{"title":"The Study and Methods for Cloud Based CDN","authors":"C. Lin, M. Leu, Chih-Wei Chang, S. Yuan","doi":"10.1109/CyberC.2011.82","DOIUrl":"https://doi.org/10.1109/CyberC.2011.82","url":null,"abstract":"Cloud computing becomes a popular trend in recent years. In the meanwhile, content delivery network has been used for many years to distribute content all over the world. The relation between cloud computing and content delivery network is very interesting. In this paper, we proposed a cloud based content delivery network. This architecture integrates cloud infrastructure and content delivery network system together. It provides a low cost and elastic web serving cloud platform. Besides, it also provides easy way to manage data for web content developers, and accelerate the speed for users to access web sites. This system uses Hadoop Distributed File System as a cloud infrastructure service, and creates many data clusters around the world. Therefore, content providers could place content to closest node from end users. The result shows a high performance and flexible solution to build a personal content delivery network over cloud.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"4318 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can Collective Use Help for Searching?","authors":"D. Dicheva, Christo Dichev","doi":"10.1109/CyberC.2011.14","DOIUrl":"https://doi.org/10.1109/CyberC.2011.14","url":null,"abstract":"In this paper we propose a \"find similar\" method intended to extend the searching capabilities of digital collections targeting educational and academic domains. Given a document, the described algorithm finds similar documents that may be of interest to the user. It exploits the metadata typical for the participatory web. In the adopted model, documents are viewed as objects associated with a set of tags and a set of users who have tagged them, inducing tag-based and user-based similarity. The similarity between two documents is computed as a combination of their tag-base and, user-based cosine similarity and the document recency. We have con-ducted a series of experiments using a CiteULike dump to investigate the properties of the proposed similarity measure. The experimental results indicate that the algorithm exploiting meta-information about the documents provides a good approximation of our understanding of the contextual dependency of the notion of similarity.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123147068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load-Balancing Tactics in Cloud","authors":"Rich Lee, B. Jeng","doi":"10.1109/CyberC.2011.79","DOIUrl":"https://doi.org/10.1109/CyberC.2011.79","url":null,"abstract":"Cloud computing enables shared servers to provide resources, software and data for collaborative services on demand with high interoperability and scalability. However, there are a number of technical challenges that need to be tackled before these benefits can be fully realized, which include system reliability, resource provisioning, and efficient resources consuming, etc. Among them, load-balancing is a necessary mechanism to increase the service level agreement (SLA) and better uses of the resources. Unfortunately, servers¡¦ capability varies much in practice and is not easy to record in ordered positions in a server farm, which will causes non resource-aware load-balancing algorithms to distribute workloads evenly. We discuss this issue and show why such algorithms don¡¦t fit the cloud computing environment and then present a feasible resource-aware load-balancing mechanism by using existing proven technologies to meet higher SLA and the return of investment as well.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"81 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123273459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opportunities and Challenges in Running Scientific Workflows on the Cloud","authors":"Yong Zhao, Xubo Fei, I. Raicu, Shiyong Lu","doi":"10.1109/CyberC.2011.80","DOIUrl":"https://doi.org/10.1109/CyberC.2011.80","url":null,"abstract":"Cloud computing is gaining tremendous momentum in both academia and industry. The application of Cloud computing, however, has mostly focused on Web applications and business applications; while the recognition of using Cloud computing to support large-scale workflows, especially data-intensive scientific workflows on the Cloud is still largely overlooked. We coin the term \"Cloud Workflow\", to refer to the specification, execution, provenance tracking of large-scale scientific workflows, as well as the management of data and computing resources to enable the execution of scientific workflows on the Cloud. In this paper, we analyze why there has been such a gap between the two technologies, and what it means to bring Cloud and workflow together; we then present the key challenges in running Cloud workflow, and discuss the research opportunities in realizing workflows on the Cloud.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121008832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donghua Yang, Jianzhong Li, Xixian Han, Jinbao Wang
{"title":"Ad Hoc Aggregation Query Processing Algorithms Based on Bit-Store in Data Intensive Cloud","authors":"Donghua Yang, Jianzhong Li, Xixian Han, Jinbao Wang","doi":"10.1109/CyberC.2011.103","DOIUrl":"https://doi.org/10.1109/CyberC.2011.103","url":null,"abstract":"Ad-hoc Aggregation query is extremely important for data-intensive applications in the cloud which extracts valuable summary information on massive datasets to help decision-maker make right decisions. Current data storage schemes (row-store and column-store) cannot efficiently answer ad-hoc aggregation on massive data sets in the cloud. A new data storage structure (bit vector storage structure, bit-store for short) is proposed in the paper, which partitions tables vertically by bit position and stores all bit values in the same positions into a separate bit file. This paper focuses on proposing ad-hoc aggregation query algorithms based on bit-store. Firstly, the storage model of bit-store including its attribute encoding and bit file organization is introduced. Then, the implementation of different aggregation operations using different encoding schemes is presented. Finally, analytical and experimental results show the effectiveness and efficiency of the proposed approach.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116381686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Online Failure Prediction Model and Status Pretreatment Method for Exascale System","authors":"Hao Zhou, Yanhuang Jiang","doi":"10.1109/CyberC.2011.68","DOIUrl":"https://doi.org/10.1109/CyberC.2011.68","url":null,"abstract":"The reliability issue of Exascale system is extremely serious. Traditional passive fault-tolerant methods, such as rollback-recovery, can not fully guarantee system reliability any more because of their large executing overhead and long recovering duration. Active fault tolerance is expected to become another important fault-tolerant approach for Exascale system. Focusing on system failure prediction, which is one key step of active fault tolerance, we construct online failure prediction model and research on the effective method of system status pretreatment. In order to improve the accuracy and real-time feature of current methods, the proposed Improved Adaptive Semantic Filter (IASF) method processes the latest system logs regularly, filtering useless information out of them according to their semantics. Adopting the main idea of Vector Space Model (VSM), IASF method creates Event Vector corresponding to each log record. By calculating the cosine of vectorial angle, it evaluates the semantics correlation between different log records, and then executes temporal and spatial redundant filter considering the burst feature of log records. IASF method is insensitive to the type of system log and does not introduce any expert system or domain knowledge. The experiment result shows that system can eliminate about 99.6% of useless log records after executing IASF method.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116564451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrum Sharing Models in Cognitive Radio Networks","authors":"H. Rifà-Pous, J. Rifà","doi":"10.1109/CyberC.2011.86","DOIUrl":"https://doi.org/10.1109/CyberC.2011.86","url":null,"abstract":"Spectrum scarcity demands thinking new ways to manage the distribution of radio frequency bands so that its use is more effective. The emerging technology that can enable this paradigm shift is the cognitive radio. Different models for organizing and managing cognitive radios have emerged, all with specific strategic purposes. In this article we review the allocation spectrum patterns of cognitive radio networks and analyse which are the common basis of each model. We expose the vulnerabilities and open challenges that still threaten the adoption and exploitation of cognitive radios for open civil networks.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126582193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hong Mao, Zhenzhong Zhang, Bin Zhao, Limin Xiao, Li Ruan
{"title":"Towards Deploying Elastic Hadoop in the Cloud","authors":"Hong Mao, Zhenzhong Zhang, Bin Zhao, Limin Xiao, Li Ruan","doi":"10.1109/CyberC.2011.83","DOIUrl":"https://doi.org/10.1109/CyberC.2011.83","url":null,"abstract":"The fast development of internet application is boosting the development of cloud computing, a new paradigm of provisioning computing infrastructure and services over network. In cloud computing environment, MapReduce is often used to perform scientific computing like matrix multiplication and do data mining and information extraction on massive data. Hadoop, an open-source implementation of MapReduce, is a suitable tool to parallelly deal with these kinds of applications. While current hadoop environments are mainly deployed on physical servers manually and are lack of flexibility. This paper proposes the EHAD (Elastic Hadoop Auto-Deployer) system to creates/destroys corresponding number of VM nodes and deploys/releases hadoop environment among the VM nodes for client users in service level. We also propose multithreading and VMOP (Virtual Machine Optimized Placement) to improve the service quality of EHAD. Experiments show that our EHAD system can deploy a hadoop cluster on demand in less than 300 seconds. The multithread method could shorten the time consumption of creating 28 VMs by 3 times and VMOP policy could improve the runtime performance of hadoop cluster by 9.73 percent.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130782200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Post-Filter for Removing the Edge Ringing Artifacts in Deconvolution Images","authors":"B. Zuo, Xiang-yun Hu","doi":"10.1109/CyberC.2011.71","DOIUrl":"https://doi.org/10.1109/CyberC.2011.71","url":null,"abstract":"The edge ringing artifacts often appear nearby the image edge for the deconvolution bias. A new post filtering is proposed to remove the edge ringing artifact in the deconvolution image. The experimental results validate the proposed edge ringing artifact filtering algorithms perform well.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131360024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerating 3-DES Performance Using GPU","authors":"Hsiu-Pang Yeh, Yue-Shan Chang, C. Lin, S. Yuan","doi":"10.1109/CyberC.2011.49","DOIUrl":"https://doi.org/10.1109/CyberC.2011.49","url":null,"abstract":"Various cryptography algorithms have developed to provide different levels of data security for application domains, such as storage security, personal identification, and secure web browsing. They consume massive amount of resource on the server-side while processing encrypting and decrypting requests from clients. In this paper, we try to utilize GPU (Graphics Processing Unit) to speed up the data encryption and decryption to reduce the computing resource spent on security and to improve the web server throughput. We chose the widely-used 3-DES and implemented it on GPU. In our implementation, we observed the GPU cipher performs 5 times faster than the OpenSSL implementation on CPU. As a result, we show a promising direction for offloading the data encryption and decryption onto GPU.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124240164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}