首页 > 最新文献

2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)最新文献

英文 中文
Human Acceptance of Autonomous Social Media Agent 人类对自主社交媒体代理的接受
B. Fatima, S. W. Jaffry, Mian Muhammad Mubasher, M. Sherwani, A. Haseeb
On the advent of Web 2.0 online social media has emerged as a paramount vehicle for information sharing, business and entertainment. In order to harness this technology in a seamless and effective manner we need intelligent artifacts which can glue various stockholders and fulfill their information need pervasively. Hence, it is the time to design autonomous agents that would be able to take part in active social communication on social media like human beings. To this main question is whether people will accept and trust such systems in their environment or not. So, in this research an autonomous agent is designed that interacts with human beings and perform permissible social actions on the Facebook. Two types of experiments are conducted to compute the agent's expected level of acceptance by human and actual human acceptance of the agent. As the samples are collected from two different populations hence Student's T Test is performed to determine if two sets of data are significantly different from each other. 'Mean Difference' between both populations is 0.034 which shows that if an agent is capable of performing human-like social interaction it increases the human acceptance of the social agent.
随着Web 2.0的出现,在线社交媒体已经成为信息共享、商业和娱乐的重要工具。为了无缝有效地利用这一技术,我们需要智能产品来粘合各种股东并普遍满足他们的信息需求。因此,现在是时候设计能够像人类一样在社交媒体上积极参与社会交流的自主代理了。对于这个主要问题,人们是否会在他们的环境中接受和信任这样的系统。因此,在这项研究中,设计了一个自主代理,与人类互动,并在Facebook上执行允许的社会行为。通过两种类型的实验来计算人类对代理的期望接受程度和人类对代理的实际接受程度。由于样本是从两个不同的人群中收集的,因此执行学生T检验以确定两组数据是否彼此显著不同。两个群体之间的“平均差异”为0.034,这表明如果一个代理能够进行类似人类的社会互动,它会增加人类对社会代理的接受度。
{"title":"Human Acceptance of Autonomous Social Media Agent","authors":"B. Fatima, S. W. Jaffry, Mian Muhammad Mubasher, M. Sherwani, A. Haseeb","doi":"10.1109/W-FiCloud.2016.50","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.50","url":null,"abstract":"On the advent of Web 2.0 online social media has emerged as a paramount vehicle for information sharing, business and entertainment. In order to harness this technology in a seamless and effective manner we need intelligent artifacts which can glue various stockholders and fulfill their information need pervasively. Hence, it is the time to design autonomous agents that would be able to take part in active social communication on social media like human beings. To this main question is whether people will accept and trust such systems in their environment or not. So, in this research an autonomous agent is designed that interacts with human beings and perform permissible social actions on the Facebook. Two types of experiments are conducted to compute the agent's expected level of acceptance by human and actual human acceptance of the agent. As the samples are collected from two different populations hence Student's T Test is performed to determine if two sets of data are significantly different from each other. 'Mean Difference' between both populations is 0.034 which shows that if an agent is capable of performing human-like social interaction it increases the human acceptance of the social agent.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123855234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficiency in Mobile Cloud Computing Architectures 移动云计算架构中的能源效率
Le Vinh Thinh, Radha Krishna Reddy Pallavali, Fatiha Houacine, S. Bouzefrane
Mobile Cloud Computing (MCC) is an emerging and popular mobile technology which uses fully available Cloud Computing services and functionalities. This technology provides rich computational services to the users, network operators and Cloud service providers as well. However due to users mobility and high computational operations, consumption of energy is a major issue. Energy efficiency over MCC is needed since 57% of generated energy is used by ICT related devices and other negative impacts over environment. This paper investigates different mobile Cloud computing architectures and their performance over energy efficiency by examining different approaches: OSGi, overlay, and container based solutions.
移动云计算(MCC)是一种新兴和流行的移动技术,它使用完全可用的云计算服务和功能。该技术为用户、网络运营商和云服务提供商提供了丰富的计算服务。然而,由于用户的移动性和高计算操作,能源消耗是一个主要问题。MCC需要提高能源效率,因为57%的能源被ICT相关设备使用,并对环境产生其他负面影响。本文通过研究不同的方法(OSGi、覆盖和基于容器的解决方案)来研究不同的移动云计算架构及其能效性能。
{"title":"Energy Efficiency in Mobile Cloud Computing Architectures","authors":"Le Vinh Thinh, Radha Krishna Reddy Pallavali, Fatiha Houacine, S. Bouzefrane","doi":"10.1109/W-FiCloud.2016.72","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.72","url":null,"abstract":"Mobile Cloud Computing (MCC) is an emerging and popular mobile technology which uses fully available Cloud Computing services and functionalities. This technology provides rich computational services to the users, network operators and Cloud service providers as well. However due to users mobility and high computational operations, consumption of energy is a major issue. Energy efficiency over MCC is needed since 57% of generated energy is used by ICT related devices and other negative impacts over environment. This paper investigates different mobile Cloud computing architectures and their performance over energy efficiency by examining different approaches: OSGi, overlay, and container based solutions.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123294354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Power Optimization of Large Scale Mobile Cloud System Using Cooperative Cloudlets 基于协同Cloudlets的大规模移动云系统功耗优化
Muneera Al-Quraan, M. Al-Ayyoub, Y. Jararweh, L. Tawalbeh, E. Benkhelifa
Reducing the total power consumption and network delay are among the most interesting issues facing large scale Mobile Cloud Computing (MCC) systems and their ability to satisfy the Service Level Agreement (SLA). Such systems utilize cloudlet based infrastructure to support off-loading some of user's computationally heavy tasks to the cloudlets. However, the limited capabilities of the cloudlet system (in terms of the ability of serve different request type and the ability to serve users in large geographical regions) represent serious challenges to achieve those objectives. To cover the users demand for different types of services and in wide geographical regions, cloudlets cooperate among each others by passing user requests from one cloudlets to another. By adapting this cooperation, the total power consumption per request will be increased so that it includes the power consumption between the user and the local cloudlet and the power consumption of passing the request to a remote cloudlet. In this paper, we consider two types of cloudlets: local cloudlets and global cloudlets. The global cloudlets are a special kind of local cloudlets but with higher capabilities. The user can connect only to the local cloudlet and sends all its traffics to it. If the local cloudlet cannot serve the desired request, then the request is moved to other local cloudlet. If no local cloudlet can serve the request, then it is moved to a global cloudlet in which it can serve all service types. We optimize the power consumption for large scale cooperative cloudlets and evaluate the proposed model under two realistic scenarios. The result prove that the proposed model can be used to optimize power consumption in large scale MCC systems.
降低总功耗和网络延迟是大规模移动云计算(MCC)系统及其满足服务水平协议(SLA)的能力所面临的最有趣的问题之一。这样的系统利用基于cloudlet的基础设施来支持将一些用户繁重的计算任务卸载到cloudlet上。然而,cloudlet系统的有限功能(就服务不同请求类型的能力和为大地理区域的用户服务的能力而言)对实现这些目标构成了严峻的挑战。为了满足用户对不同类型服务和广泛地理区域的需求,cloudlets通过将用户请求从一个cloudlets传递到另一个cloudlets来相互协作。通过调整这种协作,每个请求的总功耗将增加,以便它包括用户和本地云之间的功耗以及将请求传递到远程云的功耗。在本文中,我们考虑了两种类型的云:本地云和全局云。全局云是一种特殊类型的本地云,但具有更高的功能。用户只能连接到本地cloudlet,并将所有流量发送到本地cloudlet。如果本地cloudlet不能提供所需的请求,则将请求移动到其他本地cloudlet。如果没有本地cloudlet可以为请求提供服务,则将其移动到可以为所有服务类型提供服务的全局cloudlet。我们优化了大规模协作云的功耗,并在两个现实场景下评估了所提出的模型。结果表明,该模型可用于大规模MCC系统的功耗优化。
{"title":"Power Optimization of Large Scale Mobile Cloud System Using Cooperative Cloudlets","authors":"Muneera Al-Quraan, M. Al-Ayyoub, Y. Jararweh, L. Tawalbeh, E. Benkhelifa","doi":"10.1109/W-FiCloud.2016.23","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.23","url":null,"abstract":"Reducing the total power consumption and network delay are among the most interesting issues facing large scale Mobile Cloud Computing (MCC) systems and their ability to satisfy the Service Level Agreement (SLA). Such systems utilize cloudlet based infrastructure to support off-loading some of user's computationally heavy tasks to the cloudlets. However, the limited capabilities of the cloudlet system (in terms of the ability of serve different request type and the ability to serve users in large geographical regions) represent serious challenges to achieve those objectives. To cover the users demand for different types of services and in wide geographical regions, cloudlets cooperate among each others by passing user requests from one cloudlets to another. By adapting this cooperation, the total power consumption per request will be increased so that it includes the power consumption between the user and the local cloudlet and the power consumption of passing the request to a remote cloudlet. In this paper, we consider two types of cloudlets: local cloudlets and global cloudlets. The global cloudlets are a special kind of local cloudlets but with higher capabilities. The user can connect only to the local cloudlet and sends all its traffics to it. If the local cloudlet cannot serve the desired request, then the request is moved to other local cloudlet. If no local cloudlet can serve the request, then it is moved to a global cloudlet in which it can serve all service types. We optimize the power consumption for large scale cooperative cloudlets and evaluate the proposed model under two realistic scenarios. The result prove that the proposed model can be used to optimize power consumption in large scale MCC systems.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New Scalable and Energy Efficient Algorithm for VMs Reassignment in Cloud Data Centers 云数据中心虚拟机重新分配的一种可扩展节能新算法
Makhlouf Hadji, N. Djenane, R. Aoudjit, S. Bouzefrane
To improve resource utilization in Cloud Data Centers and in order to reduce energy consumption at the same time, reassignment of services is required and leads to efficient operational costs. This paper presents a new and scalable algorithm based on b-matching theory to judiciously replace resources (considered as Virtual Machines in our work) according to energy consumption constraints. Our algorithm is benchmarked by an exact approach based on an Integer Linear Program (ILP) formulation of the Bin-Packing problem. The b-Matching algorithm allows to find near-optimal solutions and scale for large problem instances.
为了提高云数据中心的资源利用率,同时降低能源消耗,需要对服务进行重新分配,从而降低运营成本。本文提出了一种新的基于b匹配理论的可扩展算法,可以根据能耗约束明智地替换资源(在我们的工作中称为虚拟机)。我们的算法是基于整数线性规划(ILP)的装箱问题的精确方法的基准。b-Matching算法允许找到接近最优的解决方案,并扩展到大型问题实例。
{"title":"A New Scalable and Energy Efficient Algorithm for VMs Reassignment in Cloud Data Centers","authors":"Makhlouf Hadji, N. Djenane, R. Aoudjit, S. Bouzefrane","doi":"10.1109/W-FiCloud.2016.69","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.69","url":null,"abstract":"To improve resource utilization in Cloud Data Centers and in order to reduce energy consumption at the same time, reassignment of services is required and leads to efficient operational costs. This paper presents a new and scalable algorithm based on b-matching theory to judiciously replace resources (considered as Virtual Machines in our work) according to energy consumption constraints. Our algorithm is benchmarked by an exact approach based on an Integer Linear Program (ILP) formulation of the Bin-Packing problem. The b-Matching algorithm allows to find near-optimal solutions and scale for large problem instances.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Secure Mobile Process Tracking Using Wearable Computing in mGovernment Applications 在移动政府应用中使用可穿戴计算实现安全的移动过程跟踪
M. Ghazal, Yasmina Alkhalil, Fasila Haneefa, Assem Mhanna, Dana Awachi, Samr Ali
In this paper, we propose an automatic platform for mobile process monitoring by utilising wearable computing. The proposed system is implemented and tested for the process of the renewal of expired documents, that caters to both the clients and issuing governmental entities. The client-side system consists of a mobile application synced with a smart watch, which serves to receive notifications and status update on the renewal of the requested document. On the other hand, issuing authorities are served using specialised web portals, which offer a capability to manage the incoming requests in a structured way, to download the documents pertaining to a specific user, and to upload the processed document that is requested. Both sides of the proposed system are served using a database, which offers real-time updates and notifications. All documents are secured by using the latest encryption methods and digital signatures. The major benefit of the proposed system is the ability to monitor and go through the renewal process by simply using a user-friendly interface on the smart watch. We present the system workflow and design in the results, and discuss an application scenario that was proposed for the process of visa renewal in United Arab Emirates.
在本文中,我们提出了一个利用可穿戴计算的移动过程自动监控平台。建议的系统用于过期文件的更新过程的实施和测试,以满足客户和签发政府实体的需求。客户端系统由一个与智能手表同步的移动应用程序组成,用于接收更新所请求文档的通知和状态更新。另一方面,使用专门的web门户为颁发机构提供服务,这些门户提供了以结构化方式管理传入请求、下载与特定用户相关的文档以及上传所请求的处理过的文档的功能。该系统的双方都使用一个数据库,提供实时更新和通知。所有文件均采用最新的加密方法和数字签名加以保护。该系统的主要优点是能够通过简单地使用智能手表上的用户友好界面来监控和完成更新过程。我们在结果中介绍了系统的工作流程和设计,并讨论了在阿拉伯联合酋长国签证续签过程中提出的应用场景。
{"title":"Towards Secure Mobile Process Tracking Using Wearable Computing in mGovernment Applications","authors":"M. Ghazal, Yasmina Alkhalil, Fasila Haneefa, Assem Mhanna, Dana Awachi, Samr Ali","doi":"10.1109/W-FiCloud.2016.65","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.65","url":null,"abstract":"In this paper, we propose an automatic platform for mobile process monitoring by utilising wearable computing. The proposed system is implemented and tested for the process of the renewal of expired documents, that caters to both the clients and issuing governmental entities. The client-side system consists of a mobile application synced with a smart watch, which serves to receive notifications and status update on the renewal of the requested document. On the other hand, issuing authorities are served using specialised web portals, which offer a capability to manage the incoming requests in a structured way, to download the documents pertaining to a specific user, and to upload the processed document that is requested. Both sides of the proposed system are served using a database, which offers real-time updates and notifications. All documents are secured by using the latest encryption methods and digital signatures. The major benefit of the proposed system is the ability to monitor and go through the renewal process by simply using a user-friendly interface on the smart watch. We present the system workflow and design in the results, and discuss an application scenario that was proposed for the process of visa renewal in United Arab Emirates.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Legal and Regulative Aspects of IoT Cloud Systems 物联网云系统的法律和监管方面
Eszter E. Kalmar, A. Kertész, Szilvia Varadi, Radhika Garg, B. Stiller
Organizations envisioning adopting cloud computing have to consider numerous factors, including technical, organizational, economical and relational ones. Legal and regulative constraints increase the complexity and can vary with different deployment models and service levels. Nowadays a growing number of powerful devices are joining the Internet. Data users produce with these devices are continuously posted to online services, which require the use of cloud providers to efficiently handle these data. In our former work we have derived a general federation architecture for clouds from definitions of international organizations, and used it to define common cloud computing usage patterns. The aim of this paper is to revise purely cloud usage patterns and identify scenarios with cases involving Internet of Things (IoT) utilization based on corresponding European projects. These cases are also examined against legal and regulative constraints, in order to help users to better understand IoT ecosystems and companies to design better applications for IoT cloud environments.
设想采用云计算的组织必须考虑许多因素,包括技术、组织、经济和关系因素。法律和法规约束增加了复杂性,并且会随着不同的部署模型和服务级别而变化。如今,越来越多的功能强大的设备正在加入互联网。用户使用这些设备产生的数据会不断地发布到在线服务中,这就需要使用云提供商来有效地处理这些数据。在我们以前的工作中,我们从国际组织的定义中导出了云的通用联邦体系结构,并使用它来定义常见的云计算使用模式。本文的目的是修订纯云使用模式,并根据相应的欧洲项目确定涉及物联网(IoT)利用的案例场景。为了帮助用户更好地了解物联网生态系统,帮助企业为物联网云环境设计更好的应用程序,这些案例还将针对法律和监管限制进行审查。
{"title":"Legal and Regulative Aspects of IoT Cloud Systems","authors":"Eszter E. Kalmar, A. Kertész, Szilvia Varadi, Radhika Garg, B. Stiller","doi":"10.1109/W-FICLOUD.2016.20","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2016.20","url":null,"abstract":"Organizations envisioning adopting cloud computing have to consider numerous factors, including technical, organizational, economical and relational ones. Legal and regulative constraints increase the complexity and can vary with different deployment models and service levels. Nowadays a growing number of powerful devices are joining the Internet. Data users produce with these devices are continuously posted to online services, which require the use of cloud providers to efficiently handle these data. In our former work we have derived a general federation architecture for clouds from definitions of international organizations, and used it to define common cloud computing usage patterns. The aim of this paper is to revise purely cloud usage patterns and identify scenarios with cases involving Internet of Things (IoT) utilization based on corresponding European projects. These cases are also examined against legal and regulative constraints, in order to help users to better understand IoT ecosystems and companies to design better applications for IoT cloud environments.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131359082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generational Garbage Collection Algorithm Based on Lifespan Prediction 基于寿命预测的分代垃圾回收算法
Xin Ren, Ying Zhangxu
This paper proposes a new method of generational garbage collection (GC) algorithm for the issue of low efficiency of garbage collection in embedded virtual machine. Through predicting the lifespan of the allocating objects, the objects predicted of long lifespan can be distributed into the old generation directly, and the copy numbers from the young generation to old generation were decreased, thus the executed time of GC is cute down. In the aspect of generational collection, the young generation implements a non-suspended mode, which the objects allocation and GC are done simultaneously, the old generation uses a integrating strategy, combined lazy-buddy algorithm with mark-sweep algorithm, to achieve the quick allocation and recycle. It not only avoids the copy operation on objects, but also controls the amounts of memory fragments. The experimental on v8 JavaScript engine results shows that this algorithm can reduce the GC time by about 23.9%, operation time by around 17.2%, and the overall operation performance of the system is enhanced evidently.
针对嵌入式虚拟机垃圾回收效率低的问题,提出了一种新的分代垃圾回收算法。通过预测分配对象的寿命,可以将预期寿命较长的对象直接分配到老一代中,减少了从年轻代到老一代的拷贝数,从而降低了GC的执行时间。在分代收集方面,年轻代采用非挂起模式,对象分配和GC同时进行;老代采用整合策略,将懒哥们儿算法与标记-扫描算法相结合,实现快速分配和回收。它不仅避免了对对象的复制操作,而且还控制了内存片段的数量。在v8 JavaScript引擎上的实验结果表明,该算法可使GC时间减少约23.9%,操作时间减少约17.2%,系统的整体操作性能得到明显提高。
{"title":"Generational Garbage Collection Algorithm Based on Lifespan Prediction","authors":"Xin Ren, Ying Zhangxu","doi":"10.1109/W-FICLOUD.2016.47","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2016.47","url":null,"abstract":"This paper proposes a new method of generational garbage collection (GC) algorithm for the issue of low efficiency of garbage collection in embedded virtual machine. Through predicting the lifespan of the allocating objects, the objects predicted of long lifespan can be distributed into the old generation directly, and the copy numbers from the young generation to old generation were decreased, thus the executed time of GC is cute down. In the aspect of generational collection, the young generation implements a non-suspended mode, which the objects allocation and GC are done simultaneously, the old generation uses a integrating strategy, combined lazy-buddy algorithm with mark-sweep algorithm, to achieve the quick allocation and recycle. It not only avoids the copy operation on objects, but also controls the amounts of memory fragments. The experimental on v8 JavaScript engine results shows that this algorithm can reduce the GC time by about 23.9%, operation time by around 17.2%, and the overall operation performance of the system is enhanced evidently.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multilayer Virtualized Systems Analysis with Kernel Tracing 基于内核跟踪的多层虚拟系统分析
Cédric Biancheri, Naser Ezzati-Jivan, M. Dagenais
This paper studies interactions between virtual machines and their host through the sharing of resources like physical CPUs. We present an analysis based on kernel tracing that erases the bounds between virtual machines and their host to reduce the multilayer system into a single layer. For this analysis we developed a view that displays a time line for each host's CPU, showing across time which process is running, even if it is from a virtual machine. By using a system of filters, we added the possibility to highlight in this view either traced machines, virtual CPUs or specific processes. This last feature grants the possibility to precisely see on the host where and when a virtual machine's thread is running.
本文研究了虚拟机与主机之间通过共享资源(如物理cpu)实现的交互。我们提出了一种基于内核跟踪的分析方法,该方法消除了虚拟机与其主机之间的界限,从而将多层系统简化为单层。对于这个分析,我们开发了一个视图,显示每个主机CPU的时间线,显示哪个进程正在运行,即使它来自虚拟机。通过使用过滤器系统,我们增加了在该视图中突出显示跟踪的机器、虚拟cpu或特定进程的可能性。最后一个特性允许在主机上精确地查看虚拟机线程的运行地点和时间。
{"title":"Multilayer Virtualized Systems Analysis with Kernel Tracing","authors":"Cédric Biancheri, Naser Ezzati-Jivan, M. Dagenais","doi":"10.1109/W-FiCloud.2016.18","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.18","url":null,"abstract":"This paper studies interactions between virtual machines and their host through the sharing of resources like physical CPUs. We present an analysis based on kernel tracing that erases the bounds between virtual machines and their host to reduce the multilayer system into a single layer. For this analysis we developed a view that displays a time line for each host's CPU, showing across time which process is running, even if it is from a virtual machine. By using a system of filters, we added the possibility to highlight in this view either traced machines, virtual CPUs or specific processes. This last feature grants the possibility to precisely see on the host where and when a virtual machine's thread is running.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
State-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security 《物联网与云信息安全领域专业能力的国家层面看法》
N. Miloslavskaya, A. Tolstoy
Two important areas of our lives -- Internet of Things (IoT) and Clouds -- are based on the general information and communication technologies (ICT) concepts. If so, the modern state-level requirements for the competencies of information security (IS) professionals are completely applicable to IS professionals needed for the IoT and Clouds. That is why the peculiarities of American, Australian and European approaches to the development of IS professional competencies are discussed on four best-in-the-breed examples: "The Competency and Functional Framework for IT Security Workforce Development" by the U. S. DHS/NCSD, the NICE by NIST, "The Cyber Security Capability Framework & Mapping of Information Security Manual Roles" by AGIMO and "The European e-Competence Framework" by the European Commission. Pros and cons of all approaches are marked. A short prediction on the new international standard ISO/IEC 27021 content with IS professional competencies is proposed. The discussion of all these documents' applicability to the IoT and Cloud IS professional competencies concludes the paper.
我们生活中的两个重要领域——物联网(IoT)和云——都是基于一般的信息和通信技术(ICT)概念。如果是这样,那么信息安全(IS)专业人员的现代国家级能力要求完全适用于物联网和云所需的IS专业人员。这就是为什么美国、澳大利亚和欧洲发展信息系统专业能力的方法的特点是通过四个最好的例子来讨论的:美国国土安全部/NCSD的“IT安全劳动力发展的能力和功能框架”,NIST的NICE, AGIMO的“网络安全能力框架和信息安全手册角色映射”和欧盟委员会的“欧洲电子能力框架”。所有方法的优点和缺点都被标记出来。对新国际标准ISO/IEC 27021内容与信息系统专业能力进行了简要预测。讨论了所有这些文档对物联网和云信息系统专业能力的适用性,从而总结了本文。
{"title":"State-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security","authors":"N. Miloslavskaya, A. Tolstoy","doi":"10.1109/W-FiCloud.2016.31","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.31","url":null,"abstract":"Two important areas of our lives -- Internet of Things (IoT) and Clouds -- are based on the general information and communication technologies (ICT) concepts. If so, the modern state-level requirements for the competencies of information security (IS) professionals are completely applicable to IS professionals needed for the IoT and Clouds. That is why the peculiarities of American, Australian and European approaches to the development of IS professional competencies are discussed on four best-in-the-breed examples: \"The Competency and Functional Framework for IT Security Workforce Development\" by the U. S. DHS/NCSD, the NICE by NIST, \"The Cyber Security Capability Framework & Mapping of Information Security Manual Roles\" by AGIMO and \"The European e-Competence Framework\" by the European Commission. Pros and cons of all approaches are marked. A short prediction on the new international standard ISO/IEC 27021 content with IS professional competencies is proposed. The discussion of all these documents' applicability to the IoT and Cloud IS professional competencies concludes the paper.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130078373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Taxonomy for Unsecure Big Data Processing in Security Operations Centers 安全运营中心不安全大数据处理分类
N. Miloslavskaya, A. Tolstoy, S. Zapechnikov
While the media constantly describes new attacks, the organizations seriously concerned about their business protection need to be prepared for such sophisticated attacks against their IT infrastructures. Hence a properly designed and formalized information security (IS) management system with Security Operations Center (SOC) as its centric part is required as never before. Among the most important documents for SOC there are two policies: IS policy and IS incident management policy. In order to create a truly effective policy it is vital to adequately describe SOC's operational environment from the IS viewpoint. The paper presents the most demand for these purposes classifications (taxonomy) of IS threats, vulnerabilities, attacks and IS incidents as the negative elements that should be avoided.
当媒体不断地描述新的攻击时,认真关注其业务保护的组织需要为针对其IT基础设施的此类复杂攻击做好准备。因此,一个以安全运营中心(SOC)为中心的信息安全(IS)管理系统的设计和形式化是前所未有的。在SOC最重要的文档中有两个策略:IS策略和IS事件管理策略。为了创建一个真正有效的政策,从is的角度充分描述SOC的操作环境至关重要。本文提出了最需要这些目的的分类(分类法)的IS威胁,漏洞,攻击和IS事件作为应该避免的负面因素。
{"title":"Taxonomy for Unsecure Big Data Processing in Security Operations Centers","authors":"N. Miloslavskaya, A. Tolstoy, S. Zapechnikov","doi":"10.1109/W-FiCloud.2016.42","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.42","url":null,"abstract":"While the media constantly describes new attacks, the organizations seriously concerned about their business protection need to be prepared for such sophisticated attacks against their IT infrastructures. Hence a properly designed and formalized information security (IS) management system with Security Operations Center (SOC) as its centric part is required as never before. Among the most important documents for SOC there are two policies: IS policy and IS incident management policy. In order to create a truly effective policy it is vital to adequately describe SOC's operational environment from the IS viewpoint. The paper presents the most demand for these purposes classifications (taxonomy) of IS threats, vulnerabilities, attacks and IS incidents as the negative elements that should be avoided.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"2007 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1