Cloud computing is a new emerging way by which hardware and software resources can be shared on demand to computers and other devices via the Internet. Cloud computing platform has now become a new platform for enterp...
详细信息
Cloud computing is a new emerging way by which hardware and software resources can be shared on demand to computers and other devices via the Internet. Cloud computing platform has now become a new platform for enterprises and personal computing. The data placement issues in cloud computing platform have been extensively studied and researched in the past years. In this paper, based on the workload information derived from system logs, we design an overall system architecture for the method of placing data replica and dynamic selection of data replica from a higher level. We model the previous query workload as a hypergraph which contains a set of data items, then formulate and analyze the problem of replica placement by the graph theory concepts. We use these concepts to develop a series of algorithms to decide which data items to replicate, and where to place the replicas. Based on this system architecture, we designed the workload-driven replica selection and placement algorithm. According to this algorithm, we can minimize the average query range of the involved transactions. Our experiments show that the fine-grained data placement and replication method can dramatically reduce the average query range resulting in significant reductions in the resource consumption in cloud computing platform.
Signed network is the network with both positive and negative links. Many real-world complex systems can be represented as signed networks, which are unbalanced according to structural balance theory. Unbalanced degre...
详细信息
Signed network is the network with both positive and negative links. Many real-world complex systems can be represented as signed networks, which are unbalanced according to structural balance theory. Unbalanced degree of signed networks is the distance to exact balance. Evaluating unbalanced degree of signed networks is a NP-hard problem, which has attracted many attentions. Many approaches are developed to compute structural balance. However, the results obtained by these approaches are unsatisfactory. In this study, the computation of unbalanced degree is convert to an optimization problem whose object function is come from the Hamiltonian of Edwards-Anderson spin glass model. We use a new Cultural Algorithm named CA-SNB to solve the optimization problem. The Cultural Algorithm, a new computable framework of Evolution Algorithm, has been successfully applied to many areas. In CA-SNB, the evolution of population space and belief space is based on Genetic Algorithm and greedy strategy respectively. Experiments on social and biological networks show the excellent effectiveness and efficiency of the proposed method.
In this paper, we propose a semi-supervised learning method to simultaneous segmentation and labeling of parts in 3D garments. The key idea in this work is to analyze 3D garments using semi-supervised learning method ...
详细信息
Clothing in vision plays an important role in many applications of digital clothing, virtual fitting, fashion design and manufacturing. The research of clothing in vision is full of technical challenges, such as backg...
详细信息
In smart grid, privacy implications to individuals and their family is an important issue, due to the fine-grained usage data collection. Wireless communications are considered by many utility companies to obtain info...
详细信息
In order to enhance the convergence ability of multi-objective group search optimizer (MGSO) and solution distribution of non-dominated Pareto set, a novel multiobjective group search optimizer based on multiple produ...
详细信息
Device-to-device (D2D) communications allow direct transmissions between two proximate user equipments (UEs) under the control of base stations (BSs), which can improve local services and spectrum efficiency in cellul...
详细信息
ISBN:
(纸本)9781509001552
Device-to-device (D2D) communications allow direct transmissions between two proximate user equipments (UEs) under the control of base stations (BSs), which can improve local services and spectrum efficiency in cellular networks. In this paper, we propose an efficient resource allocation scheme and a low complexity relay selection strategy for D2D communications enabled cellular networks, where a D2D UE can act as a source as well as a potential relay for other UEs. Consider the selection cooperation (SC) rule which restricts relaying for a D2D transmitter to only one relay (i.e., another D2D transmitter) is imposed. First, we formulate the resource allocation problem for the cooperative D2D transmitters as a bargaining game. By solving the Nash bargaining solution (NBS) of the game, proportional fair (PF) rate allocation for the D2D communications can be achieved. Next, to implement the SC rule, a simple heuristic is proposed which is used to maintain the long-term priority fairness of relay selection for each D2D link. The proposed algorithm has a low computational complexity of 0(N~2), where N is the number of cooperative D2D transmitters in a game. Simulation results demonstrate the system efficiency and fairness properties of the proposed scheme.
According to the students' independent selection of course and the management of courses and grades of administrators, it were designed two aspects. First of all, the analysis of the basic running principles of PH...
详细信息
According to the students' independent selection of course and the management of courses and grades of administrators, it were designed two aspects. First of all, the analysis of the basic running principles of PHP program and use all events application programming of PHP and MyS QL specific methods to create the database and tables, to link the MyS QL database statement right into practice, implementation planning project development overall design and components, play the spirit of cooperation between modules. The function of students' online information, course selection, course information query of teachers, the final score function, the curriculum and the data management function of administrators were achieved. The problem of the three rights in access and the management of system has solved.
Context-aware computing has proven to be successful in collecting and understanding various sensor data. However, providing an intelligent service by exploiting the collected context data from heterogeneous sensors is...
详细信息
The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider (CSP) that provides various services to users of the database. It is inevitably to bring in new...
详细信息
ISBN:
(纸本)9781467383165
The notion of database outsourcing enables the data owner to delegate the database management to a cloud service provider (CSP) that provides various services to users of the database. It is inevitably to bring in new security challenges such as data privacy and query integrity. Although the issue of data privacy can be solved by database encryption techniques, query integrity is still an important challenge in database outsourcing scenario. Recently, some researchers present a verifiable auditing scheme, which can simultaneously achieve the correctness and completeness of search results even if the CSP intentionally returns an empty set. However, it requires the data owner to count the number of each identical item before outsourcing the database, which seems that this work cannot be effectively adoptable in dynamic database scenario. In this paper, we present a new verifiable search scheme for outsourced database supporting data update operation without any pre-computation.
暂无评论