2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)最新文献

筛选
英文 中文
Human Acceptance of Autonomous Social Media Agent 人类对自主社交媒体代理的接受
B. Fatima, S. W. Jaffry, Mian Muhammad Mubasher, M. Sherwani, A. Haseeb
{"title":"Human Acceptance of Autonomous Social Media Agent","authors":"B. Fatima, S. W. Jaffry, Mian Muhammad Mubasher, M. Sherwani, A. Haseeb","doi":"10.1109/W-FiCloud.2016.50","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.50","url":null,"abstract":"On the advent of Web 2.0 online social media has emerged as a paramount vehicle for information sharing, business and entertainment. In order to harness this technology in a seamless and effective manner we need intelligent artifacts which can glue various stockholders and fulfill their information need pervasively. Hence, it is the time to design autonomous agents that would be able to take part in active social communication on social media like human beings. To this main question is whether people will accept and trust such systems in their environment or not. So, in this research an autonomous agent is designed that interacts with human beings and perform permissible social actions on the Facebook. Two types of experiments are conducted to compute the agent's expected level of acceptance by human and actual human acceptance of the agent. As the samples are collected from two different populations hence Student's T Test is performed to determine if two sets of data are significantly different from each other. 'Mean Difference' between both populations is 0.034 which shows that if an agent is capable of performing human-like social interaction it increases the human acceptance of the social agent.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123855234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficiency in Mobile Cloud Computing Architectures 移动云计算架构中的能源效率
Le Vinh Thinh, Radha Krishna Reddy Pallavali, Fatiha Houacine, S. Bouzefrane
{"title":"Energy Efficiency in Mobile Cloud Computing Architectures","authors":"Le Vinh Thinh, Radha Krishna Reddy Pallavali, Fatiha Houacine, S. Bouzefrane","doi":"10.1109/W-FiCloud.2016.72","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.72","url":null,"abstract":"Mobile Cloud Computing (MCC) is an emerging and popular mobile technology which uses fully available Cloud Computing services and functionalities. This technology provides rich computational services to the users, network operators and Cloud service providers as well. However due to users mobility and high computational operations, consumption of energy is a major issue. Energy efficiency over MCC is needed since 57% of generated energy is used by ICT related devices and other negative impacts over environment. This paper investigates different mobile Cloud computing architectures and their performance over energy efficiency by examining different approaches: OSGi, overlay, and container based solutions.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123294354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Power Optimization of Large Scale Mobile Cloud System Using Cooperative Cloudlets 基于协同Cloudlets的大规模移动云系统功耗优化
Muneera Al-Quraan, M. Al-Ayyoub, Y. Jararweh, L. Tawalbeh, E. Benkhelifa
{"title":"Power Optimization of Large Scale Mobile Cloud System Using Cooperative Cloudlets","authors":"Muneera Al-Quraan, M. Al-Ayyoub, Y. Jararweh, L. Tawalbeh, E. Benkhelifa","doi":"10.1109/W-FiCloud.2016.23","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.23","url":null,"abstract":"Reducing the total power consumption and network delay are among the most interesting issues facing large scale Mobile Cloud Computing (MCC) systems and their ability to satisfy the Service Level Agreement (SLA). Such systems utilize cloudlet based infrastructure to support off-loading some of user's computationally heavy tasks to the cloudlets. However, the limited capabilities of the cloudlet system (in terms of the ability of serve different request type and the ability to serve users in large geographical regions) represent serious challenges to achieve those objectives. To cover the users demand for different types of services and in wide geographical regions, cloudlets cooperate among each others by passing user requests from one cloudlets to another. By adapting this cooperation, the total power consumption per request will be increased so that it includes the power consumption between the user and the local cloudlet and the power consumption of passing the request to a remote cloudlet. In this paper, we consider two types of cloudlets: local cloudlets and global cloudlets. The global cloudlets are a special kind of local cloudlets but with higher capabilities. The user can connect only to the local cloudlet and sends all its traffics to it. If the local cloudlet cannot serve the desired request, then the request is moved to other local cloudlet. If no local cloudlet can serve the request, then it is moved to a global cloudlet in which it can serve all service types. We optimize the power consumption for large scale cooperative cloudlets and evaluate the proposed model under two realistic scenarios. The result prove that the proposed model can be used to optimize power consumption in large scale MCC systems.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132448244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A New Scalable and Energy Efficient Algorithm for VMs Reassignment in Cloud Data Centers 云数据中心虚拟机重新分配的一种可扩展节能新算法
Makhlouf Hadji, N. Djenane, R. Aoudjit, S. Bouzefrane
{"title":"A New Scalable and Energy Efficient Algorithm for VMs Reassignment in Cloud Data Centers","authors":"Makhlouf Hadji, N. Djenane, R. Aoudjit, S. Bouzefrane","doi":"10.1109/W-FiCloud.2016.69","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.69","url":null,"abstract":"To improve resource utilization in Cloud Data Centers and in order to reduce energy consumption at the same time, reassignment of services is required and leads to efficient operational costs. This paper presents a new and scalable algorithm based on b-matching theory to judiciously replace resources (considered as Virtual Machines in our work) according to energy consumption constraints. Our algorithm is benchmarked by an exact approach based on an Integer Linear Program (ILP) formulation of the Bin-Packing problem. The b-Matching algorithm allows to find near-optimal solutions and scale for large problem instances.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Secure Mobile Process Tracking Using Wearable Computing in mGovernment Applications 在移动政府应用中使用可穿戴计算实现安全的移动过程跟踪
M. Ghazal, Yasmina Alkhalil, Fasila Haneefa, Assem Mhanna, Dana Awachi, Samr Ali
{"title":"Towards Secure Mobile Process Tracking Using Wearable Computing in mGovernment Applications","authors":"M. Ghazal, Yasmina Alkhalil, Fasila Haneefa, Assem Mhanna, Dana Awachi, Samr Ali","doi":"10.1109/W-FiCloud.2016.65","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.65","url":null,"abstract":"In this paper, we propose an automatic platform for mobile process monitoring by utilising wearable computing. The proposed system is implemented and tested for the process of the renewal of expired documents, that caters to both the clients and issuing governmental entities. The client-side system consists of a mobile application synced with a smart watch, which serves to receive notifications and status update on the renewal of the requested document. On the other hand, issuing authorities are served using specialised web portals, which offer a capability to manage the incoming requests in a structured way, to download the documents pertaining to a specific user, and to upload the processed document that is requested. Both sides of the proposed system are served using a database, which offers real-time updates and notifications. All documents are secured by using the latest encryption methods and digital signatures. The major benefit of the proposed system is the ability to monitor and go through the renewal process by simply using a user-friendly interface on the smart watch. We present the system workflow and design in the results, and discuss an application scenario that was proposed for the process of visa renewal in United Arab Emirates.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Legal and Regulative Aspects of IoT Cloud Systems 物联网云系统的法律和监管方面
Eszter E. Kalmar, A. Kertész, Szilvia Varadi, Radhika Garg, B. Stiller
{"title":"Legal and Regulative Aspects of IoT Cloud Systems","authors":"Eszter E. Kalmar, A. Kertész, Szilvia Varadi, Radhika Garg, B. Stiller","doi":"10.1109/W-FICLOUD.2016.20","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2016.20","url":null,"abstract":"Organizations envisioning adopting cloud computing have to consider numerous factors, including technical, organizational, economical and relational ones. Legal and regulative constraints increase the complexity and can vary with different deployment models and service levels. Nowadays a growing number of powerful devices are joining the Internet. Data users produce with these devices are continuously posted to online services, which require the use of cloud providers to efficiently handle these data. In our former work we have derived a general federation architecture for clouds from definitions of international organizations, and used it to define common cloud computing usage patterns. The aim of this paper is to revise purely cloud usage patterns and identify scenarios with cases involving Internet of Things (IoT) utilization based on corresponding European projects. These cases are also examined against legal and regulative constraints, in order to help users to better understand IoT ecosystems and companies to design better applications for IoT cloud environments.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131359082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Generational Garbage Collection Algorithm Based on Lifespan Prediction 基于寿命预测的分代垃圾回收算法
Xin Ren, Ying Zhangxu
{"title":"Generational Garbage Collection Algorithm Based on Lifespan Prediction","authors":"Xin Ren, Ying Zhangxu","doi":"10.1109/W-FICLOUD.2016.47","DOIUrl":"https://doi.org/10.1109/W-FICLOUD.2016.47","url":null,"abstract":"This paper proposes a new method of generational garbage collection (GC) algorithm for the issue of low efficiency of garbage collection in embedded virtual machine. Through predicting the lifespan of the allocating objects, the objects predicted of long lifespan can be distributed into the old generation directly, and the copy numbers from the young generation to old generation were decreased, thus the executed time of GC is cute down. In the aspect of generational collection, the young generation implements a non-suspended mode, which the objects allocation and GC are done simultaneously, the old generation uses a integrating strategy, combined lazy-buddy algorithm with mark-sweep algorithm, to achieve the quick allocation and recycle. It not only avoids the copy operation on objects, but also controls the amounts of memory fragments. The experimental on v8 JavaScript engine results shows that this algorithm can reduce the GC time by about 23.9%, operation time by around 17.2%, and the overall operation performance of the system is enhanced evidently.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"343 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116531777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multilayer Virtualized Systems Analysis with Kernel Tracing 基于内核跟踪的多层虚拟系统分析
Cédric Biancheri, Naser Ezzati-Jivan, M. Dagenais
{"title":"Multilayer Virtualized Systems Analysis with Kernel Tracing","authors":"Cédric Biancheri, Naser Ezzati-Jivan, M. Dagenais","doi":"10.1109/W-FiCloud.2016.18","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.18","url":null,"abstract":"This paper studies interactions between virtual machines and their host through the sharing of resources like physical CPUs. We present an analysis based on kernel tracing that erases the bounds between virtual machines and their host to reduce the multilayer system into a single layer. For this analysis we developed a view that displays a time line for each host's CPU, showing across time which process is running, even if it is from a virtual machine. By using a system of filters, we added the possibility to highlight in this view either traced machines, virtual CPUs or specific processes. This last feature grants the possibility to precisely see on the host where and when a virtual machine's thread is running.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
State-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security 《物联网与云信息安全领域专业能力的国家层面看法》
N. Miloslavskaya, A. Tolstoy
{"title":"State-Level Views on Professional Competencies in the Field of IoT and Cloud Information Security","authors":"N. Miloslavskaya, A. Tolstoy","doi":"10.1109/W-FiCloud.2016.31","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.31","url":null,"abstract":"Two important areas of our lives -- Internet of Things (IoT) and Clouds -- are based on the general information and communication technologies (ICT) concepts. If so, the modern state-level requirements for the competencies of information security (IS) professionals are completely applicable to IS professionals needed for the IoT and Clouds. That is why the peculiarities of American, Australian and European approaches to the development of IS professional competencies are discussed on four best-in-the-breed examples: \"The Competency and Functional Framework for IT Security Workforce Development\" by the U. S. DHS/NCSD, the NICE by NIST, \"The Cyber Security Capability Framework & Mapping of Information Security Manual Roles\" by AGIMO and \"The European e-Competence Framework\" by the European Commission. Pros and cons of all approaches are marked. A short prediction on the new international standard ISO/IEC 27021 content with IS professional competencies is proposed. The discussion of all these documents' applicability to the IoT and Cloud IS professional competencies concludes the paper.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130078373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Taxonomy for Unsecure Big Data Processing in Security Operations Centers 安全运营中心不安全大数据处理分类
N. Miloslavskaya, A. Tolstoy, S. Zapechnikov
{"title":"Taxonomy for Unsecure Big Data Processing in Security Operations Centers","authors":"N. Miloslavskaya, A. Tolstoy, S. Zapechnikov","doi":"10.1109/W-FiCloud.2016.42","DOIUrl":"https://doi.org/10.1109/W-FiCloud.2016.42","url":null,"abstract":"While the media constantly describes new attacks, the organizations seriously concerned about their business protection need to be prepared for such sophisticated attacks against their IT infrastructures. Hence a properly designed and formalized information security (IS) management system with Security Operations Center (SOC) as its centric part is required as never before. Among the most important documents for SOC there are two policies: IS policy and IS incident management policy. In order to create a truly effective policy it is vital to adequately describe SOC's operational environment from the IS viewpoint. The paper presents the most demand for these purposes classifications (taxonomy) of IS threats, vulnerabilities, attacks and IS incidents as the negative elements that should be avoided.","PeriodicalId":441441,"journal":{"name":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW)","volume":"2007 23","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信