By Topic

2013 IEEE 5th International Conference on Cloud Computing Technology and Science

2-5 Dec. 2013

Go

Filter Results

Displaying Results 1 - 25 of 80
  • [Front cover - Volume 2]

    Publication Year: 2013, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (839 KB)
    Freely Available from IEEE
  • [Title Page i - Volume 2]

    Publication Year: 2013, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • [Title page iii - Volume 2]

    Publication Year: 2013, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (148 KB)
    Freely Available from IEEE
  • [Copyright notice - Volume 2]

    Publication Year: 2013, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • Table of Contents - Volume 2

    Publication Year: 2013, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (162 KB)
    Freely Available from IEEE
  • Message from the Cloud Computing Association - Volume 2

    Publication Year: 2013, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (76 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Workshop Co-chairs - Volume 2

    Publication Year: 2013, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (70 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organization and Committees - Volume 2

    Publication Year: 2013, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Workshop Organizing Committee - Volume 2

    Publication Year: 2013, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (129 KB)
    Freely Available from IEEE
  • Program Committee - Volume 2

    Publication Year: 2013, Page(s):xvi - xxii
    Request permission for commercial reuse | PDF file iconPDF (151 KB)
    Freely Available from IEEE
  • Sub-reviewers List - Volume 2

    Publication Year: 2013, Page(s): xxiii
    Request permission for commercial reuse | PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • Sponsors - Volume 2

    Publication Year: 2013, Page(s): xxiv
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • Security as a Service Using an SLA-Based Approach via SPECS

    Publication Year: 2013, Page(s):1 - 6
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (282 KB) | HTML iconHTML

    The cloud offers attractive options to migrate corporate applications, without any implication for the corporate security manager to manage or to secure physical resources. While this ease of migration is appealing, several security issues arise: can the validity of corporate legal compliance regulations still be ensured for remote data storage? How is it possible to assess the Cloud Service Provi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Richer Requirements for Better Clouds

    Publication Year: 2013, Page(s):7 - 12
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Resource usage in Clouds can be improved by deploying applications with richer defined requirements. Such "richer requirements" involve wider application / user specific context capture expressed in interrelated models. The use of model based requirements is presented using input from test-beds monitoring resource use in terms of Trust, Risk, Eco-Efficiency and Cost (TREC) models. The results of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Hierarchical Affinity Propagation with MapReduce

    Publication Year: 2013, Page(s):13 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (339 KB) | HTML iconHTML

    The accelerated evolution and explosion of the Internet and social media is generating voluminous quantities of data (on zettabyte scales). Paramount amongst the desires to manipulate and extract actionable intelligence from vast big data volumes is the need for scalable, performance-conscious analytics algorithms. To directly address this need, we propose a novel MapReduce implementation of the e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introducing PRECIP: An API for Managing Repeatable Experiments in the Cloud

    Publication Year: 2013, Page(s):19 - 26
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1769 KB) | HTML iconHTML

    Cloud computing with its on-demand access to resources has emerged as a tool used by researchers from a wide range of domains to run computer-based experiments. In this paper we introduce a flexible experiment management API, written in Python that simplifies and formalizes the execution of scientific experiments on cloud infrastructures. We describe the features and functionality of PRECIP (Pegas... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Iterative MapReduce for Parallel Virtual Screening

    Publication Year: 2013, Page(s):27 - 32
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (514 KB) | HTML iconHTML

    Virtual Screening is a technique in chemo informatics used for Drug discovery by searching large libraries of molecule structures. Virtual Screening often uses SVM, a supervised machine learning technique used for regression and classification analysis. Virtual screening using SVM not only involves huge datasets, but it is also compute expensive with a complexity that can grow at least up to O(n2)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How to Govern the Cloud? Characterizing the Optimal Enforcement Institution that Supports Accountability in Cloud Computing

    Publication Year: 2013, Page(s):33 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    This paper applies economic governance theory to the cloud computing industry. We analyze which governance institution may be best suited to solve the problems stemming from asymmetric information about the true level of data protection, security, and accountability offered by cloud service providers. We conclude that certification agencies - private, independent organizations which award certific... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Defining "The Weakest Link" Comparative Security in Complex Systems of Systems

    Publication Year: 2013, Page(s):39 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (350 KB) | HTML iconHTML

    Cloud architectures are complex socio-technical systems of systems, consisting not only of technological components and their connections, but also of physical premises and employees. When analysing security of such systems and considering countermeasures, the notion of "weakest link" often appears. Humans are then typically said to be the "weakest link" when it comes to security, but no proof is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The IEEE Intercloud Testbed -- Creating the Global Cloud of Clouds

    Publication Year: 2013, Page(s):45 - 50
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (530 KB) | HTML iconHTML

    This paper presents the current work of the IEEE Intercloud Testbed project. The notion of an Intercloud has been an active research topic. Within the IEEE several researchers formed a Standards Working Group (IEEE P2302) where a specific set of conventions, formats, and protocols were proposed. It was decided by those in the Standards Working Group that due to the scale, variability of component ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OpenStack Federation in Experimentation Multi-cloud Testbeds

    Publication Year: 2013, Page(s):51 - 56
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (673 KB) | HTML iconHTML

    There is an increasing number of cloud platforms emerging in both academia and industry. They often federate resources from multiple infrastructures in order to benefit from the unique features that each presents. After introducing the main capabilities and features of OpenStack, this article addresses the integration of OpenStack-based platforms into larger, heterogeneous multi-cloud infrastructu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling a Plagiarism Search Service on the BonFIRE Testbed

    Publication Year: 2013, Page(s):57 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (277 KB) | HTML iconHTML

    The KOPI Online Plagiarism Search Portal - a nationwide plagiarism service in Hungary - is a unique, open service for web users that enables them to check for identical or similar contents between their own documents and the files uploaded by other authors. As our recent result, we can also detect cross-language plagiarism, but with a highly increased computational demand. The paper describes our ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an Operating System for Intercloud

    Publication Year: 2013, Page(s):63 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (899 KB) | HTML iconHTML

    Cyber physical systems, such as intelligent dikes and smart energy systems, require scalable and flexible computing infrastructures to process data from instruments and sensor networks. Infrastructure as a Service clouds provide a flexible way to allocate remote distributed resources, but lack mechanisms to dynamically configure software (dependencies) and manage application execution. This paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network Virtualization Platform for Hybrid Cloud

    Publication Year: 2013, Page(s):69 - 74
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (271 KB) | HTML iconHTML

    Cloud computing has enabled elastic and transparent access to infrastructure services without involving IT operating overhead. Virtualization has been a key enabler for cloud computing. While resource virtualization and service abstraction have been widely investigated, networking in cloud remains a difficult puzzle. Even though network has significant role in facilitating hybrid cloud scenarios, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • OpenNaaS Based Management Solution for Inter-data Centers Connectivity

    Publication Year: 2013, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1605 KB) | HTML iconHTML

    Recently, cloud-alike end-to-end services development has evolved towards new service paradigms in which network service provisioning management among Data Centers represent a key enabler. In this paper, we address the issue of network service provisioning management among Data Centers. We propose a software based management solution leveraging virtualization technologies, applied on top of networ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.