the proceedings contain 26 papers. the special focus in this conference is on Cloud computing and Internet of things. the topics include: Towards modelling-based self-adaptive resource allocation in multi-tiers cloud ...
ISBN:
(纸本)9783319232362
the proceedings contain 26 papers. the special focus in this conference is on Cloud computing and Internet of things. the topics include: Towards modelling-based self-adaptive resource allocation in multi-tiers cloud systems;fuzzy logic based energy aware VM consolidation;autonomic and cognitive architectures for the internet of things;sensor web enablement applied to an earthquake early warning system;towards motion characterization and assessment within a wireless body area network;data driven transmission power control for wireless sensor networks;mining regularities in body sensor network data;task execution in distributed smart systems;inferring appliance load profiles from measurements;intra smart grid management frameworks for control and energy saving in buildings;urban crowd steering;towards a self-adaptive middleware for building reliable publish/subscribe systems;review of replication techniques for distributed systems;connectivity recovery in epidemic membership protocols;epidemic fault tolerance for extreme-scale parallel computing;a GPU-based statistical framework for moving object segmentation;containment of fast scanning computer network worms;fragmented-iterated bloom filters for routing in distributed event-based sensor networks;fast adaptive real-time classification for data streams with concept drift;omentum - a peer-to-peer approach for internet-scale virtual microscopy;using social networks data for behavior and sentiment analysis and sentimental preference extraction from online reviews for recommendation.
In this work, a cloud infrastructure is analysed and deployed to virtualize computing laboratories. Virtualization of computing resources allows the user to face a single computing interface whose capabilities are rea...
详细信息
ISBN:
(纸本)9783319238142;9783319238135
In this work, a cloud infrastructure is analysed and deployed to virtualize computing laboratories. Virtualization of computing resources allows the user to face a single computing interface whose capabilities are really offered by a cloud system that makes use of its processing capability on demand. the use of this proposed infrastructure reduces the cost of equipment investments as well as maintenance of real laboratories and further, it makes a more efficient use of available resources with a transparent user experience.
In this paper the problem of the expansion of the simple face recognition system using the distributed system architecture is considered. the basic principle of the simple real-life face recognition system assumes the...
详细信息
ISBN:
(纸本)9783319238142;9783319238135
In this paper the problem of the expansion of the simple face recognition system using the distributed system architecture is considered. the basic principle of the simple real-life face recognition system assumes the operating in specific localization using a single camera. People's faces are detected first and then recognized. Taking as a basis a primary face recognition system for the task of visitor identification the extension to additional localizations is analyzed. In order to maintain the simplicity of the components the final distributed Visitor Identification System integrates the results from the individual subsystems and provides the data exchange. As a result face-based people re-identification is obtained. the resultant solution, by linking the information between separate localizations, enables new applications like for example the reported people flow analysis.
Translation of Data analysis algorithms from data analysis language to high-level programming language is hard work when we construct a cloud computing platform for data analysis. It adds implementation difficulty and...
详细信息
ISBN:
(纸本)9781509051540
Translation of Data analysis algorithms from data analysis language to high-level programming language is hard work when we construct a cloud computing platform for data analysis. It adds implementation difficulty and maintenance cost of constructing the platform. this paper suggests a new method to use the popular data analysis language R directly on constructing a cloud computing platform. By using resource virtualization techniques, computing resource environment is virtualized into R cluster based on given configurations. By allocating different R machines from R cluster to specified data analysis service, we solve the problem that data analysis algorithms implemented in R should be run in single-user mode only and cannot be customized. After verification, this method simplifies the work of translating data analysis algorithms and speeds up the process of constructing a cloud computing platform for data analysis.
Social media usage has increased marginally in the last decade and it is still continuing to grow. Companies, data scientists, and researchers are trying to infer meaningful information from this vast amount of data. ...
详细信息
ISBN:
(纸本)9781509028467
Social media usage has increased marginally in the last decade and it is still continuing to grow. Companies, data scientists, and researchers are trying to infer meaningful information from this vast amount of data. One of the most important target applications is to find influential people in these networks. this information can serve many purposes such as;user or content recommendation, viral marketing, and user modeling. Social media is divided into subcategories like where one can share photos (i.e. Instagram, Flickr), video or music (i.e. Youtube, Last. fm), restaurant suggestions like Foursquare, or text like Twitter. Twitter is more of an idea and news sharing media than other types of social media and it has a huge amount of public profiles. these features of Twitter make it a more interesting and valuable media to research on. In this paper, we are addressing to identify topical authorities/influential users in Twitter. We provide a novel representation of users' topical interests called focus rate. We incorporate nodal features into network features and introduce a modified version of Pagerank algorithm which efficiently analyzes topical influence of users. Experimental results show that focus rate of users on specific topics increase their influence scores and lead to higher information diffusion. We use also distributedcomputing environment which enables to work with large data sets. We demonstrate our results on Turkish Twitter messages. For the best of our knowledge, this is the first influence analysis on Twitter that is conducted for Turkish language.
We continue the evaluation of our model to describe regularly occurring phenomena in online social networks. the influence of link removals triggered by dislikes on the network structure is analyzed. Additionally, two...
详细信息
Video delivery networks (VDNs) using cloud storage have recently started to emerge. Different to the conventional VDNs, Cloud Video Delivery Networks (CVDNs) take advantage of the cloud computing technology which help...
详细信息
ISBN:
(纸本)9781509039067
Video delivery networks (VDNs) using cloud storage have recently started to emerge. Different to the conventional VDNs, Cloud Video Delivery Networks (CVDNs) take advantage of the cloud computing technology which helps to reduce the storage and bandwidth cost. However, the existing CVDNs model cannot guarantee the Quality of Service (QoS) adequately because of the dynamic demands of end users such as the delay and the priority. In this paper, we put forward a path-splitting-supported and priority-oriented CVDNs method to increase the acceptance ratio of requests and provide the QoS of end users. In the proposed method, we divide the end users into ordinary users and paying users while the paying users having higher priorities. then, we formulate the priority-oriented cloud video delivery problem as a mixed integer programming (MIP) problem while considering the routing constraints. the experimental results show that the acceptance rate of path-splitting-supported method is 20% higher than the method of path-unsplitting. In addition, our method can also make CVDNs providers get higher earnings.
distributed grid systems offer possible benefits in terms of fast computation of tasks. this is accompanied by potential drawbacks due to their openness, the heterogeneity of participants, and the unpredictability of ...
详细信息
Cloud computing has been popular as the new IT infrastructure, because it is able to provide convenient and low-cost network computing and storage service. However, duo to separation of ownership and control rights, c...
详细信息
ISBN:
(纸本)9781509051540
Cloud computing has been popular as the new IT infrastructure, because it is able to provide convenient and low-cost network computing and storage service. However, duo to separation of ownership and control rights, cloud users' data bring about many security issues, including data leakage and data tampering. Now, the security and integrity of cloud data usually depend on a trusted third party auditors. Although the introduction of a third-party mechanism can reduce the cost of computing and communication costs in the client, the mechanism increases the threat of data leakage to a third party and we will be unable to avoid the conspiracy threat of cloud service providers and third-party mechanism. In this paper, we propose the model of distributed virtual machine agent, and the model provides a unique and credible monitoring of virtual machines for each user in the cloud, so that even the sole administrator of the cloud server monitoring mechanism cannot bypass it and obtain protected sensitive data, preventing data from being tampered. In addition, based on virtual machine agent auditing data, we utilize a data integrity protocol to make sure the users' data availability and integrity. Security analysis proves that the protocol can defend three kinds of attack from cloud service provider in our security model.
the proceedings contain 68 papers. the topics discussed include: amplified distributed denial of service attack in software defined networking;a case of service interaction in M2M device management;applying and compar...
ISBN:
(纸本)9781509029143
the proceedings contain 68 papers. the topics discussed include: amplified distributed denial of service attack in software defined networking;a case of service interaction in M2M device management;applying and comparing two measurement approaches for the estimation of indoor Wi-Fi coverage;60 GHz mmW channel measurements inside a bus;a brief survey of security approaches for cyber-physical systems;ANASTASIA: Android malware detection using static analysis of applications;an approach to detecting text autorship in the Spanish language;an IoT middleware for enhanced security and privacy: the rerum approach;a novel dynamic hidden semi-Markov model (D-HSMM) for occupancy pattern detection from sensor data stream;adaptive security framework for resource-constrained internet-of-things platforms;achieving intelligent traffic-aware consolidation of virtual machines in a data center using learning automata;a new service advertisement message for ETSI ITS environments: CAM-infrastructure;a component-based cross-layer framework for software defined wireless networks;a framework for security enhancement in SDN-based datacenters;cooperative watchdog for malicious failure notification in wireless ad-hoc networks;coordination strategy for dense 5g femtocell deployments;and cross layer design to evaluate scalable video traffic in multihop cognitive radio environment.
暂无评论