{"title":"CPS 2016 Track Report: Capacity-Driven Processes and Services for Cyber Physical Society","authors":"Zhangbing Zhou","doi":"10.1109/WETICE.2016.40","DOIUrl":"https://doi.org/10.1109/WETICE.2016.40","url":null,"abstract":"This is the report for the CPS track: Capacity-Driven Processes and Services for Cyber Physical Society.","PeriodicalId":319817,"journal":{"name":"2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133095681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an Autonomic Outsourcing to the Cloud Decision","authors":"M. Rekik, Khouloud Boukadi, H. Ben-Abdallah","doi":"10.1109/WETICE.2016.15","DOIUrl":"https://doi.org/10.1109/WETICE.2016.15","url":null,"abstract":"When enterprises decide to outsource their business processes to the Cloud, various considerations should be tackled. Indeed, the enterprises aim to reduce the business processes investment cost, to enhance their performance, and to focus on the enterprise core competency while considering security constraints. Hence, it is essential to assist enterprises to take the suitable decision by providing an appropriate decision system that specifies the activities to be outsourced as well as the Cloud resource to support them while considering the above enterprise preferences. Obviously, the outsourcing decision, when taken in a specific business process context, may be influenced by some variants that make it not suitable in another one. For instance, the business process workloads vary according to its execution period and thus the decision may require to change the Cloud resources as well as the outsourced activities to fit the new context requirements. This consideration should be taken when tackling an outsourcing decision to alleviate enterprise experts from the burden of assessing by themselves the changing business processes context and react by consequence to this change. In this paper, we present an adaptive outsourcing decision system, which provides personalized and autonomic decision-making to support the dynamic business process context when outsourced to the Cloud. The system predicts the business process context and provides accordingly appropriate decisions using the penalty based genetic algorithm.","PeriodicalId":319817,"journal":{"name":"2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134468229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammad Ashiqur Rahaman, Cédric Hébert, Jurgen Frank
{"title":"An Attack Pattern Framework for Monitoring Enterprise Information Systems","authors":"Mohammad Ashiqur Rahaman, Cédric Hébert, Jurgen Frank","doi":"10.1109/WETICE.2016.46","DOIUrl":"https://doi.org/10.1109/WETICE.2016.46","url":null,"abstract":"Intrusion detection systems (IDS) look for digital patterns mainly over the network or host traffic. Increasing complexity of todays enterprise information systems (EIS) obliges enterprises to deploy multiple but yet isolated IDSs in their IT boundaries, namely in, network (NIDS), host (HIDS), DMZs and application (appIDS). Modern exploits being able to disguise may appear innocent from an individual IDS perspective, however, its maliciousness could be detected from an end to end application perspective. One of the core problems in this regard is the inability of detecting such end to end targeted attacks whose functional scopes may stretch across IT boundaries. In this paper, we first argue that complex end to end intrusions can be detected in real time by analyzing application level logs originating from various IT boundaries (network, proxy, web server, OS, application etc.). We propose an attack pattern framework for EIS that enables an appIDS, such as SAP Enterprise Threat Detection (ETD) [1], to perform log analysis simultaneously from multiple sources. The framework includes a reference architecture and its prototypical implementation can be the core engine of an appIDS. It also provides an attack pattern specification language and associated methodology for managing attack pattern lifecycle and appropriate alert mitigation response.","PeriodicalId":319817,"journal":{"name":"2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125802235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sean C. Mondesire, Douglas B. Maxwell, Jonathan Stevens
{"title":"Physics Engine Threading Design and Object-Scalability in Virtual Simulation","authors":"Sean C. Mondesire, Douglas B. Maxwell, Jonathan Stevens","doi":"10.1109/WETICE.2016.37","DOIUrl":"https://doi.org/10.1109/WETICE.2016.37","url":null,"abstract":"The U.S. Army Research Laboratory (ARL) is investigating technologies and methods to enhance the next generation of tactical simulation-based trainers. A primary research objective is to increase the number of simultaneous Soldiers that can train and collaborate in a shared, virtual environment. Current virtual programs of record cannot support the Department of the Army's goal to train at the company echelon (200 Soldiers) in a virtual environment and are limited to the platoon echelon (42 Soldiers) of concurrent trainees. ARL has identified scalability limiting factors to be the simulator's physics engine and threading architecture. In this work, two threading designs are evaluated on how they perform with high amounts of physics load to determine which thread design is optimal for future virtual trainers.","PeriodicalId":319817,"journal":{"name":"2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116503261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raja Benali, Hana Teyeb, Ali Balma, S. Tata, N. Hadj-Alouane
{"title":"Evaluation of Traffic-Aware VM Placement Policies in Distributed Cloud Using CloudSim","authors":"Raja Benali, Hana Teyeb, Ali Balma, S. Tata, N. Hadj-Alouane","doi":"10.1109/WETICE.2016.29","DOIUrl":"https://doi.org/10.1109/WETICE.2016.29","url":null,"abstract":"Due to the complexity of managing virtual machines arrival and departure in a geographic distributed Cloud, we tackle the dynamic placement and migrations of VMs with simulation techniques. In this work, we present the study of VMs placement policies in geographically distributed data centers (DCs) using the cloud simulator Cloud Sim. We have extended the simulator to take into consideration the inter-DCs communication and migration. Through simulations, we show an example of a VMs placement and migration approach and discuss the obtained results.","PeriodicalId":319817,"journal":{"name":"2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113949413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ASSDN: A Framework for Adaptive Strategies for Software-Defined Networking","authors":"G. Cammarata, A. Stefano, G. Morana, D. Zito","doi":"10.1109/WETICE.2016.30","DOIUrl":"https://doi.org/10.1109/WETICE.2016.30","url":null,"abstract":"In the last years, several projects are emerged with the aim to addressing the challenge of providing solutions for deployment, monitoring, adaptation, and management of clouds belonging to different enterprises/organisations. In such scenarios the network connectivity is one of the key factors. SDN technologies represent a good solution to face this challenge. Separating the control plane from the data plan, they can supply the cloud provider with the opportunity to specify on-the fly both the network topologies and routing schemes, guaranteeing, at same time, specific level of isolation. ASSDN, the framework presented in this paper, represents the first attempt to face this kind of issue. Driving the SDN controllers of all the Network Providers involved, it allows to create, handle and monitor virtual networks that are able to span across several heterogeneous cloud environments so to guarantee specific level of QoS.","PeriodicalId":319817,"journal":{"name":"2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132481162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Demonstration of a New Computing Model to Manage a Distributed Application and Its Resources Using Turing Oracle Design","authors":"Rao V. Mikkilineni, G. Morana, Surendra Keshan","doi":"10.1109/WETICE.2016.63","DOIUrl":"https://doi.org/10.1109/WETICE.2016.63","url":null,"abstract":"This paper describes the result of the work started in the first Cloud Computing session in WETICE 2009. During the last seven years, collaboration from participants in WETICE has resulted in a new computation model and a commercial product that advances the state of the art in infrastructure agnostic distributed application life-cycle quality of service management. In WETICE 2016, celebrating its 25th anniversary, we demonstrate the resulting new technology with extensions to the Turing machine models to include manageability of distributed applications in the face of wild fluctuations in available computing resources or fluctuations introduced by the interactions between the computation and its environment or both.","PeriodicalId":319817,"journal":{"name":"2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123681445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agent Technology, Superrecursive Algorithms, and DNa as a Tool for Distributed Clouds and Grids","authors":"M. Burgin, Rao V. Mikkilineni","doi":"10.1109/WETICE.2016.28","DOIUrl":"https://doi.org/10.1109/WETICE.2016.28","url":null,"abstract":"Agents and agent systems are becoming more and more important in the development of a variety of fields such as ubiquitous computing, ambient intelligence, autonomous computing, intelligent systems and intelligent robotics. In this paper, we analyze how agent technology is presented in mathematical models of computation demonstrating how these models are used in the novel distributed intelligent managed element (DIME) network architecture (DNA), which extends the conventional computational model of information processing networks, allowing improvement of the efficiency and resiliency of computational processes.","PeriodicalId":319817,"journal":{"name":"2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127996257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Ammar, M. Baklouti, M. Pelcat, K. Desnos, M. Abid
{"title":"Off-Line DVFS Integration in MDE-Based Design Space Exploration Framework for MP2SoC Systems","authors":"M. Ammar, M. Baklouti, M. Pelcat, K. Desnos, M. Abid","doi":"10.1109/WETICE.2016.43","DOIUrl":"https://doi.org/10.1109/WETICE.2016.43","url":null,"abstract":"As the speed metric of Massively Parallel Multi-Processors System-on-Chip (MP2SoC) systems has increased over time, another metric has become more important: power consumption. Finding a tradeoff between power consumption and performance early in the design flow of MP2SoC systems in order to satisfy time-to-market is the design challenge of Electronic Design Automation (EDA) tools. This paper presents a Design Space Exploration (DSE) framework, named Energy-Aware Rapid Design of MP2SoC (EWARDS), aiming at exploring the performance and power capabilities of modern homogenous MP2SoC systems at design time using Model-Driven Engineering (MDE) techniques. The proposed framework extends the Modeling and Analysis of Real-Time and Embedded systems (MARTE)profile with power aspects of MP2SoC systems providing a high-level design entry. In addition, EWARDS integrates an energy-aware scheduler that strives to balance performance and energy savings by combining clustering scheduling algorithm with off-line Dynamic Voltage and Frequency Scaling (DVFS) power management techniques.","PeriodicalId":319817,"journal":{"name":"2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133559026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quasi Opportunistic Supercomputing for Geospatial Socially Networked Mobile Devices","authors":"Ankush Rai, Sakkaravarthi Ramanathan, R. Kannan","doi":"10.1109/WETICE.2016.65","DOIUrl":"https://doi.org/10.1109/WETICE.2016.65","url":null,"abstract":"due to several reasons such as attentions given to design features and to modification from littler to medium sized system that results in trivial enhancement in performance.In spite of the tremendous achievement of grids which run parallel jobs, there still exists demand of requesting applications to avail opportunistic computing for considering the right selection of prerogative supercomputers. The objective of this research is to build a framework for on the fly computational commencing on socially convolved terrestrial grids to facilitate the sharing of computing workload over wireless networks as virtual supercomputers of unprecedented power. This will assist computing in heterogeneously interconnected mobile assets, Internet of Things, in crowdedscenarios for variable ranges like: stadiums, shopping centers, and so forth.","PeriodicalId":319817,"journal":{"name":"2016 IEEE 25th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"34 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134545841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}