Vai al contenuto principale della pagina
| Titolo: |
Computational Science and Its Applications – ICCSA 2016 : 16th International Conference, Beijing, China, July 4-7, 2016, Proceedings, Part II / / edited by Osvaldo Gervasi, Beniamino Murgante, Sanjay Misra, Ana Maria A.C. Rocha, Carmelo M. Torre, David Taniar, Bernady O. Apduhan, Elena Stankova, Shangguang Wang
|
| Pubblicazione: | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
| Edizione: | 1st ed. 2016. |
| Descrizione fisica: | 1 online resource (XXVII, 634 p. 282 illus.) |
| Disciplina: | 004 |
| Soggetto topico: | Computer networks |
| Algorithms | |
| Software engineering | |
| Computer simulation | |
| Application software | |
| Data mining | |
| Computer Communication Networks | |
| Software Engineering | |
| Computer Modelling | |
| Computer and Information Systems Applications | |
| Data Mining and Knowledge Discovery | |
| Persona (resp. second.): | GervasiOsvaldo |
| MurganteBeniamino | |
| MisraSanjay | |
| RochaAna Maria A.C | |
| TorreCarmelo M | |
| TaniarDavid | |
| ApduhanBernady O | |
| StankovaElena | |
| WangShangguang | |
| Nota di bibliografia: | Includes bibliographical references and index. |
| Nota di contenuto: | Intro -- Preface -- Organization -- Contents - Part II -- High Performance Computing and Networks -- Parallel Sparse Matrix-Vector Multiplication Using Accelerators -- 1 Introduction -- 2 Sparse Matrix-Vector Multiplication -- 2.1 Parallel SpMV -- 3 Accelerator -- 3.1 Programming Model of Xeon Phi -- 4 Implementation of SpMV -- 5 Evaluation of Parallel SpMV -- 5.1 Experimental Results -- 5.2 Performance of Each SpMV Implementation (single Process) -- 5.3 Performance of Each SpMV Implementation (64 MPI Processes) -- 6 Investigation of SpMV Kernel for MIC -- 6.1 Existing Kernels and Their Problems -- 6.2 Applying Segmented Scan to SpMV -- 7 Conclusion -- References -- On the Cluster-Connectivity of Wireless Sensor Networks -- 1 Wireless Sensor Networks -- 1.1 System Model -- 1.2 Graph-Theoretic Model -- 1.3 Minimum Total Energy Topology Problems: Nondeterministic Polynomial-Time Completeness -- 2 Clustered Wireless Sensor Networks -- 2.1 System Model -- 2.2 Graph-Theoretic Model -- 2.3 Connectivity Problems of Clustered Wireless Sensor Networks -- 3 Clustered-Graph Connectivity Problems: Nondeterministic Polynomial-Time Completeness -- 4 Minimization of Clustered-Graph Connectivity: Nondeterministic Polynomial-Time Hardness, and Approximation Algorithm -- 5 Concluding Remarks -- References -- A PBIL for Load Balancing in Network Coding Based Multicasting -- Abstract -- 1 Introduction -- 2 Problem Formulation -- 3 The Proposed PBIL -- 3.1 New PV Update Scheme -- 3.2 The Overall Procedure of the Proposed PBIL -- 4 Performance Evaluation -- 4.1 Test Instances -- 4.2 Overall Performance Evaluation -- 5 Conclusions -- Acknowledgements -- References -- A Proposed Protocol for Periodic Monitoring of Cloud Storage Services Using Trust and Encryption -- Abstract -- 1 Introduction -- 2 Background -- 2.1 Encryption -- 2.2 Trust -- 2.3 Hash -- 3 Related Work. |
| 4 File Integrity Monitoring Protocol -- 4.1 Protocol Requirements -- 4.2 Protocol Operating Principle -- 4.3 Protocol Architecture -- 4.3.1 File Storage Process -- 4.3.2 Verification Process -- 4.3.3 Trust Level Classification Process -- 5 Protocol Analysis -- 6 Simulations -- 7 Conclusions -- Acknowledgments -- References -- Implementation of Multiple-Precision Floating-Point Arithmetic on Intel Xeon Phi Coprocessors -- 1 Introduction -- 2 Multiple-Precision Floating-Point Number Representation -- 3 Vectorization and Parallelization of Multiple-Precision Floating-Point Addition, Subtraction and Multiplication -- 4 Vectorization and Parallelization of Multiple-Precision Floating-Point Division and Square Root -- 4.1 Newton Iteration -- 4.2 Vectorization and Parallelization -- 5 Performance Results -- 6 Conclusion -- References -- Towards a Sustainable Architectural Design by an Adaptation of the Architectural Driven Design Method -- Abstract -- 1 Introduction -- 2 Problem Statement and Solution Approach -- 3 Background -- 3.1 Sustainability and the Karlskrona Manifesto -- 3.2 Architecture Driven Design - ADD -- 3.3 Sustainable Health Services on Cloud -- 4 Proposal Solution -- 5 Architectural Sustainability Analysis of the HCR -- 5.1 Environmental Sustainability -- 5.2 Social Sustainability -- 5.3 Technical Sustainability -- 5.4 Economic Sustainability -- 5.5 Individual Sustainability -- 6 Conclusions -- References -- The Design and Implementation on the Android Application Protection System -- Abstract -- 1 Introduction -- 2 Related Background -- 2.1 Security Threats -- 2.2 Security Reinforcement Measure -- 3 Static Defense Solution -- 3.1 DEX Shell Mechanism -- 3.2 DEX Shell Technology -- 3.3 Class Loading Mechanism of Dalvik -- 3.4 Design of Static Defense Solution -- 4 Dynamic Defense Solution -- 4.1 Dynamic Attack Mechanism. | |
| 4.2 Dynamic Defense Mechanism -- 5 System Design and Implementation -- 5.1 Design -- 5.2 Architecture of System -- 6 Implement of Defense Solution -- 6.1 Static Defense Solution -- 6.2 Dynamic Defensing Solution -- 7 Security Analysis -- 7.1 Static Security Analysis -- 7.2 Dynamic Security Analysis -- 8 Conclusions -- Acknowledgment -- References -- Extending the ITU-T G.1070 Opinion Model to Support Current Generation H.265/HEVC Video Codec -- Abstract -- 1 Introduction -- 2 Experimental Setup -- 3 Result Analysis -- 3.1 Video Quality Affected by Coding -- 3.2 Video Quality Affected by Packet Loss -- 3.3 Accuracy of the Model -- 4 Conclusion -- References -- New Advantages of Using Chains in Computing Multiple s-t Probabilistic Connectivity -- 1 Introduction -- 2 Factoring Method for Network Reliability Calculation -- 3 One of Pivot Nodes is Inside a Chain -- 4 Both Pivot Nodes are Inside Different Chains -- 5 Obtaining Bounds for (G) and C(G) Through Known Part of Rij -- 6 Example -- 7 Conclusion -- References -- A Delay-Driven Switching-Based Broadcasting Scheme in Low-Duty-Cycled Wireless Sensor Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Preliminaries -- 3.1 System Model and Assumptions -- 3.2 Timeslot Design -- 3.3 Problem Formulation -- 4 Proposed Scheme -- 4.1 Motivation -- 4.2 Switching Criteria -- 4.3 Switching Decision -- 4.4 Sending Schedule Priority -- 4.5 Collision-Free Scheduling -- 5 Performance Evaluation -- 5.1 Simulation Environment -- 5.2 Simulation Results -- 6 Conclusion -- Acknowledgement -- References -- Memory-Aware Scheduling for Mixed-Criticality Systems -- 1 Introduction -- 2 Related Work -- 3 Models and Problem Formulation -- 3.1 System Models -- 3.2 Problem Formulation -- 4 Theoretical Foundation -- 5 Memory-Processor Priority Co-assignment for Mixed-Criticality Task Set -- 6 Evaluation. | |
| 6.1 Experimental Setting -- 6.2 Experiment Results and Discussions -- 7 Conclusion -- References -- A Generalized Ant Routing Mechanism Framework in Mobile P2P Networks -- Abstract -- 1 Introduction -- 2 ACO and Routing Protocols -- 2.1 Basic Idea of ACO -- 2.2 Design Challenge of Routing Protocols in MP2P -- 3 Survey of Ant Routing Protocols -- 3.1 Discussion of Representative Ant Routing Protocols -- 3.2 General Ant Routing Principles -- 4 Generalized Ant Routing Mechanism Framework -- 4.1 Ant Module -- 4.2 Node Module -- 4.3 Data Packet Module -- 5 A Generalized Solution -- 5.1 A Generalized Solution from the Framework -- 5.2 Simulation Study -- 6 Conclusions and Future Work -- Acknowledgments -- References -- WACA: WearAble Device Based Home Control Assistant Framework -- Abstract -- 1 Introduction -- 2 Motivation and Considerations -- 3 Proposed System Architecture -- 3.1 Framework Design -- 3.2 Gesture Patterns -- 3.3 Control Protocol Design -- 3.4 Service Scenarios -- 4 Experiment Result and Evaluation -- 5 Conclusion and Future Works -- References -- Media, Screen, Input, and Context Sharing System for D2D Services in Smart TV 2.0 -- Abstract -- 1 Introduction -- 2 Related Work -- 3 System Design and Development -- 3.1 System Outline -- 3.2 Media Sharing System -- 3.3 Screen Sharing System -- 3.4 Input Sharing System -- 3.5 Context Sharing System -- 4 System Analysis -- 5 Conclusion -- Acknowledgement -- Indoor Location: An Adaptable Platform -- 1 Introduction -- 2 Platform Architecture -- 2.1 I/O Manager -- 2.2 Request Manager -- 2.3 Data Publication Manager -- 2.4 Map Manager -- 2.5 Location Manager -- 2.6 Event Manager -- 2.7 Things Manager -- 2.8 Data Storage Manager -- 3 Evaluation -- 4 Related Work -- 5 Conclusion and Future Works -- References. | |
| Sequential and Parallel Hybrid Approaches of Augmented Neural Networks and GRASP for the 0-1 Multidimensional Knapsack Problem -- 1 Introduction -- 2 0-1 Multidimensional Knapsack Problem -- 3 Augmented Neural Networks -- 4 GRASP -- 5 Proposed Solution -- 6 Comparative Results -- 7 Conclusions and Future Work -- References -- Computational Verification of Network Programs for Several OpenFlow Switches in Coq -- 1 Introduction -- 2 Preliminary -- 2.1 NetCore -- 2.2 Coq -- 3 Methodology of Verification -- 4 Verification -- 4.1 Overview of Verification -- 5 Discussion -- 6 Conclusion -- A Appendix (Program that Does Not Generate Looping Packets) -- B Appendix (Program that Generates Looping Packets) -- References -- Parallelizing Simulated Annealing Algorithm in Many Integrated Core Architecture -- 1 Introduction -- 2 Simulated Annealing Algorithm -- 2.1 The Basic Idea -- 2.2 Generation of New Solutions -- 2.3 To Solve TSP Using Simulated Annealing Algorithm -- 2.4 To Improve Simulated Annealing Algorithm for TSP -- 3 Parallel SAA in MIC -- 3.1 MIC Architecture -- 3.2 A Parallel Simulated Annealing Algorithm -- 4 Experimental Results -- 4.1 Parallel SAA in CPU Architecture -- 4.2 Parallel SAA in MIC Architecture -- 5 Conclusions and Future Work -- References -- On Efficient SC-Based Soft Handoff Scheme in Proxy Mobile IPv6 Networks -- Abstract -- 1 Introduction -- 2 Related Work -- 3 Proposed Scheme -- 4 Performance Evaluation -- 4.1 Markov Chain Model for Soft Handoff and the Handoff Queue -- 4.2 Numerical Results and Discussion -- 5 Conclusion -- Acknowledgement -- References -- Distributed Computing Infrastructure Based on Dynamic Container Clusters -- 1 Introduction -- 2 Related Work -- 3 Deploying and Running Applications in DCIs: Containers vs Virtual Machines -- 4 Simulating Container-Based Distributed Computing Infrastructure. | |
| 5 Building and Evaluating Container-Based Distributed Computing Environment. | |
| Sommario/riassunto: | The five-volume set LNCS 9786-9790 constitutes the refereed proceedings of the 16th International Conference on Computational Science and Its Applications, ICCSA 2016, held in Beijing, China, in July 2016. The 239 revised full papers and 14 short papers presented at 33 workshops were carefully reviewed and selected from 849 submissions. They are organized in five thematical tracks: computational methods, algorithms and scientific applications; high performance computing and networks; geometric modeling, graphics and visualization; advanced and emerging applications; and information systems and technologies. |
| Titolo autorizzato: | Computational Science and Its Applications - ICCSA 2016 ![]() |
| ISBN: | 3-319-42108-5 |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910483368003321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |