This work describes a system that enables non-commercial communities, e.g. students and researchers, to deploy pre-configured clusters of virtual machines on arbritary cloud computing stacks implementing the Open Clou...
详细信息
ISBN:
(纸本)9781450316569
This work describes a system that enables non-commercial communities, e.g. students and researchers, to deploy pre-configured clusters of virtual machines on arbritary cloud computing stacks implementing the Open Cloud computing Interface (OCCI). As a key enabling technology, the virtualization and provisioning available in such infrastructure as a service clouds is leveraged in order to instantiate and setup clusters on a user's demand. A simple, web-based market system is provided as the user interface. It allows the browsing, configuring and launching of different clusters of appliances. Running virtual machines are accessible directly from the market via integrated remote desktop software. Copyright 2013 acm.
computing the semantic relatedness between two words or phrases is an important problem for fields such as information retrieval and natural language processing. One state-of-the-art approach to solve the problem is E...
详细信息
ISBN:
(纸本)9781450316569
computing the semantic relatedness between two words or phrases is an important problem for fields such as information retrieval and natural language processing. One state-of-the-art approach to solve the problem is Explicit Semantic Analysis (ESA). ESA uses the word frequency in Wikipedia articles to estimate the relevance, so the relevance of words with low frequency cannot always be well estimated. To improve the relevance estimate of the low frequency words, we use not only word frequency but also layout information in Wikipedia articles. Empirical evaluation shows that on the low frequency words, our method achieves better estimate of semantic relatedness over ESA. Copyright 2013 acm.
This paper proposes a recommender algorithm denominated "gSVD++" which exploits implicit feedback from users by considering not only the latent space of factors describing the user and item, but also the ava...
详细信息
ISBN:
(纸本)9781450316569
This paper proposes a recommender algorithm denominated "gSVD++" which exploits implicit feedback from users by considering not only the latent space of factors describing the user and item, but also the available metadata associated to the content. Such descriptions are an important source to construct a user profile containing relevant and meaningful information about his/her preferences. The method is evaluated on the MovieLens dataset, being compared against other approaches reported in the literature. The results show the effectiveness of incorporating metadata awareness into a latent factor model. Copyright 2013 acm.
General purpose graphics processors units (GPU) provide the potential for high computational performance with reduced cost and power. Typically they are employed in heterogeneous settings acting as accelerators. Here ...
详细信息
ISBN:
(纸本)9781450326704
General purpose graphics processors units (GPU) provide the potential for high computational performance with reduced cost and power. Typically they are employed in heterogeneous settings acting as accelerators. Here an application resides on a host multi-core, dispatching work to the GPU. However, workload dispatch is frequently accompanied by large scale data transfers between the host main memory and the dedicated memories of the GPUs. For many applications, memory allocation and communication overhead can severely reduce the benefits of GPU *** paper develops an approach that reduces host-device communication overhead for OpenCL applications. It does this without modification or recompilation of the application source code and is portable across platforms. It achieves this by tracing and analyzing calls to the runtime made by the application and then selecting the best platform specific memory allocation and communication policy. This approach was applied to 12 existing OpenCL benchmarks from Parboil and Rodinia suites on 3 different platforms where it gives on average a speedup of 1.51, 1.31 and 1.48, respectively. In certain cases, our approach leads up to a factor of three times improvement over current approaches.
Onto-substitutability has been shown to be intrinsic to how a domain value is considered redundant. A value is onto-substitutable if any solution involving that value remains a solution when that value is replaced by ...
详细信息
ISBN:
(纸本)9781450316569
Onto-substitutability has been shown to be intrinsic to how a domain value is considered redundant. A value is onto-substitutable if any solution involving that value remains a solution when that value is replaced by some other value. We redefine onto-substitutability to accommodate binary relationships and study its implication. Joint interchangeability, an extension of onto-substitutability to its interchangeabil-ity counterpart, emerges as one of the results. We propose a new way of removing interchangeable values by constructing a new value as an intermediate step, as well as introduce virtual interchangeability, a local reasoning that leads to joint interchangeability and allows values to be merged together. Copyright 2013 acm.
Software change impact analysis (CIA) is a key technique to identify the potential effects caused by software changes. In this paper, a new graph mining based CIA technique is proposed, which takes the interference am...
详细信息
ISBN:
(纸本)9781450316569
Software change impact analysis (CIA) is a key technique to identify the potential effects caused by software changes. In this paper, a new graph mining based CIA technique is proposed, which takes the interference among multiple proposed changes into account to improve the precision of the impact results. Empirical evaluations on two real-world software projects demonstrate the effectiveness of our CIA technique. Copyright 2013 acm.
Android OS have several security vulnerabilities. Most of existing proposals require extensive modification of Android kernel or application framework. So, they are not feasible for end users which use stock Android O...
详细信息
ISBN:
(纸本)9781450316569
Android OS have several security vulnerabilities. Most of existing proposals require extensive modification of Android kernel or application framework. So, they are not feasible for end users which use stock Android OS. In this paper, we present a novel application market system which protect users from piracy by malicious third-party applications installed in their devices without any modification of Android system. Our market system grants users the ability to monitor and control applications' malicious behaviors at runtime by inserting instrumentation codes into each application in its repository. Experimental results show that our market system is effective at preventing applications' malicious behaviors. Copyright 2013 acm.
In this paper, we propose a steganography-based software watermarking scheme to protect Android applications from software piracy. Considering the resource limitations in mobile devices, it is difficult to apply previ...
详细信息
ISBN:
(纸本)9781450316569
In this paper, we propose a steganography-based software watermarking scheme to protect Android applications from software piracy. Considering the resource limitations in mobile devices, it is difficult to apply previous software watermarking schemes in mobile applications. To decrease the watermarking overhead in a watermarking scheme, such as a slowdown in the execution of applications after embedding a watermark, we proposed a different approach that applies steganography-based techniques in software watermarking. The proposed scheme embeds watermarks by reordering the sequence of instructions in the basic blocks in Dalvik executable files. Copyright 2013 acm.
The Cloud Security Alliance (CSA) provides a framework for cloud platform providers that manages standardized self assessments regarding security controls. The framework as it stands does not allow consumers to specif...
详细信息
ISBN:
(纸本)9781450316569
The Cloud Security Alliance (CSA) provides a framework for cloud platform providers that manages standardized self assessments regarding security controls. The framework as it stands does not allow consumers to specify and check their own requirements, nor does it contain any means for verifying the capabilities claimed by the providers. From a customer perspective, both these aspects are essential for evaluating the trustworthiness of cloud providers and for making an informed decision. We propose a novel concept for verifying the capabilities captured in the CSA's framework, plus a decision model that checks consumer requirements against the verification results. Our capability verification combines hard trust based on rigid validation with soft trust based on evidence about past behaviour. Elaborate formal methods are applied in both fields and combined into a single concept. Copyright 2013 acm.
The same video contents tend to exist in various formats depending on encodings and resolutions, as there are many different codecs and devices of various screen sizes. Particularly, when videos are consumed by a view...
详细信息
ISBN:
(纸本)9781450316569
The same video contents tend to exist in various formats depending on encodings and resolutions, as there are many different codecs and devices of various screen sizes. Particularly, when videos are consumed by a viewer on multiple screens, such as digital TVs, smartphones and tablets, appropriate formats of videos need to be delivered to client viewers. Video transcoding is inevitable to handle such cases. Since real-time video transcoding requires enormous computing power, cloud computing has emerged as a strong candidate to process many transcoding requests. However, resource provision for cloud computing is an essential part in cloud transcoding systems. With a given video request, we need to estimate how many machines will suffice the requests and how much cache space is appropriate for real-time transcoding. In this paper, we provide an analytic simulation for cloud transcoding systems with cache capability and explore a required number of machines and amount of cache size to handle given video transcoding requests. Copyright 2013 acm.
暂无评论