Innovative approaches for securing the computing systems have intense inference for our understanding of technological, societal, economical, and political phenomena in making guiding principles, policies, rules and s...
详细信息
The problem of efficient querying large amount of linked data using Map-Reduce is investigated in this paper. The proposed approach is based on the following assumptions: a) Data graphs are arbitrarily partitioned in ...
详细信息
The problem of efficient querying large amount of linked data using Map-Reduce is investigated in this paper. The proposed approach is based on the following assumptions: a) Data graphs are arbitrarily partitioned in the distributed file system is such a way that replication of data triples between the data segments is allowed. b) Data triples are replicated is such a way that answers to a special form of queries, called subject-object star queries, can be obtained from a single data segment. c) Each query posed by the user, can be transformed into a set of subject-object star sub queries. We propose a one and a half phase, scalable, Map-Reduce algorithm that efficiently computes the answers of the initial query by computing and appropriately combining the sub query answers. We prove that, under certain conditions, query can be answered in a single map-reduce phase.
Computational Grids are high performance computing systems used to solve large scale computational demands. Because scheduling workflow applications in a distributed environment is a NP-Complete problem, meta-heuristi...
详细信息
Computational Grids are high performance computing systems used to solve large scale computational demands. Because scheduling workflow applications in a distributed environment is a NP-Complete problem, meta-heuristics are introduced to solve this issue. In this paper, we propose an Energy-Aware algorithm based on Discrete Particle Swarm Optimization (DPSO) called EA-DPSO. Our aim is to minimize the make span (i.e., Overall completion time) of all the tasks within the workflow while optimizing energy consumption. The experimental results show that energy consumption is optimized, while the scheduling in terms of completion time is maintained.
The mobile user behaviors data were usually collected by using embedded SDK in the Apps. However once too many device connected to the data collection system, the server has to deal with the high load. In this work, w...
详细信息
ISBN:
(纸本)9781467396431
The mobile user behaviors data were usually collected by using embedded SDK in the Apps. However once too many device connected to the data collection system, the server has to deal with the high load. In this work, we design a new data collection strategy based on the FNV hash strategy in order to reduce the server load. Experimental results show that the strategy can effectively alleviate the pressure on the server.
We had proposed a distributed storage system which relocates data blocks autonomously among the storage nodes. Generally, owing to requirement of exchanging the management information frequently, such autonomous block...
详细信息
We had proposed a distributed storage system which relocates data blocks autonomously among the storage nodes. Generally, owing to requirement of exchanging the management information frequently, such autonomous block migration tends to increase network traffic. Our previous work has presented a scheme to reduce network traffic by appending the management information onto an iSCSI short packet. In this paper, we present a scheme to propagate the management information by utilizing internode communications more aggressively. Our scheme utilizes iSCSI read/write packets which are exchanged more frequently to transmit the management information, and appends also the management information which is collected from the other nodes. This indirect propagation helps to reduce broadcast packets on the network. We have investigated the traffic behavior in the iSCSI environment, and show that our scheme can effectively reduce extra Ethernet frames for exchanging the management information.
Fraud control is important for the online marketplace. This study addresses the problem of detecting attempts to deceive orders in internet transactions. Our goal is to generate an algorithm model to detect and preven...
详细信息
ISBN:
(纸本)9783319160504;9783319160498
Fraud control is important for the online marketplace. This study addresses the problem of detecting attempts to deceive orders in internet transactions. Our goal is to generate an algorithm model to detect and prevent the fraudulent orders. First, after analyzing the real historical data of customers' orders from Dangdang Website (http://***. E-commerce China Dangdang Inc (Dangdang) is a leading e-commerce company in China. Dangdang officially listed on the New York Stock Exchange on December 8th, 2010, and is the first Chinese B2C e-commerce company which is completely based on online business to list on New York Stock.), we described characteristics related to transactions that may indicate frauds orders. We presented fraudulent orders characteristic matrix through comparing the normal and abnormal orders. Secondly, we apply Logic Regression model to identify frauds based on the characteristic matrix. We used real data from Dang company to train and evaluate our methods. Finally we evaluated the validity of solutions though analyzing feedback data.
An Integrated internet MANET (IIM) is a heterogeneous network which is an interconnection of the wired internet and the wireless MANET. Two of the issues which arise in Integrated internet-MANET are gateway load balan...
详细信息
Web application developers have been bothered about cross-browser compatibility problems caused by different kinds of Web browsers. Existing techniques and tools commonly compare and analyze screenshots of Web sites r...
详细信息
ISBN:
(纸本)9781467396431
Web application developers have been bothered about cross-browser compatibility problems caused by different kinds of Web browsers. Existing techniques and tools commonly compare and analyze screenshots of Web sites rendering in different browsers. In this paper, we propose a technique for statically analyzing cross-browser compatibility problems. Our approach can easily detect whether Web applications contain HTML5 incompatible features and generate a report containing the HTML5 incompatible features in the Web site for developers.
Connecting data and services is nowadays an essential skill for life sciences researchers. Handling data from unrelated sources using problem-specific software or labor-intensive tools are common tasks. Despite the la...
详细信息
ISBN:
(纸本)9783319164809;9783319164793
Connecting data and services is nowadays an essential skill for life sciences researchers. Handling data from unrelated sources using problem-specific software or labor-intensive tools are common tasks. Despite the latest advances, integration and interoperability developments still involve primitive interactions and manual triggers. On the one hand, available tools cover specific niches, ignoring more generic problems. On the other hand, overly complex tools with excessive features dominate the market. In this proposal we introduce a cloud-based architecture to simplify real-time integration and interoperability for biomedical data. We support our strategy in an event-driven service-oriented architecture, where new data are pushed from any content source, through an intelligent proxy, for delivery to heterogeneous endpoints. This enables a passive integration approach, providing developers with a streamlined solution for deploying integrative biomedical applications.
Normative accounts on health information privacy often highlight the importance of regulating data sharing. Yet, little attention has been paid to how health professionals perform and negotiate privacy practices in hi...
详细信息
ISBN:
(纸本)9781450329224
Normative accounts on health information privacy often highlight the importance of regulating data sharing. Yet, little attention has been paid to how health professionals perform and negotiate privacy practices in highly multidisciplinary, technologically-mediated medical work. This paper examines information privacy practices in two HIV outpatient clinics based in two NHS hospitals in London (UK). Methods include 46 semi-structured interviews, primarily with health professionals and technology developers, ethnographic observation and document analysis. Drawing on an empirically informed understanding of privacy as 'articulation work', we focus on the indeterminate nature of information privacy practices and examine the work required to translate privacy, from a normative professional duty to an enacted medical practice. This analysis also highlights the invisibility of privacy practices and their coordinating role in delivering technologically-supported medical care. The paper ends with a discussion of implications for practice and technology design.
暂无评论