2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)最新文献

筛选
英文 中文
Application-centric Cloud management 以应用程序为中心的云管理
Sunirmal Khatua, Anirban Ghosh, N. Mukherjee
{"title":"Application-centric Cloud management","authors":"Sunirmal Khatua, Anirban Ghosh, N. Mukherjee","doi":"10.1109/AICCSA.2011.6126627","DOIUrl":"https://doi.org/10.1109/AICCSA.2011.6126627","url":null,"abstract":"In recent years most of the cloud computing community adopt an infrastructure centric approach to optimize the cost of cloud resources considering both Cloud Computing Service Users(CCSU) and Cloud Computing Service Providers(CCSP). In this paper we have brought up the concept of Application-centric Cloud. With Application-centric Cloud we propose an architecture to provide a generalized framework for auto deploying, sharing, providing scalability, robustness and availability of any cloud based application. Along with application independence, the framework also considers CCSP independence so that an application can use resources across providers.","PeriodicalId":375277,"journal":{"name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129967820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Performance analysis of streamed video over mobile IP based networks 基于移动IP网络的流媒体视频性能分析
Heba Nashaat, R. Rizk, Hani M. K. Mahdi
{"title":"Performance analysis of streamed video over mobile IP based networks","authors":"Heba Nashaat, R. Rizk, Hani M. K. Mahdi","doi":"10.1109/AICCSA.2011.6126620","DOIUrl":"https://doi.org/10.1109/AICCSA.2011.6126620","url":null,"abstract":"In mobile IPv6, packet transfer is interrupted due to the handoff of a mobile node, which results in burst packet loss. This transient behavior decreases the required quality of services for time-critical streaming media applications. This paper introduces an analytical model of streamed video over mobile IP networks considering the effects of handoff. The proposed model focuses on the effect of the frame error rates on the handoff latency of multimedia traffic. It is derived based on general distribution for the residence time to be applicable in all cases of user mobility. The impact of the behavior of wireless connection, cell residence time and the handoff time is investigated. Numerical results are obtained for video traffic presented by Gamma distribution for transmission behavior. It is shown that, a higher value of frame error rate increases the probability of erroneous packet transfer. A shorter video time leads to end this connection most likely in first foreign agents while a longer one leads to larger delivery time.","PeriodicalId":375277,"journal":{"name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115396001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the influence of selection function on the performance of fat-trees under hot-spot traffic 热点流量下选择函数对肥壮树性能的影响
A. Farouk, H. M. El-Boghdadi
{"title":"On the influence of selection function on the performance of fat-trees under hot-spot traffic","authors":"A. Farouk, H. M. El-Boghdadi","doi":"10.1109/AICCSA.2011.6126622","DOIUrl":"https://doi.org/10.1109/AICCSA.2011.6126622","url":null,"abstract":"Fat-tree topology has drawn a considerable interest because it offers a rich connectivity among source and destination nodes. Routing in fat-trees is composed of a routing function and a selection function. The selection function was shown to have a great impact on the performance [2]. In this paper, we study the performance of fat-trees in case of hot-spot traffic. First, we propose a new selection function SAOP, which is based on the stage and the source node address. We argue that the SAOP is more suitable for hot-spot traffic than other selection functions. We show that the new selection function outperforms other well known selections functions under hot-spot traffic. Then, we compare a deterministic version of the SAOP to that of the adaptive one. We show that their performances are comparable. This guarantees an in-order packet delivery. Finally, we analyze the SAOP algorithm and show that the congestion occurs only within the parent switches of the destination which explain the outperforming results of the SAOP.","PeriodicalId":375277,"journal":{"name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122767189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Verification of decimal floating-point fused-multiply-add operation 验证十进制浮点融合乘加运算
Amr A. R. Sayed-Ahmed, H. Fahmy, R. Samy
{"title":"Verification of decimal floating-point fused-multiply-add operation","authors":"Amr A. R. Sayed-Ahmed, H. Fahmy, R. Samy","doi":"10.1109/AICCSA.2011.6126614","DOIUrl":"https://doi.org/10.1109/AICCSA.2011.6126614","url":null,"abstract":"Decimal floating-point fused-multiply-add (FMA) software or hardware designs require a verification process to prove that the design is in compliance with the IEEE Standard for Floating-Point Arithmetic (IEEE Std 754–2008). Our work represents the first verification technique to verify the decimal FMA designs using simulation based coverage models. The paper describes in details the coverage models needed in the verification of the decimal FMA, the FMA engine used to solve the coverage models, and the results of using that technique in the verification of SilMinds FMA hardware design, DecNumber FMA software design, and Intel-Decimal Floating point Library FMA software design. The Technique has proven its efficiency in discovering bugs in FMA software and hardware designs.","PeriodicalId":375277,"journal":{"name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122961933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reliable distributed data fusion scheme in unsafe sensor networks 不安全传感器网络中的可靠分布式数据融合方案
J. Bahi, M. Hakem, A. Makhoul
{"title":"Reliable distributed data fusion scheme in unsafe sensor networks","authors":"J. Bahi, M. Hakem, A. Makhoul","doi":"10.1109/AICCSA.2011.6126603","DOIUrl":"https://doi.org/10.1109/AICCSA.2011.6126603","url":null,"abstract":"In this paper, we deal with the problem of distributed data fusion in unsafe large-scale sensor networks. Data fusion application is the phase of processing the collected data by sensor nodes before sending it the end user. During this phase, resource failures are more likely to occur and can have an adverse effect on the application. To achieve/ensure the convergence of node states to the average of the initial measurements of the network even when sensor nodes are subject to failures, two algorithms are presented. We introduce first an efficient fault-tolerant scheme capable of supporting faults due to battery depletion. Next, we derive a more complex solution to resist to frequent and unexpected fail-silent/fail-stop node failures. We provide a comprehensive set of experimental results, that fully demonstrate the usefulness of the proposed schemes.","PeriodicalId":375277,"journal":{"name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127107039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Averaging measurement strategies for identifying single nucleotide polymorphisms from redundant data sets 从冗余数据集中识别单核苷酸多态性的平均测量策略
Tai-Chun Wang, J. Taheri, Albert Y. Zomaya
{"title":"Averaging measurement strategies for identifying single nucleotide polymorphisms from redundant data sets","authors":"Tai-Chun Wang, J. Taheri, Albert Y. Zomaya","doi":"10.1109/AICCSA.2011.6126593","DOIUrl":"https://doi.org/10.1109/AICCSA.2011.6126593","url":null,"abstract":"Single nucleotide polymorphisms (SNPs) studies have been an active topic of research in the life sciences in recent years. Because SNPs are abundant, stable and sometimes can be related to specific diseases, they have been widely selected as biomarkers for multi-purpose research. As traditional methods for identifying SNPs are time-consuming and expensive, discovering SNPs from expressed sequence tags (ESTs) has became an alternative efficient way. As most EST databases do not store quality/trace files together with EST reads, several methods, like Phard, which requires corresponding sequences quality files, will not be suitable for further research purpose. Thus, computational methods that are able to obtain reliable SNPs without the need for trace/quality information are still essential. We have developed a pipeline framework, called PFSNP, to reveal reliable SNPs from EST data sets without the association of trace/quality files. PFSNP deploys several strategies, like modified neighborhood quality standard measurement and fuzzy logic, in this framework. Also, it automatically adjusts the slide window to efficiently fit different conditions of data sets. PFSNP is demonstrated by identifying SNPs from two subgroups of Oryza sativa with two different strategies as well as zebrafish. Based on our experimental results, PFSNP can obtain higher reliable results when compared to existing methods.","PeriodicalId":375277,"journal":{"name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121091327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Satellite image classification using a classifier integration model 基于分类器集成模型的卫星图像分类
Dong-Chul Park, T. Jeong, Yunsik Lee, Soo-Young Min
{"title":"Satellite image classification using a classifier integration model","authors":"Dong-Chul Park, T. Jeong, Yunsik Lee, Soo-Young Min","doi":"10.1109/AICCSA.2011.6126608","DOIUrl":"https://doi.org/10.1109/AICCSA.2011.6126608","url":null,"abstract":"A new satellite image classification method using a classifier integration model(CIM)is proposed in this paper. CIM does not use the entire feature vectors extracted from the original data in a concatenated form to classify each datum, but rather uses groups of features related to each feature vector separately. In the training stage, a confusion table calculated from each local classifier that uses a specific feature vector group is drawn throughout the accuracy of each local classifier and then, in the testing stage, the final classification result is obtained by applying weights corresponding to the confidence level of each local classifier. The CIM is applied to the problem of satellite image classification on a set of image data. The results demonstrate that the CIM scheme can enhance the classification accuracy of individual classifiers that use specific feature vector group.","PeriodicalId":375277,"journal":{"name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125477791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Modeling gene regulatory networks: A survey 基因调控网络建模:综述
W. Gomaa
{"title":"Modeling gene regulatory networks: A survey","authors":"W. Gomaa","doi":"10.1109/AICCSA.2011.6126584","DOIUrl":"https://doi.org/10.1109/AICCSA.2011.6126584","url":null,"abstract":"One of the major missions of the health care enterprise in Egypt is the proper control of local endemic diseases, such as liver and breast cancers, through the development and maintenance of integrated quality programs in patient care, research, education, and prevention. This was particularly manifested by the establishment of the National Cancer Institute NCI in the 1950's [1]. NCI is the largest comprehensive cancer center in Egypt, and is committed to the multidisciplinary approach to cancer management in which different treatment modalities cooperate rather than compete. Given a particular kind of disease one of the major problems to its management and treatment can be summarized by the following: (1) to isolate the genes that are involved in that cancer, (2) to model the interactions among these genes to derive what is called Gene Regulatory Network GRN, and (3) to detect the topological changes among the GRN of the normal state, the GRN of the cancer state, and the GRN that results as a pharmacologic response to a therapeutic intervention; these changes are called biomarkers. Modeling of GRNs is a multidisciplinary task that poses many scientific challenges. The subject has gained much interest in the past few years. In this article we give a quick survey of the current modeling techniques of gene regulatory networks.","PeriodicalId":375277,"journal":{"name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116773168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Measuring “Sybil attacks” in Kademlia-based networks 在基于卡德米亚的网络中测量“西比尔攻击”
Xiangtao Liu, Kai Cai, Yang Li
{"title":"Measuring “Sybil attacks” in Kademlia-based networks","authors":"Xiangtao Liu, Kai Cai, Yang Li","doi":"10.1109/AICCSA.2011.6126586","DOIUrl":"https://doi.org/10.1109/AICCSA.2011.6126586","url":null,"abstract":"In today's Internet, many peer-to-peer (P2P) applications deploy their distributed networks based on Kademlia, a robust distributed hash table (DHT) protocol. Since Kademlia has no mechanism to defend ID fraud, Sybil attack becomes a great threat on these P2P networks. However, to our best knowledge, Sybil attacks in real Kademlia-based networks has never been measured. In this paper, based on our own measurement tool, Rainbow, we measure Sybil attacks in Kademlia-based networks BTDHT and KAD. A number of characteristics of Sybil attacks are revealed. We believe that our measurement results may be useful for developing better countermeasures to deal with Sybil attacks in Kademlia-based networks.","PeriodicalId":375277,"journal":{"name":"2011 9th IEEE/ACS International Conference on Computer Systems and Applications (AICCSA)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123459868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信