2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)

30 Nov.-3 Dec. 2015

Filter Results

Displaying Results 1 - 25 of 117
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1870 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (115 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (160 KB)
    Freely Available from IEEE
  • Message from the General Co-Chairs

    Publication Year: 2015, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (93 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Program Chairs

    Publication Year: 2015, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (119 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Cloud Computing Association

    Publication Year: 2015, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (99 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Enterprise Security Workshop Chairs

    Publication Year: 2015, Page(s):xvi - xvii
    Request permission for commercial reuse | PDF file iconPDF (141 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Data Teaching Workshop Chairs

    Publication Year: 2015, Page(s):xviii - xix
    Request permission for commercial reuse | PDF file iconPDF (110 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the DSVCC Workshop Chairs

    Publication Year: 2015, Page(s):xx - xxi
    Request permission for commercial reuse | PDF file iconPDF (125 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the QAC 2015 Workshop Chairs

    Publication Year: 2015, Page(s):xxii - xxiii
    Request permission for commercial reuse | PDF file iconPDF (103 KB)
    Freely Available from IEEE
  • Committee Lists

    Publication Year: 2015, Page(s):xxiv - xxv
    Request permission for commercial reuse | PDF file iconPDF (116 KB)
    Freely Available from IEEE
  • Program Committee Members

    Publication Year: 2015, Page(s):xxvi - xxxii
    Request permission for commercial reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2015, Page(s): xxxiii
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2015, Page(s): xxxiv
    Request permission for commercial reuse | PDF file iconPDF (251 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2015, Page(s):xxxv - xli
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tutorials

    Publication Year: 2015, Page(s):xlii - xliv
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (123 KB) | HTML iconHTML

    These tutorials discuss the following: Mobile Cloud Computing and Cloudlets; and Apache Hadoop System. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Panel Abstracts

    Publication Year: 2015, Page(s):xlv - xlvi
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • SmartFetch: Efficient Support for Selective Queries

    Publication Year: 2015, Page(s):1 - 8
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    The paper proposes SmartFetch, a storage strategy that relies on a combination of techniques aimed at efficiently supporting selective jobs that are only concerned with a subset of the entire dataset in systems such as Hadoop and Spark. We combine the use of an appropriate data-layout with data indexing tools to improve the data access speed and significantly shorten total job execution time. An e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Record-Aware Two-Level Compression for Big Textual Data Analysis Acceleration

    Publication Year: 2015, Page(s):9 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    An increasing volume of data puts MapReduce data analytic platforms such as Hadoop under constant resource pressure. A new two-phase text compression scheme has been specially designed to accelerate data analysis and reduce cluster resource usage, and this has been implemented for Hadoop. The scheme consists of two levels of compression. The first level compression allows a Hadoop program to consu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Cloud Resource Allocation for Analysing Many Video Streams

    Publication Year: 2015, Page(s):17 - 24
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (559 KB) | HTML iconHTML

    The visual data generated by network cameras can be valuable for a wide range of scientific studies such as weather, wildlife, and traffic. The resource demands for analysis of the data may fluctuate significantly for some of these studies (for example, seasonal or during only rush hours). Cloud computing's pay-per-use can be a preferred solution for analysing large amounts of data from these netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HPCCloud: A Cloud/Web-Based Simulation Environment

    Publication Year: 2015, Page(s):25 - 33
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2213 KB) | HTML iconHTML

    Advanced modeling and simulation has enabled the design of a variety of innovative products and the analysis of numerous complex phenomenon. However, significant barriers exist to widespread adoption of these tools. In particular, advanced modeling and simulation: (1) is considered complex to use, (2) needs in-house expertise, and (3) requires high capital costs. In this paper, we describe the dev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VISO: Characterizing Malicious Behaviors of Virtual Machines with Unsupervised Clustering

    Publication Year: 2015, Page(s):34 - 41
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    Cloud computing has become one of the most dominant computation platforms in recent years. Security threats could be one of the major stunning blocks on this evolution road. While system vendors and cloud tenants benefit much from sharing resources in the cloud environment, security breaches can cause more significant damages of the cloud ecosystem than personal computers. Virtualization technique... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Friend or Foe? Detecting and Isolating Malicious Nodes in Mobile Edge Computing Platforms

    Publication Year: 2015, Page(s):42 - 49
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (394 KB) | HTML iconHTML

    The evolution of mobile devices into highly capable computing platforms that sense, store, and execute complex tasks is making them attractive candidates for edge computational micro-cloud settings. Such solutions are creating novel security challenges due to the increased push for more seamless computational cyber-foraging that leverages the exploding proliferation of mobile devices. A major conc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.