by wireless telecommunication devices that emit EMF radiations e.g. mobile phones and its transceivers, as against their relevance. Correlations were arrived at concerning their indirect effects on human health, from which possible safety measures were proposed and relevant suggestions made.
关于电磁场辐射及其对人体健康的不利影响的研究有很多,这些研究得出的大多数结论都是积极的。为此目的,已经确定了一些发出EMF辐射水平的来源,如输电线路、基站发射台(BTS)、移动电话和许多家用电器,其中一些已被归类为极低频(ELF)非电离辐射设备。全球移动通信系统(GSM)革命在很大程度上支持了发展中国家移动电话和随机基站的普及,因为这些国家的电磁辐射可能对人类健康造成非常危险的影响。这项研究是为了调查无线通信设备所造成的困境,这些设备发射EMF辐射,如移动电话及其收发器,而不是它们的相关性。得出了它们对人类健康的间接影响的相关性,据此提出了可能的安全措施并提出了相关建议。
{"title":"Electromagnetic Wave Effect on Human Health: Challenges for Developing Countries","authors":"B. Anyaka, U. B. Akuru","doi":"10.1109/CyberC.2012.81","DOIUrl":"https://doi.org/10.1109/CyberC.2012.81","url":null,"abstract":"Several studies abound on electromagnetic field (EMF) radiation and its adverse impact on human health with majority of the conclusions resulting from these studies being positive. To this end, a number of sources have been identified to emit levels of EMF radiation such as power transmission lines, base transmitter stations (BTS), mobile phones and many household appliances, some of which have been classified as extremely low frequency (ELF) non-ionizing radiating devices. The global system of mobile telecommunications (GSM) revolution supports to a large extent the proliferation of mobile phones and random BTS siting in developing countries of which EMF emissions can assume very dangerous dimensions for human health. This study is undertaken to investigate the dilemma posed by wireless telecommunication devices that emit EMF radiations e.g. mobile phones and its transceivers, as against their relevance. Correlations were arrived at concerning their indirect effects on human health, from which possible safety measures were proposed and relevant suggestions made.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115149606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
File Exchange in a Private Cloud Supported by a Trust Model 私有云中信任模型支持的文件交换
E. Canedo, Rafael Timóteo de Sousa Júnior, R. D. O. Albuquerque, Fábio L. L. Mendonça
Cloud computing is being progressively adopted in different business scenarios in order to obtain flexible and reliable computing environments, with several supporting solutions available in the market. Computing systems trust representation have been widely discussed and applied in a lot of information technology scenarios, becoming subject of scientific researches. This paper proposes the development of a trust model to ensure a reliable files exchange among nodes in a private cloud, as well as the calculation process of trust among them, according to the established metrics. The simulation result using CloudSim framework shows the effectiveness of the model in selecting more reliable node in private cloud.
为了获得灵活可靠的计算环境,不同的业务场景正在逐步采用云计算,市场上有几种支持解决方案。计算系统信任表示在许多信息技术场景中得到了广泛的讨论和应用,成为科学研究的课题。本文提出了一种保证私有云中节点间文件交换可靠的信任模型,并根据所建立的度量标准,给出了节点间信任的计算过程。在CloudSim框架下的仿真结果表明了该模型在私有云中选择更可靠节点的有效性。
{"title":"File Exchange in a Private Cloud Supported by a Trust Model","authors":"E. Canedo, Rafael Timóteo de Sousa Júnior, R. D. O. Albuquerque, Fábio L. L. Mendonça","doi":"10.1109/CyberC.2012.23","DOIUrl":"https://doi.org/10.1109/CyberC.2012.23","url":null,"abstract":"Cloud computing is being progressively adopted in different business scenarios in order to obtain flexible and reliable computing environments, with several supporting solutions available in the market. Computing systems trust representation have been widely discussed and applied in a lot of information technology scenarios, becoming subject of scientific researches. This paper proposes the development of a trust model to ensure a reliable files exchange among nodes in a private cloud, as well as the calculation process of trust among them, according to the established metrics. The simulation result using CloudSim framework shows the effectiveness of the model in selecting more reliable node in private cloud.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122196197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Core Broking Model for E-Markets 电子市场的核心经纪模型
P. Sun, M. Odetayo, R. Iqbal, Anne E. James
Coalitions, which allow traders to form teams, can sometimes accomplish tasks more efficiently than individuals. The core has become a popular solution concept in economic applications for researchers in Computer Science, because it provides a way to find stable sets. However, its problems hinder researchers from applying it to a real world market. This paper proposes a new Core Broking Model (CBM), which is based on the core and adopts some other solution concepts to resolve group trading problems in emarkets. It involves bundle selling of composite services from several service providers, offering amount discounts in group buying in the e-marketplace. The CBM successfully creates a win-win-win situation for customers, providers and brokers in e-markets. The comparison between the results of the new model and the core shows that the CBM is superior to the core when applied in e-markets. The results of the simulation presented in this paper demonstrate that the CBM can attract customers and deal with online group trading problems in a large coalition. An extensive evaluation of the CBM has been made and shows that it is effective and efficient.
允许交易者组成团队的联盟有时比个人更有效地完成任务。核心已经成为计算机科学研究人员在经济应用中的一个流行的解决方案概念,因为它提供了一种寻找稳定集的方法。然而,它的问题阻碍了研究人员将其应用于现实世界的市场。本文提出了一种新的核心经纪模型(CBM),该模型以核心为基础,结合其他一些求解概念来解决市场中的群体交易问题。它包括捆绑销售来自几家服务提供商的组合服务,在电子市场团购中提供数量折扣。CBM成功地为电子市场中的客户、供应商和经纪人创造了一个三赢的局面。将新模型的结果与核心模型的结果进行比较,结果表明CBM在电子市场中的应用优于核心模型。仿真结果表明,该方法能够有效地吸引顾客,并能有效地解决大联盟中的在线团体交易问题。对信任措施进行了广泛的评价,表明它是有效和高效的。
{"title":"A Core Broking Model for E-Markets","authors":"P. Sun, M. Odetayo, R. Iqbal, Anne E. James","doi":"10.1109/CyberC.2012.49","DOIUrl":"https://doi.org/10.1109/CyberC.2012.49","url":null,"abstract":"Coalitions, which allow traders to form teams, can sometimes accomplish tasks more efficiently than individuals. The core has become a popular solution concept in economic applications for researchers in Computer Science, because it provides a way to find stable sets. However, its problems hinder researchers from applying it to a real world market. This paper proposes a new Core Broking Model (CBM), which is based on the core and adopts some other solution concepts to resolve group trading problems in emarkets. It involves bundle selling of composite services from several service providers, offering amount discounts in group buying in the e-marketplace. The CBM successfully creates a win-win-win situation for customers, providers and brokers in e-markets. The comparison between the results of the new model and the core shows that the CBM is superior to the core when applied in e-markets. The results of the simulation presented in this paper demonstrate that the CBM can attract customers and deal with online group trading problems in a large coalition. An extensive evaluation of the CBM has been made and shows that it is effective and efficient.","PeriodicalId":416468,"journal":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1