Search For:

Displaying 1-20 out of 20 total
Who Is Your Neighbor: Net I/O Performance Interference in Virtualized Clouds
Found in: IEEE Transactions on Services Computing
By Xing Pu,Ling Liu,Yiduo Mei,Sankaran Sivathanu,Younggyun Koh,Calton Pu,Yuanda Cao
Issue Date:July 2013
pp. 314-329
User-perceived performance continues to be the most important QoS indicator in cloud-based data centers today. Effective allocation of virtual machines (VMs) to handle both CPU intensive and I/O intensive workloads is a crucial performance management capab...
 
Behavioral Compatibility Analysis for Context-independent Service Substitution
Found in: 2012 Seventh ChinaGrid Annual Conference (ChinaGrid)
By Jun Jin,Jingjing Hu,Yuanda Cao,Jingxia Wang
Issue Date:September 2012
pp. 121-127
Service composition and substitution are major research fields in Service Oriented Computing (SOC). Behavioral compatibility is very important. This paper proposes a context-dependent behavioral substitutability analysis approach. Web service processes are...
 
A Method of Web Service Content Auto-generating Based on AIS
Found in: Intelligent System Design and Engineering Application, International Conference on
By Changyou Zhang,Lixiang Shao,Jichuan Wang,Yuanda Cao
Issue Date:January 2012
pp. 32-35
In the evaluation of self-organized algorithm for web service providers, we need a great deal of web service information. And these services should be of natural similar properties by which they will be grouped into several alliances. In this paper, we pro...
 
A Structure-Wise Service Selection Approach for Efficient Service Composition
Found in: E-Business Engineering, IEEE International Conference on
By Jun Jin, Yuanda Cao, Dongfeng Zhu, Xing Pu, Minghua Yang
Issue Date:November 2010
pp. 256-261
Service-Oriented Architecture (SOA) provides a flexible architecture for service composition. Service composition can be integrated by atomic Web services developed independently by their providers. With increasing number of alternative services that imple...
 
Web Text Knowledge Fusion
Found in: Web Mining and Web-based Application, Pacific-Asia Conference on
By Sikang Hu, Yuanda Cao
Issue Date:June 2009
pp. 171-174
There is still no complete and unified theoretical model for studying the research issues such as redundancy, localization, and fuzziness existed in the fusion of web text knowledge. To this end, this paper proposes a fusion framework, called Web Pages Kno...
 
A Clone Node Protocol for Reducing Maintenance Cost of Structured P2P System
Found in: Artificial Intelligence, International Joint Conference on
By Yu Zhang,Yuanda Cao,Baodong Cheng
Issue Date:April 2009
pp. 84-87
With highly dynamic, structured P2P system needs very large maintenance cost. But there is little research on this kind of maintenance. This article focuses on reducing maintenance cost of structured P2P system and proposes a Clone Node Protocol, CNP for s...
 
Spray and Wait Routing Based on Average Delivery Probability in Delay Tolerant Network
Found in: Networks Security, Wireless Communications and Trusted Computing, International Conference on
By Jingfeng Xue, Xiumei Fan, Yuanda Cao, Ji Fang, Jiansheng Li
Issue Date:April 2009
pp. 500-502
To avoid random and blindfold forwarding decision in Spray and Wait routing in delay tolerant network, Binary Spray and Wait routing based on average delivery probability is proposed in this paper. Based on delivery predictability of PROPHET, average deliv...
 
Advanced PROPHET Routing in Delay Tolerant Network
Found in: Communication Software and Networks, International Conference on
By Jingfeng Xue, Jiansheng Li, Yuanda Cao, Ji Fang
Issue Date:February 2009
pp. 411-413
To solve routing jitter problem in PROPHET in delay tolerant network, advanced PROPHET routing is proposed in this paper. Average delivery predictabilities are used in advanced PROPHET to avoid routing jitter. Furthermore, we evaluate it through simulation...
 
An Enhanced Precise Self-deployment Algorithm in Mobile Sensor Network
Found in: Information Science and Engieering, International Symposium on
By Minghua Yang, Yuanda Cao, Li Tan, Jiong Yu, Minghua Yang
Issue Date:December 2008
pp. 786-789
To reduce the cost of abundant mobile sensors deployed in unknown environment, a target-oriented self-deployment algorithm (TSA) based on attracting force line is proposed. By designing the attracting force line and constructing virtual attracting force an...
 
A New Self-Deployment Algorithm in Hybrid Sensor Network
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Minghua Yang, Yuanda Cao, Li Tan, Jiong Yu
Issue Date:December 2008
pp. 268-272
Sensor network is usually composed of static nodes or mobile nodes. In order to achieve maximum performance, deployment of nodes should maximize coverage. The deployment of static sensor network is simple, but random location can not ensure the better conn...
 
An Enhanced Self-deployment Algorithm in Mobile Sensor Network
Found in: Future Information Technology and Management Engineering, International Seminar on
By Minghua Yang, Yuanda Cao, Li Tan, Jiong Yu
Issue Date:November 2008
pp. 573-576
In order to enforce the sensing performance of mobile sensor network (MSN), an enhanced self-deployment (ESD) algorithm is proposed in this paper. By designing the virtual repulsive force between nodes, the movement equation and the virtual attracting-fiel...
 
Modeling Objects with Local Descriptors of Biologically Motivated Selective Attention
Found in: International Conference on Natural Computation
By Li Tan, Yuanda Cao, Minghua Yang, Qiaoyan He
Issue Date:October 2008
pp. 75-79
Recent work in visual retrieval shows that bag-of-features (BoF) has appeared promising for object recognition and categorization. Local descriptors such as SIFT have shown impressive results on objects. The main idea of BoF is to depict each image as an o...
 
A Scalable Evenly Distributed Replica Location Mechanism
Found in: Digital Media and its Application in Museum & Heritage/Digital Media and its Application in Museum & Heritage, Workshop on
By Xiaohua Song, Heqing Huang, Yuanda Cao
Issue Date:December 2007
pp. 281-285
In order to provide better load balancing capability and scalability, a replica location mechanism is designed for data grids based on distributed hash structure which equitably assigns node identifiers. The system is peer-to-peer and hierarchical. It coll...
 
A Novel Efficient Search Algorithm in Unstructured P2P Networks
Found in: Digital Media and its Application in Museum & Heritage/Digital Media and its Application in Museum & Heritage, Workshop on
By Zhitao Guan, Yuanda Cao, Xiangsong Hou, Dongfeng Zhu
Issue Date:December 2007
pp. 275-280
There are two major problems of unstructured p2p systems, one is their heavy network traffic; the other is the problem of unpredictable delay. The popular search techniques in unstructured p2p networks such as flooding, dynamic query don't deal with these ...
 
A New Multi-quality Image Fusion Method in Visual Sensor Network
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Minghua Yang, Yuanda Cao, Li Tan, Changyou Zhang, Jiong Yu
Issue Date:November 2007
pp. 667-670
Bandwidth, energy consumption and delay are always bottlenecks of visual sensor network. In this paper a hierarchical multi-quality image fusion method based on region-mapping is proposed to improve above condition. Camera view is divided into regions acco...
 
Study on the Non-Dedicated Grid Scheduling System
Found in: Semantics, Knowledge and Grid, International Conference on
By Jiong Yu, Yong Hou, Xianhe Sun, Yuanda Cao, Changyou Zhang
Issue Date:October 2007
pp. 386-389
Effective task scheduling and deployment is hard to achieve in a Grid environment, especially where computing resources are heterogamous and local tasks have a high priority in the non-dedicated grid. We introduce a scheduling system of the non-dedicated g...
 
An Efficient Hybrid P2P Incentive Scheme
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Zhitao Guan, Muhammad Hanif Durad, Yuanda Cao, Liehuang Zhu
Issue Date:August 2007
pp. 377-382
P2P systems have suffered a lot from free riding problem i.e. some participants consume more resources than they contribute. In order to deal with this problem efficiently, an incentive model based on peer credit has been proposed. Each peer in this model ...
 
A Vision for the Trust Managed Grid
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Muhammad Hanif Durad, Yuanda Cao
Issue Date:May 2006
pp. 34
Envisaging that the Grid related research in the captioned area is more influenced by similar research in P2P and Internet; hence an independent course needs to be adopted. The objectives of this paper are; a review and suggest some improvements in Grid re...
 
Research on Security Architecture and Privacy Policy of Grid Computing System
Found in: Semantics, Knowledge and Grid, International Conference on
By Jiong Yu, Yuanda Cao, Yonggang Lin, Li Tan
Issue Date:November 2005
pp. 117
The wide acceptance of the grid technology has created pressure to add some features that were not part of its original design, such as security, privacy, and quality-of-service support. In this paper, we have proposed the enhanced grid security and privac...
 
Similarity Degree-Based Mobility Pattern Aware Routing in DTNs
Found in: Intelligent Ubiquitous Computing and Education, International Symposium on
By Lei Yin, Yuanda Cao, Wei He
Issue Date:May 2009
pp. 345-348
Delay-tolerant networks (DTN) have the capacity to interconnect devices in roomy regions unlike traditional networks. Based on common sense, the more similar the mobility pattern of nodes, the more stable their relative positions, which results in a connec...
 
 1