2014 Second International Conference on Advanced Cloud and Big Data



Similar documents
Workshop on Internet and BigData Finance (WIBF)

Appendix 1: Search strategies for randomized controlled trials on Chinese herbal medicine for symptom management in cancer palliative care

en fi lm af Zhang Yang instruktøren bag den kinesiske fi lmperle Badeanstalten Premiere 31. oktober

Capability Service Management System for Manufacturing Equipments in

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

Open Access Research on Database Massive Data Processing and Mining Method based on Hadoop Cloud Platform

The Board of Directors

Big Data Storage Architecture Design in Cloud Computing

Program 2014 Tsinghua-Sanya Workshop on Big Data: Opportunities, Challenges and Innovations Dec. 27 Dec. 30, 2014 Sanya, China

ASEM Seminar on Capacity Building on Air Pollution Prevention and Control LIST OF PARTICIPANTS

1 Study of City-Level Management System of Air-Conditioning Information System Scm Rationality in the Decision Making... 9

Technical Program 研 讨 会 程 序 手 册

THURSDAY, January 24, 2013

Proceedings of the 7 th Euro-Asia Conference on Environment and CSR: Tourism, MICE, Hospitality Management and Education Session (Part I)

ISBJ Special Issue Conference on Exploring Entrepreneurial Activity and Small Business Issues in the Chinese Economy

Information Security Practice and Experience

Modeling Risk Management in Sustainable Construction

Journal of Chemical and Pharmaceutical Research, 2015, 7(3): Research Article. E-commerce recommendation system on cloud computing

ICLEM 2012 ASCE. Chengdu, China. Technology and Managementfor Efficiency. Volume 1. Xiaoqiang Zhang Zhongquan Qiu Ping Yi

Study on Tacit Knowledge Identification of Independent Documentary Film Directors

ZhangFu or Meridian theory related to Ear disease 1. Organs: Kidney: Kidney in charge of the ear s function Heart: Heart also open on the ear Liver &

A Novel User-Preference-Driven Service Selection Strategy in Cloud

Design of Electronic Medical Record System Based on Cloud Computing Technology

Zhejiang University SPIE Student Chapter Annual Report September 2014

Load Balancing of virtual machines on multiple hosts

International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015

Principles of Cross-selling Page Design Based on Consumer Online Purchasing Behaviors --Take C to C E-commerce Website as an Example

An Analysis and Review on Various Techniques of Mining Big Data

Introduction. Research methodology

Aus Li-ming, Li; Si-yan, Zhan: Epidemiological Research Cases in China Peoples Medical Publishing House - Rufen Sie weitere Kapitel oder das gesamte

A Cloud Computing-Based ERP System under The Cloud Manufacturing

BEIJING. Heat & Mass Transfer Society of China. 16th INTERNATIONAL HEAT TRANSFER CONFERENCE

CHEN Song Professor. RESEARCH FIELD Technological Innovation Management Economic Evaluation of Technology Business Management

Development of a Web-based Information Service Platform for Protected Crop Pests

Date & Time: February 5 th (Monday), 10:00-17:00 Place: Main Entrance Foyer, DIT Kevin Street, Dublin 8

Network traffic monitoring system design based on the unconstrained

Effects of node buffer and capacity on network traffic

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Metaheuristics in Big Data: An Approach to Railway Engineering

Secure & Encrypted Accessing and Sharing of Data in Distributed Virtual Cloud

Study on Human Performance Reliability in Green Construction Engineering

Technical Program 26th ICTPA Annual Meeting, Tampa, Florida May 24-26, 2013

Analysis and Optimization of Massive Data Processing on High Performance Computing Architecture

UPS battery remote monitoring system in cloud computing

Studies of Chinese Intellectual Property:Academic Basis and Development Idea

CAO Jiming Professor

2012 China General Aviation Forum Conference Agenda

8th International Forum of Automotive Traffic Safety 2010 (INFATS 2010) Wuhu, China 2-4 December Editors: Jikuang Yang ISBN:

LIST OF CONFERENCE PARTICIPANTS

Supporting Information. Phosphorus-, nitrogen- and carbon- containing polyelectrolyte complex:

Presentation of Multi Level Data Replication Distributed Decision Making Strategy for High Priority Tasks in Real Time Data Grids

[Chinese Learning Mentor Service]

International Conference on Metropolitan Tourism

Method of Fault Detection in Cloud Computing Systems

Development of cloud computing system based on wireless sensor network protocol and routing

Research on the UHF RFID Channel Coding Technology based on Simulink

KPC Herbs. Capsules/Pin Yin. Name Alternate Name Code Size Price

A STUDY ON THE NARRATOR S VOICE IN THE CHINESE TRANSLATION OF A ROOM OF ONE S OWN (1929) LAW TSZ SANG

Call For Papers. Submission Deadline: May 31, 2015 ORGANISERS. City University of Hong Kong

CRIOCM2015 International Symposium on. Advancement of Construction Management and Real Estate

Analysis of China Motor Vehicle Insurance Business Trends

International Conference on Education, Management and Computing Technology

A TABLE-FILLING SCHEDULING ALGORITHM FOR THE ROUND ROBIN CALENDAR PROBLEM WITH ARBITRARY COMPETITORS

DUI-YAO (HERB PAIRS)

Towards Cloud Factory Simulation. Abstract

E-Life: Web-Enabled Convergence of Commerce, Work, and Social Life

HSBC Bank (China) Shanghai Branch Network

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Enhanced Load Balancing Approach to Avoid Deadlocks in Cloud

QoS EVALUATION OF CLOUD SERVICE ARCHITECTURE BASED ON ANP

The soil nutrient monitoring system

OPTIMIZATION STRATEGY OF CLOUD COMPUTING SERVICE COMPOSITION RESEARCH BASED ON ANP

Advances in Natural and Applied Sciences

2015 CMB Request for Proposals (RFP) Innovations in e-learning for Health Professional Education

The Study on Logistics Management Patterns based on Fuzzy Comprehensive Evaluation Method

A CHAOS BASED SECURE CLUSTER PROTOCOL FOR WIRELESS SENSOR NETWORKS

ISSN: (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

The Commons China Law and Business Mission

An empirical study of factor analysis on M & A performance of listed companies of Chinese pharmaceutical industry

Submission Deadline: May 31, 2015 ORGANISERS City University of Hong Kong Xi an Jiaotong University

Research on the Analytics Model Design of Online Learning Behavior

PULLING OUT OPINION TARGETS AND OPINION WORDS FROM REVIEWS BASED ON THE WORD ALIGNMENT MODEL AND USING TOPICAL WORD TRIGGER MODEL

Access Control And Intrusion Detection For Security In Wireless Sensor Network

SU Qiang Professor

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

The Large-scale Dynamic Data Rapid Reduction Algorithm Based on Map-Reduce

Photonics and Imaging

ANNOUNCEMENT COMPLETION OF THE NON-PUBLIC ISSUANCE OF A SHARES

Load Balancing Algorithm Based on Services

RESEARCH INTERESTS Modeling and Simulation, Complex Systems, Biofabrication, Bioinformatics

Transcription:

2014 Second International Conference on Advanced Cloud and Big Data (CBD 2014) Huangshan, China 20-22 November 2014 IEEE Catalog Number: ISBN: CFP1403Y-POD 978-1-4799-8067-3

2014 Second International Conference on Advanced Cloud and Big Data CBD 2014 Table of Contents Welcome Message from the General Conference Co-Chairs...ix Organizing Committee...x Program Committee...xi Keynote Speeches...xiii Technical Forum Speeches...xviii Session 1: Big Data and Applications I Data Locality-Aware Query Evaluation for Big Data Analytics in Distributed Clouds...1 Qiufen Xia, Weifa Liang, and Zichuan Xu SLDP: A Novel Data Placement Strategy for Large-Scale Heterogeneous Hadoop Cluster...9 Runqun Xiong, Junzhou Luo, and Fang Dong Scaling Information-Theoretic Text Clustering: A Sampling-based Approximate Method...18 Zhexi Xu, Zhiang Wu, Jie Cao, and Hengnong Xuan An Effective Method for Mining Quantitative Association Rules with Clustering Partition in Satellite Telemetry Data...26 Xin Dong and Dechang Pi Examination of Ex-Dividend Day Trading Using Big Data of American Depositary Receipts...34 Bi-Huei Tsai A Score Based Approach towards Improving Bayesian Network Structure Learning...39 Yan Tang and Zhuoming Xu v

Multi-objective Ant Colony System for Data-Intensive Service Provision...45 Lijuan Wang, Jun Shen, and Junzhou Luo A Parallel Algorithm to Mine Abnormal Patterns from Satellite Data...53 Yuhang Xu and Dechang Pi Session 2: Cloud Computing and Applications Strategy-Proof Auction Mechanism with Group Price for Virtual Machine Allocation in Clouds...60 Yonglong Zhang, Bin Li, Zhiqiu Huang, Jin Wang, Junwu Zhu, and Huanfeng Peng Deadline Constrained Energy-Efficient Scheduling for Workflows in Clouds...69 Wei Zheng and Shouhui Huang Data Placement and Task Scheduling Optimization for Data Intensive Scientific Workflow in Multiple Data Centers Environment...77 Mingjun Wang, Jinghui Zhang, Fang Dong, and Junzhou Luo Efficient Auction Mechanism with Group Price for Resource Allocation in Clouds...85 Yiyi Ma, Bin Li, Yonglong Zhang, and Junwu Zhu Improved GEP Algorithm for Task Scheduling in Cloud Computing...93 LI Kun-lun, Wang Jun, Song Jian, and Dong Qing-yun Multi-Q: Multiple Queries Optimization Based on MapReduce in Cloud...100 Ding Ding, Fang Dong, and Junzhou Luo Cost in the Cloud Rationalisation and Research Trails...108 Kahina Hamadache, Paraskevi Zerva, Ariana Polyviou, Viliam Simko, Rustem Dautov, Fotis Gonidis, and Ivan Paez Anaya A Monitoring and Prediction Model of Workflow Based Self-Adaptive Software System...115 Xiaowei Zhang, Bin Li, and Junwu Zhu Session 3: Big Data and Applications II Near-Optimal Approximate Duplicate-Detection in Data Streams Over Sliding Windows for the Uniform Query Frequency or Membership Likelihood...122 Xiujun Wang, Xiao Zheng, Zhe Dang, Xuangou Wu, and Baohua Zhao MyBSP: An Iterative Processing Framework Based on the Cloud Platform for Graph Data...128 Chao Liu, Hong Yao, Deze Zeng, Qingzhong Liang, Chengyu Hu, and Xuesong Yan Energy Consumption Data Based Machine Anomaly Detection...136 Hui Chen, Xiang Fei, Sheng Wang, Xin Lu, Guoqin Jin, Weidong Li, and Xuyang Wu vi

Protecting and Analysing Health Care Data on Cloud...143 Danan Thilakanathan, Yu Zhao, Shiping Chen, Surya Nepal, Rafael A. Calvo, and Abelardo Pardo Research of Big Data Space-Time Analytics for Clouding Based Contexts-Aware IOV Applications...150 Di Zheng, Kerong Ben, and Hongliang Yuan An Image Processing System Based on Heterogeneous Embedded Multicore Processors...157 Liang Zhang, Peiyi Shen, Juan Song, Lb Dong, Guoxi Wang, and Yuxin Cai Session 4: Data Center Networking SA-TCP: A Novel Approach to Mitigate TCP Incast in Data Center Networks...163 Yongmao Ren, Jun Li, Guodong Wang, Lingling Li, and Shanshan Shi Data Center Multicast with High Stability...168 Ye Shen, Jing Feng, Zhanfeng Wang, Weijun Ma, Min Yin, and Lei Jiang Improved Directed Diffusion Protocol Based on Visible Forwarding Path and Promoted Evaluation Criterion...174 Yan Gu, Liang Ma, Jie Guo, and Dahai Jing Research on Undirected Double-Loop Data Center Networks...180 Yebin Chen, Ying Li, Weipeng Tai, and Xiao Zheng SSNF: Shared Datacenter Mechanism for Inter-datacenter Bulk Transfer...184 Yang Yu, Wang Rong, and Wang Zhijun NVLAN: A Novel VLAN Technology for Scalable Multi-tenant Datacenter Networks...190 Yang Hu, Huiba Li, and Yuxing Peng A Node-to-Set Disjoint Path Routing Algorithm in DCell Networks...196 Xi Wang and Jianxi Fan Session 5: Cloud Computing and Security Entropy-Based Denial of Service Attack Detection in Cloud Data Center...201 Jiuxin Cao, Bin Yu, Fang Dong, Xiangying Zhu, and Shuai Xu A MapReduce Task Scheduling Algorithm for Deadline-Constraint in Homogeneous Environment...208 Yi Yang, Jiao Xu, Fei Wang, Zhaocai Ma, Jingshan Wang, and Lian Li Advances and Future Challenges in Electric Power Big Data...213 Yang Yindong and Bi Zhongqin Inferring Application Type Information from Tor Encrypted Traffic...220 Gaofeng He, Ming Yang, Junzhou Luo, and Xiaodan Gu vii

Efficient Approximate Search Using VGRAM Over Encrypted Cloud Data...228 Lidong Han and Changhui Hu Distributed Key Management Scheme Based on ECC for Heterogeneous Sensor Networks...235 Jiu-Ru Wang and Hai-Feng Wang A Novel Method to Detect Encrypted Data Exfiltration...240 Gaofeng He, Tao Zhang, Yuanyuan Ma, and Bingfeng Xu An Intrusion Detection Model Based on Deep Belief Networks...247 Ni Gao, Ling Gao, Quanli Gao, and Hai Wang Session 6: Social Computing and Service Computing Efficient Parallel Community Detection in Large Edge-Intensive Networks...253 Guangliang Gao, Zhan Bu, Zhiang Wu, Yuan Li, and Jie Cao Social Recommendation Algorithm Dynamically Adaptable to User Profiling for SNS...261 Weimin Li, Yikai Ni, Minye Wu, Zhengbo Ye, and Qun Jin Geographic Location-Based Service Reliability Prediction...267 Haiyan Wang and Jun Qian A Personalized Service Recommendation Algorithm for Service Functionality...275 Wei Li, Di Hu, and Junzhou Luo A Clustering-Based Similarity Measurement for Collaborative Filtering...282 Liang Gu, Peng Yang, and Yongqiang Dong The SOM Based Improved K-Means Clustering Collaborative Filtering Algorithm in TV Recommendation System...288 Zhaocai Ma, Yi Yang, Fei Wang, Caihong Li, and Lian Li A Group Member Search Method Based on Dispersion Analysis...296 Qiang Yang, Bing Huang, Xiaojun Zeng, and Jianfeng Liu Collaborative Filtering for Recommender Systems...301 Ruisheng Zhang, Qi-dong Liu, Chun-Gui, Jia-Xuan Wei, and Huiyi-Ma Author Index...309 viii