Proceedings. IEEE International Conference on Cloud Computing最新文献

筛选
英文 中文
A Parallel Algorithm for Bayesian Text Classification Based on Noise Elimination and Dimension Reduction in Spark Computing Environment Spark计算环境下基于消噪降维的贝叶斯文本分类并行算法
Proceedings. IEEE International Conference on Cloud Computing Pub Date : 2019-06-25 DOI: 10.1007/978-3-030-23502-4_16
Zhuo Tang, Wei Xiao, Bin Lu, Youfei Zuo, Yuan Zhou, Keqin Li
{"title":"A Parallel Algorithm for Bayesian Text Classification Based on Noise Elimination and Dimension Reduction in Spark Computing Environment","authors":"Zhuo Tang, Wei Xiao, Bin Lu, Youfei Zuo, Yuan Zhou, Keqin Li","doi":"10.1007/978-3-030-23502-4_16","DOIUrl":"https://doi.org/10.1007/978-3-030-23502-4_16","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81361210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Multiple Workflow Scheduling with Offloading Tasks to Edge Cloud 多工作流调度与卸载任务到边缘云
Proceedings. IEEE International Conference on Cloud Computing Pub Date : 2019-01-01 DOI: 10.1007/978-3-030-23502-4_4
H. Kanemitsu, M. Hanada, H. Nakazato
{"title":"Multiple Workflow Scheduling with Offloading Tasks to Edge Cloud","authors":"H. Kanemitsu, M. Hanada, H. Nakazato","doi":"10.1007/978-3-030-23502-4_4","DOIUrl":"https://doi.org/10.1007/978-3-030-23502-4_4","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72758810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using Intel SGX to Enforce Auditing of Running Software in Insecure Environments 使用Intel SGX对在不安全环境中运行的软件进行审计
Proceedings. IEEE International Conference on Cloud Computing Pub Date : 2018-12-01 DOI: 10.1109/CloudCom2018.2018.00054
Leonardo Winter Pereira, Luis Felipe Mazzuchetti Ortiz, Douglas Costa Rossi, M. Rosa, K. Fonseca, Charles B. Prado, L. D. C. Carmo, Andrey Elísio Monteiro-Brito, R. Riella
{"title":"Using Intel SGX to Enforce Auditing of Running Software in Insecure Environments","authors":"Leonardo Winter Pereira, Luis Felipe Mazzuchetti Ortiz, Douglas Costa Rossi, M. Rosa, K. Fonseca, Charles B. Prado, L. D. C. Carmo, Andrey Elísio Monteiro-Brito, R. Riella","doi":"10.1109/CloudCom2018.2018.00054","DOIUrl":"https://doi.org/10.1109/CloudCom2018.2018.00054","url":null,"abstract":"In this work we propose a strategy using Intel SGX processors to guarantee the use of audited applications in insecure environments. A cloud-based toolchain allows auditors to assess if the user's application meets specifications and standards, to generate the final binaries, and to cryptographically sign them. It also generates a manifesto containing information to verify the authenticity of the audited software binaries. A SGX-based binary loader (inserted by the cloud-based toolchain during the applications building process) writes down auditing data that is encrypted and sealed by SGX functions to form reliable proofs that the original audited software is the one running. As a proof-of-concept, a Linux kernel was modified in order to cryptographically measure all processes being executed and send these results to a SGX application. An analysis was carried out to measure the performance of the altered system. On average, a system consistently running the audit increased the execution time of each process by 20 to 30%.","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83764602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Ontological Analysis of Vulnerabilities in the Energy Sector 能源部门脆弱性的本体论分析
Proceedings. IEEE International Conference on Cloud Computing Pub Date : 2018-08-01 DOI: 10.2991/IWCI-18.2018.35
Tatiana Vorozhtsova, S. Skripkin
{"title":"Ontological Analysis of Vulnerabilities in the Energy Sector","authors":"Tatiana Vorozhtsova, S. Skripkin","doi":"10.2991/IWCI-18.2018.35","DOIUrl":"https://doi.org/10.2991/IWCI-18.2018.35","url":null,"abstract":"The paper presents an ontological analysis of the terminology associated with the concept of vulnerability in the energy sector. The ontology of vulnerabilities is proposed. This ontology reflects the interrelationships between this concept and other cyber security concepts. Classification of vulnerabilities is presented. Possible means of protection for ensuring information security and cyber security in the energy sector are considered.","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91396361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Federated Galaxy: Biomedical Computing at the Frontier. 联合星系:生物医学计算的前沿。
Proceedings. IEEE International Conference on Cloud Computing Pub Date : 2018-07-01 Epub Date: 2018-09-10 DOI: 10.1109/cloud.2018.00124
Enis Afgan, Vahid Jalili, Nuwan Goonasekera, James Taylor, Jeremy Goecks
{"title":"Federated Galaxy: Biomedical Computing at the Frontier.","authors":"Enis Afgan, Vahid Jalili, Nuwan Goonasekera, James Taylor, Jeremy Goecks","doi":"10.1109/cloud.2018.00124","DOIUrl":"10.1109/cloud.2018.00124","url":null,"abstract":"<p><p>Biomedical data exploration requires integrative analyses of large datasets using a diverse ecosystem of tools. For more than a decade, the Galaxy project (https://galaxyproject.org) has provided researchers with a web-based, user-friendly, scalable data analysis framework complemented by a rich ecosystem of tools (https://usegalaxy.org/toolshed) used to perform genomic, proteomic, metabolomic, and imaging experiments. Galaxy can be deployed on the cloud (https://launch.usegalaxy.org), institutional computing clusters, and personal computers, or readily used on a number of public servers (e.g., https://usegalaxy.org). In this paper, we present our plan and progress towards creating Galaxy-as-a-Service-a federation of distributed data and computing resources into a panoptic analysis platform. Users can leverage a pool of public and institutional resources, in addition to plugging-in their private resources, helping answer the challenge of resource divergence across various Galaxy instances and enabling seamless analysis of biomedical data.</p>","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8356149/pdf/nihms-1689939.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"39305842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault Injection and Detection for Artificial Intelligence Applications in Container-Based Clouds 基于容器云的人工智能应用中的故障注入与检测
Proceedings. IEEE International Conference on Cloud Computing Pub Date : 2018-06-25 DOI: 10.1007/978-3-319-94295-7_8
Kejiang Ye, Yangyang Liu, Guoyao Xu, Chengzhong Xu
{"title":"Fault Injection and Detection for Artificial Intelligence Applications in Container-Based Clouds","authors":"Kejiang Ye, Yangyang Liu, Guoyao Xu, Chengzhong Xu","doi":"10.1007/978-3-319-94295-7_8","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_8","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88180333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Network Anomaly Detection and Identification Based on Deep Learning Methods 基于深度学习方法的网络异常检测与识别
Proceedings. IEEE International Conference on Cloud Computing Pub Date : 2018-06-25 DOI: 10.1007/978-3-319-94295-7_15
Mingyi Zhu, Kejiang Ye, Chengzhong Xu
{"title":"Network Anomaly Detection and Identification Based on Deep Learning Methods","authors":"Mingyi Zhu, Kejiang Ye, Chengzhong Xu","doi":"10.1007/978-3-319-94295-7_15","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_15","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81695119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
A Two-Stage Data Processing Algorithm to Generate Random Sample Partitions for Big Data Analysis 大数据分析中随机样本分区的两阶段数据处理算法
Proceedings. IEEE International Conference on Cloud Computing Pub Date : 2018-06-25 DOI: 10.1007/978-3-319-94295-7_24
Chenghao Wei, Salman Salloum, Tamer Z. Emara, Xiaoliang Zhang, J. Huang, Yulin He
{"title":"A Two-Stage Data Processing Algorithm to Generate Random Sample Partitions for Big Data Analysis","authors":"Chenghao Wei, Salman Salloum, Tamer Z. Emara, Xiaoliang Zhang, J. Huang, Yulin He","doi":"10.1007/978-3-319-94295-7_24","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_24","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75866082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Feedback Prediction Model for Resource Usage and Offloading Time in Edge Computing 边缘计算中资源使用和卸载时间的反馈预测模型
Proceedings. IEEE International Conference on Cloud Computing Pub Date : 2018-06-25 DOI: 10.1007/978-3-319-94295-7_16
Menghan Zheng, Yubin Zhao, Xi Zhang, Cheng-Zhong Xu, Xiaofan Li
{"title":"A Feedback Prediction Model for Resource Usage and Offloading Time in Edge Computing","authors":"Menghan Zheng, Yubin Zhao, Xi Zhang, Cheng-Zhong Xu, Xiaofan Li","doi":"10.1007/978-3-319-94295-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_16","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83815741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cloud Service Brokerage and Service Arbitrage for Container-Based Cloud Services 基于容器的云服务的云服务代理和服务套利
Proceedings. IEEE International Conference on Cloud Computing Pub Date : 2018-06-25 DOI: 10.1007/978-3-319-94295-7_7
R. Schulze
{"title":"Cloud Service Brokerage and Service Arbitrage for Container-Based Cloud Services","authors":"R. Schulze","doi":"10.1007/978-3-319-94295-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-94295-7_7","url":null,"abstract":"","PeriodicalId":93366,"journal":{"name":"Proceedings. IEEE International Conference on Cloud Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89503339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信