{"title":"Self-Organize Network Architecture for Multi-agent Cognitive Radio Systems","authors":"Qi Zhao, Shi Qin, Zhijie Wu","doi":"10.1109/CyberC.2011.88","DOIUrl":"https://doi.org/10.1109/CyberC.2011.88","url":null,"abstract":"this paper presents self-organize network architecture for cognitive radio (CR). In order to increase the flexibility of CR, a division method and corresponding network keeping strategy is proposed in this paper, whose key part is finding the cutting edge in the interface graph. The TFCE (Tarjan-find-cutting-edge) algorithm is also given to find the cutting edge. On the basis of the division method a spectrum allocation model is introduced to research the effectiveness of the method for CR. The result shows the self-organize method could effectively add group's flexibility without affecting spectrum allocation utility or increasing system traffic.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116450689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reutilization Model for High Utilization and Low Delay Time Properties on Streaming Servers","authors":"Yung-Chiao Chen, Chang-Hsu Chen, C. Sue, Wei Chen","doi":"10.1109/CyberC.2011.65","DOIUrl":"https://doi.org/10.1109/CyberC.2011.65","url":null,"abstract":"Streaming service is becoming more popular for many users to access multimedia content. With different demand of clients and different service charge given, streaming servers must provide different levels of quality of service (QoS) and apply more effective resource management scheme. This paper proposes an enhanced model of harmonic proportional bandwidth allocation scheme to re-utilize the released bandwidth. Our proposed strategy uses one part (defined as £]) of the released bandwidth to raise service quality of clients and increase total bandwidth utilization. The rest part (i.e., 1-Β]) of the released bandwidth reduces the delay time of clients by serving more clients who are not allowed to be served originally, where Β] is between 0 and 1. In the simulation, we discuss what the value of Β] is better when simultaneously considering the two factors including the total bandwidth utilization and the delay time of users, respectively. Furthermore, our proposed strategy is validated through the simulation that the high utilization and lower delay time properties for streaming servers can be obtained no matter whether the probability of clients that leave services is high or low even in different request scheduling policies.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123594216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Social-Knowledge-Directed Query Suggestion Approach for Exploratory Search","authors":"Yuqing Mao, Haifeng Shen, Chengzheng Sun","doi":"10.1109/CyberC.2011.11","DOIUrl":"https://doi.org/10.1109/CyberC.2011.11","url":null,"abstract":"Existing query suggestion techniques mainly revolve around mining existing queries that are most similar to a given query. If the query fails to precisely capture a user's real intent, for example, in most exploratory search tasks, suggested queries are likely to fail as well. If suggested queries are not only relevant to the query but also diverse in nature, it is likely that some of them are close to the user's real intent. In this paper, we propose a novel social-knowledge-directed query suggestion approach for exploratory search, which integrates the social knowledge into the probabilistic model based on query-URL bipartite graphs. Social knowledge is discovered by conducting kernel principle component analysis on the related queries, and incorporating the social knowledge with random walk on the bipartite graph can obtain diverse queries that are relevant to a given one. We have conducted a set of experiments to validate this approach and the results show that this approach outperforms other query suggestion methods in terms of supporting exploratory search.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123748482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Multimedia Network Supported by Constructivism in the Teaching of College English Listening and Speaking","authors":"Han Zhongqiang","doi":"10.1109/CyberC.2011.73","DOIUrl":"https://doi.org/10.1109/CyberC.2011.73","url":null,"abstract":"The essay is devoted to the analysis of how constructivism theory is applied in the teaching of college English listening and speaking in the multimedia network environment from the perspectives of learners, environment and teachers. Meanwhile, some problems are put forward to raise awareness of these problems.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128289122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Choi, Y. Gui, Se-Hyun Seo, Choong-Hyo Ko, Ju-Ha Seo
{"title":"TDM: Time-Driven Mesh Overlay Network for Peer-to-Peer Video-on-Demand Services","authors":"H. Choi, Y. Gui, Se-Hyun Seo, Choong-Hyo Ko, Ju-Ha Seo","doi":"10.1109/CyberC.2011.26","DOIUrl":"https://doi.org/10.1109/CyberC.2011.26","url":null,"abstract":"In this paper, we propose a new Time-Driven Mesh (TDM) overlay network for peer-to-peer video-on-demand systems. In our TDM, all of the peers construct a mesh network connected among them in chronological order of their playback starting times. In order to efficiently search multiple streaming suppliers, we manage the playback starting time and the network location information for all of the peers using a distributed hash table. Our TDM provides both time and space localities while locating suppliers, and the failed peers can be quickly replaced with other suitable peers. As a result, we can construct a bandwidth efficient and robust overlay network for P2P VoD systems. In simulation experiments, we show that our scheme achieves lower server stress and better playback continuity under peer random joins and leaves for providing efficient interactive VoD streaming in P2P environment.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125036113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Monitoring with Predictive QoS Analysis of LTE Backhaul","authors":"C. Yang, Michael Ketcham, David Lu, David Kinsey","doi":"10.1109/CyberC.2011.35","DOIUrl":"https://doi.org/10.1109/CyberC.2011.35","url":null,"abstract":"LTE (Long Term Evolution) represents an emerging technology that will change how mobility service providers connect user devices to their infrastructure over IP networks. To support growing mobile broadband data loads, an all-IP Ethernet cell site backhaul (CSBH) network infrastructure will make possible real-time high bandwidth applications using mobiles. This paper discusses the changes that LTE will bring and examines network operations impacts on the CSBH. It also introduces operations support system solutions to address performance management (PM) to determine if impaired LTE service has occurred. This paper covers major aspects of system solutions, including: capabilities for auto-detection, root-cause analysis based on correlation algorithms, and traffic congestion control mechanisms. It also presents functionality for quality of service (QoS) trending projections to manage traffic capacity and trigger the traffic control mechanisms, to protect network resources and improve the overall customer experience.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126476511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Computing Model without Resource Management Center","authors":"Zongheng Liu, W. Tong, Zhi-xun Gong, Jianhua Liu, Yue Hu, Shaojie Guo","doi":"10.1109/CyberC.2011.78","DOIUrl":"https://doi.org/10.1109/CyberC.2011.78","url":null,"abstract":"Cloud computing, as an emerging computing model, is attracting more and more attention of industry and academia. Though it is of significant importance to carry out studies on such programming models, so far, there are few programming models for cloud computing. Because various kinds of cloud platforms are developed independently, it is necessary to have the support of cloud platform in making cloud programming model be able to deploy application to the cloud. This paper takes the cloud platform as its center. The cloud computing model in this paper is proposed as the Cloud platform, which is a kind of distributed structure without central management node. Each cloud node has equal status and manages its local resources respectively. In addition, this paper proposes mechanisms for resource management and allocation as well as the organizational structure of the user virtual machine.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121805881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Recognizing and Embedding Outerplanar Distributed Computer Networks","authors":"Yung H. Tsin","doi":"10.1109/CyberC.2011.43","DOIUrl":"https://doi.org/10.1109/CyberC.2011.43","url":null,"abstract":"A new distributed algorithm for outerplanar network recognition and embedding is presented. The algorithm requires 2n-2 time and transmits at most 5m messages of O(lg n) length, where m is the number of links and n is the number of nodes in the network. In addition, if the network is indeed outerplanar, the algorithm will run in 2n-2 time and transmit at most 10n-15 messages. This time bound is the best one could ever achieve with a depth-first-search based algorithm. The previously best known algorithm achieves O(n) time and message bounds by using messages of O(n) length and running on a stronger model, making multiple passes over the network.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling the Management of Electronic Health Records in Healthcare Information Systems","authors":"P. Chang","doi":"10.1109/CyberC.2011.98","DOIUrl":"https://doi.org/10.1109/CyberC.2011.98","url":null,"abstract":"Healthcare information systems include the information technologies and processes that support the healthcare providers in performing their services. Currently more and more healthcare organizations are converting their paper data to electronic format and keep them in computers' storage. This practice is partly due to government laws or regulations; it is also partly due to a need to effectively compete with other healthcare organizations. Two main types of electronic data records for a healthcare organization are electronic medical record (EMR) and electronic health record (EHR) for patients. There are two characteristics of a patient's data records. The first is their longevity and the second is the strict requirement of their integrity. Properly managing these data records is a challenging task. This paper presents an approach in modeling the management of EMR's and EHR's by using the Unified Modeling Language (UML). It demonstrates the usefulness by mapping some important healthcare functions to the elements of the UML model.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach to Explain the Human Hyper-acuity: Applied to THz Imaging","authors":"O. Dominguez, J. Lizarraga, C. Rio","doi":"10.1109/CyberC.2011.105","DOIUrl":"https://doi.org/10.1109/CyberC.2011.105","url":null,"abstract":"Hyper-acuity of the human eye is the capability to see beyond the understandable acuity defined by the number and size of the photoreceptors of the human eye. Surprisingly, in other words, we could say that the human eye is able to see small details at very long distances that never could be detected by a CCD camera of equal number of detectors [1] [2]. On the other hand, the emerging topic of Terahertz imaging cameras is getting more and more relevance for the multiple applications that could be used for: security in airports and borders, medicine, support to vision under hard conditions, etc. Nowadays, the technology used to detect these frequencies is still expensive and quite complex to think in a high quality imaging cameras with a quite high number of detectors. The complexity of the Terahertz detector technology pushes the designers to find a simpler solution that it could be found in the human eye strategy to create the Hyper-acuity, that is, create high resolution images from a significantly reduced number of detectors. In this paper, we discuss about this human high resolution capability and its principles applied to THz antenna systems. Firstly, human eye paradigm is explained and shown by examples and formulae. Secondly, optical basis and explained principles are studied and discussed for THz imaging systems. We propose a method that significantly reduces the number of detectors needed for achieving a certain resolution by means of diffraction that paradoxically is the resolution limiting factor in current imaging devices.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132847769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}