2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)最新文献

筛选
英文 中文
A Distributed Framework for Event Detection in Video Surveillance Context 视频监控环境下分布式事件检测框架
Fabio Persia, D. D’Auria
{"title":"A Distributed Framework for Event Detection in Video Surveillance Context","authors":"Fabio Persia, D. D’Auria","doi":"10.1109/3PGCIC.2015.113","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.113","url":null,"abstract":"In latest years modern world's needs of safety caused a speed spreading of video surveillance systems, more and more frequently collocated in the most crowded places. Thus, a lot of theoretical approaches working with data coming from heterogeneous sources and defining some very complex event detection algorithms have been proposed in the literature. In this paper, we present a distributed framework for event detection in video surveillance context. The overall process is described, starting from the video frames captured by different kinds of sensors and cameras till at the end some high-level event detection algorithms performed in a distributed environment for finding potentially dangerous activities are applied. The conducted experiments confirm the efficiency achieved by our distributed framework.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"516 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116220958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Lava Flows Simulations with OpenCL: A Preliminary Application for Civil Defence Purposes 用OpenCL进行高效熔岩流模拟:民防目的的初步应用
M. Macri, A. Rango, D. Spataro, D. D'Ambrosio, W. Spataro
{"title":"Efficient Lava Flows Simulations with OpenCL: A Preliminary Application for Civil Defence Purposes","authors":"M. Macri, A. Rango, D. Spataro, D. D'Ambrosio, W. Spataro","doi":"10.1109/3PGCIC.2015.107","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.107","url":null,"abstract":"GPGPU (General Purpose computing on Graphics Processing Units) has marked a revolution in the field of Parallel Computing allowing to achieve computational performance unimaginable until a few years ago. This hardware has proven to be extremely reliable and suitable to simulate Cellular Automata (CA) models for modeling complex systems whose evolution can be described in terms of local interactions. Starting from previous GPGPU implementations of CA models with CUDA, this paper presents an effective implementation of a well-known numerical model for simulating lava flows on Graphical Processing Units (GPU) based on the OpenCL (Open Computing Language) standard. In addition, a preliminary Civil Defence application related Hazard maps of an area located at Mt. Etna volcano (South Italy), confirms the validity of OpenCL and both low-cost and high-end graphics hardware as an alternative to expensive solutions for the simulation of CA models.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128281476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The HtComp Research Project: An Overview HtComp研究项目:概述
A. Cilardo
{"title":"The HtComp Research Project: An Overview","authors":"A. Cilardo","doi":"10.1109/3PGCIC.2015.135","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.135","url":null,"abstract":"This contribution reviews the main results of the HtComp project, a two-year research programme aiming at facilitating the integration of FPGA-based accelerators into general-purpose computing. The project covered the automated generation of HDL code from parallel applications written in traditional high-level software languages, as well as the customization of the processing, memory, and on-chip interconnect subsystems tailored on the application requirements. The ultimate outcome of the research was the introduction of methods and tools allowing software developers, particularly from the HPC domain, to access hardware-accelerated platforms incurring significantly reduced design complexity and overheads.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128340875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Entity-Attribute-Value Data Model in a Multi-tenant Shared Data Environment 多租户共享数据环境中的实体-属性-值数据模型
Torben Jastrow, T. Preuss
{"title":"The Entity-Attribute-Value Data Model in a Multi-tenant Shared Data Environment","authors":"Torben Jastrow, T. Preuss","doi":"10.1109/3PGCIC.2015.189","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.189","url":null,"abstract":"Service providers in the Software as a Service (SaaS) Business offer the same or similar services to multiple tenants. Presentation, business logic and persistence layer are shared by all tenants. However, in many cases tenants have a great need to customize their application. In this paper we investigate the use of Entity-Attribute-Value (EAV) databases for multi tenant applications. In the EAV design attributes are not recorded as columns in a table but in rows. Since databases are designed for changing the number of rows rather than columns in tables this improves the performance of the customization process.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124757683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Sensor Data Stream Delivery System with Different Delivery Cycles for IoT Environments 物联网环境中具有不同交付周期的传感器数据流交付系统
T. Yoshihisa, Yoshimasa Ishi, Kodai Mako, Tomoya Kawakami, Y. Teranishi
{"title":"A Sensor Data Stream Delivery System with Different Delivery Cycles for IoT Environments","authors":"T. Yoshihisa, Yoshimasa Ishi, Kodai Mako, Tomoya Kawakami, Y. Teranishi","doi":"10.1109/3PGCIC.2015.87","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.87","url":null,"abstract":"Due to the recent attraction for IoT (Internet of Things) environments, some sensor data stream delivery systems have been proposed. In IoT environments, clients have different computational and communication performances. If servers deliver sensor data stream with a shorter delivery cycle than the limit of the clients' performance, the client losses the data or the delay lengthens. These causes unexpected system behaviors. However, most of conventional systems do not consider the clients' performances. In this research, we propose a sensor data stream delivery system with different delivery cycles for IoT environments. In the proposed system, the clients select their appropriate delivery cycles based on their performances. We also developed our proposed system and confirmed that our proposed system can reduce data loss and delay.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114323426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistical Challenges for Quality Assessment of Smart Medical Devices 智能医疗设备质量评估的统计挑战
J. Sliwa
{"title":"Statistical Challenges for Quality Assessment of Smart Medical Devices","authors":"J. Sliwa","doi":"10.1109/3PGCIC.2015.96","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.96","url":null,"abstract":"Connected medicine, using smart (software based and networked) medical devices is frequently presented as the major disruptive trend in health care. Such devices will however be broadly used only if they are \"prescribed\" by the hospitals as a part of a therapy and are reimbursed by the insurances. For this we need the proof of their safety, medical efficacy and economic efficiency. Aside of obligatory clinical trials we need an extensive system of post-market surveillance, because: a medical device is a part of a complex cyber-physical system, with humans in the loop / the environment cannot be sufficiently defined / humans react differently to the therapy, they also behave differently / after every software upgrade the device is not the same as before In their operation such devices generate huge amounts of data that can be reused for such analysis. Technically oriented people believe it can be done using a Big Data Analytics system without a deeper understanding of the underlying processes. It is doubtful if such approach can deliver useful results. The main problems seem to be: unbalanced cohort / various patient groups with various preferences / multiple quality parameters (basic algorithm, signal propagation, battery, security & privacy, obtrusiveness, etc.) / multiple variants (operating modes, device settings) / variability of the device and of the environment. When we transform data into \"actionable knowledge\", especially if the generated decisions influence human health, utmost care has to be applied. The goal of this paper is to present the complexity of the problem, warn against hasty, purely technical solutions, raise interest among specialists in health statistics and ignite an interdisciplinary cooperation to solve it.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"23 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113971888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation 一种轻量级认证器生成的公有云存储审计方案
Wenting Shen, Jia Yu, Rong Hao, Xu An Wang
{"title":"A Public Cloud Storage Auditing Scheme with Lightweight Authenticator Generation","authors":"Wenting Shen, Jia Yu, Rong Hao, Xu An Wang","doi":"10.1109/3PGCIC.2015.47","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.47","url":null,"abstract":"Cloud storage is becoming more and more popular with the development of cloud computing technique. Cloud storage auditing, as one important security service, is used to check the integrity of the cloud data stored in cloud for users. However, the burden for users to generate authenticators is very huge before cloud data are outsourced to cloud in public cloud storage auditing. In order to deal with this problem, we propose a public cloud storage auditing scheme with lightweight authenticator generation. We design a new framework of public cloud storage auditing, in which an Authenticators Generation Center (AGC) is in charge of generating authenticators for users. In our proposed scheme, the AGC does not know the real cloud data of users because it only generates the authenticators for blinded cloud data. To reduce the computation burden at user side, the cloud can verify whether the authenticators generated by the AGC are correct or not. As a result, the users only consume very little computation for public authenticator generation and verification. The security analysis and the performance analysis show the proposed scheme is secure and efficient.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Efficient Numerical Simulation for the Quasilinear Elliptic Problems 拟线性椭圆型问题的高效数值模拟
Qingli Zhao, Jin Li, Juxin Chen, X. Wang
{"title":"Efficient Numerical Simulation for the Quasilinear Elliptic Problems","authors":"Qingli Zhao, Jin Li, Juxin Chen, X. Wang","doi":"10.1109/3PGCIC.2015.71","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.71","url":null,"abstract":"With the rapid development of computing power, some efficient numerical methods are presented. In this paper, expanded mixed finite element method is introduced to solve the quasilinear elliptic problems. This method expands the traditional mixed finite element method in the sense that three variables are explicitly treated simultaneously. Existence and uniqueness of the discrete approximation are demonstrated. L2 2-error estimates for three variables are presented. Numerical examples are carried out to validate the theoretical analysis.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124101642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Cloud-Based Cyber-Physical Systems 基于云的网络物理系统的安全性
Juha Puttonen, Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, A. Lobov, J. Lastra
{"title":"Security in Cloud-Based Cyber-Physical Systems","authors":"Juha Puttonen, Samuel Olaiya Afolaranmi, Luis E. Gonzalez Moctezuma, A. Lobov, J. Lastra","doi":"10.1109/3PGCIC.2015.30","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.30","url":null,"abstract":"Cyber-physical systems combine data processing and physical interaction. Therefore, security in cyber-physical systems involves more than traditional information security. This paper surveys recent research on security in cloud-based cyber-physical systems. In addition, this paper especially analyzes the security issues in modern production devices and smart mobility services, which are examples of cyber-physical systems from different application domains.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115752147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Text Mining Terms and Condition to Provide a Confidence Factor for the Use of Cloud Services 文本挖掘条款和条件,为使用云服务提供信心因素
Mak Sharma, Philip Davies, D. Newell, P. Moore, Chander Sidhu
{"title":"Text Mining Terms and Condition to Provide a Confidence Factor for the Use of Cloud Services","authors":"Mak Sharma, Philip Davies, D. Newell, P. Moore, Chander Sidhu","doi":"10.1109/3PGCIC.2015.60","DOIUrl":"https://doi.org/10.1109/3PGCIC.2015.60","url":null,"abstract":"In this paper we look at proposals to enable machine analysis of terms and conditions of cloud service providers. We begin with the investigation of cloud usage and the extent to which consumers are aware of the content of terms and conditions. We propose a terms and conditions analyzer that identifies keywords and sentences. We show how a confidence factor can be constructed to help consumers make an informed decision whether a particular cloud service should be adopted or not.","PeriodicalId":395401,"journal":{"name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115809719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信