With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of confidential knowledge when the social ne...
详细信息
ISBN:
(纸本)9781615671090
With the development of emerging social networks, such as Facebook and MySpace, security and privacy threats arising from social network analysis bring a risk of disclosure of confidential knowledge when the social network data is shared or made public. In addition to the current social network anonymity de-identification techniques, we study a situation, such as in a business transaction network, in which weights are attached to network edges that are considered to be confidential (e.g., transactions). We consider perturbing the weights of some edges to preserve data privacy when the network is published, while retaining the shortest path and the approximate cost of the path between some pairs of nodes in the original network. We develop two privacy-preserving strategies for this application. The first strategy is based on a Gaussian randomization multiplication, the second one is a greedy perturbation algorithm based on graph theory. In particular, the second strategy not only yields an approximate length of the shortest path while maintaining the shortest path between selected pairs of nodes, but also maximizes privacy preservation of the original weights. We present experimental results to support our mathematical analysis.
As grid computing becomes a reality, a resource broker is needed to manage and monitor available resources. This work presents a workflow-based computational resource broker whose main function is to match available r...
详细信息
As grid computing becomes a reality, a resource broker is needed to manage and monitor available resources. This work presents a workflow-based computational resource broker whose main function is to match available resources with user requests and consider network information status during matchmaking. The resource broker provides a uniform interface for accessing available and the appropriate resources via user credentials. We utilize the NWS tool to monitor the network-related information and resources status. Also, we constructed a grid platform using Globus Toolkit that integrates the distributed resources of five universities in Taichung, Taiwan, where the resource broker is developed. As a result, the proposed broker provides secure and updated information about available resources and serves as a link to the diverse systems available in the grid
In this paper, an artificial neural network (ANN) model is proposed to predict the flexibility (or robustness against system load fluctuations in heterogeneous computing systems) of dynamic loop scheduling (DLS) metho...
详细信息
Scientific computing has become one of the key players in the advance of modern science and technologies. In the meantime, due to the success of developments in processor fabrication, the computing power of Personal C...
详细信息
Scientific computing has become one of the key players in the advance of modern science and technologies. In the meantime, due to the success of developments in processor fabrication, the computing power of Personal computer (PC) is not to be ignored as well. Lots of high throughput type of applications can be satisfied by using the current desktop PCs, especially for those in computerized classrooms, and leave the supercomputers for the demands from large scale highperformance parallel computations. The goal of this work is to develop an automated mechanism for cluster computing to utilize the computing power such as resides in computerized classroom. The PCs in computerized classroom are usually setup for education and training purpose during the daytime, and shut down at night. After well deployment, these PCs can be transformed into a pre-configured cluster computing resource immediately without touching the existing education/training environment installed on these PCs. Thus, the training activities will not be affected by this additional activity to harvest idle computing cycles. To echo today's energy saving issues, a dynamic power management is also developed to minimize energy cost. This development not only greatly reduces the management efforts and time to build a cluster, but also implies the reduction of the power consumption by such a mechanism.
Loop scheduling on parallel and distributed systems has been a critical problem. Furthermore, it becomes more difficult to deal with on the emerging heterogeneous grid environments. In the past, some loop self-schedul...
详细信息
Loop scheduling on parallel and distributed systems has been a critical problem. Furthermore, it becomes more difficult to deal with on the emerging heterogeneous grid environments. In the past, some loop self-scheduling schemes have been proposed to be applicable to heterogeneous gird environments. In this paper, we propose a performance-based approach, which partitions loop iterations according to the performance weight of nodes. To verify the proposed approach, a grid testbed that consists four schools is built, and matrix multiplication example is implemented to be executed in this testbed. Experimental results show that the proposed approach performs better than previous schemes.
Large scale cluster based on cloud technologies has been widely used in many areas, including the data center and cloud computing environment. The purpose of presenting the research paper in this field was to solve th...
详细信息
Large scale cluster based on cloud technologies has been widely used in many areas, including the data center and cloud computing environment. The purpose of presenting the research paper in this field was to solve the challenge in Medical Image exchanging, storing and sharing issues of EMR (Electronic Medical Record). In recent years, many countries invested significant resources on the projects of EMR topics. The benefit of the EMR included: Patient-centered Care, Collaborative Teams, Evidence-based Care, Redesigned Business Processes, Relevant Data Capture and Analysis and Timely Feedback and Education. For instance, the ARRAHIT project in Untied States (2011-2015), Health Infoway project in Canada (2001-2015) and NHIP project in Taiwan, etc. Aim to the topic of EMR, we presented a system called MIFAS (Medical Image File Accessing System) to solve the exchanging, storing and sharing on Medical Images of crossing the different hospitals issues. Through this system we can enhance efficiency of sharing information between patients and their caregivers. Furthermore, the system can make the best-possible patient-care decisions.
Managing and monitoring a cluster is both a tedious and challenging task, since each computing node is designed as a stand-alone system rather than a part of a parallel architecture. In this paper, a software system t...
详细信息
Managing and monitoring a cluster is both a tedious and challenging task, since each computing node is designed as a stand-alone system rather than a part of a parallel architecture. In this paper, a software system that allows the centralized administration of a generic Beowulf cluster is proposed. This system also provides Web services and applications to monitor multiple PC clusters with job submission and scheduling
Graph clustering, also known as community detection, is a long-standing problem in data mining. However, with the proliferation of rich attribute information available for objects in real-world graphs, how to leverage...
详细信息
Traditional digital image authentication is usually based on signature or fragile watermarks. This performs authentication without any secret hidden data. Until now, many image authentication schemes with error detect...
详细信息
暂无评论