2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT)

18-20 Dec. 2017

Filter Results

Displaying Results 1 - 25 of 87
  • [Title page i]

    Publication Year: 2017, Page(s): 1
    Request permission for reuse | PDF file iconPDF (29 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2017, Page(s): 3
    Request permission for reuse | PDF file iconPDF (84 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2017, Page(s): 4
    Request permission for reuse | PDF file iconPDF (126 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2017, Page(s):5 - 12
    Request permission for reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • Message from the General Chair

    Publication Year: 2017, Page(s):13 - 14
    Request permission for reuse | PDF file iconPDF (236 KB)
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2017, Page(s): 15
    Request permission for reuse | PDF file iconPDF (86 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2017, Page(s):16 - 17
    Request permission for reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2017, Page(s):18 - 19
    Request permission for reuse | PDF file iconPDF (88 KB)
    Freely Available from IEEE
  • Sponsors

    Publication Year: 2017, Page(s): 20
    Request permission for reuse | PDF file iconPDF (286 KB)
    Freely Available from IEEE
  • Keynote Speakers

    Publication Year: 2017, Page(s):21 - 29
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (199 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Privacy-Preserving Cloud-Based Data Management System with Efficient Revocation Scheme

    Publication Year: 2017, Page(s):1 - 8
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (478 KB) | HTML iconHTML

    There are lots of data management systems, according to various reasons, designating their high computational work-loads to public cloud service providers. It is well-known that once we entrust our tasks to a cloud server, we may face several threats, such as privacy-infringement with regard to users attribute information; therefore, an appropriate privacy preserving mechanism is a must for constr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Colluded Adversarial VNet Embeddings Attack in Cloud

    Publication Year: 2017, Page(s):9 - 16
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    Nowadays, network virtualization has been widely investigated in order to prevent Internet ossification, and develop future emerging network applications flexibly. However, prior work by Pignolet et al. shows the possible attacking methodology with which the attackers can disclose the whole cloud topology while deploying virtual networks in cloud named “Topology Disclosure Attack”. In this attack ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis on the Security and Use of Password Managers

    Publication Year: 2017, Page(s):17 - 24
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (773 KB) | HTML iconHTML

    Cybersecurity has become one of the largest growing fields in computer science and the technology industry. Faulty security has cost the global economy immense losses. Oftentimes, the pitfall in such financial loss is due to the security of passwords. Companies and regular people alike do not do enough to enforce strict password guidelines like the NIST (National Institute of Standard Technology) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Lower Bound of Privacy Budget for Distributed Differential Privacy

    Publication Year: 2017, Page(s):25 - 32
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (637 KB) | HTML iconHTML

    Distributed data aggregation via summation (counting) helped us to learn the insights behind the raw data. However, such computing suffered from a high privacy risk of malicious collusion attacks. That is, the colluding adversaries infer a victim's privacy from the gaps between the aggregation outputs and their source data. Among the solutions against such collusion attacks, Distributed Differenti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of an Intelligent Equipment Lock Management System with RFID Technology

    Publication Year: 2017, Page(s):33 - 38
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (680 KB) | HTML iconHTML

    The equipment lock has been an important tool for the power company to protect the electricity metering equipment. However, the conventional equipment lock has two potential problems: vandalism and counterfeiting. To fulfill the control and track the potential illegal behavior, the human labor and paper are required to proceed with related operations, resulting in the consumption of a large amount... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Unconscious Behavior Detection for Pedestrian Safety Based on Gesture Features

    Publication Year: 2017, Page(s):39 - 43
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (382 KB) | HTML iconHTML

    Behavior detection is an important research field in pattern recognition and it can be applied to control the traffic safety. The mobile phones becomes a potential security when the pedestrians unconsciously use the phones during the crossing of the street. To avoid the traffic accidents, this paper proposes a new algorithm of the pedestrian behavior detection for the people unconsciously using ph... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Efficient Locality-Aware Task Assignment Algorithm for Minimizing Shared Cache Contention

    Publication Year: 2017, Page(s):44 - 51
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (517 KB) | HTML iconHTML

    Task scheduling can improve the performance of parallel execution through optimizing the utilization of on-chip computing resources, and thus it has been widely studied. Most of the previous work uses data access locality to predict cache behaviors for task scheduling, but usually suffering accuracy and computational time complexity issues. This paper proposes an efficient task assignment algorith... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Tax-Based Mechanisms for Resource Scaling-Out of Stream Big Data Analytics

    Publication Year: 2017, Page(s):52 - 59
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (430 KB) | HTML iconHTML

    Cloud-based big data platforms provide physical resources for a variety of applications to analyze all forms of data. For the stream big data analytics, a participated task always needs to scale out resources when its input data increases steeply. Typically, the resource scaling out can be achieved by increasing the parallelism degree of the platform based on the experience. However, the resource ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Profit-Aware Workload Management for Geo-Distributed Data Centers

    Publication Year: 2017, Page(s):60 - 66
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (464 KB) | HTML iconHTML

    With the rising demand on internet online services, more and more individuals and organizations migrate their data and services from local to geographically distributed internet data centers for reliability, management, and cost benefits. From internet data center operators' perspective, profit is one of the most significant factors which are to be taken into account and it is mainly determined by... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • IBBAS: A Visual Analytics System of Large-Scale Traffic Data for Bus Body Advertising

    Publication Year: 2017, Page(s):67 - 74
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (1379 KB) | HTML iconHTML

    Bus body advertising planners have been plagued for a long time for formulating solutions effectively and comparing different solutions efficiently, because there is no such decision support system. In this study, we attempt to use the state-of-the-art data mining and visualization techniques to solve this problem. Using the traffic data, we design a visual analytics system named IBBAS (Intelligen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient Algorithms for VM Placement in Cloud Data Centers

    Publication Year: 2017, Page(s):75 - 80
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (186 KB) | HTML iconHTML

    The virtual machine (VM) placement problem is a major issue in optimizing resource ulitization of cloud data centers. With the rapid development of cloud computing, efficient algorithms are needed to reduce the power consumption and save energy in data centers. Many models and algorithms are designed with a objective to minimize the number of physical machines (PMs) used in a cloud data center. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Exact Algorithm for the Biobjective 0-1 Linear Knapsack Problem with a Single Continuous Variable

    Publication Year: 2017, Page(s):81 - 85
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (146 KB) | HTML iconHTML

    In this paper, we study one variant of the multiobjective knapsack problem, i.e., the biobjective 0-1 linear knapsack problem with a single continuous variable (BKPC). An exact algorithm, the biobjective branch and bound method (BOBB), is presented to find all nondominated points of the BKPC. We analyze the nondominated frontier of the BKPC and design a new branching strategy to improve the algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NMFDIV: A Nonnegative Matrix Factorization Approach for Search Result Diversification on Attributed Networks

    Publication Year: 2017, Page(s):86 - 91
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (179 KB) | HTML iconHTML

    Search result diversification is effective way to tackle query ambiguity and enhance result novelty. In the context of large information networks, diversifying search result is also critical for further design of applications such as link prediction and citation recommendation. In previous work, this problem has mainly been tackled in a way of implicit query intent. To further enhance the performa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fusion Financial Prediction Strategy Based on RNN and Representative Pattern Discovery

    Publication Year: 2017, Page(s):92 - 97
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (215 KB) | HTML iconHTML

    To predicate the future with high accuracy is a holy grail in financial market. However, the volatility of chaotic financial market challenges new technologies from computer science to economic science all the time. Recently, Recurrent Neural Network (RNN) plays a new role in financial market prediction. However, results from RNN are restricted by sample size of training datasets, and show predica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Implementation of Local Similarity Search for Unstructured Text Using Prefix Filtering

    Publication Year: 2017, Page(s):98 - 103
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Identifying partially duplicated text segments among documents is an important research problem with applications in plagiarism detection and near-duplicate web page detection. We investigate the problem of local similarity search for finding partially replicated text, focusing on its parallel implementation. Our aim is to find text windows that are approximately similar in two documents, using a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.