4-6 Nov. 2013
Filter Results
-
[Title page i]
Publication Year: 2013, Page(s): i|
PDF (18 KB)
-
[Title page iii]
Publication Year: 2013, Page(s): iii|
PDF (60 KB)
-
[Copyright notice]
Publication Year: 2013, Page(s): iv|
PDF (135 KB)
-
Table of contents
Publication Year: 2013, Page(s):v - vii|
PDF (130 KB)
-
Message from General Chairs
Publication Year: 2013, Page(s): viii -
Organizing Committee
Publication Year: 2013, Page(s):ix - x|
PDF (71 KB)
-
Technical Program Committee
Publication Year: 2013, Page(s):xi - xiii|
PDF (81 KB)
-
Reviewers list
Publication Year: 2013, Page(s):xiv - xvi|
PDF (81 KB)
-
Erlang as a Language for Cloud Computing and Its Integration with Many-core Coprocessor
Publication Year: 2013, Page(s):1 - 8Erlang programming language is developed for programming concurrent, distributed and fault-tolerant systems. The native support for concurrency makes Erlang an efficient language for multi-core and even many-core programming. The support for large number of light-weight processes in distributed computing environment makes Erlang a good choice for cloud computing. Building more cores on a single ch... View full abstract»
-
CUDA-Enabled Multiple Symbol Detection for PCM/FM Demodulation
Publication Year: 2013, Page(s):9 - 15
Cited by: Papers (1)PCM/FM has been widely used in telemetry system. Multiple Symbol Detection (MSD) based signal demodulation methods can achieve lower BER (Bit Error Rate) than other methods. Due to its high computational complexity, current MSD algorithms are implemented in specialized signal processing devices, such as FPGAs (Field Programmable Gate Arrays). As the rapid development of CUDA, GPU has successfully ... View full abstract»
-
Real Time Cache Performance Analyzing for Multi-core Parallel Programs
Publication Year: 2013, Page(s):16 - 23
Cited by: Papers (1)Modern processors mostly use cache to hide the memory access latency, so cache performance is very important to application program. A detailed cache performance analysis will provide programmers a clear view of their program behaviors, which can help them to identify the performance bottleneck and to optimize the source code. As the chip industry turn to integrate multiple cores into one chip, mu... View full abstract»
-
A System-Oriented Approach to Full-Text Search on Encrypted Cloud Storage
Publication Year: 2013, Page(s):24 - 29
Cited by: Papers (4)Today's Cloud market offers a wide variety of online storage services which provide reliable and inexpensive storage accessible from almost every device at almost any location. Still, it proofs to be difficult to satisfy the user's confidence concerning the confidentiality and integrity of the own data in the Cloud. This is especially true since the user is forced to take a tradeoff between securi... View full abstract»
-
PIOD: A Parallel I/O Dispatch Model Based on Lustre File System for Virtual Machine Storage
Publication Year: 2013, Page(s):30 - 35Virtualization is a key technique for cloud computing. One challenge in it is providing a scalable, high performance and high cost effective data storage for virtual machines. In this paper, we propose a parallel I/O dispatch model called PIOD based on Lustre parallel file system to address this issue. PIOD adopts queue mechanism to coordinate data access requests from clients, avoiding random and... View full abstract»
-
TH_Cloudkey: Fast, Secure and Lowcost Backup System for Using Public Cloud Storage
Publication Year: 2013, Page(s):36 - 41In this paper, we describe a COM between the interior enterprise application and public cloud storage platform which is closer to the client we called-Cloudkey, which is designed to take responsible for enterprise data backup business. Cloudkey stores data persistently in a cloud storage provider such as Amazon S3 [1] or Windows Azure [2], allowing users to take advantages of the reliability and l... View full abstract»
-
Pipeline-Based Parallel Framework for Mass File Processing
Publication Year: 2013, Page(s):42 - 48
Cited by: Papers (1)Currently, there exists billions of files on the Internet, such as pictures, web pages, audio and video files, etc., and the number is still growing rapidly. These huge amount of files need to be processed by some applications as quickly as possible with parallel processing. With the increasing of cores in processors, parallel programming becomes more complex. The behavior that multiple parallel p... View full abstract»
-
Ceaser: Exploring the Monitoring Rules in the Time Dimension
Publication Year: 2013, Page(s):49 - 56In cloud environment, most failures would not strike at a sudden moment but evolve from a minor anomaly. During the evolving procedure, it may generate a series of events. But users can't specify exactly the event sequences of all the failures due the lack of time or knowledge. Automatically exploring the monitoring rules in time dimension can help users refine their rules and timely discover the ... View full abstract»
-
Empowering Designers to Estimate Function-Level Power for Developing Green Applications
Publication Year: 2013, Page(s):57 - 62
Cited by: Papers (1)Power consumption in clusters has become increasingly important over the past few years. Our previous research had added power consumption to the list of managed resources to help to understand and control power profile of the clusters. We believe that in the near future, power consumption will be a charging criterion in the cloud computing services. User may pay for the energy used by their workl... View full abstract»
-
An Approach to Minimizing Downtime Induced by Taking Live Snapshot of Virtual Cluster
Publication Year: 2013, Page(s):63 - 68
Cited by: Papers (2)Cloud computing has emerged as a new computing paradigm which is adopted by more and more application services based on cluster computing. Live snapshot technology is usually used to ensure the reliability of data and high availability of the running virtual machines. However, existing virtual machine live snapshot technologies are not enough to minimize the downtime induced by taking live snapsho... View full abstract»
-
Information Extraction for Computer Science Academic Rankings System
Publication Year: 2013, Page(s):69 - 76Today the academic ranking for computer science is a hot and importmant problem. This paper introduces Computer Science Academic Rankings System (CSAR) which aims at academic information extracting, mining and ranking. In this paper we mainly present approaches for information extraction and normalization in CSAR. For semi-structured and unstructured web pages such as paper-view pages, we propose ... View full abstract»
-
A Dynamic Resource Management Strategy for Cloud Based on Sequential Decision Model and Demand Forecast
Publication Year: 2013, Page(s):77 - 83In order to improve the utilization of finite resources, lower the cost of electrical power consumption and provide high QoS (Quality of Service) for customers, resource management approaches should be chosen carefully and dynamically. In this paper, we model the resource management process as a sequential decision problem. In addition, we apply the grey model to forecast the future demands. The e... View full abstract»
-
Lynn: A Multi-dimensional Dynamic Resource Management System for Distributed Applications in Clouds
Publication Year: 2013, Page(s):84 - 91
Cited by: Papers (5) | Patents (1)We present Lynn, a multi-dimensional dynamic resource management system for distributed applications in clouds. Lynn is the first to uniformly manage full kinds of resources, including CPU, memory and particularly, the network I/O bandwidth resource as a whole to schedule tasks. This comprehensive policy allows for more fine-grained control over hardware resources, and thus more efficiency. To sup... View full abstract»
-
Optimal Service Selection Based on Business for Cloud Computing
Publication Year: 2013, Page(s):92 - 97
Cited by: Papers (1)When organization select service provider (SP) in cloud computing based on service-oriented architecture (SOA), the optimal management of services is the kernel content of cloud computing from SP perspectives. However, it is difficult to realize the optimization of service selection in an open environment which contains large amounts of randomicity and uncertainty. In this paper, we focus on solvi... View full abstract»
-
Heterogeneous Network Analysis of Developer Contribution in Bug Repositories
Publication Year: 2013, Page(s):98 - 105
Cited by: Papers (1)Using a bug repository, developers contribute to improve the quality of software incrementally by creating and updating bug reports. All the software artifacts in bug repositories are derived from developer contribution. Most prior studies on developer contribution in bug repositories bias on one particular form, e.g., commenting bug reports. However, in real practice of bug repositories, develope... View full abstract»
-
Contructing Authentication Web in Cloud Computing
Publication Year: 2013, Page(s):106 - 111Cloud computing enables rapid deployment of services on an on-demand basis in large scale. Public clouds are open to all users with identities from various domains, requiring the support of multiple identity providers and hybrid authentication protocols. The complexity of the authentication scenario brings a great burden to service providers. Service providers and users know only a small part of t... View full abstract»
-
A Multi-tenant Software as a Service Model for Large Organization
Publication Year: 2013, Page(s):112 - 119Software as a service (SaaS) has been adopted by more and more small and medium-sized businesses with the spread of relevant ideas in recent years. But its application is still limited in large organizations. Sophisticated organizational structure, various customized sub-organization services and complex cross-organizational interaction are un-ignored challenges for its success. Based on the analy... View full abstract»