By Topic

Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on

Date 10-12 Oct. 2012

Filter Results

Displaying Results 1 - 25 of 104
  • [Cover art]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1440 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (164 KB)
    Freely Available from IEEE
  • Welcome to CyberC 2012

    Publication Year: 2012, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (143 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2012, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (126 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Steering Committee Chair

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (96 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee and Technical Program Committee

    Publication Year: 2012, Page(s):xvi - xviii
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s):xix - xxvii
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • MPI-Based Twi-extraction of Traffic State Evaluation Rules

    Publication Year: 2012, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (182 KB) | HTML iconHTML

    Through converting transportation data into some conditional attributes and one decision attribute which constitute the decision table, we use Rough Set theory (RS) to extract rules for traffic state evaluation. This method, named twi-extraction, combines the first extraction by the confidence threshold and the second extraction on the eliminated rules by the matching accuracy. Since the computati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient TCB for a Generic Content Distribution System

    Publication Year: 2012, Page(s):5 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    We consider the security requirements for a broad class of content distribution systems where the content distribution infrastructure is required to strictly abide by access control policies prescribed by owners of content. We propose a security solution that identifies a minimal trusted computing base (TCB) for a content distribution infrastructure, and leverages the TCB to provide all desired as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting Attribute Redundancy in Extracting Open Source Forge Websites

    Publication Year: 2012, Page(s):13 - 20
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (565 KB) | HTML iconHTML

    Open Source Forge (OSF) websites provide information on massive open source software projects, extracting these web data is important for open source research. Traditional extraction methods use string matching among pages to detect page template, which is time-consuming. A recent work published in VLDB exploits redundant entities among websites to detect web page coordinates of these entities. Th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enabling Dynamic Analysis of Anonymized Social Network Data

    Publication Year: 2012, Page(s):21 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    Anonymization is a widely used technique for the private publication of social network data. However, since the existing social network anonymization methods consider only one-time releases, they only reserve the static utility of the anonymized data. As social network evolves, these methods have posed severe challenges to the emerging requirement of dynamic social network analysis, which requires... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Network Analysis in Multiple Social Networks Data for Criminal Group Discovery

    Publication Year: 2012, Page(s):27 - 30
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    A criminal network is a kind of social networks with both secrecy and efficiency. The hidden knowledge in criminal networks can be regarded as an important indicators for criminal investigations which can help finding the criminal's relationship and identifying suspects. However such criminal network analysis has not been studied well in an applied way and remains primarily a manual process. To as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Local Oriented Efficient Detection of Overlapping Communities in Large Networks

    Publication Year: 2012, Page(s):31 - 38
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (217 KB) | HTML iconHTML

    Overlapping community detecting for large-scale social networks becomes a research focus with the development of online social network applications. Among the current overlapping community discovery algorithms, LFM is based on local optimization of a fitness function, which is in consistent with the local nature of community, especially in large networks. But the original LFM may fall in loops whe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BTMD: A Framework of Binary Translation Based Malcode Detector

    Publication Year: 2012, Page(s):39 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (318 KB) | HTML iconHTML

    Binary Translation technology is used to convert binary code of one Instruction Set Architecture (ISA) into another. This technology can solve the software-inheritance problem and ISA-compatibility between different computers architecture. In this paper, we describe BTMD (Binary Translation based Malcode Detector), a novel framework that exploits static and dynamic binary translation features to d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scrapy-Based Crawling and User-Behavior Characteristics Analysis on Taobao

    Publication Year: 2012, Page(s):44 - 52
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (745 KB) | HTML iconHTML

    The widespread use of Internet provides a good environment for e-commerce. Study on e-commerce network characteristics always focuses on the Taobao. So far, researches based on Taobao are related to credit rating system, marketing strategy, analysis of characteristics of the seller and so on. The purpose of all these studies is to analyze online marketing transactions in e-commerce. In this paper,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Evidence Combination Scheme for Decision Assistant

    Publication Year: 2012, Page(s):53 - 57
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (154 KB) | HTML iconHTML

    In D-S evidence theory, the Dempster's rule always leads to counter-intuitive results when combining conflicting evidences. The methods proposed to solve these problems all simply focus on BBA features, and ignore the decision assistant purpose. In order to get consistent results, a new combination scheme is proposed, which imitates the thinking of our brain, and fuses evidences with different con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Metadata Independent Hashing for Media Identification & P2P Transfer Optimisation

    Publication Year: 2012, Page(s):58 - 65
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    Efficient swarming behaviours within peer-to-peer networks are hindered by imprecise or incorrect metadata content. Once published, metadata corrections can only be effected by a complete republish/swarm recreation or for each peer to manually make corrections (causing them to leave the swarm, decreasing performance). This work presents an approach which enables a swarm to collaboratively upgrade ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High Performance and High Reliability Storage Server for Parallel File System

    Publication Year: 2012, Page(s):66 - 72
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (582 KB) | HTML iconHTML

    To meet the increasingly demand of massive storage system, we have designed and implemented a parallel file system called Cappella. It consists of Client, Object Storage Server (OSS) and Metadata Server (MDS). Its I/O performance and data reliability mostly rely on the OSS. In this paper, we present the design and implementation of the OSS. By comparing with existing OSS implementation, our OSS ca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Cloning Simulation of Flood Mitigation Operations in the Upper-Middle Reach of Huaihe River

    Publication Year: 2012, Page(s):73 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (316 KB) | HTML iconHTML

    Simulation based decision tools have been playing a significant role in the flood mitigation operation, especially for a river network with a large number of flood control structures. However, to evaluate the feasibility of alternative scenarios, decision-makers must repeat executing a simulation, which is a tiresome and time-consuming work. Based upon the technique of simulation cloning, a parall... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Offline Downloading: A Non-Traditional Cloud-Accelerated and Peer-Assisted Content Distribution Service

    Publication Year: 2012, Page(s):81 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    A novel Internet content distribution service - Offline downloading service - has emerged recently and attracted a large number of users all over the world. Unlike traditional Internet content distribution systems such as Bittorrent (BT), Offline downloading service uses dedicated cloud unities (Cache cloud) to store files what users wish to download and provide uploading, in order to guarantee fi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • File Exchange in a Private Cloud Supported by a Trust Model

    Publication Year: 2012, Page(s):89 - 96
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB) | HTML iconHTML

    Cloud computing is being progressively adopted in different business scenarios in order to obtain flexible and reliable computing environments, with several supporting solutions available in the market. Computing systems trust representation have been widely discussed and applied in a lot of information technology scenarios, becoming subject of scientific researches. This paper proposes the develo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Holistic View Angles of Cloud Computing Services Provisions

    Publication Year: 2012, Page(s):97 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Cloud computing services (CCS) is a modern blend of provisioning technologies and management of resources formed on limited requirements such as accessibility, hypotheses of elasticity and massive deployment. This paradigm offers on-demand IT resources such as applications, networks, services, data, servers and storage that are readily accessible through the Internet. Need for globalisation and co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.