{"title":"Towards Agents and Ontology for Cloud Service Discovery","authors":"Jaeyong Kang, K. Sim","doi":"10.1109/CyberC.2011.84","DOIUrl":"https://doi.org/10.1109/CyberC.2011.84","url":null,"abstract":"Cloud computing has attracted great interest from both academic and industrial communities. However, only a few efforts have been devoted to building tools for supporting Cloud service discovery. In this paper, we present a four-stage, agent-based Cloud service discovery protocol. Utilizing an ontology description, in which each resource is described semantically and relatively to other resources, we develop a multi-agent system that cooperates efficiently by introducing a flexible ontology-based matching. To increase the utility and success rate of matching consumers' requests to resources, we use a database to store and keep track of historical data for making intelligent recommendation based on attribute value prediction. Empirical results show that when broker agents in our system use a Cloud ontology and a connection procedure with a recommendation stage achieved better performance in finding the appropriate Cloud services than when broker agents 1) use only the connection procedure but not the Cloud ontology and 2) do not use both the connection procedure and the Cloud ontology.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127636123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yali Liu, Zhengye Liu, Xidong Wu, Jin Wang, C. Yang
{"title":"IPTV System Design: An ISP's Perspective","authors":"Yali Liu, Zhengye Liu, Xidong Wu, Jin Wang, C. Yang","doi":"10.1109/CyberC.2011.47","DOIUrl":"https://doi.org/10.1109/CyberC.2011.47","url":null,"abstract":"IPTV is an emerging Internet application, and is revolutionizing the entertainment and media industries. In this paper, we examine the current progress in research and development of IPTV systems. We provide an overview of two major IPTV system architectures, namely, the IP multicast architecture and the P2P architecture, and review various challenges, design issues, and interesting research problems in these approaches, more from an ISP's perspective. We also outline a hybrid IP multicast and P2P IPTV architecture, which enhances the system resilience to network errors, while preserving the desirable properties of the IP multicast system.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130330664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One Method for Provenance Tracking of Product Lifecycle Data in Collaborative Service Environment","authors":"Ren Genquan, Zhang Li, W. Jianmin, Liu Yinbo","doi":"10.1109/CYBERC.2011.62","DOIUrl":"https://doi.org/10.1109/CYBERC.2011.62","url":null,"abstract":"It is vital to provides more necessary and accurate data for product services and knowledge discovery through provenance tracking of product lifecycle data. We propose one three-level framework of provenance tracking of product lifecycle data, which is consisting of business level, process level and data level firstly. After the models of product lifecycle data and their data provenance are given, the organization of product lifecycle data and the design of provenance annotations are explored. Then the tracking algorithms are described and one method for product lifecycle data on business level in collaborative service environment is suggested. The method is verified in one prototype system. The verification results show that it is enough to the provenance tracking of product life statuses and physical BOM in collaborative service environment.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115127698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ling Li, Hua Yang, Hang Su, Yihua Cao, Shibao Zheng
{"title":"A Web-Based HD Telemedicine System for Remote Psychotherapy","authors":"Ling Li, Hua Yang, Hang Su, Yihua Cao, Shibao Zheng","doi":"10.1109/CyberC.2011.94","DOIUrl":"https://doi.org/10.1109/CyberC.2011.94","url":null,"abstract":"With the accelerated global urbanization and life rhythm, an increasing physical and mental stress has been imposed, which led to a variety of problems that could not be ignored. This paper proposes a novel web-based telemedicine system that is focusing on psychotherapy. Considering the requirement of the psychological treatment, the function of system contains high definition video monitoring, two-way voice talkback, physiology parameters monitoring and data management based on database. The solution of the system is presented in the paper, including the hardware and software design. Some key issues in the system, including HD video processing, physiological parameters processing, are also discussed. Finally, the demonstration system and performance evaluation are presented.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115291601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access Control for the Smart Meters Based on ABE","authors":"C. Yin, Ronggang Zhang","doi":"10.1109/CyberC.2011.22","DOIUrl":"https://doi.org/10.1109/CyberC.2011.22","url":null,"abstract":"As more granular sensitive metering data are available in the demand response system, privacy issues are getting more and more attentions recently. The users' habits, behaviors and lifestyles can be deduced by the malicious entities from the energy information such as energy usage data, distributed energy generation and consumption, billing information and so on. In this paper we propose an access control model using ciphertext-policy attribute based encryption (CPABE) to reduce such risks. Specifically, our construction provides entities with different access rights to the fine-grained data stored in the smart meters, as the sensitive information is protected using certain attribute policies.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122143173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Frequency Allocation in Dynamic Environment of Cognitive Radio Networks Based on Stochastic Game","authors":"Xin Liu, Jinlong Wang, Qi-hui Wu, Yang Yang","doi":"10.1109/CyberC.2011.85","DOIUrl":"https://doi.org/10.1109/CyberC.2011.85","url":null,"abstract":"We investigate distributed frequency allocation problem in dynamic environment of cognitive radio (CR) networks with a stochastic game (SG) model. Traditional multi-agent reinforcement learning (MARL) algorithms, as the primary online strategy learning algorithms of SG game, are not suitable for the application of wireless communication. Hence, a new MARL algorithm, maximizing the average Q function algorithm (MAQ), is proposed in this article. MAQ not only reduces the intercommunications but also realizes indirect coordination among agents. Simulation results show the learning efficiency of MAQ which is close to that of centric learning method.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128687987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Health Transformation Model in Serbia: Design, Architecture and Developing","authors":"Miljan Vucetic, Ana Uzelac, N. Gligoric","doi":"10.1109/CyberC.2011.96","DOIUrl":"https://doi.org/10.1109/CyberC.2011.96","url":null,"abstract":"Electronic health (e-health), or the electronic health system, allows a more efficient performance of all participants in the healthcare chain reducing administrative costs. In developing e-health, healthcare institutions are given an opportunity to improve the quality of their services through the use of advanced electronic systems. This paper presents the strategy of designing and developing a health information system, i.e. storing of all information on health status of every citizen in a central database. It should take the form of an electronic health record, while the citizens will have their own personal health record - file, which will allow communication with the central database. Unlike some other types of electronic transactions, where security issues are predominantly concerned with payments, e-health has an added \"complication\" of sending confidential, important and sensitive information over the Internet. For this reason, introduction of electronic \"smart\" cards within the new health information system (HIS) is planned, as their security encryption mechanisms will ensure secure communication within the proposed system.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125853062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Deng, Zhaoyun Ding, Bingying Xu, Bin Zhou, Yan Jia, Peng Zou
{"title":"Exploring Event Evolution Patterns at the Atomic Level","authors":"Lei Deng, Zhaoyun Ding, Bingying Xu, Bin Zhou, Yan Jia, Peng Zou","doi":"10.1109/CyberC.2011.16","DOIUrl":"https://doi.org/10.1109/CyberC.2011.16","url":null,"abstract":"The event evolution mining for news corpus is beneficial for people who are less interested in the set of documents related by a topic rather than the underlying stories. Most of state-of-the-art approaches which derived from the TDT field considered events at the document level, which made different granularity for each event in evolution graph. In this paper, we consider events from a unified perspective by introducing the IE techniques into this task. We propose an unsupervised approach to explore event evolution patterns through extracting atomic event from documents, identifying their co-reference, and measuring their relationship automatically. And then we construct the event evolution graph. Meanwhile, we propose two policies to find a newsworthy subset from a mass of atomic events in a news corpus to simplify the event evolution graph. Finally, we show experimentally that our method which works on a Chinese news corpus can construct the atomic event evolution graph, whose vertexes are standing for important events of the topic, and edges are reasonable relationship between their adjacent events.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116915655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Label Based Greedy Algorithm for Minimum Energy Consumption Multicast Routing in Ad Hoc Networks","authors":"Lin Lin, Qiwu Wu","doi":"10.1109/CyberC.2011.28","DOIUrl":"https://doi.org/10.1109/CyberC.2011.28","url":null,"abstract":"We study the problem of computing multicast trees with minimal energy consumption in multi-hop wireless ad hoc networks. We demonstrate in this paper, that for two multicast trees having the same number of forwarding nodes in an ad hoc network, the one with least steiner nodes consumes least bandwidth. A greedy Label Based Greedy Algorithm (LBGA) is presented. Our algorithm LBGA with time complexity O(n^2) is an improvement of the existed multicast algorithms. At the end of the paper, we give an example to show the improvement on three representative algorithms by our LBGA.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116908546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unbiased Sampling of Bipartite Graph","authors":"J. Wang, Yuchun Guo","doi":"10.1109/CyberC.2011.63","DOIUrl":"https://doi.org/10.1109/CyberC.2011.63","url":null,"abstract":"Increasing size of online social networks (OSNs) has given rise to sampling method studies that provide a relatively small but representative sample of large-scale OSNs so that the measurement and analysis burden can be affordable. So far, a number of sampling methods already exist that crawl social graphs. Most of them are suitable for one-mode graph where there is only one type of nodes. Literatures show that Metropolis-Hastings Random Walk (MHRW) produces unbiased samples with better performance than other sampling methods. But there are more and more online social networking sites with two types of nodes, such as Taobao and eBay. Representing these two-mode networks as bipartite graphs, we study the sampling methods for bipartite graphs in this paper. Our contributions include analyze the effectiveness of extending MHRW algorithm to bipartite graphs and making a modification in sampling procedure to improve the stability. Finally, we compare our MHRW sampling algorithm with Random Walk (RW) over the generated bipartite graphs as well as real two-mode network graphs. Simulations show that MHRW outperforms RW over bipartite graphs.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}