{"title":"Failure-Aware Virtual Machine Configuration for Cloud Computing","authors":"Yaqin Luo, Li Qi","doi":"10.1109/APSCC.2012.46","DOIUrl":"https://doi.org/10.1109/APSCC.2012.46","url":null,"abstract":"Failure occurrence and its impact on system performance have become an increasingly important concern in cloud computing. Most techniques in today's system are reactive schemes to recover after failure which could lead to major cost and significantly affect system performance. Instead, we propose a proactive failure aware virtual machine infrastructure for cloud computing. Our approach takes both the performance and reliability status of a node into account to forecast failure in a given time window. We leverage failure prediction techniques to mitigate the potential failure impact on system reliability and productivity. The mechanism can also reschedule the running job in case the failures occurred during execution. The experiment results show the enhancement of system productivity and reliability significantly by using the proposed strategy.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133978421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Orchestrating Provisioning among Heterogeneous Grid Middleware","authors":"Li Qi, Jie Dai","doi":"10.1109/APSCC.2012.45","DOIUrl":"https://doi.org/10.1109/APSCC.2012.45","url":null,"abstract":"After several years development, the computational infrastructure has been widely developed. Especially, when the grid technology grows to production level, users have several options to handle resource less problems when submitting large scale jobs to the infrastructure. Capabilities of dynamic provisioning, fast deployment of virtual machines, and interoperation can help users finishing their jobs correctly even the local resources are not adequate. To orchestrate these approaches well and find the optimal solution for users, this paper proposes a novel orchestrating model to optimize these approaches for high efficiency. An image processing application running on three heterogeneous grid platforms is adopted to demonstrate the efficiency and capability of proposed model. The result proved that the optimal solution can efficiently orchestrate the jobs among the grids.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126039547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Full Scale Authentication Protocol for RFID Conforming to EPC Class1 Gen2 Standard","authors":"Guiyue Jin, Jiyu Jin, Xueheng Tao, Baoying Li","doi":"10.1109/APSCC.2012.18","DOIUrl":"https://doi.org/10.1109/APSCC.2012.18","url":null,"abstract":"The low cost RFID tags can be applied in new applications\", \"and interest more different groups of suppliers and end users, But the most important problem of low cost RFID system is that unauthorized readers can access to tag information and illegal tags can be authorized by legal readers, which should be potential to produce privacy and security problem. EPC Class1 Gen2 standard can be considered as a universal specification for low cost RFID tags, but it does not pay more attention to security. Recently some compliant to low cost RFID tags authentication protocols are proposed in the literature, but many of them do not guarantee security and privacy. Those protocols do not consider that the tags' electronic product code usually has 96 bits, and directly use 16 bit CRC and 16-bit PRNG, so it does not guarantee the unequivocal identification of tagged items. Our protocol not only overcomes the weakness of the previous proposed protocols to guarantee the security and privacy, but also reduces database searching time and guarantees the synchronization between the readers and the tags. Furthermore, we analyze the proposed protocol in terms of security and performance, and it shows that the proposed protocol is effective and efficient.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124711760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Graph Analysis Approach to Support Question & Answer on Enterprise Social Network","authors":"Ke Ning, Ning Li, Liang-Jie Zhang","doi":"10.1109/APSCC.2012.36","DOIUrl":"https://doi.org/10.1109/APSCC.2012.36","url":null,"abstract":"Enterprise Social Network (ESN) service is getting more popular recently. It can help employees to communicate and collaborate efficiently with colleagues, with customers and with suppliers. One significant phenomenon happening on ESN is question & answer: people posting questions to the network to get answers from friends or friends-of-friends. However, existing ESN platforms do not have good support to this process. In this paper, we propose a method to better support question & answer on ESN, purely by using a graph analysis approach. Based on the questioner's initial input list of potential answerers, it can extract a shared-interest group of people, whose interest is close to the initial list of potential answerers, and sort the group of people according to a score of interest distance, and then recommend them to the questioner. To evaluate its applicability, the method is implemented in KDWeibo the most popular ESN platform in China, and the results are promising.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"201 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121072300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ning Li, Liangjie Zhang, Yuejun Chen, Sheng-Ping Wu
{"title":"Research of Strategic Transformation Model of the Fast Moving Consumer Goods Industry","authors":"Ning Li, Liangjie Zhang, Yuejun Chen, Sheng-Ping Wu","doi":"10.1109/APSCC.2012.35","DOIUrl":"https://doi.org/10.1109/APSCC.2012.35","url":null,"abstract":"With the gradually subsided of economic crisis, China's fast moving consumer goods industry has present slow growth trend. But its market share is still not high. According to the characteristics of China's fast moving consumer goods industry, it is necessary to carry out the strategic transformation at this stage. This article departure from the beer industry, a particular fast moving consumer goods industey, combined the importance of the forecast sales orders in the supply chain, to discuss the new strategic transformation model of the beer industry.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"349 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123366426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mixed Multi-tenancy Data Model and Its Migration Approach for the SaaS Application","authors":"Li Jiang, Jin Cao, Peifeng Li, Qiaoming Zhu","doi":"10.1109/APSCC.2012.16","DOIUrl":"https://doi.org/10.1109/APSCC.2012.16","url":null,"abstract":"Software providers exploit economies of scale by migrating traditional isolated tenancy hosted applications to multi-tenancy supporting ones in the Cloud. How to transform a single-tenancy database to multi-tenancy model plays a key role in the vast majority of migrated SaaS (Software as a Service) applications and it also determines the cost paid by the tenants. In this paper, to meet the tenants' cost-saving expectation versus database performance requirement, a mixed multi-tenancy data model and its architecture generating a configurable multi-tenancy data model group are proposed based on three existing data models firstly. Then, due to the analysis on the challenges arising from such a data migration scenario, this paper describes the design and implementation of our migration approach that enables tenants enjoy customizability of different data models with security and scalability of database services. Finally, a real-world case study demonstrates how our data model and migration approach can be used in the SaaS migration.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115191713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Li Wang, Liang Zhang, Wei Wang, Weiwei Xiao, Susheng Wang
{"title":"Research on the Effect of Business Models on Enterprise Performance: Based on Information Technology Industry Listed Companies in China","authors":"Li Wang, Liang Zhang, Wei Wang, Weiwei Xiao, Susheng Wang","doi":"10.1109/APSCC.2012.12","DOIUrl":"https://doi.org/10.1109/APSCC.2012.12","url":null,"abstract":"This paper introduces the research status of the business model at home and abroad, including the concept of business model, business model classification, the relationship between the business model classification and enterprise performance, and puts forward the shortcomings of study on the business model classification. Based on previous studies, this paper puts forward a new business model classification according to Chinese IT industry characters. Then enterprise performance is divided into four aspects: profitability, growth, operating efficiency and market value. This paper introduces a single-factor analysis of variance, and the process of studying the effects of different business models on the various aspects of enterprise performance in order to find a better business model, and the method can provide recommendations for the enterprise business model transformation.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115191762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Executability Analysis for Semantically Annotated Process Model","authors":"Ping Gong, Jianmin Jiang, Shi Zhang, Zhichao Chen","doi":"10.1109/APSCC.2012.25","DOIUrl":"https://doi.org/10.1109/APSCC.2012.25","url":null,"abstract":"Semantically annotated process model (SPM) is a process model with semantic annotations, which include the precondition and effect, labeled for its activities based on the domain ontology. Such semantic annotations can increase the model's understanding and reusability, and facilitate its implement as well as compliance analysis. However, SPM analysis is challenging, since its correctness is beyond the soundness of process model and its formal semantics needs to consider domain state change. To assuring the correctness of SPM, the executablity analysis, i.e., whether there exists activity whose precondition is falsatisfied when it is active, is essential and has also been identified as a coNP-hard problem. To tame the hardness of the executability, we define a dynamic semantics for SPM based on a model which is proposed for defining domain state transition, present an encoding method by which the formal semantics is encoded into formulae as well as the executability, and propose a procedure which can bounded model check and diagnose the executability by using SAT solver. Our method has been implemented as a tool called SPMT and its validity is also illustrated through examples.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126797404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experts Ranking on the Enterprise Microblogging Based on the PageRank Algorithm","authors":"Ning Li, Ke Ning, Liangjie Zhang, Yan Wang","doi":"10.1109/APSCC.2012.47","DOIUrl":"https://doi.org/10.1109/APSCC.2012.47","url":null,"abstract":"With the rapid development of social networks services (SNS), Enterprise micro logging gradually shows its importance in business management. In the Enterprise Micro logging, If we can Accurately search and rank the experts, it can greatly enhance the operational rate of the Enterprise. In this article, Based on Google's PageRank algorithm, combined with the labels of the expert on enterprise microblogging network, we can rank the experts in the enterprise microblogging network according to the influence of the expert. Therefore, we can improve the precision rate of the expert searching results for the user.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124819537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Liampotis, N. Kalatzis, I. Roussaki, Pavlos Kosmides, Ioannis V. Papaioannou, E. Sykas, M. Anagnostou, S. Xynogalas
{"title":"Addressing the Context-Awareness Requirements in Personal Smart Spaces","authors":"N. Liampotis, N. Kalatzis, I. Roussaki, Pavlos Kosmides, Ioannis V. Papaioannou, E. Sykas, M. Anagnostou, S. Xynogalas","doi":"10.1109/APSCC.2012.65","DOIUrl":"https://doi.org/10.1109/APSCC.2012.65","url":null,"abstract":"The provision of pervasive computing services is a challenging research area. This paper elaborates on the notion of Personal Smart Spaces (PSSs) that allows the delivery of pervasive services to mobile users. PSSs aim to couple the facilities offered by next generation mobile communications with the features provided by the static smart spaces to support a more ubiquitous, context-aware and personalised smart space that is able to follow the user wherever he/she goes. Moreover, PSSs provide interfaces between the user and the various services and sensors that are available via the Internet. One of the core PSS features is the management of static and dynamic context information of users. This paper elaborates on the context management approach that has been designed and implemented in order to address the advanced requirements of PSSs regarding context awareness.","PeriodicalId":256842,"journal":{"name":"2012 IEEE Asia-Pacific Services Computing Conference","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128635758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}