2012 Third International Conference on Networking and Computing最新文献

筛选
英文 中文
Implementation and Evaluation of an Pairing-Based Anonymous Credential System with Constant-Size Proofs and Efficient Proof Generations 具有恒大小证明和高效证明生成的基于配对的匿名证书系统的实现与评估
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.48
Nasima Begum, T. Nakanishi, N. Funabiki
{"title":"Implementation and Evaluation of an Pairing-Based Anonymous Credential System with Constant-Size Proofs and Efficient Proof Generations","authors":"Nasima Begum, T. Nakanishi, N. Funabiki","doi":"10.1109/ICNC.2012.48","DOIUrl":"https://doi.org/10.1109/ICNC.2012.48","url":null,"abstract":"To enhance user privacy, anonymous credential systems allow the user to convince a verifier of the possession of a certificate issued by the issuing authority anonymously. In the systems, the user can prove logical relations on his/her attributes embedded into the certificate. Previously, we proposed a pairing-based system with constant-size proofs. In the system, the proof generation needs only multiplications depending on the size of the proved relations, and it is more efficient than other existing system that needs the exponentiations whose costs are much larger than multiplications. However, our efficient system has never been implemented, and thus the practicality is not evaluated. In this study, we implemented the system, and measured the processing times and data size, when changing the parameters describing the size of the proved relation. The verification time is very fast and constant, and the proof size is also constant, from which we can confirm the practicality. However, the proof generation time increases, when the parameters increase. Although we confirm the practicality in case of small relations, we clarify the problems in case of larger relations, which should be solved in our future works.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134184660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Automatic Host and Device Memory Allocation Method for OpenMPC 一种用于OpenMPC的主机和设备内存自动分配方法
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.39
Hiroaki Uchiyama, Tomoaki Tsumura, Hiroshi Matsuo
{"title":"An Automatic Host and Device Memory Allocation Method for OpenMPC","authors":"Hiroaki Uchiyama, Tomoaki Tsumura, Hiroshi Matsuo","doi":"10.1109/ICNC.2012.39","DOIUrl":"https://doi.org/10.1109/ICNC.2012.39","url":null,"abstract":"The CUDA programming model provides better abstraction for GPU programming. However, it is still hard to write programs with CUDA because both some specific techniques and knowledge about GPU architecture are required. Hence, many programming frameworks for CUDA have been developed. OpenMPC is one of them based on OpenMP. OpenMPC is an easy-to-write framework for programmers familiar with traditional OpenMP, but still requires programmers to use the special directives for utilizing fast device memories. To solve this problem, this paper proposes a method for allocating appropriate device memories automatically. This paper also proposes a method for automatically allocating page locked memory for the data which are transferred between host and device. The evaluation results with several programs show that proposed methods can reduce 52% execution time in maximum.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127810862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Empirical Analysis of Periodically Bookmarked Web Pages in Social Bookmarking Systems 社会化书签系统中网页定期书签的实证分析
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.21
Keisuke Tsunamoto, S. Kamei, S. Fujita
{"title":"Empirical Analysis of Periodically Bookmarked Web Pages in Social Bookmarking Systems","authors":"Keisuke Tsunamoto, S. Kamei, S. Fujita","doi":"10.1109/ICNC.2012.21","DOIUrl":"https://doi.org/10.1109/ICNC.2012.21","url":null,"abstract":"There are enormous amount of pages on web. We consider that there are many web pages periodically viewed by users. For example, we can imagine that pages about the illustration of New Year's cards are generally viewed near the end of each year. In this paper, we investigate the property of such periodically viewed web pages using social book marking systems. Specifically, we will confirm that how many pages are actually book marked with a specific period and why they are book marked periodically. We focus on the frequency analysis with a discrete Fourier transform as a concrete tool to analyze the temporal periodicity of bookmarks, and we use the Hatena Bookmark dataset as a concrete dataset of social bookmarks. As a result, we detected 1385 periodically book marked pages which accounts for approximately 1% of the pages stored in the dataset.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117241698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient GPU Implementation of Ant Colony Optimization for the Traveling Salesman Problem 旅行商问题蚁群优化的高效GPU实现
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.22
Akihiro Uchida, Yasuaki Ito, K. Nakano
{"title":"An Efficient GPU Implementation of Ant Colony Optimization for the Traveling Salesman Problem","authors":"Akihiro Uchida, Yasuaki Ito, K. Nakano","doi":"10.1109/ICNC.2012.22","DOIUrl":"https://doi.org/10.1109/ICNC.2012.22","url":null,"abstract":"Graphics Processing Units (GPUs) are specialized microprocessors that accelerate graphics operations. Recent GPUs, which have many processing units connected with an off-chip global memory, can be used for general purpose parallel computation. Ant Colony Optimization (ACO) approaches have been introduced as ature-inspired heuristics to find good solutions of the Traveling Salesman Problem (TSP). In ACO approaches, a number of ants traverse the cities of the TSP to find better solutions of the TSP. The ants randomly select next visiting cities based on the probabilities determined by total amounts of their pheromone spread on routes. The main contribution of this paper is to present sophisticated and efficient implementation of one of the ACO approaches on the GPU. In our implementation, we have considered many programming issues of the GPU architecture including coalesced access of global memory, shared memory bank conflicts, etc. In particular, we present a very efficient method for random selection of next cities by a number of ants. Our new method uses iterative random trial which can find next cities in few computational costs with high probability. The experimental results on NVIDIA GeForce GTX 580 show that our implementation for 1002 cities runs in 8.71 seconds, while a conventional CPU implementation runs in 381.95 seconds. Thus, our GPU implementation attains a speed-up factor of 43.47.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"22 18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125392985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
On Reachability in Acyclic Well-Structured Workflow Nets 非循环结构良好工作流网络的可达性研究
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.83
S. Yamaguchi
{"title":"On Reachability in Acyclic Well-Structured Workflow Nets","authors":"S. Yamaguchi","doi":"10.1109/ICNC.2012.83","DOIUrl":"https://doi.org/10.1109/ICNC.2012.83","url":null,"abstract":"Workflow net is a particular class of Petri net for verifying the correctness of workflows. Reach ability problem for workflow nets plays an important role in the verification, but the problem is known to be intractable. Limiting our analysis to a subclass of workflow net, called a cyclic well-structured workflow net, we gave a necessary and sufficient condition on the reach ability problem. Based on this condition, we also constructed a polynomial time procedure for solving the problem.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126651752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Real Estate Recommender: Location Query for Selecting Spatial Objects 房地产推荐:选择空间对象的位置查询
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.51
Jinhao Xu, M. Arefin, Zhiming Chen, Y. Morimoto
{"title":"Real Estate Recommender: Location Query for Selecting Spatial Objects","authors":"Jinhao Xu, M. Arefin, Zhiming Chen, Y. Morimoto","doi":"10.1109/ICNC.2012.51","DOIUrl":"https://doi.org/10.1109/ICNC.2012.51","url":null,"abstract":"With the increase of data volume, advanced query operators are necessary in order to help users to handle the huge amount of available data by selecting a set of promising data objects. In this paper, we present a method for selecting spatial objects, such as houses, based on surrounding facilities such as restaurants, supermarkets, and stations. In the proposed method, a user specifies a list of favourable surrounding facilities within a specified distance in his preferred location. We evaluate each real estate based on how many favourable surrounding facilities are there within the specified distance. We, then, calculate a set of spatial objects that are in favourable locations by utilizing the idea of skyline queries. We performed different experiments to show the effectiveness of proposed approach. Experimental evaluation show that our proposed approach is well applicable for efficient decision making.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126684276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Processing Slots Scheduling for I/O Intensive Jobs of Hadoop MapReduce Hadoop MapReduce I/O密集型任务的动态处理槽调度
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.53
Shiori Kurazumi, Tomoaki Tsumura, S. Saito, H. Matsuo
{"title":"Dynamic Processing Slots Scheduling for I/O Intensive Jobs of Hadoop MapReduce","authors":"Shiori Kurazumi, Tomoaki Tsumura, S. Saito, H. Matsuo","doi":"10.1109/ICNC.2012.53","DOIUrl":"https://doi.org/10.1109/ICNC.2012.53","url":null,"abstract":"Hadoop, consists of Hadoop MapReduce and Hadoop Distributed File System (HDFS), is a platform for large scale data and processing. Distributed processing has become common as the number of data has been increasing rapidly worldwide and the scale of processes has become larger, so that Hadoop has attracted many cloud computing enterprises and technology enthusiasts. Hadoop users are expanding under this situation. Our studies are to develop the faster of executing jobs originated by Hadoop. In this paper, we propose dynamic processing slots scheduling for I/O intensive jobs of Hadoop MapReduce focusing on I/O wait during execution of jobs. Assigning more tasks to added free slots when CPU resources with the high rate of I/O wait have been detected on each active Task Tracker node leads to the improvement of CPU performance. We implemented our method on Hadoop 1.0.3, which results in an improvement of up to about 23% in the execution time.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122939731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Asynchronous SN P Systems for Sorting 异步SN - P排序系统
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.41
Shunsuke Aoki, A. Fujiwara
{"title":"Asynchronous SN P Systems for Sorting","authors":"Shunsuke Aoki, A. Fujiwara","doi":"10.1109/ICNC.2012.41","DOIUrl":"https://doi.org/10.1109/ICNC.2012.41","url":null,"abstract":"We propose two kinds of asynchronous SN P systems for sorting. We first propose an anynchronous SN P system that works as a comparator, which sorts two binary numbers of m bits. The SN P systems work in O(m) sequential steps or O(log m) parallel steps using O(m) neurons. We next propose an asynchronous SN P system that simulates a sorting network, which sorts n binary numbers of m bits using the above comparator. The SN P system works in O(mn log n) sequential steps or O(log m log n) parallel steps using O(mn log n) neurons. Finally, we propose another SN P system that sorts n binary numbers of m bits. The SN P system is based on a round robin tournament, and works in O(mn2) sequential steps or O(log m) parallel steps using O(mn2) neurons.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134497191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Domain Specific Language and Toolchain for OpenCV Runtime Binary Acceleration Using GPU 基于GPU的OpenCV运行时二进制加速的领域特定语言和工具链
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.34
Takaaki Miyajima, David B. Thomas, H. Amano
{"title":"A Domain Specific Language and Toolchain for OpenCV Runtime Binary Acceleration Using GPU","authors":"Takaaki Miyajima, David B. Thomas, H. Amano","doi":"10.1109/ICNC.2012.34","DOIUrl":"https://doi.org/10.1109/ICNC.2012.34","url":null,"abstract":"Computationally intensive applications, such as OpenCV, can be off-loaded to accelerators to reduce execution time. However, developing an accelerated system requires a significant amount of time, requiring the developer to first choose an accelerator and which parts to off-load, then to port and the offloaded kernels to the accelerator using many accelerator-specific tools. In addition to the low-level parallelism of the accelerator, the developer also needs to extract and utilize system-level parallelism found within the application, while making sure that the application still executes correctly. This paper presents Courier, a tool chain and a domain specific language for Runtime Binary Acceleration, designed to simplify many of the steps involved in accelerating an application. The Courier tool chain can extract dataflow from a running software binary file, explore the off-loaded execution time on an accelerator, and then actually accelerate the original binary. By utilizing Courier, both expert and non-expert users can easily extract system-level parallelism and decide which part should be off-loaded to accelerators in a mixed software-hardware environment, without special knowledge on the target application source code and accelerator architecture. In a case study an OpenCV application is accelerated by 2.06 times using Courier, without requiring the application source code or any re-compilation of the application.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"702 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133322697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Constant-Time Approximation Algorithms for the Optimum Branching Problem on Sparse Graphs 稀疏图上最优分支问题的常时间逼近算法
2012 Third International Conference on Networking and Computing Pub Date : 2012-12-05 DOI: 10.1109/ICNC.2012.78
M. Kusumoto, Yuichi Yoshida, Hiro Ito
{"title":"Constant-Time Approximation Algorithms for the Optimum Branching Problem on Sparse Graphs","authors":"M. Kusumoto, Yuichi Yoshida, Hiro Ito","doi":"10.1109/ICNC.2012.78","DOIUrl":"https://doi.org/10.1109/ICNC.2012.78","url":null,"abstract":"We propose constant-time algorithms for approximating the weight of the maximum weight branching in the general graph model. A directed graph is called a branching if it is acyclic and each vertex has at most one incoming edge. An edge-weighted digraph G, in which weights are given in real values in [0, 1], of average degree d is given as an oracle access, and we are allowed to ask degrees and incoming edges for every vertex through the oracle. Then, with high probability, our algorithm estimates the weight of the maximum weight branching in G with an absolute error of at most εn with query complexity O(d/ε3), where n is the number of vertices. We also show a lower bound of Ω(d/ε2). Additionally, our algorithm can be modified to run with query complexity O(1/ε4) for unweighted digraphs, i.e., it runs in time independent of the input size even for digraphs with Ω(n2) edges. In contrast, we show that it requires Ω(n) queries to approximate the weight of the minimum (or maximum) spanning arborescence in a weighted digraph.","PeriodicalId":442973,"journal":{"name":"2012 Third International Conference on Networking and Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124405467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信