2016 Fourth International Symposium on Computing and Networking (CANDAR)最新文献

筛选
英文 中文
Performance Evaluation of Participatory Sensing Scheme Using Delay Tolerant Networking 基于时延容忍网络的参与式感知方案性能评价
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0059
Hiro Onishi, T. Asaka
{"title":"Performance Evaluation of Participatory Sensing Scheme Using Delay Tolerant Networking","authors":"Hiro Onishi, T. Asaka","doi":"10.1109/CANDAR.2016.0059","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0059","url":null,"abstract":"With the spread of high-performance mobile terminals that include sensors, participatory sensing is attracting attention for collecting sensor information using smartphones. Although there are two key advantages to this approach, its low cost and wide range of sensing, they come at the tradeoff of both the battery and storage. Therefore, efficient collection is required. There is also a challenge posed by how to collect data from environments in which the network infrastructure does not work. Previously, we proposed a data collection method using the location and time information of data in sinks as efficient data collection for participatory sensing using smartphones. In this paper, we evaluate the performance of this method using a real human behavior model.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115241645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Accelerating BLAST Computation on an FPGA-enhanced PC Cluster 在fpga增强型PC集群上加速BLAST计算
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0025
Masato Yoshimi, Celimuge Wu, T. Yoshinaga
{"title":"Accelerating BLAST Computation on an FPGA-enhanced PC Cluster","authors":"Masato Yoshimi, Celimuge Wu, T. Yoshinaga","doi":"10.1109/CANDAR.2016.0025","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0025","url":null,"abstract":"This paper introduces an FPGA-based scheme to accelerate mpiBLAST, which is a parallel sequence alignment algorithm for computational biology. Recent rapidly growing biological databases for sequence alignment require high-throughput storage and network rather than computing speed. Our scheme utilizes a specialized hardware configured on an FPGA-board which connects flash storage and other FPGA-boards directly. The specialized hardware configured on the FPGAs, we call a Data Stream Processing Engine (DSPE), take a role for preprocessing to adjust data for high-performance multi- and many- core processors simultaneously with offloading system-calls for storage access and networking. DSPE along the datapath achieves in-datapath computing which applies operations for data streams passing through the FPGA. Two functions in mpiBLAST are implemented using DSPE to offload operations along the datapath. The first function is database partitioning, which distributes the biological database to multiple computing nodes before commencing the BLAST processes. Using DSPE, we observe a 20-fold improvement in computation time for the database partitioning operation. The second function is an early part of the BLAST process that determines the positions of sequences for more detailed computations. We implement IDP-BLAST (In-datapath BLAST), which annotates positions in data streams from solid-state drives. We show that IDP-BLAST accelerates the computation time of the preprocess of BLAST by a factor of three hundred by offloading heavy operations to the introduced special hardware.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115626898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Tightness of Deterministic Identity-Based Signatures 基于身份的确定性签名的紧密性
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0039
Naoto Yanai
{"title":"On the Tightness of Deterministic Identity-Based Signatures","authors":"Naoto Yanai","doi":"10.1109/CANDAR.2016.0039","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0039","url":null,"abstract":"Deterministic ID-based signatures are digital signatures where secret keys are generated with random numbers by a key generation center while the signatures are generated deterministically. Although the deterministic ID-based signatures are useful for both systematic and cryptographic applications, to the best of our knowledge, there is no scheme with a tight reduction proof. In this work, we show that the scheme by Selvi et al. (IWSEC 2011) whose original proof is loose in the random oracle model is tightly secure by our new proof framework. We furthermore shed light on mathematical features necessary for achieving a tight reduction, and improve the scheme by Herranz (The Comp. Jour., 2006) to proving tightly secure in the random oracle model. The schemes described above are motivated to construct aggregate signatures with partial aggregation, and our technique is able to prove the security without the loss of the original aggregation capability.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124630889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
FPGA-based Real-Time Object Tracking Using a Particle Filter with Stream Architecture 基于fpga的流结构粒子滤波实时目标跟踪
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0079
Akane Tahara, Yoshiki Hayashida, Theint Theint Thu, Yuichiro Shibata, K. Oguri
{"title":"FPGA-based Real-Time Object Tracking Using a Particle Filter with Stream Architecture","authors":"Akane Tahara, Yoshiki Hayashida, Theint Theint Thu, Yuichiro Shibata, K. Oguri","doi":"10.1109/CANDAR.2016.0079","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0079","url":null,"abstract":"This paper deals with the real-time FPGA implementation of the posterior system state estimation in dynamic state-space models using a particle filter. The system is constructed by parallel resampling (FO-resampling) algorithm on a stream-based architecture. In particular, the system consists of three steps: prediction, likelihood calculation and resampling. Since the resampling is accomplished in a synchronized area, our approach enhances the object tracking system especially efficiency and performance. The result shows that the amount of FPGA resource utilizes for the simulation of red-color soccer ball tracking compared with the available usage. Moreover, we evaluate the tracker detection rate and the accuracy of object tracking with the calculation of average and maximum tracking errors.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114217942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Case Study of the Running Time Fluctuation of Application 应用程序运行时间波动的实例研究
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0099
Kiyoshi Kumahata, K. Minami
{"title":"A Case Study of the Running Time Fluctuation of Application","authors":"Kiyoshi Kumahata, K. Minami","doi":"10.1109/CANDAR.2016.0099","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0099","url":null,"abstract":"During the operation of a supercomputer, running time of an application occasionally becomes longer or shorter than that previously measured under the same conditions. This is called \"running time fluctuation.\" Running time fluctuations disturb the efficient operation of a supercomputer and waste the consumption of precious computer resources. Thus, we have been investigating and resolving this issue on the K computer. These issues may occur for many applications and supercomputers. In this paper, we describe some causes of running time fluctuations that we encountered in the past.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114422601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic Construction of Artificial Scale-Free Networks with Designated Maximum Degree 具有指定最大度的人工无标度网络的确定性构造
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0064
Naoki Takeuchi, S. Fujita
{"title":"Deterministic Construction of Artificial Scale-Free Networks with Designated Maximum Degree","authors":"Naoki Takeuchi, S. Fujita","doi":"10.1109/CANDAR.2016.0064","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0064","url":null,"abstract":"In this paper, we consider the problem of constructing scale-free networks in a deterministic manner. Scale-free networks have several favorable properties as the topology of interconnection networks such as the short diameter and the quick message propagation. The proposed algorithm is an extension of the Bulut's algorithm for constructing scale-free networks with designated minimum degree k and maximum degree m, such that: 1) it determines the ideal number of edges derived from the ideal degree distribution; and 2) after connecting each new node to k existing nodes as in the Bulut's algorithm, it adjusts the number of edges to the ideal value by conducting add/removal of edges. The performance of the algorithm is experimentally evaluated.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115590048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of an Application State Migration Mechanism between Android Devices Android设备间应用状态迁移机制的设计与实现
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0125
Kohei Sato, Koichi Mouri, S. Saito
{"title":"Design and Implementation of an Application State Migration Mechanism between Android Devices","authors":"Kohei Sato, Koichi Mouri, S. Saito","doi":"10.1109/CANDAR.2016.0125","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0125","url":null,"abstract":"Devices equipped with Android, which is the OS for mobile devices, spread widely, and one user may own plural devices. It is thought that the user uses plural devices properly depending on the situation. For example, the user may use a small device on the way, and a large device in the office. In such situation, it is necessary for improvement of work efficiency to change work environment seamlessly at plural devices. We design and implement a platform to transmit an application used now to other device. This platform enables a user to resume work with the other device. The platform acquires a state of application working at a transmission side device, and transmits it using the communication between the devices. The application in a reception side is restored by the platform using the state. Bluetooth is used for the communication. We offer the platform as a function of Android OS. In this article, we describe the implementation of the platform, the measurements of time to use it, and consideration about results of the measurements.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Implementation of a Revocable Group Signature Scheme with Compact Revocation List Using Accumulator 利用累加器实现具有紧凑吊销列表的可撤销群签名方案
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0110
Nasima Begum, T. Nakanishi, Shahidatul Sadiah, Md. Ezharul Islam
{"title":"Implementation of a Revocable Group Signature Scheme with Compact Revocation List Using Accumulator","authors":"Nasima Begum, T. Nakanishi, Shahidatul Sadiah, Md. Ezharul Islam","doi":"10.1109/CANDAR.2016.0110","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0110","url":null,"abstract":"A group signature scheme allows a user to anonymously sign a message on behalf of a group. One of important issues in group signature schemes is the user revocation. Previously, Libert et al. proposed an elegant revocable group signature scheme with O(1) signing/verification costs, O(1) signature size, O(1) membership certificate size, and O(log N) public key size, where N is the number of group members. However, the revocation list (RL) size is O(R), where R is the number of revoked members. Due to O(R) signatures in the RL, the RL size amounts to 8 MB in case of R=10,000. Then, a revocable group signature scheme with O(R/T) RL size was previously proposed for an integer parameter T, by accumulating T entries in the RL. Thus, we can expect that the delay time for a signer to fetch the RL is reduced in mobile environment. As the trade-off, the signing cost is increased by O(T). However, this scheme with the compact RL has not been implemented yet, and the practicality on the computation times for concrete T is unknown. In this paper, we implemented the scheme with the compact RL, and explore the practicality, where the signing time is greatly reduced by the technique to reduce the witness computation for the accumulator shown in the previous paper. From the experimental results, the signing and verification times are less than 500 ms and 900 ms even for T=100, and thus we can confirm that the implemented scheme is practical, and the accumulating technique in the implemented scheme is sufficiently effective.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117082165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Experimental Evaluation of a GPU-based Frequent Subgraph Miner Using Synthetic Databases 基于gpu的合成数据库频繁子图挖掘的实验评估
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0093
Tatsuya Toki, Tomonobu Ozaki
{"title":"Experimental Evaluation of a GPU-based Frequent Subgraph Miner Using Synthetic Databases","authors":"Tatsuya Toki, Tomonobu Ozaki","doi":"10.1109/CANDAR.2016.0093","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0093","url":null,"abstract":"Frequent subgraph mining, i.e. enumeration of subgraphs appearing frequently in graph databases, is one of the most fundamental problems in graph mining. Several optimization techniques as well as parallel implementations are developed to alleviate the problem that subgraph miners require a long computation time if target databases are huge or given frequency threshold is low. In this paper, we investigate on a GPU-based implementation of subgraph miner developed recently. In order to obtain significant insights for further performance improvements, we re-implement the GPU-based subgraph miner with a few modifications, and conduct a series of intensive experiments by using synthetic graph databases.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128488999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
File Placing Control for Improving the I/O Performance of Hadoop in Virtualized Environment 提高Hadoop在虚拟化环境下I/O性能的文件放置控制
2016 Fourth International Symposium on Computing and Networking (CANDAR) Pub Date : 2016-11-01 DOI: 10.1109/CANDAR.2016.0076
Kenji Nakashima, Eita Fujishima, Saneyasu Yamaguchi
{"title":"File Placing Control for Improving the I/O Performance of Hadoop in Virtualized Environment","authors":"Kenji Nakashima, Eita Fujishima, Saneyasu Yamaguchi","doi":"10.1109/CANDAR.2016.0076","DOIUrl":"https://doi.org/10.1109/CANDAR.2016.0076","url":null,"abstract":"Hadoop is a popular open-source MapReduce implementation and has been widely used in many large scale systems. For improving I/O performance of Hadoop, a method which controlled file storing location based on sequential I/O speed of the storage device was proposed. However, the method did not take account of virtualized environment. In this paper, we focus on virtualized environment with a fixed number of virtual machines and discuss a method for improving I/O performance of Hadoop in virtualized environment. First, we evaluate performance of the existing method in virtualized environment and point its ineffective behaviors out. Second, we propose a new method considering this issue. The method takes account of both of the sequential access performance and seek distance among virtual machine image files. Third, we evaluate the proposed method with virtualized environment wherein plural virtual machines are running on a physical machine and demonstrate that the method can improve I/O performance of Hadoop application.","PeriodicalId":322499,"journal":{"name":"2016 Fourth International Symposium on Computing and Networking (CANDAR)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129783932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信