Scheduled System Maintenance
On Wednesday, December 20, IEEE Xplore will undergo scheduled maintenance from 1:00-5:00 PM ET.
During this time, there may be intermittent impact on performance. We apologize for any inconvenience.

2017 IEEE International Conference on Cloud Engineering (IC2E)

4-7 April 2017

Filter Results

Displaying Results 1 - 25 of 58
  • [Front cover]

    Publication Year: 2017, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (11462 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2017, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (132 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):v - viii
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • Message from the IC2E 2017 General Chairs

    Publication Year: 2017, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (65 KB)
    Freely Available from IEEE
  • Message from the IC2E 2017 Program Chairs

    Publication Year: 2017, Page(s):x - xi
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • IC2E 2017 Organizing Committee

    Publication Year: 2017, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • IC2E 2017 Program Committee

    Publication Year: 2017, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (107 KB)
    Freely Available from IEEE
  • Message from the CLaw 2017 Chairs

    Publication Year: 2017, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • CLaw 2017 Program Committee

    Publication Year: 2017, Page(s): xvii
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Message from the WoC 2017 Chairs

    Publication Year: 2017, Page(s): xviii
    Request permission for commercial reuse | PDF file iconPDF (73 KB)
    Freely Available from IEEE
  • WoC 2017 Program Committee

    Publication Year: 2017, Page(s): xix
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Message from the IC2E 2017 Doctoral Symposium Chair

    Publication Year: 2017, Page(s): xx
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • Keynote Abstracts

    Publication Year: 2017, Page(s):xxi - xxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (178 KB)

    These keynote speeches discuss the following: Advances in Optimistic Concurrency Control; Amazon Aurora: A Look under the Hoods; and Keeping up with the Architects: Software Evolution for Dense Datacenters. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorial Abstracts

    Publication Year: 2017, Page(s):xxiv - xxx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (107 KB)

    The following tutorials are presented: (1) Cloud Computing for Science and Engineering: Scaling Science in the Cloud; (2) Parallelizing Trajectory Stream Analysis on Cloud Platforms; and (3) Building Secure Cloud Architectures and Ecosystems usung Patterns. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Sponsors

    Publication Year: 2017, Page(s): xxxi
    Request permission for commercial reuse | PDF file iconPDF (108 KB)
    Freely Available from IEEE
  • Introducing SECURESTREAMS: Scalable Middleware for Reactive and Secure Data Stream Processing

    Publication Year: 2017, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (199 KB) | HTML iconHTML

    We introduce SECURESTREAMS, a middleware framework for secure stream processing. Its design builds on Intel's Secure Guard Extensions (SGX) to guarantee the privacy and the integrity of the data being processed. Our initial experimental results of SECURESTREAMS are promising: the framework is easy to use, and delivers high throughput, enabling developers to implement complex processing pipelines i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Paving the Way for Energy Efficient Cloud Data Centers: A Type-Aware Virtual Machine Placement Strategy

    Publication Year: 2017, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB) | HTML iconHTML

    The rapid revolution of cloud computing model is accompanied by huge amounts of energy consumed by the cloud data centers. So, enhancing the energy efficiency of those data centers has become a major challenge. This paper tackles the problem of enhancing the energy consumption of cloud data centers by proposing a novel virtual machine placement strategy. The proposed strategy suits both static and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Engineering Self-Adaptive Applications on Cloud with Software Defined Networks

    Publication Year: 2017, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB) | HTML iconHTML

    Self-adaptive applications are engineered to adapt to operation conditions to continuously meet application requirements at run-time. Before the emergence of Software Defined Networking (SDN) and new network virtualization technologies, the common run-time adaptation actions were limited to changes in computing and storage resources (i.e., scaling in/out). However, SDN creates new avenues for adap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithmic Enhancements to Big Data Computing Frameworks for Medical Image Processing

    Publication Year: 2017, Page(s):13 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB) | HTML iconHTML

    Large-scale medical imaging studies to date have predominantly leveraged in-house, laboratory-based or traditional grid computing resources for their computing needs, where the applications often use hierarchical data structures (e.g., NFS file stores) or databases (e.g., COINS, XNAT) for storage and retrieval. The resulting performance for laboratory-base approaches reveal that performance is imp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • iCSI: A Cloud Garbage VM Collector for Addressing Inactive VMs with Machine Learning

    Publication Year: 2017, Page(s):17 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (418 KB) | HTML iconHTML

    According to a recent study, 30% of VMs in private cloud data centers are "comatose", in part because there is generally no strong incentive for their human owners to delete them at an appropriate time. These inactive VMs are still scheduled and executed on physical cloud resources, taking valuable access away from productive VMs. In an extreme, cloud infrastructure may deny legitimate requests fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dark Shadows: User-Level Guest/Host Linux Process Shadowing

    Publication Year: 2017, Page(s):29 - 39
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    The concept of a shadow process simplifies the design and implementation of virtualization services such as system call forwarding and device file-level device virtualization. A shadow process on the host mirrors a process in the guest at the level of the virtual and physical address space, terminating in the host physical addresses. Previous shadow process mechanisms have required changes to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BalCon: A Distributed Elastic SDN Control via Efficient Switch Migration

    Publication Year: 2017, Page(s):40 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (961 KB) | HTML iconHTML

    Scalability and reliability are among the main concerns in large-scale Software Defined Networking (SDN) application scenarios. A common approach is to use multiple distributed controllers, each managing one static partition of the network. In this paper, we show that dynamic mapping can improve efficiency in managing traffic load variations. We then propose BalCon (Balanced Controller): an algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Agile Composition of Compliant Data Analytics Platforms

    Publication Year: 2017, Page(s):51 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4433 KB) | HTML iconHTML

    Sensitive data such as health records and financial transactions are increasingly being stored and processed in the cloud. Correspondingly, laws and regulations have been established to protect such data. For a cloud-based analytics service provider, it is of paramount importance to protect the sensitive information contained in customer data, while running analytics on it. While there exist a ple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.