2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)最新文献

筛选
英文 中文
Image Compression Based on Restricted Wavelet Synopses with Maximum Error Bound 基于最大误差界的受限小波图像压缩
2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) Pub Date : 2016-12-06 DOI: 10.1145/2996890.3007880
Xiaoyu Li, Shizhong Huang, Huanyu Zhao, Xueyan Guo, Libo Xu, Xingsen Li, Youjia Li
{"title":"Image Compression Based on Restricted Wavelet Synopses with Maximum Error Bound","authors":"Xiaoyu Li, Shizhong Huang, Huanyu Zhao, Xueyan Guo, Libo Xu, Xingsen Li, Youjia Li","doi":"10.1145/2996890.3007880","DOIUrl":"https://doi.org/10.1145/2996890.3007880","url":null,"abstract":"The construction of wavelet synopses with maximum error bound have been studied by many years, which has many real world applications, such as health data stream analysis and image compression. Recently, there are two kinds of wavelet synopses with maximum error bound: one is restricted wavelet synopses whose synopses are restricted to the haar coefficients. Another is unrestricted wavelet synopses whose synopses are not equal to the haar coefficients. In this paper, we propose a simple and novel compression approach of restricted wavelet synopses with maximum error bound. The approach is applied in image compression in this paper. This approach firstly performs a stepwise Haar transformation for each 2×2 non-overlapping sub-block of an image. It then filters each level of detail coefficients by using varied thresholds. This approach guarantees each pixel's error in an user-defined error bound and can maintain image quality greatly in reconstruction. Experiment results show that the approach has faster execution speed and can obtain better reconstruction effects under the same compression ratio than the existing approaches. This advantage is more obvious, especially in the situation of high compression ratio.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Elasticity Debt: A Debt-Aware Approach to Reason about Elasticity Decisions in the Cloud 弹性债务:考虑云计算弹性决策的债务意识方法
2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) Pub Date : 2016-12-06 DOI: 10.1145/2996890.2996904
C. Mera-Gómez, R. Bahsoon, R. Buyya
{"title":"Elasticity Debt: A Debt-Aware Approach to Reason about Elasticity Decisions in the Cloud","authors":"C. Mera-Gómez, R. Bahsoon, R. Buyya","doi":"10.1145/2996890.2996904","DOIUrl":"https://doi.org/10.1145/2996890.2996904","url":null,"abstract":"Cloud elasticity provides the underlying primitives to dynamically acquire and release shared computational resources on demand. Therefore, elasticity constantly takes adaptation decisions to adjust the resource provisioning constrained by quality of service and operating costs minimization. However, dynamic trade-offs for resource provisioning rarely consider the value of the adaptation decisions under uncertainty. Part of the problem stems from the lack of a utility-driven model to reason about it. In this paper, we introduce the concept of elasticity debt as an approach to reason about elasticity decisions from a utility-driven perspective, where we apply the technical debt metaphor in the context of cloud elasticity. Moreover, we extended CloudSim as a proof of concept to show that a debt-aware elasticity decision-making can achieve a higher utility over time. We provide an elasticity conceptual model that links the key factors to consider when adapting resource provisioning and the potential debts incurred by these decisions. We propose a new perspective to value elasticity decisions in the uncertain cloud environment by introducing a technical debt perspective.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127933015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Titian2: A Scalable System-Level Emulator with All Programmability for Datacenter Servers in Cloud Computing Titian2:一个可扩展的系统级模拟器,具有云计算中数据中心服务器的所有可编程性
2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) Pub Date : 2016-12-06 DOI: 10.1145/2996890.3007891
Ke Zhang, Ran Zhao, Hongxia Zhang, Lei-Ping Yu, Yisong Chang, Zhao Zhang, Mingyu Chen
{"title":"Titian2: A Scalable System-Level Emulator with All Programmability for Datacenter Servers in Cloud Computing","authors":"Ke Zhang, Ran Zhao, Hongxia Zhang, Lei-Ping Yu, Yisong Chang, Zhao Zhang, Mingyu Chen","doi":"10.1145/2996890.3007891","DOIUrl":"https://doi.org/10.1145/2996890.3007891","url":null,"abstract":"In order to provide the cloud computing research community with a full-system level datacenter server emulator with programmable hardware and software, and stimulate more innovative research work, this poster and demo shows a scientific research platform, Titian2, designed and implemented at ICT of CAS. Titian2 has the ability of on-line profiling and measuring, and the scalability of connecting with each other. Researchers can deploy complete software stacks and run normal server workloads on Titian2. As a microscope for cloud computing workloads, Titian2 provides scholars with more details of data movements inside both software stacks and hardware components, compared with an x86 commercial platform.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133464767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interface Diversification in IoT Operating Systems 物联网操作系统中的接口多样化
2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) Pub Date : 2016-12-06 DOI: 10.1145/2996890.3007877
Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Lauri Koivunen, V. Leppänen
{"title":"Interface Diversification in IoT Operating Systems","authors":"Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Lauri Koivunen, V. Leppänen","doi":"10.1145/2996890.3007877","DOIUrl":"https://doi.org/10.1145/2996890.3007877","url":null,"abstract":"With the advancement of Internet in Things (IoT) more and more \"things\" are connected to each other through the Internet. Due to the fact that the collected information may contain personal information of the users, it is very important to ensure the security of the devices in IoT. Diversification is a promising technique that protects the software and devices from harmful attacks and malware by making interfaces unique in each separate system. In this paper we apply diversification on the interfaces of IoT operating systems. To this aim, we introduce the diversification in post-compilation and linking phase of the software life-cycle, by shuffling the order of the linked objects while preserving the semantics of the code. This approach successfully prevents malicious exploits from producing adverse effects in the system. Besides shuffling, we also apply library symbol diversification method, and construct needed support for it e.g. into the dynamic loading phase. Besides studying and discussing memory layout shuffling and symbol diversification as a security measures for IoT operating systems, we provide practical implementations for these schemes for Thingsee OS and Raspbian operating systems and test these solutions to show the feasibility of diversification in IoT environments.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133741709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Video Authentication Based on Statistical Local Information 基于统计本地信息的视频认证
2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) Pub Date : 2016-12-06 DOI: 10.1145/2996890.3007857
M. Al-Athamneh, F. Kurugollu, D. Crookes, M. Farid
{"title":"Video Authentication Based on Statistical Local Information","authors":"M. Al-Athamneh, F. Kurugollu, D. Crookes, M. Farid","doi":"10.1145/2996890.3007857","DOIUrl":"https://doi.org/10.1145/2996890.3007857","url":null,"abstract":"With the outgrowth of video editing tools, video information trustworthiness becomes a hypersensitive field. Today many devices have the capability of capturing digital videos such as CCTV, digital cameras and mobile phones and these videos may transmitted over the Internet or any other non secure channel. As digital video can be used to as supporting evidence, it has to be protected against manipulation or tampering. As most video authentication techniques are based on watermarking and digital signatures, these techniques are effectively used in copyright purposes but difficult to implement in other cases such as video surveillance or in videos captured by consumer's cameras. In this paper we propose an intelligent technique for video authentication which uses the video local information which makes it useful for real world applications. The proposed algorithm relies on the video's statistical local information which was applied on a dataset of videos captured by a range of consumer video cameras. The results show that the proposed algorithm has potential to be a reliable intelligent technique in digital video authentication without the need to use for SVM classifier which makes it faster and less computationally expensive in comparing with other intelligent techniques.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133797518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Capacity Management for Streaming Applications over Cloud Infrastructures with Micro Billing Models 容量管理的流应用程序在云基础设施与微计费模型
2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) Pub Date : 2016-12-06 DOI: 10.1145/2996890.3007868
Rafael Tolosana-Calasanz, J. Montes, L. Bittencourt, O. Rana, M. Parashar
{"title":"Capacity Management for Streaming Applications over Cloud Infrastructures with Micro Billing Models","authors":"Rafael Tolosana-Calasanz, J. Montes, L. Bittencourt, O. Rana, M. Parashar","doi":"10.1145/2996890.3007868","DOIUrl":"https://doi.org/10.1145/2996890.3007868","url":null,"abstract":"Recent advances in sensor technologies and instrumentation have led to an extraordinary growth of data sources and streaming applications. A wide variety of devices, from smart phones to dedicated sensors, have the capability of collecting and streaming data at unprecedented rates. Typical applications include smart cities & built environments for instance, where sensor-based infrastructures continue to increase in scale and variety. Analysis of stream data involves: (i) execution of a number of operations on a time/sample window – e.g. min./max./avg., filtering, etc, (ii) a need to combine a number of such operations together, (iii) event-driven execution of operations, generally over short time durations, (iv) operation correlations across multiple data streams. The use of such operations does not fit well in the per-hour or per-minute cloud billing models currently available from cloud providers – with some notable exceptions (e.g. Amazon AWS). In this paper we discuss how micro-billing and sub-second resource allocation can be used in the context of streaming applications and how micro-billing models bring challenges to capacity management on cloud infrastructures.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132617993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Latency Analysis of Cooperative Caching with Multicast for 5G Wireless Networks 5G无线网络协同多播缓存延迟分析
2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) Pub Date : 2016-12-06 DOI: 10.1145/2996890.3007879
Xiangyue Huang, Zhifeng Zhao, Honggang Zhang
{"title":"Latency Analysis of Cooperative Caching with Multicast for 5G Wireless Networks","authors":"Xiangyue Huang, Zhifeng Zhao, Honggang Zhang","doi":"10.1145/2996890.3007879","DOIUrl":"https://doi.org/10.1145/2996890.3007879","url":null,"abstract":"The explosion of mobile data traffic has an adverse effect on communication delay and system performance in 5G wireless network. Deploying a number of caches on the base stations(BSs) to cache content has became an essential solution. In this paper, we present a caching structure and propose a CMAC(Cooperative Multicast-Aware Caching) strategy to reduce the average latency of delivering content. The strategy is based on the characteristics of multicast and cooperation among BSs. In this strategy, we pay more attention to the users' QoE and the content-access latency. The cooperative caching scheme for multicast is more important in improving the cache hit ratio and efficiency of content delivery. We also formulate the optimization problem in using CMAC strategy and introduce an algorithm with performance guarantees. The relevant trace-driven simulations reveal that CMAC yields up to 13% decrease in the average content-access latency compared to MAC(Multicast-Aware Caching) scheme with the same total cache capacity.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Public Auditing Scheme for Cloud-Based Wireless Body Area Network 基于云的无线体域网络公共审计方案
2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) Pub Date : 2016-12-06 DOI: 10.1145/2996890.3007855
Song Li, Hong Zhong, Jie Cui
{"title":"Public Auditing Scheme for Cloud-Based Wireless Body Area Network","authors":"Song Li, Hong Zhong, Jie Cui","doi":"10.1145/2996890.3007855","DOIUrl":"https://doi.org/10.1145/2996890.3007855","url":null,"abstract":"WBAN (Wireless Body Area Network) plays a fundamental role in telemedicine. However, due to the small size of sensor devices and weak capabilities in data processing/storage, WBAN is limited in application. In order to improve the ability of WBAN system and provide a richer service, the cloud-assisted WBAN has been proposed. Recently, He et al. proposed a method to check the data integrity in cloud-assisted WBAN. However, we found that in their scheme, the cloud server (storage service provider) can access the user's medical information directly. As we know, the cloud service provider can be divided into three kinds: public cloud, private cloud and hybrid cloud. Except of the private cloud, the cloud server should be considered as not trusted in the other two situations. Based on this assumption, in this paper, we proposed a certificateless public auditing scheme with privacy preserving and revocation in group sharing data model. Compared with He et al.'s scheme, the cloud server can not access any useful information from the stored data. Furthermore, our scheme supports properties of multi-user sharing data, public auditing, forward security and revocation of illegal group members.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114233280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Enterprise IoT Security and Scalability: How Unikernels can Improve the Status Quo 企业物联网安全性和可扩展性:Unikernels如何改善现状
2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) Pub Date : 2016-12-06 DOI: 10.1145/2996890.3007875
B. Duncan, A. Happe, Alfred Bratterud
{"title":"Enterprise IoT Security and Scalability: How Unikernels can Improve the Status Quo","authors":"B. Duncan, A. Happe, Alfred Bratterud","doi":"10.1145/2996890.3007875","DOIUrl":"https://doi.org/10.1145/2996890.3007875","url":null,"abstract":"Cloud computing has been a great enabler for both the In-ternet of Things and Big Data. However, as with all newcomputing developments, development of the technology is usually much faster than consideration for, and development of, solutions for security and privacy. In a previous paper, we proposed that a unikernel solution could be used to improve security and privacy in a cloud scenario. In this paper, we outline how we might apply this approach to the Internet of Things, which can demonstrate an improvement over existing approaches.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"2023 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114741775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Testing-as-a-Service Approach for Cloud Applications 云应用的“测试即服务”方法
2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC) Pub Date : 2016-12-06 DOI: 10.1145/2996890.3007890
Dmitry I. Savchenko, N. Ashikhmin, G. Radchenko
{"title":"Testing-as-a-Service Approach for Cloud Applications","authors":"Dmitry I. Savchenko, N. Ashikhmin, G. Radchenko","doi":"10.1145/2996890.3007890","DOIUrl":"https://doi.org/10.1145/2996890.3007890","url":null,"abstract":"Web-based systems test techniques developed rapidly over the past years. Continuous integration approach demanded rejection of manual testing methods, and transition to fully automated methods, covering all application from the source code of core services to the user interface and API correctness. Every year there are dozens of new approaches to cloud applications testing, many of which, despite their effectiveness, little known to ordinary developers and testers. We propose a Testing-as-a-Service solution to simplify the cloud applications testing by providing a catalog of applicable test techniques and automating testing processes.","PeriodicalId":350701,"journal":{"name":"2016 IEEE/ACM 9th International Conference on Utility and Cloud Computing (UCC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124073081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信