2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing最新文献

筛选
英文 中文
Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences 时钟控制FCSR序列的分布性质和二进复杂度
Lishan Ke, Zhiqiang Lin
{"title":"Distribution Properties and 2-Adic Complexity of Clock-Controlled FCSR Sequences","authors":"Lishan Ke, Zhiqiang Lin","doi":"10.1109/3PGCIC.2014.134","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.134","url":null,"abstract":"In this paper, the stop-and-go clock-controlled generator based on feedback with carry shift register (FCSR) is considered. The elementary statistical properties of its sequences are investigated. We prove that some d-decimation sequences are of ideal arithmetic correlation under certain conditions. Moreover, the upper and lower bounds of the 2-adic complexity of an output sequence are obtained when the control register sequence and the generating register sequence are both l-sequences.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124670183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Schema Conversion Model of SQL Database to NoSQL SQL数据库到NoSQL的模式转换模型
Gansen Zhao, Qiaoying Lin, Libo Li, Zijing Li
{"title":"Schema Conversion Model of SQL Database to NoSQL","authors":"Gansen Zhao, Qiaoying Lin, Libo Li, Zijing Li","doi":"10.1109/3PGCIC.2014.137","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.137","url":null,"abstract":"With the increasing maturity of NoSQL databases as well as the situation of reading more than writing on large volumes of data, many applications turn to NoSQL and pick it as data storage system. Migrating from SQL database to NoSQL and providing efficient query become growing imperative. However, join operation is not supported in NoSQL database and read separately for multiple times which brings poor performance is unavoidable. This paper proposes a schema conversion model for transforming SQL database to NoSQL which can provide high performance of join query with nesting relevant tables, and a graph transforming algorithm for containing all required content of join query in a table by offering correctly nested sequence. A rigorous proof about the transform algorithm has been conducted and the experiment has verified the correctness of the conversion model and the high performance of join operation.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125982246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
MOMC: Multi-objective and Multi-constrained Scheduling Algorithm of Many Tasks in Hadoop MOMC: Hadoop中多任务多目标多约束调度算法
Cristian Voicu, Florin Pop, C. Dobre, F. Xhafa
{"title":"MOMC: Multi-objective and Multi-constrained Scheduling Algorithm of Many Tasks in Hadoop","authors":"Cristian Voicu, Florin Pop, C. Dobre, F. Xhafa","doi":"10.1109/3PGCIC.2014.40","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.40","url":null,"abstract":"Even though scheduling in a distributed system was debated for many years, the platforms and the job types are changing everyday. This is why we need special algorithms based on new applications requirements, especially when a application is deployed in a Cloud environment. One of the most important framework used for large-scale data processing in Clouds is Hadoop and its extensions. Hadoop framework comes with default algorithms like FIFO, Fair Scheduler or Capacity Scheduler, and Hadoop on Demand. These scheduling algorithms are focused on a different and single constraint. It is hard to satisfy multiple constraints and to have a lot of objectives in the same time. After summarizing the most common schedulers, showing the need of each one in the moment it appeared on the market, this paper presents MOMC, a multi-objective and multi-constrained scheduling algorithm of many tasks in Hadoop. MOMC implementation focuses on two objectives: avoiding resource contention and having an optimal workload of the cluster, and two constraints: deadline and budget. To compare the algorithms based on different metrics, we use Scheduling Load Simulator, which is integrated in Hadoop framework and helps the developers to spend less time on testing. As killer application that generate many tasks we have chosen processing task for the Million Song Dataset, which is a set of data contains metadata for one million commercially-available songs.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127761780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Multi-input Functional Encryption Based Electronic Voting Scheme 基于多输入功能加密的电子投票方案
Yang Chen, You Lin
{"title":"Multi-input Functional Encryption Based Electronic Voting Scheme","authors":"Yang Chen, You Lin","doi":"10.1109/3PGCIC.2014.32","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.32","url":null,"abstract":"As voting plays an important role in democratic society, both the privacy and verifiability of voting are particularly important in computer-supported voting system. In this paper, we propose a secret voting scheme that based on multi-input functional encryption. Compared with other traditional voting systems, our scheme not only can keep anonymity and receipt freeness while voting proceedings, but also can publicly verify the result of the voting for every voter. In addition, we prove that our scheme can keep secrecy and achieve verifiability by using a multi-input functional encryption.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126358460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Cloud Bandwidth Rental and Allocation Strategy 自适应云带宽租用和分配策略
Hongli Chen, Shanguo Lv
{"title":"Adaptive Cloud Bandwidth Rental and Allocation Strategy","authors":"Hongli Chen, Shanguo Lv","doi":"10.1109/3PGCIC.2014.141","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.141","url":null,"abstract":"The cloud acceleration gives user's high-speed download experience. The factors that affect cloud acceleration rate in the process of user file retrieval are the free download of the target file, the download task start time and the user's network connection type. Based on this discovery, combined cycle system can adjust cloud bandwidth in the period of lease. In this paper, the author proposes a suitable cloud collaboration file sharing system that can achieve cloud bandwidth rental and allocation strategy. The experimental results of the actual operational data show that the system based on the auxiliary nodes and two acceleration feature of cloud collaboration synergy can substantially reduce cloud bandwidth overhead.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129026613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems 基于声誉的对等系统中恶意对等检测的通用框架
Xianglin Wei, Jianhua Fan, Ming Chen, Guomin Zhang
{"title":"A General Framework for Detecting Malicious Peers in Reputation-Based Peer-to-Peer Systems","authors":"Xianglin Wei, Jianhua Fan, Ming Chen, Guomin Zhang","doi":"10.1109/3PGCIC.2014.95","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.95","url":null,"abstract":"Constructing an efficient and trustable content delivery community with low cost is the general target for the designers of the Peer-to-Peer (P2P) systems. To achieve this goal, many reputation mechanisms are introduced in recent years to alleviate the blindness during peer selection in distributed P2P environment where malicious peers coexist with honest ones. They indeed provide incentives for peers to contribute more resources to the system, and thus, promote the whole system performance. However, little attention has been paid on how to identify the malicious peers in this situation. In this paper, a general framework is presented for detecting malicious peers in Reputation-based P2P systems. Firstly, the malicious peers are divided into various categories and the problem is formulated. Secondly, the general framework is put forward which mainly contains four steps, i.e. Data collection, data processing, malicious peers detection and malicious peers clustering. Thirdly, an algorithm implementation of this general framework is shown. Finally, the framework's application and its performance evaluation are shown.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128024662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a New EPON Connection Automatic Protection System 新型EPON连接自动保护系统的设计
Li-Xia Lei, Yuejin Zhang
{"title":"Design of a New EPON Connection Automatic Protection System","authors":"Li-Xia Lei, Yuejin Zhang","doi":"10.1109/3PGCIC.2014.121","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.121","url":null,"abstract":"Automatic protection mechanism designed a new type of connection-oriented Ethernet passive optical networks (EPON), including functional architecture, fault management, and build a network of automatic protection mechanism to test the function of the simulation tests, and the protection of its original programs and compared to overcome known problems, the application of this novel method can provide a fast fiber-optic Ethernet automatic Protection Switching to meet the requirements of the transmission network survivability, has some practical value and application prospect.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122447122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Population of Italian Medical Thesauri: A Morphosemantic Approach 意大利医学辞典的自动人口:一种形态语义学方法
F. Amato, A. Elia, Alessandro Maisto, A. Mazzeo, Serena Pelosi
{"title":"Automatic Population of Italian Medical Thesauri: A Morphosemantic Approach","authors":"F. Amato, A. Elia, Alessandro Maisto, A. Mazzeo, Serena Pelosi","doi":"10.1109/3PGCIC.2014.89","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.89","url":null,"abstract":"In the age of Semantic Web, one of the most valuable challenges is the one connected with the information extraction from raw data. Information must be managed with sophisticated linguistic and computational architectures, which are able to approach the semantic dimension of words and sentences. In this paper we propose a morphosemantic method for the automatic creation and population of medical lexical resources. Our approach is grounded on a list of neoclassical formative elements pertaining to the medical domain an on a large sized corpus of medical diagnoses. The outcomes of this work are automatically built electronic dictionaries and thesauri and an annotated corpus for the NLP in the medical domain.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124194486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Framework for Application of Cloud Computing in Wireless Mesh Networks 云计算在无线网状网络中应用的新框架
Ran Li, Qingqing Liu, Mingqiang Wang, Xianglin We
{"title":"A Novel Framework for Application of Cloud Computing in Wireless Mesh Networks","authors":"Ran Li, Qingqing Liu, Mingqiang Wang, Xianglin We","doi":"10.1109/3PGCIC.2014.91","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.91","url":null,"abstract":"Cloud computing is an effective approach for organizing computing resource which can improve service capability of WMNs remarkably. However, some drawbacks of wireless networks exist inherently make the cloud computing in WMNs insecure with various threats. In this paper, a novel hierarchical framework which is more compatible for cloud computing in WMNs is proposed, a completed security architecture and relevant key techniques guarantee service of cloud computing provision.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128725011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Concept Drift Mining of Fundamental Variables in China Stock Market 中国股市基本变量的概念漂移挖掘
Yong Hu, Kang Liu, Bin Feng, Lijun Su, Xiangzhou Zhang, Weiqi Chen, Yuran Zeng
{"title":"Concept Drift Mining of Fundamental Variables in China Stock Market","authors":"Yong Hu, Kang Liu, Bin Feng, Lijun Su, Xiangzhou Zhang, Weiqi Chen, Yuran Zeng","doi":"10.1109/3PGCIC.2014.37","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.37","url":null,"abstract":"We adopt the classical Fama and French (1992) [E.F. Fama, K.R. French, The Cross-Section of Expected Stock Returns, The Journal of Finance, 47 (1992) 427 - 465.] approach to investigate the effect of Beta, size, leverage, book value to market value (B/P), and earnings to price (E/P) ratio on the average monthly returns in the China Stock Market (CSM) from July 1998 to June 2011. The phenomenon of concept drift was found in this research. Our results indicate that the B/P has a significant negative correlation with the monthly average returns during this period, in contrast to the positive correlation found by a previous study by Wang and Di Iorio (2007) [Y. Wang, A. Di Iorio, The cross section of expected stock returns in the Chinese A-share market, Global Finance Journal, 17 (2007) 335 - 349.] that covered from July 1996 to June 2002. Meanwhile the small-firm effect remains significant. Thus, while the behavioral or institutional factors may account for the counter-intuitive finding of the effect of value in the transitional economy, the relationship between fundamental characteristics and stock returns is more complex in China and warrants more rigorous investigation. Further, we suggest that autonomic and cloud computing system has a number of potential applications in stock market concept drift mining.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116977412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信