S. Distefano, A. Puliafito, M. Rak, S. Venticinque, Umberto Villano, Antonio Cuomo, G. Modica, O. Tomarchio
{"title":"QoS Management in Cloud@Home Infrastructures","authors":"S. Distefano, A. Puliafito, M. Rak, S. Venticinque, Umberto Villano, Antonio Cuomo, G. Modica, O. Tomarchio","doi":"10.1109/CYBERC.2011.40","DOIUrl":"https://doi.org/10.1109/CYBERC.2011.40","url":null,"abstract":"Cloud is strongly emerging as the new deal of distributed computing. One of the reason behind the Cloud success is its business/commercial-oriented nature, proof of its effectiveness and applicability to real problems. There are actually a lot of open-private Cloud infrastructures aiming at providing dynamic-on demand resource provisioning according to the IAAS paradigm. To this purpose they usually apply a best effort policy, without taking into account service level agreements (SLA) and related quality of service (QoS) requirements. In such a context, the main goal of Cloud@Home is to implement a volunteer-Cloud paradigm which allows to aggregate Cloud infrastructure providers. In this work we specifically focus on SLA-QoS aspects, describing how to provide SLA based QoS guarantees through Cloud@Home on top of non-QoS oriented Cloud Providers. Aim of the paper is to demonstrate how Cloud@Home can fulfil such goal, providing and specifying the architecture, the algorithms and the components that implement SLA-QoS management features.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123920312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Two-Layer SVM Classification Mechanism for Chinese Blog Article","authors":"Guo-Heng Luo, Jia-chiam Liu, S. Yuan","doi":"10.1109/CyberC.2011.12","DOIUrl":"https://doi.org/10.1109/CyberC.2011.12","url":null,"abstract":"In Taiwan, the famous bloggers can be regard as professional writers now. More and more people subscribe their RSS (Really Simple Syndication) to receive updated information. But readers might only interest in few categories of articles, readers need to filter other articles by themselves. In order to help people select the information they want, this research proposed a two-layer SVM classification mechanism to classify blog articles. The schema is also evaluated in this research and the experiment result the proposed schema achieves 87% of recall and 95% of precision.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122703260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An AHP-Based Recommendation System for Exclusive or Specialty Stores","authors":"Hoang Duy Nguyen, Win-Tsung Lo, Ruey-Kai Sheu","doi":"10.1109/CyberC.2011.13","DOIUrl":"https://doi.org/10.1109/CyberC.2011.13","url":null,"abstract":"Recommendation system is an important method of solving the problem of information overload. It also helps consumers to save time while searching for goods. Numerous recommendation techniques are proposed. However, they still have to confront some weaknesses such as cold-start, gray sheep and matrix sparsity problems. The purpose of this paper is to propose a method to overcome the cold-start problem and recommend a fit item for consumers to improve the personalized service. The proposed method can be applied in the e-commerce websites of exclusive or specialty stores. It is a combination of the product knowledge and Analytic Hierarchy Process (AHP) method. There are two phases in the proposed method. Phase 1 is to calculate the weight between product attributes and create a candidate product set. Phase 2 is to conduct the recommendation from the candidate set. This paper also introduces the implementation experiences by taking the badminton racket recommendation as a case study example.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124735413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Individual Self-Service Electronic Health Records: Architecture, Key Technologies and Prototype System","authors":"Weiwei Jiang, Haishun Wang, Xiaomei Xu, Chun Peng","doi":"10.1109/CyberC.2011.97","DOIUrl":"https://doi.org/10.1109/CyberC.2011.97","url":null,"abstract":"Electronic health records are standardized and scientific digital data produced in the process of resident health management. General health records contain clinical diagnosis data, physical examination data and home-monitored data, etc. However, the majority of electronic health records focus on the application of health institutions, ignoring personal health self-management. We have studied and developed a personal-centered self-service electronic health records prototype system for individual recording home-monitored data and carrying out health risks self-assessment. The system is particularly useful for chronic diseases, which requiring long-term treatment and monitoring at home, such as hypertension, diabetes. This paper describes architecture of the system firstly. Then it focuses on three key technologies including health information modeling, general mechanism for dynamically generating appraisal model, and two-way sharing of health record. Finally the prototype system and the next steps are discussed.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131133431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PCRLB-Based Cluster Selection for Target Tracking in Wireless Sensor Networks","authors":"Zhigang Liu, Jinkuan Wang, Han Wang","doi":"10.1109/CyberC.2011.23","DOIUrl":"https://doi.org/10.1109/CyberC.2011.23","url":null,"abstract":"To deal with the problem of tracking a maneuvering target in range-based sensor networks, we firstly derive the expression that describes the relation of the PCRLB and the distance from the sensor to the target, and on the basis of this expression, choose the sensor subset that may attend the incoming tracking event. Secondly, we design the cluster head selection strategy under communication constraint, and further pick up the optimal sensor or the cluster head. Thirdly, we can estimate the state of the maneuvering target and the model index by making use of the interacting multiple model (IMM) algorithm. Finally, the simulation results show the effectiveness of the proposed scheme.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131788612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Improved Solution of SOM Network Anomaly Detection Based on T-Distribution","authors":"Wei Chen, Linying Xiao","doi":"10.1109/CyberC.2011.51","DOIUrl":"https://doi.org/10.1109/CyberC.2011.51","url":null,"abstract":"In this paper, a scheme of adaptable distance calculation based on t-distribution is proposed on the basis of analysis of the scheme of SOM network anomaly detection. This method establishes a confidence interval between the test sample and BMU distance using t-distribution. It makes sure that network anomaly occurs when the distance between the test sample and BMU is not within the range of the confidence interval. The improved method is compared with the method of the network anomaly detection based on OC-SVM in order to test its validity. At last, the experimental result shows that this kind of method has characteristics of easy realization, high detection rate and low false alarm rate.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129104900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Performance Analysis of Deflection Routing and FDLs with Wavelength-Based QoS in OBS Networks","authors":"Dang Thanh Chuong, V. D. Loi, Viet Minh Nhat Vo","doi":"10.1109/CyberC.2011.21","DOIUrl":"https://doi.org/10.1109/CyberC.2011.21","url":null,"abstract":"In Optical Burst Switching Network, contention is one of the challenging problems. Contention occurs when more than one burst demand for same output wavelength channel in same time. The deflection routing, fiber delay line (FDL) and wavelength conversion are the methods used to resolve contention in OBS Networks. With deflection routing, contending bursts in send in another route rather than primary route towards it's destination. In this case of wavelength conversion if any contentions occur then one of the burst's wavelength have to be change from its current wavelength to another free wavelength channel. And, FDLs is usual used to provide an extra offset time for deflected burst since deflection route is commonly longer than primary one. This paper is propose a modeling analysis of deflection routing and FDLs with wavelength-based QoS management using Queueing theory to resolving contention problem in OBS Network. Analysis results show that proposed model reduce blocking probability in comparison with models before.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115068813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Based Cluster-Head Inheritance Algorithm for Wireless Sensor Networks","authors":"Rong Ding, Haiying Du, Bing Yang","doi":"10.1109/CyberC.2011.59","DOIUrl":"https://doi.org/10.1109/CyberC.2011.59","url":null,"abstract":"Energy-efficiency is a critical factor in designing clustering protocols of Wireless Sensor networks. In this paper, we propose an Energy-based Cluster-head Inheritance Algorithm (EICA), which adopts a novel kind of CH inheritance mechanism with each cluster based on an energy threshold to balance energy cost among the network. Simulation results show that ECIA algorithm performs much better than the classical clustering algorithm LEACH and our previous work.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129516373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A PDE-Based Perceptual Deconvolution Image Edge Ringing Artifact Metric","authors":"B. Zuo, Xiang-yun Hu","doi":"10.1109/CyberC.2011.72","DOIUrl":"https://doi.org/10.1109/CyberC.2011.72","url":null,"abstract":"The edge ringing artifacts always appear near the image edge after deconvolution and degrade the image quality. In this paper, we presented a new deconvolution image edge ringing metric to evaluate the quality of image. The proposed approach is able to remove the deconvolution image edge ringing artifact by using a PDE (Partial Differential Equation)-based method and it will be compared with the degraded image to evaluate the edge ringing artifact. The experimental results validate the effectiveness of image enhancement method. and proposed evaluation metric performs well.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114983235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Scheduling Policies in a Smart Hospital Environment","authors":"Xiao Chen, N. Thomas, M. Harrison","doi":"10.1109/CyberC.2011.99","DOIUrl":"https://doi.org/10.1109/CyberC.2011.99","url":null,"abstract":"In this paper we consider the performance of different scheduling policies in a smart environment. Models are generated under a hospital scenario, and are used to simulate patient flow under three scheduling policies. SimJava 2.0 is adopted as the main simulator in this work. The findings generally show that the dynamic scheduling policy has better performance than the static scheduling policy.","PeriodicalId":227472,"journal":{"name":"2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115268567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}