首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Unlabeled training examples are readily available in many applications, but labeled examples are fairly expensive to obtain. For instance, in our previous works on classification of peer-to-peer (P2P) Internet traffics, we observed that only about 25% of examples can be labeled as “P2P”or “NonP2P” using a port-based heuristic rule. We also expect that even fewer examples can be labeled in the future as more and more P2P applications use dynamic ports. This fact motivates us to investigate the techniques which enhance the accuracy of P2P traffic classification by exploiting the unlabeled examples. In addition, the Internet data flows dynamically in large volumes (streaming data). In P2P applications, new communities of peers often join and old communities of peers often leave, requiring the classifiers to be capable of updating the model incrementally, and dealing with concept drift. Based on these requirements, this paper proposes an incremental Tri-Training (iTT) algorithm. We tested our approach on a real data stream with 7.2 Mega labeled examples and 20.4 Mega unlabeled examples. The results show that iTT algorithm can enhance accuracy of P2P traffic classification by exploiting unlabeled examples. In addition, it can effectively deal with dynamic nature of streaming data to detect the changes in communities of peers. We extracted attributes only from the IP layer, eliminating the privacy concern associated with the techniques that use deep packet inspection.
Jing LiuEmail:

Bijan Raahemi   is an assistant professor at the Telfer School of Management, University of Ottawa, Canada, with cross-appointment with the School of Information Technology and Engineering. He received his Ph.D. in Electrical and Computer Engineering from the University of Waterloo, Canada, in 1997. Prior to joining the University of Ottawa, Dr. Raahemi held several research positions in Telecommunications industry, including Nortel Networks and Alcatel-Lucent, focusing on Computer Networks Architectures and Services, Dynamics of Internet Traffic, Systems Modeling, and Performance Analysis of Data Networks. His current research interests include Knowledge Discovery and Data Mining, Information Systems, and Data Communications Networks. Dr. Raahemi’s work has appeared in several peer-reviewed journals and conference proceedings. He also holds 10 patents in Data Communications. He is a senior Member of the Institute of Electrical and Electronics Engineering (IEEE), and a member of the Association for Computing Machinery (ACM). Weicai Zhong   is a post-doctoral fellow at the Telfer School of Management, University of Ottawa, Canada. He received a B.S. degree in computer science and technology from Xidian University, Xi’an, China, in 2000 and a Ph.D. in pattern recognition and intelligent systems from Xidian University in 2004. Prior to joining the University of Ottawa, Dr. Zhong was a senior statistician in SPSS Inc. from Jan. 2005 to Dec. 2007. His current research interests include Internet Traffic Identification, Data Mining, and Evolutionary Computation. He is a member of the Institute of Electrical and Electronics Engineering (IEEE). Jing Liu   is an Associate Professor with Xidian University, China. She received a B.S. degree in computer science and technology from Xidian University, Xi’an, China, in 2000, and a Ph.D. in circuits and systems from Xidian University in 2004. Her research interests include Data Mining, Evolutionary Computation, and Multiagent Systems. She is a member of the Institute of Electrical and Electronics Engineering (IEEE).   相似文献   

2.
In both academia and industry, peer-to-peer (P2P) applications have attracted great attentions. P2P applications such as Napster, Gnutella, FastTrack, BitTorrent, Skype and PPLive, have witnessed tremendous success among the end users. Unlike a client-server based system, peers bring with them serving capacity. Therefore, as the demand of a P2P system grows, the capacity of the network grows, too. This enables a P2P application to be cheap to build and superb in scalability. In this paper, we survey the state of the art of the research and the development of P2P content delivery application. Using examples of the deployed P2P applications and research prototypes, we survey the best practices in P2P overlay building and P2P scheduling. We hope that the information may help the readers to build a reliable, robust P2P content delivery application.
Jin LiEmail:

Dr. Jin Li   is currently a principal researcher managing the communication system subgroup at Microsoft Research (Redmond, WA). He received the Ph.D. with distinction from Tsinghua University (Beijing, China) in 1994. Prior to joining Microsoft in 1999, he has worked at the University of Southern California (Los Angeles, CA) and the Sharp Laboratories of America (Camas, WA). From 2000, Dr. Li has also served as an adjunct professor at the Electrical Engineering Department, Tsinghua University (Beijing, China). His research interests cover audio/image/video/graphic compression, audio/video streaming, realtime audio/video conferencing, peer-to-peer content delivery, distributed storage, etc. Dr. Li has published 80+ referred conference and journal papers. He is currently an Area Editor for the Journal of Visual Communication and Image Representation and an Associate Editor for the Peer-to-Peer Networking and Applications. He has served as an Associate Editor for IEEE Trans. on Multimedia, and on numerous TPC committees for major conferences. He was the recipient of the 1998 Young Investigator Award from SPIE Visual Communication and Image Processing.   相似文献   

3.
We develop a new model of the interaction of rational peers in a Peer-to-Peer (P2P) network that has at its heart altruism, an intrinsic parameter reflecting peers’ inherent willingness to contribute. Two different approaches for modelling altruistic behavior and its attendant benefit are introduced. With either approach, we use Game Theoretic analysis to calculate Nash equilibria and predict peer behavior in terms of individual contribution. We consider the cases of P2P networks of peers that (i) have homogeneous altruism levels or (ii) have heterogeneous altruism levels, but with known probability distributions. We find that, under the effects of altruism, a substantial fraction of peers will contribute when altruism levels are within certain intervals, even though no incentive mechanism is used. Our results corroborate empirical evidence of large P2P networks surviving or even flourishing without or with barely functioning incentive mechanisms. We also enhance the model with a simple but powerful incentive scheme to limit free-riding and increase contribution to the network, and show that the particular incentive scheme on networks with altruistic peers achieves its goal.
Vasilis VassalosEmail: URL: http://wim.aueb.gr/vassalos

Dimitrios K. Vassilakis   2005–today: PhD candidate in the Informatics Department of the Athens University of Economics and Business (AUEB). Research areas: Operations Research (OR), Game Theory, economic models and applications of Game Theory on the internet (anti-spam, P2P networks), applications of OR on electricity scheduling. Vasilis Vassalos   2003–today: Assistant Professor in the Informatics Department of the Athens University of Economics and Business (AUEB). 1999–2003: assistant professor in the Information Systems Group of Information, Operations and Management Sciences (IOMS) Department in the Stern School of Business at New York University. Research areas: databases, Web-based information systems and middleware development, generation of user interfaces and Web services for semistructured data sources, integration of mobile data sources, XML query processing, digital libraries.   相似文献   

4.
In this paper we report new results of our continuous effort on analyzing the impact of incentive mechanisms on user behavior in BitTorrent. In this second measurement and analysis study we find that free riders’ population has significantly increased comparing to our previous measurement study. We relate this increase to the advance in end-users’ connection speeds and to users’ increased knowledge in BitTorrent. We also categorize free riders based on the behavior they exhibit in multiple-torrent system into three types: cheaters, strategic and lucky peers. Furthermore, refuting the findings of other studies, we show that peers who exploit the system in BitTorrent are both high bandwidth capacity peers and low bandwidth capacity peers. Moreover, we argue that the Tit-for-Tat mechanism does not discriminate peers based on their bandwidth capacities and that it reacts successfully against inter-class bandwidth capacity strategic peers. Finally, we propose a memory-backoff approach to the optimistic unchoke policy that reduces the volume of free riding in BitTorrent.
Fotios C. Harmantzis (Corresponding author)Email:

Manaf Zghaibeh   is a PhD candidate at Stevens Institute of Technology, focusing on P2P economics. He holds a Master’s Degree in Telecommunications Management from Stevens and a Bachelor’s Degree in Electrical Engineering from Damascus University. He has been a teaching assistant at NYU since 2002. Fotios Harmantzis   is an Assistant Professor at the School of Technology Management at Stevens Institute of Technology. He holds a B.Sc. and M.Sc. in Computer Science from the University of Crete, a MSE in Systems Engineering from the University of Pennsylvania, a Finance MBA from Toronto/NYU, and a PhD in Electrical and Computer Engineering from the University of Toronto. Dr. Harmantzis’ research and teaching interests include mathematics of finance and risk, valuations of investments under uncertainty and economics of IT and telecom. His research work has been presented in several scientific conferences and journals. He has professional experience in the US, Canada and Europe, in the financial services, asset management and consulting business.   相似文献   

5.
Service-oriented architecture (SOA) and Software as a Service (SaaS) are the latest hot topics to software manufacturing and delivering, and attempt to provide a dynamic cross-organisational business integration solution. In a dynamic cross-organisational collaboration environment, services involved in a business process are generally provided by different organisations, and lack supports of common security mechanisms and centralized management middleware. On such occasions, services may have to achieve middleware functionalities and achieve business objectives in a pure peer-to-peer fashion. As the participating services involved in a business process may be selected and combined at run time, a participating service may have to collaborate with multiple participating services which it has no pre-existing knowledge in prior. This introduces some new challenges to traditional trust management mechanisms. Automated Trust Negotiation (ATN) is a practical approach which helps to generate mutual trust relationship for collaborating principals which may have no pre-existing knowledge about each other without in a peer-to-peer way. Because credentials often contain sensitive attributes, ATN defines an iterative and bilateral negotiation process for credentials exchange and specifies security policies that regulate the disclosure of sensitive credentials. Credentials disclosure in the iterative process may follow different orders and combinations, each of which forms a credential chain. It is practically desirable to identify the optimal credential chain that satisfies certain objectives such as minimum release of sensitive information and minimum performance penalty. In this paper we present a heuristic and context-aware algorithm for identifying the optimal chain that uses context-related knowledge to minimize 1) the release of sensitive information including both credentials and policies and 2) the cost of credentials retrieving. Moreover, our solution offers a hierarchical method for protecting sensitive policies and provides a risk-based strategy for handling credential circular dependency. We have implemented the ATN mechanisms based on our algorithm and incorporated them into the CROWN Grid middleware. Experimental results demonstrate their performance-related advantages over other existing solutions.
Jie XuEmail:

Jianxin Li   is a research staff and assistant professor in the School of Computer Science and Engineering, Beihang University, Beijing china. He received the Ph.D. degree in Jan. 2008. He has authored over 10 papers in SRDS, HASE and eScience etc. Her research interests include trust management, information security and distributed system.
Dacheng Zhang   received his BSc. in Computer Science at Northern Jiaotong University. Dacheng then worked at the Beijing Rail Mansion and Beijing Zhan Hua Dong He Ltd. as a software engineer. In 2004, Dacheng received his MSc. degree in Computer Science at the University of Durham. The topic of his thesis was “Multi-Party Authentication for Web Services”. Dacheng is now a PhD student in the School of Computing, University of Leeds, UK. His research area covers Multi-Party Authentication systems for Web services, Long Transactions, and Identity based authentication systems. Currently, he is exploring Coordinated Automatic Actions to manage Web Service Multi-Party Sessions.
Jinpeng Huai   is a Professor and Vice President of Beihang University. He serves on the Steering Committee for Advanced Computing Technology Subject, the National High-Tech Program (863) as Chief Scientist. He is a member of the Consulting Committee of the Central Government Information Office, and Chairman of the Expert Committee in both the National e-Government Engineering Taskforce and the National e-Government Standard office. Dr. Huai and his colleagues are leading the key projects in e-Science of the National Science Foundation of China (NSFC) and Sino-UK. He has authored over 100 papers. His research interests include middleware, peer-to-peer (P2P), grid computing, trustworthiness and security.
Professor Jie Xu   is Chair of Computing at the University of Leeds (UK) and Director of the EPSRC WRG e-Science Centre involving the three White Rose Universities of Leeds, York and Sheffield. He is also a visiting professor at the School of Computing Science, the University of Newcastle upon Tyne (UK) and a Changjiang Scholar visiting professor at Chongqing University (China). He has worked in the field of Distributed Computer Systems for over twenty years and had industrial experience in building large-scale networked systems. Professor Xu now leads a collaborative research team at Leeds studying Grid and Internet technologies with a focus on complex system engineering, system security and dependability, and evolving system architectures. He is the recipient of the BCS/IEE Brendan Murphy Prize 2001 for the best work in the area of distributed systems and networks. He has led or co-led many key research projects served as Program Chair/PC member of, many international computer conferences. Professor Xu has published more than 150 edited books, book chapters and academic papers, and has been Editor of IEEE Distributed Systems since 2000.   相似文献   

6.
In this paper, we propose an unstructured platform, namely I nexpensive P eer-to- P eer S ubsystem (IPPS), for wireless mobile peer-to-peer networks. The platform addresses the constraints of expensive bandwidth of wireless medium, and limited memory and computing power of mobile devices. It uses a computationally-, memory requirement- and communication- wise inexpensive gossip protocol as the main maintenance operation, and exploits location information of the wireless nodes to minimize the number of link-level messages for communication between peers. As a result, the platform is not only lightweight by itself, but also provides a low cost framework for different peer-to-peer applications. In addition, further enhancements are introduced to enrich the platform with robustness and tolerance to failures without incurring any additional computational and memory complexity, and communication between peers. In specific, we propose schemes for a peer (1) to chose a partner for a gossip iteration, (2) to maintain the neighbors, and (3) to leave the peer-to-peer network. Simulation results are given to demonstrate the performance of the platform.
Qian ZhangEmail:

Mursalin Akon   received his B.Sc.Engg. degree in 2001 from the Bangladesh University of Engineering and Technology (BUET), Bangladesh, and his M.Comp.Sc. degree in 2004 from the Concordia University, Canada. He is currently working towards his Ph.D. degree at the University of Waterloo, Canada. His current research interests include peer-to-peer computing and applications, network computing, and parallel and distributed computing. Xuemin Shen   received the B.Sc. (1982) degree from Dalian Maritime University (China) and the M.Sc. (1987) and Ph.D. degrees (1990) from Rutgers University, New Jersey (USA), all in electrical engineering. He is a Professor and the Associate Chair for Graduate Studies, Department of Electrical and Computer Engineering, University of Waterloo, Canada. His research focuses on mobility and resource management in wireless/wired networks, wireless security, ad hoc and sensor networks, and peer-to-peer networking and applications. He is a co-author of three books, and has published more than 300 papers and book chapters in different areas of communications and networks, control and filtering. Dr. Shen serves as the Technical Program Committee Chair for IEEE Globecom’07, General Co-Chair for Chinacom’07 and QShine’06, the Founding Chair for IEEE Communications Society Technical Committee on P2P Communications and Networking. He also serves as the Editor-in-Chief for Peer-to-Peer Networking and Application; founding Area Editor for IEEE Transactions on Wireless Communications; Associate Editor for IEEE Transactions on Vehicular Technology; KICS/IEEE Journal of Communications and Networks, Computer Networks; ACM/Wireless Networks; and Wireless Communications and Mobile Computing (Wiley), etc. He has also served as Guest Editor for IEEE JSAC, IEEE Wireless Communications, and IEEE Communications Magazine. Dr. Shen received the Excellent Graduate Supervision Award in 2006, and the Outstanding Performance Award in 2004 from the University of Waterloo, the Premier’s Research Excellence Award (PREA) in 2003 from the Province of Ontario, Canada, and the Distinguished Performance Award in 2002 from the Faculty of Engineering, University of Waterloo. Dr. Shen is a registered Professional Engineer of Ontario, Canada. Sagar Naik   received his BS, M. Tech., M. Math., and Ph.D. degrees from Sambalpur University (India), Indian Institute of Technology, University of Waterloo, and Concordia University, respectively. From June 1993 to July 1999 he was on the Faculty of Computer Science and Engineering at the University of Aizu, Japan, as an Assistant and Associate Professor. At present he is an Associate Professor in the Department of Electrical and Computer Engineering, University of Waterloo. His research interests include mobile communication and computing, distributed and network computing, multimedia synchronization, power-aware computing and communication. Ajit Singh   received the B.Sc. degree in electronics and communication engineering from the Bihar Institute of Technology (BIT), Sindri, India, in 1979 and the M.Sc. and Ph.D. degrees from the University of Alberta, Edmonton, AB, Canada, in 1986 and 1991, respectively, both in computing science. From 1980 to 1983, he worked at the R&D Department of Operations Research Group (the representative company for Sperry Univac Computers in India). From 1990 to 1992, he was involved with the design of telecommunication systems at Bell-Northern Research, Ottawa, ON, Canada. He is currently an Associate Professor at Department of Electrical and Computer Engineering, University of Waterloo, Waterloo, ON, Canada. His research interests include network computing, software engineering, database systems, and artificial intelligence. Qian Zhang   received the B.S., M.S., and Ph.D. degrees from Wuhan University, Wuhan, China, in 1994, 1996, and 1999, respectively, all in computer science. In July 1999, she was with Microsoft Research, Asia, Beijing, China, where she was the Research Manager of the Wireless and Networking Group. In September 2005, she joined Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, as an Associate Professor. She has published about 150 refereed papers in international leading journals and key conferences in the areas of wireless/Internet multimedia networking, wireless communications and networking, and overlay networking. She is the inventor of about 30 pending patents. Her current research interests are in the areas of wireless communications, IP networking, multimedia, P2P overlay, and wireless security. She also participated in many activities in the IETF ROHC (Robust Header Compression) WG group for TCP/IP header compression. Dr. Zhang is an Associate Editor for the IEEE Transactions on Wireless Communications, IEEE Transactions on Multimedia, IEEE Transactions on Vehicular Technologies, and Computer Communications. She also served as the Guest Editor for a Special Issue on Wireless Video in the IEEE Wireless Communication Magazine and is serving as a Guest Editor for a Special Issue on Cross Layer Optimized Wireless Multimedia Communication in the IEEE Journal on Selected Areas in Communications. She received the TR 100 (MIT Technology Review) World’s Top Young Innovator Award. She also received the Best Asia Pacific (AP) Young Researcher Award from the IEEE Communication Society in 2004. She received the Best Paper Award from the Multimedia Technical Committee (MMTC) of IEEE Communication Society. She is the Chair of QoSIG of the Multimedia Communication Technical Committee of the IEEE Communications Society. She is also a member of the Visual Signal Processing and Communication Technical Committee and the Multimedia System and Application Technical Committee of the IEEE Circuits and Systems Society.   相似文献   

7.
Video-on-demand service in wireless networks is one important step to achieving the goal of providing video services anywhere anytime. Typically, carrier mobile networks are used to deliver videos wirelessly. Since every video stream comes from the base station, regardless of what bandwidth sharing techniques are being utilized, the media stream system is still limited by the network capacity of the base station. The key to overcome the scalability issue is to exploit resources available at mobile clients in a peer-to-peer setting. We observe that it is common to have a carrier mobile network and a mobile peer-to-peer network co-exist in a wireless environment. A feature of such hybrid environment is that the former offers high availability assurance, while the latter presents an opportunistic use of resources available at mobile clients. Our proposed video-on-demand technique, PatchPeer, leverages this network characteristic to allow the video-on-demand system scale beyond the bandwidth capacity of the server. Mobile clients in PatchPeer are no longer passive receivers, but also active senders of video streams to other mobile clients. Our extensive performance study shows that PatchPeer can accept more clients than the current state-of-the-art technique, while maintaining the same Quality-of-Service to clients.
Fuyu LiuEmail:

Tai T. Do   is a Ph.D. student in Computer Science at the University of Central Florida, working in the Data Systems Laboratory. He received a B.S. degree in Electrical Engineering from the University of Oklahoma in 2001. His main research interests are Distributed Systems and Databases (Peer-to-Peer Systems, Distributed Monitoring Queries), Communications and Networking (Video Delivery Techniques, Wireless Communication Protocols), Decision Support Systems (Real-time Route Diversion Systems), and Security and Privacy (Anonymity for Location-based Services). Tai T. Do is a recipient of the UCF Order of Pegasus, i.e. UCF Best Student Award, class of 2008. Kien A. Hua   received the B.S. degree in Computer Science, M.S. and Ph.D. degrees in Electrical Engineering, all from the University of Illinois at Urbana-Champaign, in 1982, 1984, and 1987, respectively. Form 1987 to 1990 he was with IBM Corporation. He joined the University of Central Florida in 1990, and is currently a professor in the School of Computer Science. Dr. Hua has published widely including several papers recognized as best papers at various international conferences. He has served as Conference Chair, Vice-Chair, Associate Chair, Demo Chair, and Program Committee Member for numerous ACM and IEEE conferences. Currently, he is on the editorial boards of Journal of Multimedia Tools and Applications and International Journal of Advanced Information Technology. Dr. Hua is an IEEE Fellow. Ning Jiang   received the Ph.D. degree in Computer Science from the University of Central Florida. Currently, he is working at the Office Lab at Microsoft Corp. His main research interests are Mobile computing, Data mining, and Network security. Fuyu Liu   is a Ph.D. student in Computer Science at the University of Central Florida, working in the Data Systems Laboratory. His main research interests are Distributed Systems and Databases (Distributed Monitoring Queries, Mobile COmputing), and Security and Privacy (Anonymity for Location-based Services).   相似文献   

8.
Trust is required in a file sharing peer-to-peer system to achieve better cooperation among peers. In reputation-based peer-to-peer systems, reputation is used to build trust among peers. In these systems, highly reputable peers will usually be selected to upload requested files, decreasing significantly malicious uploads in the system. However, these peers need to be motivated by increasing the benefits that they receive from the system. In addition, it is necessary to motivate free riders to contribute to the system by sharing files. Malicious peers should be also motivated to contribute positively by uploading authentic files instead of malicious ones. Service differentiation is required to motivate peers to get involved by sharing and uploading the requested files. To provide the right incentives for peers to contribute to the system, the new concept of Contribution Behavior is introduced for partially decentralized peer-to-peer systems. In this paper, the Contribution Behavior of the peer is used as a guideline for service differentiation instead of peer’s reputation. Both Availability and Involvement of the peer are used to assess its Contribution Behavior. Performance evaluations confirm the ability of the proposed scheme to effectively identify both free riders and malicious peers and reduce the level of service provided to them. On the other hand, good peers receive better service. Simulation results also confirm that based on a Rational Behavior, peers are motivated to increase their contribution to receive services. Moreover, using our scheme, peers must continuously participate, reducing significantly the milking phenomenon.
Raouf BoutabaEmail:

Loubna Mekouar   received her M.Sc. degree in Computer Science from the University of Montreal in 1999. She is currently a Ph.D. student at the School of Computer Science at the University of Waterloo. Her research interests include trust and reputation in peer-to-peer systems, Quality of Service in multimedia applications, and network and distributed systems management. Youssef Iraqi   received his B.Sc. in Computer Engineering, with high honors, from Mohammed V University, Morocco, in 1995. He received his M.Sc. and Ph.D. degrees in Computer Science from the University of Montreal in 2000 and 2003 respectively. From 1996 to 1998, he was a research assistant at the Computer Science Research Institute of Montreal, Canada. From 2003 to 2005, he was a research assistant professor at the David R. Cheriton School of Computer Science at the University of Waterloo. He is currently an assistant professor at Dhofar University, Salalah, Oman. His research interests include network and distributed systems management, resource management in multimedia wired and wireless networks, and peer-to-peer networking. Raouf Boutaba   received the M.Sc. and Ph.D. Degrees in Computer Science from the University Pierre & Marie Curie, Paris, in 1990 and 1994 respectively. He is currently a Professor of Computer Science at the University of Waterloo. His research interests include network, resource and service management in wired and wireless networks. Dr. Boutaba is the founder and Editor-in-Chief of the IEEE Transactions on Network and Service Management and on the editorial boards of several other journals. He is currently a distinguished lecturer of the IEEE Communications Society, the chairman of the IEEE Technical Committee on Information Infrastructure. He has received several best paper awards and other recognitions such as the premier’s research excellence award.   相似文献   

9.
Providing real-time and QoS support to stream processing applications running on top of large-scale overlays is challenging due to the inherent heterogeneity and resource limitations of the nodes and the multiple QoS demands of the applications that must concurrently be met. In this paper we propose an integrated adaptive component composition and load balancing mechanism that (1) allows the composition of distributed stream processing applications on the fly across a large-scale system, while satisfying their QoS demands and distributing the load fairly on the resources, and (2) adapts dynamically to changes in the resource utilization or the QoS requirements of the applications. Our extensive experimental results using both simulations as well as a prototype deployment illustrate the efficiency, performance and scalability of our approach.
Vana Kalogeraki (Corresponding author)Email:

Thomas Repantis   is a PhD candidate at the Computer Science and Engineering Department of the University of California, Riverside. His research interests lie in the area of distributed systems, distributed stream processing systems, middleware, peer-to-peer systems, pervasive and cluster computing. He holds an MSc from the University of California, Riverside and a Diploma from the University of Patras, Greece, and has interned with IBM Research, Intel Research and Hewlett-Packard. Yannis Drougas   is currently a Ph.D. student in the Department of Computer Science and Engineering at University of California, Riverside. He received the Diploma in Electrical and Computer Engineering from Technical University of Crete, Greece in 2003. His research interests include peer-to-peer systems, real-time systems, stream processing systems, resource management and sensor networks. Vana Kalogeraki   is currently an Associate Professor in the Department of Computer Science and Engineering at the University of California, Riverside. She received the Ph.D. in Electrical and Computer Engineering from the University of California, Santa Barbara, in 2000. Previously she was an Assistant Professor in the Department of Computer Science and Engineering at the University of California, Riverside (2002–2008) and held a Research Scientist Position at Hewlett Packard Labs in Palo Alto, CA (2001–2002). Her research interests include distributed systems, peer-to-peer systems, real-time systems, resource management and sensor networks.   相似文献   

10.
Mobile P2P networks possess particular characteristics which make accessibility of services deployed on peers a challenge. This has to be taken into account when considering robustness of applications that depend on successfully accessing a set of services. While ensuring robustness is traditionally handled through replication or redundancy, those solutions are not readily applicable to decentralized and dynamic networks. Instead, current solutions are based on efficient P2P structure maintenance or unstructured network search algorithms. A novel and alternative method proposed in this paper is based on the observation that some redundancy may exist between services offered on the network, a fact which could be used to recreate an unavailable service from services accessible to a peer. Instead of adding redundancy to the system, our solution exploits the already existing redundancy to improve robustness of mobile P2P applications. We model the interaction with services as finite-state transducers and propose a heuristic to obtain redundancy between any pair of services. Then, a set of algorithms that uses this inter-service redundancy to recreate the interaction with one service from the other is discussed. The computational cost is polynomial with respect to services’ size, and in practice, the non-redundant functionality and related control need to be implemented locally.
Abdulmotaleb El SaddikEmail:

Andrew Roczniak   is a software architect specializing in semantic and mobile computing with over 10 years’ industry experience. He is the author or co-author of a number of peer-reviewed articles and serves as a reviewer for conference proceedings and journal publications. He obtained his Ph.D and Ma.Sc in electrical engineering in 2008 and 1996 respectively. He is the recipient of the IBM Student Conference Grant at the ACM Multimedia Conference in Singapore, 2005. Abdulmotaleb El Saddik   is University Research Chair and Professor, SITE, University of Ottawa and recipient of the Professional of the Year Award (2008), the Friedrich Wilhelm-Bessel Research Award from Germany’s Alexander von Humboldt Foundation (2007) the Premier’s Research Excellence Award (PREA 2004), and the National Capital Institute of Telecommunications (NCIT) New Professorship Incentive Award (2004). He is the director of the Multimedia Communications Research Laboratory (MCRLab). He is a Theme co-Leader in the LORNET NSERC Research Network. He is Associate Editor of the ACM Transactions on Multimedia Computing, Communications and Applications (ACM TOMCCAP), IEEE Transactions on Multimedia (IEEE TMM) and IEEE Transactions on Computational Intelligence and AI in Games (IEEE TCIAIG) and Guest Editor for several IEEE Transactions and Journals. Dr. El Saddik has been serving on several technical program committees of numerous IEEE and ACM events. He has been the General Chair and/or Technical Program Chair of more than 20 international conferences symposia and workshops on collaborative hapto-audio-visual environments, multimedia communications and instrumentation and measurement. He was the general co-chair of ACM MM 2008. He is leading researcher in haptics, service-oriented architectures, collaborative environments and ambient interactive media and communications. He has authored and co-authored two books and more than 200 publications. He has received research grants and contracts totaling more than $10 million and has supervised more than 90 researchers. His research has been selected for the BEST Paper Award three times. Dr. El Saddik is a Senior Member of ACM, an IEEE Distinguished Lecturer and a Fellow of the IEEE.   相似文献   

11.
Despite many improvements on original unstructured P2P networks, these systems still suffer from several problems, the most important of which are, (a) lack of guarantees on the integrity of the network topology in the face of churns, (b) excessive traffic cost and (c) poor quality of search results. This paper introduces an end-to-end scalable unstructured P2P networking solution called SUPNET to address many of these issues. SUPNET is based on our pragmatic, design oriented approach to engineering complex networks. Rather than modeling dynamical behavior in already-existing networks, we actively design and implement local stochastic dynamics so that an engineered global system, with predictable structures emerges. The resulting protocol, SUPNET, consists of two sub-protocols for network management and content search. The network management sub-protocol is scalable and highly robust and is capable of utilizing the heterogeneous distribution of network resources. Its high stability is the result of implementation of a novel distributed feedback mechanism. The search sub-protocol is capable of locating every item, even if a single copy of that item exists in the network, while producing a traffic that scales provably sub-linear with the network size. It also contains mechanisms for very efficient location of popular items as well as distributed parameter tuning algorithms. These, along with inherently self-organized and de-centralized operation, relative ease of implementation and solid analytical foundation, make SUPNET a compelling solution for unstructured P2P networking.
Vwani P. RoychowdhuryEmail:

Nima Sarshar   received his B.Sc. from Sharif University of Technology, Iran, his Masters from University of California, Los Angeles, USA and his Ph.D. from McMaster University, Canada, all in electrical engineering. Currently, he is an Assistant Professor in Faculty of Engineering, University of Regina, SK, Canada. His research interests include large scale distributed processing, P2P computing and multimedia networking. He has won the best paper award at IEEE P2P ’04 for his paper, “Percolation Search Algorithm in Power-Law Networks: Making Unstructured P2P Networks Scalable” and at VCIP ’08 for his paper “Rate-Distortion Optimized Multimedia Communication in Networks”. Vwani P. Roychowdhury   received the Ph.D. degree in Electrical Engineering from Stanford University. He is a professor of Electrical Engineering at the University of California, Los Angeles. His research focuses on computation models, including parallel and distributed processing systems, quantum computation and information processing, and circuits and computing paradigms for nanoelectronics and molecular electronics.   相似文献   

12.
We propose a unifying family of quadratic cost functions to be used in Peer-to-Peer ratings. We show that our approach is general since it captures many of the existing algorithms in the fields of visual layout, collaborative filtering and Peer-to-Peer rating, among them Koren spectral layout algorithm, Katz method, Spatial ranking, Personalized PageRank and Information Centrality. Besides of the theoretical interest in finding common basis of algorithms that where not linked before, we allow a single efficient implementation for computing those various rating methods. We introduce a distributed solver based on the Gaussian Belief Propagation algorithm which is able to efficiently and distributively compute a solution to any single cost function drawn from our family of quadratic cost functions. By implementing our algorithm once, and choosing the computed cost function dynamically on the run we allow a high flexibility in the selection of the rating method deployed in the Peer-to-Peer network. Using simulations over real social network topologies obtained from various sources, including the MSN Messenger social network, we demonstrate the applicability of our approach. We report simulation results using networks of millions of nodes.
Danny BicksonEmail:

Danny Bickson   is a Ph.D. candidate at the Hebrew University of Jerusalem. He received his M.Sc. and B.Sc. degree is 2003 and 1999 respectively at the Hebrew University of Jerusalem. His research interests include linear dynamical systems, message-passing algorithms applied in distributed settings and Peer-to-Peer networks. Dahlia Malkhi   is a Principal Researcher in the Microsoft Research Silicon Valley lab. She received her Ph.D., M.Sc. and B.Sc. degrees in 1994, 1988, 1985, respectively, from the Hebrew University of Jerusalem, Israel. During the years 1995–1999 she was a member of the Secure Systems Research Department at AT&T Labs-Research in Florham Park, New Jersey. From 1999 to 2007, she was a member of the faculty at the Institute of Computer Science, the Hebrew University of Jerusalem. Her research interests include all areas of distributed systems.   相似文献   

13.
14.
We show how to create a music video automatically, using computable characteristics of the video and music to promote coherent matching. We analyze the flow of both music and video, and then segment them into sequences of near-uniform flow. We extract features from the both video and music segments, and then find matching pairs. The granularity of the matching process can be adapted by extending the segmentation process to several levels. Our approach drastically reduces the skill required to make simple music videos.
Siwoo ByunEmail:

Jong-Chul Yoon   received his B.S. and M.S. degree in Media from Ajou University in 2003 and 2005, respectively. He is currently a Ph.D. candidate in the Computer Science from Yonsei University. His research interests include computer animation, multi-media control, and geometric modeling. In-Kwon Lee   received his B.S. degree in Computer Science from Yonsei University in 1989 and earned his M.S. and Ph.D. in Computer Science from POSTECH in 1992 and 1997, respectively. Currently, he is teaching and researching in the area of computer animation, geometric modeling, and computational music in Yonsei University. Siwoo Byun   received his B.S. degree in Computer Science from Yonsei University in 1989 and earned his M.S. and Ph.D. in Computer Science from Korea Advanced Institute of Science and Technology (KAIST) in 1991 and 1999, respectively. Currently, he is teaching and researching in the area of distributed database systems, mobile computing, and fault-tolerant systems in Anyang University.   相似文献   

15.
Node sampling services provide peers in a peer-to-peer system with a source of randomly chosen addresses of other nodes. Ideally, samples should be independent and uniform. The restrictions of a distributed environment, however, introduce various dependancies between samples. We review gossip-based sampling protocols proposed in previous work, and identify sources of inaccuracy. These include replicating the items from which samples are drawn, and imprecise management of the process of refreshing items. Based on this analysis, we propose a new protocol, Eddy, which aims to minimize temporal and spatial dependancies between samples. We demonstrate, through extensive simulation experiments, that these changes lead to an improved sampling service. Eddy maintains a balanced distribution of items representing active system nodes, even in the face of realistic levels of message loss and node churn. As a result, it behaves more like a centralized random number generator than previous protocols. We demonstrate this by showing that using Eddy improves the accuracy of a simple algorithm that uses random samples to estimate the size of a peer-to-peer network.
Stephen A. JarvisEmail:

Elth Ogston   is a Post-doctoral Research Fellow the High Performance Systems Group at the University of Warwick. She obtained her Bachelors/Masters degree from the Massachusetts Institute of Technology in 1996 and subsequently joined HP Labs in Bristol. She completed her Ph.D. at the Vrije Universiteit Amsterdam in 2005. Stephen A. Jarvis   is an Associate Professor (Reader) in the Department of Computer Science at the University of Warwick. He is head of the High Performance Systems Group and also the Department’s Director of Research. Dr Jarvis has authored more than 125 refereed publications (including three books) on software and performance evaluation. While previously at the Oxford University Computing Laboratory, he worked on the development of performance tools with Oxford Parallel, Sychron Ltd and Microsoft Research in Cambridge. He has considerable experience in the field of peer-to-peer systems, with particular reference to overlay construction and performance optimization(including publications in ICDCS, INFOCOM, DSN and MASCOTS). His recent papers on this topic have received best paper awards, and he has published several IEEE Transactions Parallel and Distributed Systems articles in this area. He is also guest editor of a special issue of the International Journal of Parallel, Emergent and Distributed Systems dedicated to the performance analysis of P2P systems. Dr Jarvis has been a member of more than thirty international programme committees for high-performance and distributed computing. He is an external advisor for the Netherlands Organization for Scientific Research; co-organiser for one of the UK’s High End Scientific Computing Training Centres; Manager of the Midlands e-Science Technical Forum on Grid Technologies, and elected member of the EPSRC Review College.   相似文献   

16.
In this paper a novel scheme for color video compression using color transfer technique is proposed. Towards this, a new color transfer mechanism for video using motion estimation is presented. Encoder and decoder architectures for the proposed compression scheme are also presented. In this scheme, compression is achieved by firstly discarding chrominance information for all but selected reference frames and then using motion prediction and discrete cosine transform (DCT) based quantization. At decompression stage, the luminance-only frames are colored using chrominance information from the reference frames applying the proposed color transfer technique. To integrate color transfer mechanism with hybrid compression scheme a new color transfer protocol is defined. Both compression scheme and color transfer work in YCbCr color space.
Ritwik KumarEmail:

Ritwik Kumar   received his B.Tech. degree in Information and Communication Technology from Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, India in 2005. Since 2005 he has been a Ph.D. student at the Center for Vision, Graphics and Medical Imaging at the Department of Computer and Information Science and Engineering at the University of Florida, Gainesville, FL, USA. His research interests include machine learning, color video processing and face recognition Suman K. Mitra   is an Assistant Professor at the Dhirubhai Ambani Institute of Information and Communication Technology, Gandhinagar, India. Dr. Mitra obtained his Ph.D. from the Indian Statistical Institute. Earlier, Dr. Mitra was with the Institute of Neural Computation at the University of California, San Diego, USA as a post-graduate researcher and with the Department of Mathematics at the Indian Institute of Technology, Bombay as an assistant professor. Dr. Mitra’s research interest includes image processing, pattern recognition, Bayesian networks and digital watermarking. Currently, Dr. Mitra is serving International Journal of Image and Graphics (IJIG) as an Associate Editor. Dr. Mitra is a life member of ISCA and a member of IEEE, and IUPRAI   相似文献   

17.
This paper presents an analytical model that helps understanding the common foundations of routing in DHTs and provides means for analytical comparison of different systems and different parameter combinations. In the proposed model, a logarithmic transformation is applied to the metric space embedding node identifiers. We show that in this transformed space - similarly to short-range connections in the real metric space - long-range connections have linear properties: connections are uniformly distributed and routing via long-range contacts progresses linearly toward the target. Using this transformation model, we introduce a λ long-range connection density parameter to characterize DHT routing and analyze common properties and differences between existing DHT routing mechanisms. For the the two extreme DHT families (“most random” and completely deterministic), we also present a detailed stochastic analysis of routing in the transformed space and express analytically the expected value of the number of routing hops.
Róbert SzabóEmail:

Peter Kersch   has received MSc degree in computer science from Budapest University of Technology and Economics in 2003. He is currently a PhD candidate in the same institution. His main research interests include modelling, performance analysis and design of self-organizing algorithms, P2P networks and ad hoc networks. Dr. Robert Szabo   is an associate professor at the Department of Telecommunication and Media Informatics, Budapest University of Technology (BME). He is the head of the High Speed Networks Laboratory at BME; and is the president of the Telecommunications Section of the Scientific Association for Infocommunications, Hungary. His main research interests are architectures, protocols and performance of communication networks.   相似文献   

18.
Participants of a decentralized system often use some local ranking informations, for selection of effective collaborations. We say that such systems are preference-based. For most practical types of preferences, such systems converge towards a unique stable configuration. In this paper, we investigate the speed and quality of the convergence process with respect to the model parameters. Our results provide an interesting insight into the design of system parameters, such as the number of connections or the algorithm for choosing new partners.
Fabien MathieuEmail:

Fabien Mathieu   Dr. Fabien Mathieu works at France Télécom R&D (Orange Labs) on large scale networks modeling. His research interests include simulation and analytical modeling of P2P networks and Web graphs. He graduated in 2001 from the école Normale Supérieure de la rue d’Ulm (Paris, France). He has a PhD in Computer Science from university of Montpellier II. He has been a post-doc researcher during 2005 at the University of Louvain-la-Neuve (Belgium) working on traffic analysis.   相似文献   

19.
Due to the large data size of 3D MR brain images and the blurry boundary of the pathological tissues, tumor segmentation work is difficult. This paper introduces a discriminative classification algorithm for semi-automated segmentation of brain tumorous tissues. The classifier uses interactive hints to obtain models to classify normal and tumor tissues. A non-parametric Bayesian Gaussian random field in the semi-supervised mode is implemented. Our approach uses both labeled data and a subset of unlabeled data sampling from 2D/3D images for training the model. Fast algorithm is also developed. Experiments show that our approach produces satisfactory segmentation results comparing to the manually labeled results by experts.
Changshui ZhangEmail:

Yangqiu Song   received his B.S. degree from Department of Automation, Tsinghua University, China, in 2003. He is currently a Ph.D. candidate in Department of Automation, Tsinghua University. His research interests focus on machine learning and its applications. Changshui Zhang   received his B.S. degree in Mathematics from Peking University, China, in 1986, and Ph.D. degree from Department of Automation, Tsinghua University in 1992. He is currently a professor of Department of Automation, Tsinghua University. He is an Associate Editor of the journal Pattern Recognition. His interests include artificial intelligence, image processing, pattern recognition, machine learning, evolutionary computation and complex system analysis, etc. Jianguo Lee   received his B.S. degree from Department of Automatic Control, Huazhong University of Science and Technology (HUST), China, in 2001 and Ph.D. degree in Department of Automation, Tsinghua University in 2006. He is currently a researcher in Intel China Reasearch Center. His research interests focus on machine learning and its applications. Fei Wang   is a Ph.D. candidate from Department of Automation, Tsinghua University, Beijing, China. His main research interests include machine learning, data mining, and pattern recognition. Shiming Xiang   received his B.S. degree from Department of Mathematics of Chongqing Normal University, China, in 1993 and M.S. degree from Department of Mechanics and Mathematics of Chongqing University, China, in 1996 and Ph.D. degree from Institute of Computing Technology, Chinese Academy of Sciences, China, in 2004. He is currently a postdoctoral scholar in Department of Automation, Tsinghua University. His interests include computer vision, pattern recognition, machine learning, etc. Dan Zhang   received his B.S. degree in Electronic and Information Engineering from Nanjing University of Posts and Telecommunications in 2005. He is now a Master candidate from Department of Automation, Tsinghua University, Beijing, China. His research interests include pattern recognition, machine learning, and blind signal separation.   相似文献   

20.
Eigendecomposition-based techniques are popular for a number of computer vision problems, e.g., object and pose estimation, because they are purely appearance based and they require few on-line computations. Unfortunately, they also typically require an unobstructed view of the object whose pose is being detected. The presence of occlusion and background clutter precludes the use of the normalizations that are typically applied and significantly alters the appearance of the object under detection. This work presents an algorithm that is based on applying eigendecomposition to a quadtree representation of the image dataset used to describe the appearance of an object. This allows decisions concerning the pose of an object to be based on only those portions of the image in which the algorithm has determined that the object is not occluded. The accuracy and computational efficiency of the proposed approach is evaluated on 16 different objects with up to 50% of the object being occluded and on images of ships in a dockyard.
Anthony A. MaciejewskiEmail:

Chu-Yin Chang   received the B.S. degree in mechanical engineering from National Central University, Chung-Li, Taiwan, ROC, in 1988, the M.S. degree in electrical engineering from the University of California, Davis, in 1993, and the Ph.D. degree in electrical and computer engineering from Purdue University, West Lafayette, in 1999. From 1999--2002, he was a Machine Vision Systems Engineer with Semiconductor Technologies and Instruments, Inc., Plano, TX. He is currently the Vice President of Energid Technologies, Cambridge, MA, USA. His research interests include computer vision, computer graphics, and robotics. Anthony A. Maciejewski   received the BSEE, M.S., and Ph.D. degrees from Ohio State University in 1982, 1984, and 1987. From 1988 to 2001, he was a professor of Electrical and Computer Engineering at Purdue University, West Lafayette. He is currently the Department Head of Electrical and Computer Engineering at Colorado State University. He is a Fellow of the IEEE. A complete vita is available at: Venkataramanan Balakrishnan   is Professor and Associate Head of Electrical and Computer Engineering at Purdue University, West Lafayette, Indiana. He received the B.Tech degree in electronics and communication and the President of India Gold Medal from the Indian Institute of Technology, Madras, in 1985. He then attended Stanford University, where he received the M.S. degree in statistics and the Ph.D. degree in electrical engineering in 1992. He joined Purdue University in 1994 after post-doctoral research at Stanford, CalTech and the University of Maryland. His primary research interests are in convex optimization and large-scale numerical algebra, applied to engineering problems. Rodney G. Roberts   received B.S. degrees in Electrical Engineering and Mathematics from Rose-Hulman Institute of Technology in 1987 and an MSEE and Ph.D. in Electrical Engineering from Purdue University in 1988 and 1992, respectively. From 1992 until 1994, he was a National Research Council Fellow at Wright Patterson Air Force Base in Dayton, Ohio. Since 1994 he has been at the Florida A&M University---Florida State University College of Engineering where he is currently a Professor of Electrical and Computer Engineering. His research interests are in the areas of robotics and image processing. Kishor Saitwal   received the Bachelor of Engineering (B.E.) degree in Instrumentation and Controls from Vishwakarma Institute of Technology, Pune, India, in 1998. He was ranked Third in the Pune University and was recipient of National Talent Search scholarship. He received the M.S. and Ph.D. degrees from the Electrical and Computer Engineering department, Colorado State University, Fort Collins, in 2001 and 2006, respectively. He is currently with Behavioral Recognition Systems, Inc. performing research in computer aided video surveillance systems. His research interests include image/video processing, computer vision, and robotics.   相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号