2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery最新文献

筛选
英文 中文
Unknown Word Recognition Based on Maximal Cliques 基于最大团的未知词识别
Hao Chen, Bo Xiao, Zhiqing Lin
{"title":"Unknown Word Recognition Based on Maximal Cliques","authors":"Hao Chen, Bo Xiao, Zhiqing Lin","doi":"10.1109/CyberC.2011.46","DOIUrl":"https://doi.org/10.1109/CyberC.2011.46","url":null,"abstract":"Unknown word recognition is a key issue in Chinese information processing. The traditional algorithms of unknown word recognition can be broadly classified into two types: the rule-based methods and the statistical methods. However, these algorithms have some limitations in identifying the unknown words which are created on Internet. The unknown words of Internet have no obvious rules and are composed of common words, so the rule-based methods have limitations in identifying them; while the statistical methods also have limitations in identifying them for they use mutual information. Therefore, this paper proposes an algorithm of unknown word recognition, which is based on the bigram model and uses the method of mining maximal cliques to identify the unknown words of Internet. Experimental results show that the algorithm achieves a higher accuracy than the traditional statistical methods that are based on the N-gram model.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"66 2-3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116602986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments 普适计算环境下的网络安全问题
J. Walker, Travis Jones, Mansour Mortazavi, R. Blount
{"title":"Cyber Security Concerns for Ubiquitous/Pervasive Computing Environments","authors":"J. Walker, Travis Jones, Mansour Mortazavi, R. Blount","doi":"10.1109/CyberC.2011.53","DOIUrl":"https://doi.org/10.1109/CyberC.2011.53","url":null,"abstract":"The computing paradigm of ubiquitous/pervasive computing has changed the way in which nomadic computer users interact with computer devices and network systems. Modern ubiquitous computing devices have enabled nomadic computer users to interact with computer and network systems anywhere and at anytime. Although the issue of cyber security has been overlooked by many within the community, these devices provide users with a rich set of context-relevant information including location, usage data, and even the location/state of similar devices within the reach. Cyber Security has become a matter of national, economic, and societal importance. Present-day attacks on the nation's computer systems do not simply damage an isolated machine or disrupt a single enterprise system. Instead, modern attacks target infrastructure that is integral to the economy, and daily life. Computer networks have joined food, water, transportation, and energy as critical resources for the functioning of the national economy. As a result of our interconnected world no device is an island, and security still remains a significant obstacle for ubiquitous and pervasive environments, partially in terms intrusions. This paper examines intrusion detection within ubiquitous and pervasive environments within the context of plan recognition as means to classify attacks both quantitatively and qualitatively.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115520886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Performance Study on Several Distributed File Systems 几种分布式文件系统的性能研究
Songlin Bai, Haohao Wu
{"title":"The Performance Study on Several Distributed File Systems","authors":"Songlin Bai, Haohao Wu","doi":"10.1109/CyberC.2011.45","DOIUrl":"https://doi.org/10.1109/CyberC.2011.45","url":null,"abstract":"With the development of cloud computing, the distributed file systems are getting more and more attention. In this paper, we introduce the concept and the features of the distributed file system, and analyse several popular systems, such as Hadoop, Moosefs and Lustre. Especially, the tested performance comparison of these systems is given. Finally, we propose the research trends in the future.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"12 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129714148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Orthogonal Space-Time Codes Based Signal Constellations for MIMO System 基于正交空时码的MIMO系统信号星座
Md. Zahangir Alom, H. Lee, Md. Hashem Ali Khan, M. H. Lee
{"title":"Orthogonal Space-Time Codes Based Signal Constellations for MIMO System","authors":"Md. Zahangir Alom, H. Lee, Md. Hashem Ali Khan, M. H. Lee","doi":"10.1109/CyberC.2011.90","DOIUrl":"https://doi.org/10.1109/CyberC.2011.90","url":null,"abstract":"Orthogonal space-time codes (OSTCs) have recently captivated considerable attention due to their properties of full diversity and low implementation complexity. In this paper, we derive effective use OSTCs for MIMO systems successfully. It has been calculated coding gain of the orthogonal ST code and fast ML decoding at the receiver can be decoded separately. This goal achieved by properly choosing the signal constellations and compare bit-error-rate (BER) to signal-to-noise ratio (SNR) of different QPSK and QAM techniques. Simulation results show that the obtained constellations outperform not only the conventional QAM constellation, but also other well-known constellations used for efficient data communications.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129101730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing a Cloud-Centric Service Assurance Platform for Computing as a Service 构建以云为中心的计算即服务服务保障平台
Jun-Yan Hu, C. Wu, Chia-Chen Chu, Kuan-Hsiung Liang, Hey-Chyi Young, Yung-Yi Hsu, Chung-Hua Hu, Huan-Guo Lin
{"title":"Constructing a Cloud-Centric Service Assurance Platform for Computing as a Service","authors":"Jun-Yan Hu, C. Wu, Chia-Chen Chu, Kuan-Hsiung Liang, Hey-Chyi Young, Yung-Yi Hsu, Chung-Hua Hu, Huan-Guo Lin","doi":"10.1109/CyberC.2011.32","DOIUrl":"https://doi.org/10.1109/CyberC.2011.32","url":null,"abstract":"As the cloud market is growing fast and more and more enterprises are moving their services to the cloud, assurance of cloud service quality becomes one of the key success factors of cloud business. Due to the dynamic nature of the cloud, it's more complicated to manage and guarantee quality level in the cloud than that in the telecommunication. In order to address these issues, we developed a service assurance oriented platform, Cloud BOSS, which has the capabilities of monitoring and measuring, problem management, and quality management. Every module in this platform cooperates with each other via standard JMX (Java Management Extensions) interfaces. An end-to-end SLA (Service Level Agreement) mechanism was also depicted to show how we manage to meet the service agreements with customers and demonstrate a practical way of mapping KPIs (Key Performance Indicators) to KQIs (Key Quality Indicators).","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123854845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dynamic Threshold-Based Energy Efficient Scheduling Algorithm for Parallel Tasks on Homogeneous DVS-Enabled Clusters 基于动态阈值的同构分布式集群并行任务高效调度算法
Wei Liu, Hang Yin, Wei Du
{"title":"Dynamic Threshold-Based Energy Efficient Scheduling Algorithm for Parallel Tasks on Homogeneous DVS-Enabled Clusters","authors":"Wei Liu, Hang Yin, Wei Du","doi":"10.1109/CyberC.2011.58","DOIUrl":"https://doi.org/10.1109/CyberC.2011.58","url":null,"abstract":"For parallel applications running on high-performance clusters, performance is usually satisfied without paying much attention to energy consumption. In this paper, we develop a new scheduling algorithm called Energy efficient Scheduling Algorithm based on DVS and Dynamic threshold (ESADD), which combines dynamic threshold-based task duplication strategy with dynamic voltage scaling (DVS) technique. It first exploits an optimal threshold to get the optimal task grouping and leverage task duplication algorithm to reduce schedule length and communication energy, and then schedules the applications on DVS-enabled processors that can scale down their voltages to reduce computation energy whenever tasks have slack time due to task dependencies. Using simulations we show our algorithm not only maintains good performance, but also has a good improvement on energy efficiency for parallel applications.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Family of Heuristics for Agent-Based Cloud Bag-of-Tasks Scheduling 基于agent的云任务袋调度的一类启发式算法
Octavio Gutiérrez, K. Sim
{"title":"A Family of Heuristics for Agent-Based Cloud Bag-of-Tasks Scheduling","authors":"Octavio Gutiérrez, K. Sim","doi":"10.1109/CYBERC.2011.74","DOIUrl":"https://doi.org/10.1109/CYBERC.2011.74","url":null,"abstract":"The scheduling of bag-of-tasks applications (BoTs) in Clouds deal with fixed predefined allocation slots of Cloud resources, e.g., 1-hour time slots, that start being exhausted right after their allocation disregarding whether tasks are being executed or not. In addition, Cloud resources may be allocated for several hours to execute BoTs. However, some resource types (e.g., clusters) may be allocated for only a few hours, while others (e.g., CPU instances) may be allocated for several hours, so BoTs may be executed in such heterogeneous sets of Cloud resources (probably) allocated for a different number of hours. In this paper, a family of 15 scheduling heuristics consisting of two phases: (i) task ordering and (ii) task mapping (based on the remaining allocation times of Cloud resources) is proposed. The heuristics aim to maximize resource utilization while executing BoTs in heterogeneous sets of Cloud resources allocated for different numbers of hours. Cloud resources for executing BoTs are dynamically composed by adopting the contract net protocol. In addition, an agent-based testbed for Cloud BoT scheduling and execution was implemented. Simulation results show that the agents are capable of successfully and efficiently scheduling and executing BoTs in sets of Cloud resources composed from multiple Cloud environments.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"600 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116280968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Extending Work Queue of HCA Endpoint Using Software Work Queue Approach: Experimental Evaluation with uDAPL 用软件工作队列方法扩展HCA端点的工作队列:基于uDAPL的实验评估
Jasjit Singh, Eva Mishra, Yogeshwar Sonawane
{"title":"Extending Work Queue of HCA Endpoint Using Software Work Queue Approach: Experimental Evaluation with uDAPL","authors":"Jasjit Singh, Eva Mishra, Yogeshwar Sonawane","doi":"10.1109/CyberC.2011.66","DOIUrl":"https://doi.org/10.1109/CyberC.2011.66","url":null,"abstract":"With an ever increasing demand for computing power, number of nodes to be deployed in a high performance cluster is increasing. This has put stress on various hardware resources like endpoints (equivalent to Queue Pairs), memory etc. One of the factors limiting number of endpoints with a Host Channel Adaptor (HCA) is the amount of total descriptor space available in the form of on-board memory. For the same amount of descriptor space available, number of endpoints supported by an HCA is inversely proportional to the depth of work queue (WQ) for an endpoint (EP). Therefore to support more number of endpoints, depth of WQ has to be decreased. In this paper, we present an optimal approach of extending WQ using Software Work Queue (SWQ). SWQ is an extension to the work queue of EP on HCA. It provides a larger pool of descriptors (i.e. work requests) per EP to an application (e.g. uDAPL application, MPI library) than that available in the hardware. The advantage of this technique lies in the fact that more number of endpoints are supported by HCA without costing the depth of the WQ. Experimental evaluation suggests positive impact as requests in SWQ are given to hardware work queue (HWQ) as soon as it gets depleted.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133863449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Approach for Repeated Patterns Mining Based on Indent Shape of HTML Documents 基于HTML文档缩进形状的重复模式挖掘方法
Yanxu Zhu, Gang Yin, Huaimin Wang, Dian-xi Shi, Xiang Rao, Lin Yuan
{"title":"Efficient Approach for Repeated Patterns Mining Based on Indent Shape of HTML Documents","authors":"Yanxu Zhu, Gang Yin, Huaimin Wang, Dian-xi Shi, Xiang Rao, Lin Yuan","doi":"10.1109/CyberC.2011.15","DOIUrl":"https://doi.org/10.1109/CyberC.2011.15","url":null,"abstract":"Mining of repeated patterns from HTML documents is the key step towards Web-based data mining and knowledge extraction. Many web crawling applications need efficient repeated patterns mining techniques to generate their wrapper automatically. Existing approaches such as tree matching and string matching can detect repeated patterns with high precision, but their performance is still a challenge for practical web crawling applications. In this paper, we propose an efficient approach for mining repeated patterns based on indent shape of HTML document. Indent shape is a novel and simple model of HTML document, in which tandem repeated waves have strong association with the repeated patterns to be detected. By scanning an indent shape with a horizontal indent-line from bottom to top, the tandem repeated waves are identified by filtering the wave segments with low self-similarities. After that the boundary of HTML code corresponding to repeated patterns can be identified, which could be transformed to regular expressions formal-defined easily. Extensive experiments on two practical data sets retrieved from Internet show that our approach achieves high efficiency significantly, and its precision performance is also generally better than the existing approaches.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131570310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Fine-Grained Transaction Categorization for Multi-tier Applications 多层应用程序的自动细粒度事务分类
Zhen Zhang, Shanping Li
{"title":"Automatic Fine-Grained Transaction Categorization for Multi-tier Applications","authors":"Zhen Zhang, Shanping Li","doi":"10.1109/CyberC.2011.31","DOIUrl":"https://doi.org/10.1109/CyberC.2011.31","url":null,"abstract":"Multi-tier architecture has become the industry standard for building Web applications. These applications feature in multiple categories of transactions. Properly categorizing the transactions and accurately characterizing the resource usage for each category is crucial for modeling the performance of multi-tier application. Existing studies either ignores the transaction categorization problem by simply using the URL path as the identifier of category, or require complex monitoring infrastructure. In this paper we propose a method called Transaction ICA, which automatically categorize transactions based on only widely available Web access log and aggregate resource utilization data. The method use URL path as the initial categorization setting, and iteratively split and merge categories based on estimated resource usage. The method incorporates regression based resource usage estimation technique and independent component analysis based request categorization technique. We validate the feasibility of our method using a synthetic 2-tier Web application. The experiments shows the method can correctly categorize transactions into coherent groups and give accurate per category resource demand, the result categorization is also more fine-grained than the one from existing method.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115345337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信