{"title":"Cache Management for Information-centric Networking","authors":"Jie Duan, Xiong Wang, Sheng Wang, Shizhong Xu","doi":"10.1109/CSE.2014.353","DOIUrl":"https://doi.org/10.1109/CSE.2014.353","url":null,"abstract":"In-network caching as a fundamental characteristic of ICN has been paid more attentions. How to cache is an important problem should to be answered by ICN designers and ISPs. Our argument is how to program a better cache placement within a funds limit. That is, an Internet Service Provider (ISP) wants to invest on deploying some cache equipment on the ICN router to improve the network performance. A mathematical model is built to describe the following problems simultaneously: cache type, cache location and cache capacity. And then a heuristic algorithm is presented: an Integer Linear Programming (ILP) is used for helping to achieve initial solution, while inter-layer iterative adjustment algorithm is proposed to meet the funds constraint and reduce latency. Simulation results shows that our algorithm can improve the network performance effectively, which is practical for ISP.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123671767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Evaluation of Inverted Index Traversal Techniques","authors":"Kun Jiang, Xingshen Song, Yuexiang Yang","doi":"10.1109/CSE.2014.315","DOIUrl":"https://doi.org/10.1109/CSE.2014.315","url":null,"abstract":"Large search engines process thousands of queries per second over billions of documents, making query processing a major performance bottleneck. In this paper, we study an important class of index traversal techniques called dynamic pruning, which can efficiently reduce the query computational resources. We give brief overviews of index structure and skipping structure that used to quicken the term-centric and document centric index traversal strategies. Due to the fact that document centric is more efficient than term-centric for large indexes, we review several state-of-the-art dynamic pruning approaches based on document-centric scoring. We then present explicit experimental comparisons of the above index traversal techniques on TREC GOV2 datasets with detailed analytical conclusions. Finally, we provide the prospective future study of dynamic pruning with large scale of indexes.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114624388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qian Peng, Enqing Dong, Xu Juan, Lan Xing, Liu Wei, Wentao Cui
{"title":"Multipath Routing Protocol Based on Congestion Control Mechanism Implemented by Cross-Layer Design Concept for WSN","authors":"Qian Peng, Enqing Dong, Xu Juan, Lan Xing, Liu Wei, Wentao Cui","doi":"10.1109/CSE.2014.98","DOIUrl":"https://doi.org/10.1109/CSE.2014.98","url":null,"abstract":"To solve the problem of congestion which often occurs in the process of the large data transmission in large-scale wireless senator networks, a multipath routing protocol based on congestion control mechanism implemented by cross-layer design concept is proposed. Realizing the multipath routing protocol on the basis of AODV protocol, congestion control mechanism with active congestion avoidance, real-time detection and alleviative congestion is implemented by applying interaction information of cross-layer design between MAC layer and Routing layer. The simulation results show that the proposed multipath routing protocol with congestion control mechanism has some advantages in packet delivery ratio, end-to-end delay and normalized overheads. The proposed protocol can ensure the reliability and validity of service, and save energy consumption to prolong the working lifetime of wireless sensor networks.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124485944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Parallel Optical Flow Processing of 4D Cardiac CT Data on Multicore Clusters","authors":"Xingfu Wu, G. Ding, V. Taylor","doi":"10.1109/CSE.2014.53","DOIUrl":"https://doi.org/10.1109/CSE.2014.53","url":null,"abstract":"Optical flow is the distribution of apparent velocities of movement of brightness patterns in a sequence of images. For large 3D image sequences, optical flow applications are time consuming and memory-bound. To cope with these problems, in this paper, we present parallel optical flow processing of 4D cardiac CT data on multicore cluster systems to significantly shorten the time for computing velocity fields of the heart in order to aid cardiologists in diagnosing heart disease such as myocardial infarction and cardiac dysrhythmia in time. First, we modify and extend two traditional 2D optical flow methods Horn-Schunck and Lucas-Kanade to three-dimensional cases to process the 4D cardiac CT data. Second, we extend Mat lab MPI to support parallel computing with Mat lab and Octave on these cluster systems. Then we develop the parallel Mat lab/Octave optical flow applications for the 4D cardiac CT data in detail. Our experimental results show that these parallel optical flow applications have good scalability with close to linear speedup, and are able to shorten the image processing time significantly from more than 5 hours on 4 cores to 1.5 minutes on 1024 cores.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127770200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobistore: Secure Cloud-like Storage on Mobile Devices","authors":"Charles Fleming, Hai-Ning Liang, K. Man, Y. An","doi":"10.1109/CSE.2014.157","DOIUrl":"https://doi.org/10.1109/CSE.2014.157","url":null,"abstract":"With the rise of smart phones and tablets and the ubiquitous use of computers in daily life, the number of computing devices a user interacts with in a day has grown dramatically in recent years. This growth has led to numerous inconveniences for the user, one of the largest being the difficulty of accessing their data across all the devices they use. While one solution for this is cloud storage services such as Drop box or iCloud, these services are not without drawbacks, such as the need to constant, fast internet connectivity and security issues such as recently publicized hacks of iCloud and secret government accesses of a number of services. In this paper we introduce a new system which takes advantage of the ubiquitous use of smart phones to provide a cloud-like storage service that opportunistically pushes updates to other machines based on location. This system provides similar constant access to user data, while avoiding many of the drawbacks of cloud storage.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125710957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secret Key Extraction Technique Applied in Vehicular Networks","authors":"A. M. Abdelgader, Lenan Wu","doi":"10.1109/CSE.2014.264","DOIUrl":"https://doi.org/10.1109/CSE.2014.264","url":null,"abstract":"Vehicular Ad hoc network (VANET) is an emerging technology that supports several applications related to safety and comfort. Its life saving characteristic has attracted the industry and research communities while its mobility, lack of infrastructure and serving wide spectrum of applications make it vulnerable to several kinds of attacks. VANET applications have stringent security requirements, as they affect both road traffic and safety. Many ordinary networks security solutions can be applied to provide security services in VANET, however the common problem among all of these solutions is the key sharing between legitimate vehicles. In this paper using the special characteristics and the randomness inherent of the wireless channel, a secret key extraction technique applied in VANET is proposed. We conduct extensive simulation to evaluate the proposed approach. Our simulation results show that the extracted key approach can be adjusted to extract either high or low rate key with high entropy rate and minimum information exchange between the legitimate vehicles. The extracted secret key can be successfully used to support several VANET's security systems.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121963389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yongjun Jiang, Jinxu Tao, Weiquan Ye, Wu Wang, Z. Ye
{"title":"An Isolated Sign Language Recognition System Using RGB-D Sensor with Sparse Coding","authors":"Yongjun Jiang, Jinxu Tao, Weiquan Ye, Wu Wang, Z. Ye","doi":"10.1109/CSE.2014.38","DOIUrl":"https://doi.org/10.1109/CSE.2014.38","url":null,"abstract":"An isolated sign language recognition system is presented in this paper. A RGB-D sensor, Microsoft Kinect, is used for obtaining color stream and skeleton points from the depth stream. For a particular sign we extract a representative feature vector composed by hand trajectories and hand shapes. A sparse dictionary learning algorithm, Label Consistent K-SVD (LC-KSVD), is applied to obtain a discriminative dictionary. Based on that, we further develop a new classification approach to get better result. Our system is evaluated on 34 isolated Chinese sign words including one-handed signs and two-handed signs. Experimental results show the proposed system gets high recognition accuracy, of the reported 96.75%, and obtain an average accuracy of 92.36% for signer independent recognition.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132328165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Reliability Information for Rectangular 16-QAM over Flat Rayleigh Fading Channels","authors":"O. O. Ogundile, D. Versfeld","doi":"10.1109/CSE.2014.91","DOIUrl":"https://doi.org/10.1109/CSE.2014.91","url":null,"abstract":"Reliability information derived from the channel output in the form of a Log Likelihood Ratio or a Distance Metric (DM) have been proposed in literature for M-ary Quadrature Amplitude Modulation systems. Reliable soft information from the channel output improves the performance of the forward error correction decoding algorithm. This paper proposes an improved method of extracting reliability information in the form of a DM for rectangular 16-QAM over flat Rayleigh fading channels. The reliability information is obtained from the derived Scaled Channel State Information (CSI), and the estimated CSI which result due to variations in the Rayleigh fading channel gain. The Koetter and Vardy, Reed-Solomon (KV-RS) algebraic soft-decision decoding algorithm is used to verify the performance of this proposed method. The performance of this proposed method is documented through computer simulation. From the simulation results, the proposed method achieves significant improvement in Codeword Error Rate (CER) performance in comparison with the conventional DM method in literature with no additional computational time complexity.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134598475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Texture Complexity Based Fast Prediction Unit Size Selection Algorithm for HEVC Intra-coding","authors":"Yinbo Liu, Xingang Liu, Peicheng Wang","doi":"10.1109/CSE.2014.292","DOIUrl":"https://doi.org/10.1109/CSE.2014.292","url":null,"abstract":"The latest High Efficiency Video Coding (HEVC) standard could achieve the highest coding efficiency compared with all existing video coding standards. However, the computational complexity is increased dramatically because all the possible combinations of the mode candidates are calculated in order to find the optimal rate distortion (RD) cost using Lagrange multiplier. In order to save the coding time of HEVC encoder, this paper proposes a texture complexity based fast prediction unit size selection algorithm for HEVC intra coding. The proposed algorithm could reduce around 38% encoding time in average with only 0.2% increase in BD-rate compared to the test model HM10.0 of HEVC.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134394125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Texture Defect Detection Using Dual-Tree Complex Wavelet Reconstruction","authors":"Huixian Sun, Yuhua Zhang, Zhaorui Li","doi":"10.1109/CSE.2014.61","DOIUrl":"https://doi.org/10.1109/CSE.2014.61","url":null,"abstract":"This paper introduces a new approach for automated inspection of textured materials using Dual-Tree Complex Wavelet (DT-CWT). The DT-CWT can transform images into a representation with six directionally selective sub bands for each scale. By properly selecting the smooth sub image or the combination of detail sub images in different resolution levels for backward wavelet transform, the reconstructed image will remove regular, repetitive texture patterns and enhance only local anomalies. The difficult defect detection problem in complicated textured images is converted into a simple thresholding problem in nontextured images. The experimental results show that the DT-CWT is more effective than the real discrete wavelet transform.","PeriodicalId":258990,"journal":{"name":"2014 IEEE 17th International Conference on Computational Science and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128938321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}