首页 > 最新文献

Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion最新文献

英文 中文
Session details: 1st International Workshop on Blockchain for Smart Cyber-Physical Systems (BlockCPS) 会议详情:第一届智能网络物理系统区块链国际研讨会(BlockCPS)
{"title":"Session details: 1st International Workshop on Blockchain for Smart Cyber-Physical Systems (BlockCPS)","authors":"","doi":"10.1145/3517183","DOIUrl":"https://doi.org/10.1145/3517183","url":null,"abstract":"","PeriodicalId":440884,"journal":{"name":"Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128832943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: tokenization on blockchain SoK:区块链上的标记化
G. Wang, M. Nixon
Blockchain, a potentially disruptive technology, advances many different applications, e.g., crypto-currencies, supply chains, and the Internet of Things. Under the hood of blockchain, it is required to handle different kinds of digital assets and data. The next-generation blockchain ecosystem is expected to consist of numerous applications, and each application may have a distinct representation of digital assets. However, digital assets cannot be directly recorded on the blockchain, and a tokenization process is required to format these assets. Tokenization on blockchain will inevitably require a certain level of proper standards to enrich advanced functionalities and enhance interoperable capabilities for future applications. However, due to specific features of digital assets, it is hard to obtain a standard token form to represent all kinds of assets. For example, when considering fungibility, some assets are divisible and identical, commonly referred to as fungible assets. In contrast, others that are not fungible are widely referred to as non-fungible assets. When tokenizing these assets, we are required to follow different tokenization processes. The way to effectively tokenize assets is thus essential and expecting to confront various unprecedented challenges. This paper provides a systematic and comprehensive study of the current progress of tokenization on blockchain. First, we explore general principles and practical schemes to tokenize digital assets for blockchain and classify digitized tokens into three categories: fungible, non-fungible, and semi-fungible. We then focus on discussing the well-known Ethereum standards on non-fungible tokens. Finally, we discuss several critical challenges and some potential research directions to advance the research on exploring the tokenization process on the blockchain. To the best of our knowledge, this is the first systematic study for tokenization on blockchain.
区块链是一种潜在的颠覆性技术,它推动了许多不同的应用,例如加密货币、供应链和物联网。在区块链的底层,它需要处理不同类型的数字资产和数据。下一代区块链生态系统预计将由众多应用程序组成,每个应用程序可能都有不同的数字资产表示。然而,数字资产不能直接记录在区块链上,需要一个标记化过程来格式化这些资产。区块链上的标记化将不可避免地需要一定程度的适当标准来丰富高级功能并增强未来应用程序的互操作能力。然而,由于数字资产的特殊性,很难获得一个标准的令牌形式来表示各种资产。例如,在考虑可替代性时,一些资产是可分割的和相同的,通常被称为可替代性资产。相比之下,其他不可替代的资产被广泛地称为不可替代资产。当对这些资产进行标记时,我们需要遵循不同的标记化流程。因此,有效地令牌化资产的方式至关重要,并有望面临各种前所未有的挑战。本文系统、全面地研究了当前区块链标记化的进展。首先,我们探讨了区块链数字资产代币化的一般原则和实用方案,并将数字化代币分为三类:可替代、不可替代和半可替代。然后,我们将重点讨论关于不可替代代币的著名以太坊标准。最后,我们讨论了几个关键挑战和一些潜在的研究方向,以推进区块链上的标记化过程的研究。据我们所知,这是第一次对区块链上的标记化进行系统研究。
{"title":"SoK: tokenization on blockchain","authors":"G. Wang, M. Nixon","doi":"10.1145/3492323.3495577","DOIUrl":"https://doi.org/10.1145/3492323.3495577","url":null,"abstract":"Blockchain, a potentially disruptive technology, advances many different applications, e.g., crypto-currencies, supply chains, and the Internet of Things. Under the hood of blockchain, it is required to handle different kinds of digital assets and data. The next-generation blockchain ecosystem is expected to consist of numerous applications, and each application may have a distinct representation of digital assets. However, digital assets cannot be directly recorded on the blockchain, and a tokenization process is required to format these assets. Tokenization on blockchain will inevitably require a certain level of proper standards to enrich advanced functionalities and enhance interoperable capabilities for future applications. However, due to specific features of digital assets, it is hard to obtain a standard token form to represent all kinds of assets. For example, when considering fungibility, some assets are divisible and identical, commonly referred to as fungible assets. In contrast, others that are not fungible are widely referred to as non-fungible assets. When tokenizing these assets, we are required to follow different tokenization processes. The way to effectively tokenize assets is thus essential and expecting to confront various unprecedented challenges. This paper provides a systematic and comprehensive study of the current progress of tokenization on blockchain. First, we explore general principles and practical schemes to tokenize digital assets for blockchain and classify digitized tokens into three categories: fungible, non-fungible, and semi-fungible. We then focus on discussing the well-known Ethereum standards on non-fungible tokens. Finally, we discuss several critical challenges and some potential research directions to advance the research on exploring the tokenization process on the blockchain. To the best of our knowledge, this is the first systematic study for tokenization on blockchain.","PeriodicalId":440884,"journal":{"name":"Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124997470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Session details: 3rd International Workshop on Cloud, IoT and Fog Systems (CIFS) 会议详情:第三届云、物联网和雾系统国际研讨会(CIFS)
{"title":"Session details: 3rd International Workshop on Cloud, IoT and Fog Systems (CIFS)","authors":"","doi":"10.1145/3517184","DOIUrl":"https://doi.org/10.1145/3517184","url":null,"abstract":"","PeriodicalId":440884,"journal":{"name":"Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125213028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Differentiation of bacterial and viral pneumonia in children under five using deep learning 5岁以下儿童细菌性肺炎与病毒性肺炎的深度学习辨证
M. Jadoon, A. Anjum
With 92,000 deaths and 18 percent of the total child mortality every year, pneumonia is the leading cause of child mortality in children under 5 in Pakistan. Pakistan is one of the top 5 countries for childhood pneumonia deaths around the world. Bacteria and viruses are most common infectious agents of pneumonia. The diagnostic test for pneumonia detection is chest x-ray. Basic diagnostic tests facilities are available even at rural health centers. In proposed study, a pre-trained convolutional neural network; VGG19 model is fine-tuned on dataset of 5863 chest x-ray images of healthy, viral, and bacterial pneumonia. The VGG19, model 1 is trained on viral and bacterial pneumonia images, and model 2 is trained on multi-class data. The model 1 with viral and bacterial pneumonia images showed training accuracy of 0.83 and validation accuracy of 0.84. The model 2 with normal, viral, and bacterial pneumonia, showed training accuracy of 0.84 and validation accuracy of 0.85. The results show that the VGG19 model has powerful prediction capacity to identify correct features of types of pneumonia with reasonable accuracy even with smaller and unbalanced dataset. The results predict that already developed and trained algorithms can be used as ready to use clinical diagnostic tool, if fine-tuned with larger balanced dataset with few targeted changes. These tools can be used as second reader tool by the physicians, can process thousands of images in limited time with high accuracy, relieving the burden of patients on limited capacity of the healthcare facilities.
肺炎每年造成9.2万人死亡,占儿童总死亡率的18%,是巴基斯坦5岁以下儿童死亡的主要原因。巴基斯坦是全球儿童肺炎死亡人数最多的5个国家之一。细菌和病毒是肺炎最常见的传染因子。肺炎的诊断检查是胸部x光检查。即使在农村保健中心也有基本的诊断测试设施。在本研究中,预先训练的卷积神经网络;VGG19模型在5863张健康肺炎、病毒性肺炎和细菌性肺炎的胸部x线图像数据集上进行了微调。VGG19,模型1是在病毒和细菌性肺炎图像上训练的,模型2是在多类数据上训练的。具有病毒性肺炎和细菌性肺炎图像的模型1的训练精度为0.83,验证精度为0.84。正常肺炎、病毒性肺炎和细菌性肺炎模型2的训练准确率为0.84,验证准确率为0.85。结果表明,VGG19模型具有强大的预测能力,即使在较小且不平衡的数据集上也能以合理的精度识别出正确的肺炎类型特征。结果预测,如果使用更大的平衡数据集进行微调,并且很少有针对性的更改,那么已经开发和训练的算法可以用作临床诊断工具。这些工具可以作为医生的辅助阅读工具,可以在有限的时间内高精度地处理数千张图像,减轻了医疗机构有限容量下患者的负担。
{"title":"Differentiation of bacterial and viral pneumonia in children under five using deep learning","authors":"M. Jadoon, A. Anjum","doi":"10.1145/3492323.3495631","DOIUrl":"https://doi.org/10.1145/3492323.3495631","url":null,"abstract":"With 92,000 deaths and 18 percent of the total child mortality every year, pneumonia is the leading cause of child mortality in children under 5 in Pakistan. Pakistan is one of the top 5 countries for childhood pneumonia deaths around the world. Bacteria and viruses are most common infectious agents of pneumonia. The diagnostic test for pneumonia detection is chest x-ray. Basic diagnostic tests facilities are available even at rural health centers. In proposed study, a pre-trained convolutional neural network; VGG19 model is fine-tuned on dataset of 5863 chest x-ray images of healthy, viral, and bacterial pneumonia. The VGG19, model 1 is trained on viral and bacterial pneumonia images, and model 2 is trained on multi-class data. The model 1 with viral and bacterial pneumonia images showed training accuracy of 0.83 and validation accuracy of 0.84. The model 2 with normal, viral, and bacterial pneumonia, showed training accuracy of 0.84 and validation accuracy of 0.85. The results show that the VGG19 model has powerful prediction capacity to identify correct features of types of pneumonia with reasonable accuracy even with smaller and unbalanced dataset. The results predict that already developed and trained algorithms can be used as ready to use clinical diagnostic tool, if fine-tuned with larger balanced dataset with few targeted changes. These tools can be used as second reader tool by the physicians, can process thousands of images in limited time with high accuracy, relieving the burden of patients on limited capacity of the healthcare facilities.","PeriodicalId":440884,"journal":{"name":"Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129356772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards a Bayesian prognostic framework for high-availability clusters 面向高可用性集群的贝叶斯预测框架
Premathas Somasekaram, R. Calinescu
Critical applications deployed on cloud and in-house information technology infrastructures use software solutions known as high-availability clusters (HACs) to ensure higher availability. Our paper introduces a Bayesian prognostic (BP) framework that improves the ability of HACs to (i) predict component failures that can be resolved by reinitialising the failed component and (ii) propagate and predict failures in high-level components when the component failure cannot be resolved through reinitialisation. Preliminary experiments presented in the paper demonstrate that this BP framework can reduce the downtime for an enterprise application subjected to a wide range of injected faults by between 5.5 and 7.9 times compared to the availability achieved by the open-source HAC ClusterLabs stack (Pacemaker/Corosync).
部署在云和内部信息技术基础设施上的关键应用程序使用称为高可用性集群(HACs)的软件解决方案来确保更高的可用性。我们的论文介绍了一个贝叶斯预测(BP)框架,该框架提高了HACs的能力:(i)预测可以通过重新初始化故障组件来解决的组件故障,以及(ii)当组件故障无法通过重新初始化来解决时,在高级组件中传播和预测故障。论文中提出的初步实验表明,与开源HAC ClusterLabs堆栈(Pacemaker/Corosync)实现的可用性相比,该BP框架可以将企业应用程序遭受大范围注入故障的停机时间减少5.5到7.9倍。
{"title":"Towards a Bayesian prognostic framework for high-availability clusters","authors":"Premathas Somasekaram, R. Calinescu","doi":"10.1145/3492323.3495583","DOIUrl":"https://doi.org/10.1145/3492323.3495583","url":null,"abstract":"Critical applications deployed on cloud and in-house information technology infrastructures use software solutions known as high-availability clusters (HACs) to ensure higher availability. Our paper introduces a Bayesian prognostic (BP) framework that improves the ability of HACs to (i) predict component failures that can be resolved by reinitialising the failed component and (ii) propagate and predict failures in high-level components when the component failure cannot be resolved through reinitialisation. Preliminary experiments presented in the paper demonstrate that this BP framework can reduce the downtime for an enterprise application subjected to a wide range of injected faults by between 5.5 and 7.9 times compared to the availability achieved by the open-source HAC ClusterLabs stack (Pacemaker/Corosync).","PeriodicalId":440884,"journal":{"name":"Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"330 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133401103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Marginal metric utility for autonomic cloud application management 用于自主云应用程序管理的边际度量效用
M. Rózanska, G. Horn
Managing Cloud applications with variable resource requirements over time is an insipid task that could benefit from autonomic application management. The management platform will then need to know what the application owner considers a good deployment for the current execution context, which is normally captured by a utility function. However, it is often difficult to define such a function directly by first principles in a way that would perfectly capture the application owner's preferences. This paper proposes a methodology for defining the utility function only from the monitoring measurements taken to assess the state and context of the running application.
随着时间的推移,管理具有可变资源需求的云应用程序是一项乏味的任务,可以从自主应用程序管理中获益。然后,管理平台需要知道应用程序所有者认为当前执行上下文的良好部署是什么,这通常由实用程序函数捕获。然而,通常很难根据基本原则直接定义这样的函数,以一种能够完美捕获应用程序所有者首选项的方式。本文提出了一种方法,用于仅从用于评估运行的应用程序的状态和上下文的监视测量中定义效用函数。
{"title":"Marginal metric utility for autonomic cloud application management","authors":"M. Rózanska, G. Horn","doi":"10.1145/3492323.3495587","DOIUrl":"https://doi.org/10.1145/3492323.3495587","url":null,"abstract":"Managing Cloud applications with variable resource requirements over time is an insipid task that could benefit from autonomic application management. The management platform will then need to know what the application owner considers a good deployment for the current execution context, which is normally captured by a utility function. However, it is often difficult to define such a function directly by first principles in a way that would perfectly capture the application owner's preferences. This paper proposes a methodology for defining the utility function only from the monitoring measurements taken to assess the state and context of the running application.","PeriodicalId":440884,"journal":{"name":"Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131460643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Low-memory and high-performance CNN inference on distributed systems at the edge 边缘分布式系统的低内存高性能CNN推理
Erqian Tang, T. Stefanov
Nowadays, some applications need CNN inference on resource-constrained edge devices that may have very limited memory and computation capacity to fit a large CNN model. In such application scenarios, to deploy a large CNN model and perform inference on a single edge device is not feasible. A possible solution approach is to deploy a large CNN model on a (fully) distributed system at the edge and take advantage of all available edge devices to cooperatively perform the CNN inference. We have observed that existing methodologies, utilizing different partitioning strategies to deploy a CNN model and perform inference at the edge on a distributed system, have several disadvantages. Therefore, in this paper, we propose a novel partitioning strategy, called Vertical Partitioning Strategy, together with a novel methodology needed to utilize our partitioning strategy efficiently, for CNN model inference on a distributed system at the edge. We compare our experimental results on the YOLOv2 CNN model with results obtained by the existing three methodologies and show the advantages of our methodologies in terms of memory requirement per edge device and overall system performance. Moreover, our experimental results on other representative CNN models show that our novel methodology utilizing our novel partitioning strategy is able to deliver CNN inference with very reduced memory requirement per edge device and improved overall system performance at the same time.
目前,一些应用需要在资源受限的边缘设备上进行CNN推理,这些设备可能具有非常有限的内存和计算能力来拟合大型CNN模型。在这种应用场景下,部署大型CNN模型并在单个边缘设备上进行推理是不可行的。一种可能的解决方案是在边缘(完全)分布式系统上部署大型CNN模型,并利用所有可用的边缘设备协同执行CNN推理。我们已经观察到,现有的方法,利用不同的分区策略来部署CNN模型并在分布式系统的边缘执行推理,有几个缺点。因此,在本文中,我们提出了一种新的分区策略,称为垂直分区策略,以及一种有效利用我们的分区策略所需的新方法,用于在边缘的分布式系统上进行CNN模型推理。我们将YOLOv2 CNN模型的实验结果与现有三种方法的结果进行了比较,并显示了我们的方法在每个边缘设备的内存需求和整体系统性能方面的优势。此外,我们在其他代表性CNN模型上的实验结果表明,我们的新方法利用我们的新分区策略能够在每个边缘设备的内存需求非常低的情况下提供CNN推理,同时提高了整体系统性能。
{"title":"Low-memory and high-performance CNN inference on distributed systems at the edge","authors":"Erqian Tang, T. Stefanov","doi":"10.1145/3492323.3495629","DOIUrl":"https://doi.org/10.1145/3492323.3495629","url":null,"abstract":"Nowadays, some applications need CNN inference on resource-constrained edge devices that may have very limited memory and computation capacity to fit a large CNN model. In such application scenarios, to deploy a large CNN model and perform inference on a single edge device is not feasible. A possible solution approach is to deploy a large CNN model on a (fully) distributed system at the edge and take advantage of all available edge devices to cooperatively perform the CNN inference. We have observed that existing methodologies, utilizing different partitioning strategies to deploy a CNN model and perform inference at the edge on a distributed system, have several disadvantages. Therefore, in this paper, we propose a novel partitioning strategy, called Vertical Partitioning Strategy, together with a novel methodology needed to utilize our partitioning strategy efficiently, for CNN model inference on a distributed system at the edge. We compare our experimental results on the YOLOv2 CNN model with results obtained by the existing three methodologies and show the advantages of our methodologies in terms of memory requirement per edge device and overall system performance. Moreover, our experimental results on other representative CNN models show that our novel methodology utilizing our novel partitioning strategy is able to deliver CNN inference with very reduced memory requirement per edge device and improved overall system performance at the same time.","PeriodicalId":440884,"journal":{"name":"Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127663710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Machine learning based intrusion detection as a service: task assignment and capacity allocation in a multi-tier architecture 基于机器学习的入侵检测即服务:多层体系结构中的任务分配和容量分配
Y. Lai, Didik Sudyana, Ying-Dar Lin, Miel Verkerken, Laurens D’hooge, T. Wauters, B. Volckaert, F. Turck
Intrusion Detection Systems (IDS) play an important role for detecting network intrusions. Because the intrusions have many variants and zero days, traditional signature- and anomaly-based IDS often fail to detect it. Machine learning (ML), on the other hand, has better capabilities for detecting variants. In this paper, we adopt ML-based IDS which consists of three in-sequence tasks: pre-processing, binary detection, and multi-class detection. We proposed ten different task assignments, which map these three tasks into a three-tier network for distributed IDS. We evaluated these with queueing theory to determine which tasks assignments are more appropriate for particular service providers. With simulated annealing, we allocated the total capacity appropriately to each tier. Our results suggest that the service provider can decide on the task assignments that best suit their needs. Only edge or a combination of edge and cloud could be utilized due to their shorter delay and greater operational simplicity. Utilizing only the fog or a combination of fog and edge remains the most private, which allows tenants to not have to share their raw private data with other parties and save more bandwidth. A combination of fog and cloud is easier to manage while still addressing privacy concerns, but the delay was 40% slower than the fog and edge combination. Our results also indicate that more than 85% of the total capacity is allocated and spread across nodes in the lowest tier for pre-processing to reduce delays.
入侵检测系统(IDS)在检测网络入侵方面发挥着重要作用。由于入侵具有许多变体和零日,传统的基于签名和异常的IDS通常无法检测到它。另一方面,机器学习(ML)具有更好的检测变体的能力。本文采用基于机器学习的入侵检测系统,该系统由预处理、二进制检测和多类检测三个顺序任务组成。我们提出了十个不同的任务分配,将这三个任务映射到分布式IDS的三层网络中。我们用排队理论对这些进行了评估,以确定哪些任务分配更适合特定的服务提供商。通过模拟退火,我们将总容量适当地分配到每一层。我们的研究结果表明,服务提供者可以决定最适合他们需求的任务分配。由于其更短的延迟和更大的操作简单性,只能使用边缘或边缘和云的组合。仅使用雾或雾和边缘的组合仍然是最私密的,这允许租户不必与其他方共享其原始私人数据并节省更多带宽。雾和云的组合更容易管理,同时仍能解决隐私问题,但延迟比雾和边缘的组合慢40%。我们的结果还表明,总容量的85%以上被分配并分布在最低层的节点上进行预处理以减少延迟。
{"title":"Machine learning based intrusion detection as a service: task assignment and capacity allocation in a multi-tier architecture","authors":"Y. Lai, Didik Sudyana, Ying-Dar Lin, Miel Verkerken, Laurens D’hooge, T. Wauters, B. Volckaert, F. Turck","doi":"10.1145/3492323.3495613","DOIUrl":"https://doi.org/10.1145/3492323.3495613","url":null,"abstract":"Intrusion Detection Systems (IDS) play an important role for detecting network intrusions. Because the intrusions have many variants and zero days, traditional signature- and anomaly-based IDS often fail to detect it. Machine learning (ML), on the other hand, has better capabilities for detecting variants. In this paper, we adopt ML-based IDS which consists of three in-sequence tasks: pre-processing, binary detection, and multi-class detection. We proposed ten different task assignments, which map these three tasks into a three-tier network for distributed IDS. We evaluated these with queueing theory to determine which tasks assignments are more appropriate for particular service providers. With simulated annealing, we allocated the total capacity appropriately to each tier. Our results suggest that the service provider can decide on the task assignments that best suit their needs. Only edge or a combination of edge and cloud could be utilized due to their shorter delay and greater operational simplicity. Utilizing only the fog or a combination of fog and edge remains the most private, which allows tenants to not have to share their raw private data with other parties and save more bandwidth. A combination of fog and cloud is easier to manage while still addressing privacy concerns, but the delay was 40% slower than the fog and edge combination. Our results also indicate that more than 85% of the total capacity is allocated and spread across nodes in the lowest tier for pre-processing to reduce delays.","PeriodicalId":440884,"journal":{"name":"Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127575613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adaptive brokerage framework for the cloud with functional testing 具有功能测试的云自适应代理框架
Sheriffo Ceesay, Yuhui Lin, A. Barker
In this paper, we present an Adaptive Brokerage for the Cloud (ABC) that can be used to simplify application deployment, monitoring and management processes in the cloud. The broker uses modern cloud infrastructure automation tools to test, deploy, monitor and optimise cloud resources. We used an e-commerce application to evaluate the entire functionality of the broker, we found out that different deployment options such as single-tier vs two-tier lead to interesting hardware and application performance insights. These insights are used to make effective infrastructure optimisation decisions.
在本文中,我们提出了一种可用于简化云中的应用程序部署、监控和管理流程的自适应代理(ABC)。该代理使用现代云基础设施自动化工具来测试、部署、监控和优化云资源。我们使用一个电子商务应用程序来评估代理的整个功能,我们发现不同的部署选项(如单层和双层)会带来有趣的硬件和应用程序性能洞察。这些见解可用于制定有效的基础设施优化决策。
{"title":"Adaptive brokerage framework for the cloud with functional testing","authors":"Sheriffo Ceesay, Yuhui Lin, A. Barker","doi":"10.1145/3492323.3495624","DOIUrl":"https://doi.org/10.1145/3492323.3495624","url":null,"abstract":"In this paper, we present an Adaptive Brokerage for the Cloud (ABC) that can be used to simplify application deployment, monitoring and management processes in the cloud. The broker uses modern cloud infrastructure automation tools to test, deploy, monitor and optimise cloud resources. We used an e-commerce application to evaluate the entire functionality of the broker, we found out that different deployment options such as single-tier vs two-tier lead to interesting hardware and application performance insights. These insights are used to make effective infrastructure optimisation decisions.","PeriodicalId":440884,"journal":{"name":"Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124407142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dealing with multi-step verification processes for certification issuance in universities 处理大学证书颁发的多步骤审核流程
Andrés Heredia, Gabriel Barros-Gavilanes
As in any institution, universities have processes defined in an unique way, involving many verification steps. Issuance of end-of-course certificates require multiple signatures from authorities, instructors and in some cases administrative staff. After an initial work of single signature certificates using blockchain for education purposes, we generate a prototype including more than one signature over the infrastructure generated for the Smart Ecosystem for Learning and Inclusion or SELI project. This prototype records certificates in a private non-monetary blockchain network, and is provided as an open source project. Countries like Ecuador, Turkey, Uruguay, and Finland can share certificates from the SELI platform through local nodes. This article provides relevant details about the implementation of the system, always with the aim of re-use existing software to reduce implementation time.
与任何机构一样,大学也有以独特方式定义的流程,涉及许多验证步骤。课程结束证书的签发需要当局、教师和某些情况下行政人员的多次签名。在为教育目的使用区块链进行单签名证书的初步工作之后,我们生成了一个原型,其中包括为学习和包容智能生态系统(SELI)项目生成的基础设施上的多个签名。该原型在私有非货币性区块链网络中记录证书,并作为开源项目提供。厄瓜多尔、土耳其、乌拉圭和芬兰等国家可以通过本地节点共享SELI平台的证书。本文提供了有关系统实现的相关细节,始终以重用现有软件以减少实现时间为目的。
{"title":"Dealing with multi-step verification processes for certification issuance in universities","authors":"Andrés Heredia, Gabriel Barros-Gavilanes","doi":"10.1145/3492323.3495622","DOIUrl":"https://doi.org/10.1145/3492323.3495622","url":null,"abstract":"As in any institution, universities have processes defined in an unique way, involving many verification steps. Issuance of end-of-course certificates require multiple signatures from authorities, instructors and in some cases administrative staff. After an initial work of single signature certificates using blockchain for education purposes, we generate a prototype including more than one signature over the infrastructure generated for the Smart Ecosystem for Learning and Inclusion or SELI project. This prototype records certificates in a private non-monetary blockchain network, and is provided as an open source project. Countries like Ecuador, Turkey, Uruguay, and Finland can share certificates from the SELI platform through local nodes. This article provides relevant details about the implementation of the system, always with the aim of re-use existing software to reduce implementation time.","PeriodicalId":440884,"journal":{"name":"Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126166652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 14th IEEE/ACM International Conference on Utility and Cloud Computing Companion
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1