2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS)

12-14 Dec. 2016

Filter Results

Displaying Results 1 - 25 of 225
  • [Front cover]

    Publication Year: 2016, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (8245 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2016, Page(s): i
    Request permission for commercial reuse | |PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2016, Page(s): iii
    Request permission for commercial reuse | |PDF file iconPDF (146 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2016, Page(s): iv
    Request permission for commercial reuse | |PDF file iconPDF (128 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2016, Page(s):v - xvii
    Request permission for commercial reuse | |PDF file iconPDF (184 KB)
    Freely Available from IEEE
  • Message from HPCC2016 Chairs

    Publication Year: 2016, Page(s): xviii
    Request permission for commercial reuse | |PDF file iconPDF (120 KB)
    Freely Available from IEEE
  • HPCC2016 Organizing and Program Committees

    Publication Year: 2016, Page(s):xix - xxi
    Request permission for commercial reuse | |PDF file iconPDF (122 KB)
    Freely Available from IEEE
  • Message from SmartCity2016 Chairs

    Publication Year: 2016, Page(s): xxii
    Request permission for commercial reuse | |PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • SmartCity2016 Organizing and Program Committees

    Publication Year: 2016, Page(s):xxiii - xxv
    Request permission for commercial reuse | |PDF file iconPDF (127 KB)
    Freely Available from IEEE
  • Message from DSS2016 Chairs

    Publication Year: 2016, Page(s): xxvi
    Request permission for commercial reuse | |PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • DSS2016 Organizing and Program Committees

    Publication Year: 2016, Page(s):xxvii - xxix
    Request permission for commercial reuse | |PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • Fast Community Detection in Large Weighted Networks Using GraphX in the Cloud

    Publication Year: 2016, Page(s):1 - 8
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (494 KB) | HTML iconHTML

    Identification of different communities in large weighted networks is of crucial importance since it helps to uncover priori unknown functional modules such as topics in information networks or cyber-communities in social networks. However, the typical size of networks, such as social network services or World Wide Web, now counts in millions of nodes and is computationally complex. This urgently ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Speeding-Up Parallel Jacobi Iterations for SVDs

    Publication Year: 2016, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (603 KB) | HTML iconHTML

    We live in an era of big data and the analysis of these data is becoming a bottleneck in many domains including biology and the internet. To make these analyses feasible in practice, we need efficient data reduction algorithms. The Singular Value Decomposition (SVD) is a data reduction technique that has been used in many different applications. For example, SVDs have been extensively used in text... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Big Data: The V's of the Game Changer Paradigm

    Publication Year: 2016, Page(s):17 - 24
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (254 KB) | HTML iconHTML

    The Big Data is the most prominent paradigm now-a-days. The Big Data starts rule slowly from 2003, and expected to rule and dominate the IT industries at least up to 2030. Furthermore, the Big Data conquer the technological war and easily capture the entire market since 2009. The Big Data is blasting everywhere around the World in every domain. The Big Data, a massive amount of data, able to gener... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bare-Metal Container: Direct Execution of a Container Image on a Remote Machine with an Optimized Kernel

    Publication Year: 2016, Page(s):25 - 34
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (480 KB) | HTML iconHTML

    Container technology has become popular in HPC applications because it offers easy customization and quick execution. However, container technology does not allow kernel-level optimization. It does not allow changing a kernel as well as loading/unloading a kernel module, thus it prevents the extraction of full performance on a target machine. In addition, container technology is designed for multi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hybrid Samples Generation Approach in Speculative Multithreading

    Publication Year: 2016, Page(s):35 - 41
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (460 KB) | HTML iconHTML

    Speculative Multithreading (SpMT) is a thread level automatic parallelization technique to accelerate sequential programs. Machine learning has been successfully introduced into SpMT to improve its performance. An appropriate sample set is important for machine learning-based (ML-based) thread partition. Conventionally, heuristic rules-based (HR-based) sample generation approach can not generate a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Experimental Study of Redundant Array of Independent SSDs and Filesystems

    Publication Year: 2016, Page(s):42 - 49
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (1371 KB) | HTML iconHTML

    Solid state disks (SSDs) become more and more popular in personal devices and data centers. Flash chips can be packaged in Hard disk drive (HDD) form factors and provide the same interface as HDDs. This character makes SSDs easily replace HDDs in existing storage systems. PCIe-based SSD can provide a higher I/O performance, but it is still a little expensive. This paper studies the feasibility of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Social Recommendation GIS for Urban Tourist Spots

    Publication Year: 2016, Page(s):50 - 57
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (633 KB) | HTML iconHTML

    Since the amount of information submitted and made public about tourist spots in urban areas is very large compared to that for regional tourist spots, it is difficult for people who do not have much knowledge of or acquaintance with the places concerned to efficiently obtain information necessary for taking tourist trips. This study aims to develop a social recommendation media GIS (Geographic In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WeChat Text and Picture Messages Service Flow Traffic Classification Using Machine Learning Technique

    Publication Year: 2016, Page(s):58 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (180 KB) | HTML iconHTML

    Network Traffic Classification carries great importance for both internet service providers (ISPs) and quality of services (QoSs) management. During the last two decades, a lot of machine learning models have been proposed and applied on different types of real time applications to classify their real time traffic and obtain very proficient accuracy results. However, no research has been done on W... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Tunnelled Proxies through Passively Monitoring Network Traffic

    Publication Year: 2016, Page(s):63 - 69
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (730 KB) | HTML iconHTML

    "Proxies" are Internet applications that enable Internet users to connect to (or tunnel through) remote resources using another machine for two distinct purposes. First, they allow users to access remotely all resources in a network (i.e. Virtual Private Network or VPN). Second, they bring some level of anonymity by bouncing traffic around proxies. The latter model may enable Internet users to byp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Node Stability-Based Multipath Routing Protocol in Heterogeneous Ad Hoc Networks

    Publication Year: 2016, Page(s):70 - 77
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (475 KB) | HTML iconHTML

    Traditional mobile ad hoc networks are assumed to be homogeneous networks that nodes have single radio interface. Nodes moving fast and randomly, so they usually suffer from frequent link failures and less communication opportunities. In order to improve the network performance, heterogeneous ad hoc networks with multiple radio interfaces are involved. There are many routing protocols for traditio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Dynamic Pricing Method for Carpooling Service Based on Coalitional Game Analysis

    Publication Year: 2016, Page(s):78 - 85
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (738 KB) | HTML iconHTML

    In recent years, carpooling service provided by corporations like Uber (UberPool), Didi (DidiPool) and Lyft (Lift Link) have become more and more popular. It helps alleviating the urban traffic congestion, by decreasing the empty seats rate. To balance the supply and demand of the taxi service, a dynamic pricing method is needed. More specifically, passengers taking a same vehicle may be charged d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SpongeNet+: A Two-Layer Bandwidth Allocation Framework for Cloud Datacenter

    Publication Year: 2016, Page(s):86 - 93
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (488 KB) | HTML iconHTML

    One of the prominent problems in cloud datacenters is the unpredictability of tenants' applications. Although this problem has been recognized, prior solutions do not consider the bandwidth allocation from both the perspective of tenants' network resource requests and the applications' actual network requirements. To address this issue, we present SpongeNet+, a comprehensive solution that consists... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Empirical Study of VM Provisioning Strategies on IaaS Cloud

    Publication Year: 2016, Page(s):94 - 101
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (212 KB) | HTML iconHTML

    Cloud computing technology is rapidly emerging as quite an efficient execution platform for even highly trusted scientific applications. Efficient resource management plays a pivotal role in the execution along with attaining high performance standards in Distributed environments. Resource provisioning and scheduling has become an important area of research in cloud resource management. Clouds can... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing the Communication Costs of Graph Analysis by Read-Only Replicas and Prioritized Execution

    Publication Year: 2016, Page(s):102 - 109
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (278 KB) | HTML iconHTML

    Graph mining is widely used in fields like social network analysis. The synchronous vertex-centric frameworks strike better balance between the performance and ease-of-use, so they are widely used in realistic. However, traditional architectures of this type, like the vertex-based push architecture and GAS, are encumbered by high communication costs. In this paper we proposed a new replica-based p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.