International Journal of Networked and Distributed Computing

+ Advanced search
178 articles

Query Integrity Verification based-on MAC Chain in Cloud Storage

Jun Hong, Tao Wen, Quan Guo, Gang Sheng
Pages: 241 - 249
In order to reduce data maintenance overhead, more and more enterprises outsource their data to the cloud storage, which provides flexible and on-demand storage service for companies. Data outsourcing also brings a lot of security problems, of which query integrity is a critical issue to be resolved....

Accelerating NTRU Encryption with Graphics Processing Units

Tianyu Bai, Spencer Davis, Juanjuan Li, Ying Gu, Hai Jiang
Pages: 250 - 258
Lattice based cryptography is attractive for its quantum computing resistance and efficient encryption/ decryption process. However, the Big Data issue has perplexed most lattice based cryptographic systems since the overall processing is slowed down too much. This paper intends to analyze one of the...

Brain Activity Measurement during Program Comprehension with NIRS

Yoshiharu Ikutani, Hidetake Uwano
Pages: 259 - 268
Near infrared spectroscopy (NIRS) has been used as a low cost, noninvasive method to measure brain activity. In this paper, we experiment to measure the effects of variables and controls in a source code to brain activity during program comprehension. The measurement results are evaluated after noise...

Context-Aware Multimedia Content Adaptation for Mobile Web

Dongsong Zhang, Anil Jangam, Lina Zhou, Isil Yakut
Pages: 1 - 10
Multimedia content in web pages poses a variety of problems to mobile web users, such as incompatibility with mobile devices or failing to meet accessibility needs of users with vision disabilities. To address those problems, this study proposes and evaluates a context-aware approach to multimedia content...

The Influence of Alias and References Escape on Java Program Analysis

Shengbo Chen, Dashen Sun, Huaikou Miao
Pages: 11 - 20
The alias and references escape are often used in Java programs. They bring much convenience to the developers, but, at the same time, they also give adverse affects on the data flow and control flow of program during program analysis. Therefore, when analyzing Java programs, we must take the alias and...

An Efficient Structure for LKH Key Tree on Secure Multicast Communications

Naoshi Sakamoto
Pages: 21 - 30
In order to communicate in cipher over IP multicast, each of joining and leaving participants causes renewing keys. Moreover, the number of renewed keys depends on the key management system. LKH, one of the key management systems, uses a tree structure to manage keys to share with participants. Every...

Parallel dynamic programming based on stage reconstruction and its application in reservoir operation

Huitao Zheng, Yadong Mei, Kai Duan, Yuru Lin
Pages: 31 - 41
We improved the serial recursion calculation process of dynamic programming and introduced parallel dynamic programming based on stage reconstruction. Through the proposed algorithm a multistage decision problem can be repeatedly reconstructed and gradually transferred to a single stage issue. This algorithm...

A Distributed Storage System with Dynamic Tiering for iSCSI Environment

Atsushi Nunome, Hiroaki Hirata, Kiyoshi Shibayama
Pages: 42 - 50
We propose a distributed storage system which relocates data blocks autonomously among the storage nodes. In order to optimize I/O performance with slight administrative workload, our system is aimed at the realization of the following two functions; (i) Run-time construction of the storage tiers from...

An Introduction of Multiple P-adic Data Type and Its Parallel Implementation

Chao Lu, Xinkai Li
Pages: 51 - 59
Our research group has been working on the P-adic theory and its implementation. Based on the Chinese Remainder theorem and the Hensel code a new data type, called Multiple P-adic Data Type, has been established to realize rational calculation. With this data type all rational number operations are converted...

Comparison of Hash Table Performance with Open Addressing and Closed Addressing: An Empirical Study

Dapeng Liu, Shaochun Xu
Pages: 60 - 68
In this paper, we conducted empirical experiments to study the performance of hashing with a large set of data and compared the results of different collision approaches. The experiment results leaned more to closed addressing than to open addressing and deemed linear probing impractical due to its low...

A Traffic Flow Theory Aided Physical Measurement-Based Sybil Nodes Detection Mechanism in Vehicular Ad-hoc Networks

Dongxu Jin, JooSeok Song
Pages: 69 - 78
In Vehicular Ad-hoc Networks, security is a important issue. In the past years, several approaches have been proposed for solving Sybil attack. In this paper a novel scheme to detect the Sybil nodes is presented. The proposed scheme utilizes unmodifiable physical measurements of beacon messages. To increase...

Optimal Number of Clusters for Fast Similarity Search Considering Transformations of Time Varying Data

Toshiichiro Iwashita, Teruhisa Hochin, Hiroki Nomiya
Pages: 79 - 88
This paper proposes a method of determining the optimal number of clusters dividing the multiple transformations for the purpose of the efficient processing of query against the results of applying the transformations to time series. In this paper, the moving average is used as a transformation for simplicity....

Parallel Indexing Scheme for Data Intensive Applications

Kenta Funaki, Teruhisa Hochin, Hiroki Nomiya, Hideya Nakanishi
Pages: 89 - 98
This paper proposes a parallel indexing scheme of a large amount of data in order to resolve the issues about time limitation. Three kinds of computing-nodes are introduced. These are reception-nodes, representative-nodes, and normal-nodes. A reception-node receives data for insertion. A representative-node...

Evaluation of A Secure Live Migration of Virtual Machines Using IPsec Implementation

Norshazrul Azman bin Sulaiman, Hideo Masuda
Pages: 99 - 108
Live migration enables administrators to perform online maintenance on host and virtual machines without interrupted service during fault occurrences. While migrating VMs between physical servers of different data centers over the network is considered, security is essential for securing the migration...

Integrated Usage of Heterogeneous Databases for Novice Users

Ayano Terakawa, Teruhisa Hochin, Hiroki Nomiya
Pages: 109 - 118
This paper proposes the system enabling users to use heterogeneous databases in an integrated manner without any conversion and servers. In order to treat a variety of sources in a unified manner, this system is realized by using Java Database Connectivity (JDBC) in accessing databases on the user’s...

Incremental Data Migration for Multi-Database Systems Based on MySQL with SPIDER Storage Engines

Naoyuki Miyamoto, Ken Higuchi, Tatsuo Tsuji
Pages: 119 - 127
In this paper, an incremental data migration technique is evaluated in the multi-database system based on MySQL with SPIDER storage engine and the improvement of the turn-around times of other operations is proved in this systems. In this method, a large data migration is divided into small data migrations...

Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System

Gaith K.D. Al., Biplob Rakshit Ray, Morshed Chowdhury
Pages: 128 - 136
In RFID system a tag is attached to an object which might own by a number of owners during its life time. This requires the RFID system to transfer ownership of the tag to its new owner. The ownership transfer has to protect privacy of current and new owner. Many ownership tag ownership transfer exists...

Towards a Monitoring Framework for the Automatic Integration of the Access Control Policies for Web Services

Mohammed Alodib
Pages: 137 - 149
Cloud computing is an emerging model of business computing that can be used to maintain configurable resources such as processors, networks, storage, operating systems, databases, and servers. Service oriented Architecture (SoA) is one of most successful paradigms deployed over the Cloud; is a layered...

Jade: Reducing Energy Consumption of Android App

Hao Qian, Daniel Andresen
Pages: 150 - 158
The need for increased performance of mobile device directly conflicts with the desire for longer battery life. Offloading computation to multiple devices is an effective method to reduce energy consumption and enhance performance for mobile applications. Android provides mechanisms for creating mobile...

Secure in-vehicle Systems using Authentication

Masaya Yoshikawa, Kyota Sugioka, Yusuke Nozaki, Kensaku Asahi
Pages: 159 - 166
Recently, driving support technologies have been practically used. However, a problem has been pointed out that when a vehicle is connected with an external network, the safety of the vehicle is threatened. Ensuring the security of in-vehicle systems becomes an important priority. The present study proposes...

Effective Management of ReRAM-based Hybrid SSD for Multiple Node HDFS

Nayoung Park, Byungjun Lee, Kyung Tae Kim, Hee Yong Youn
Pages: 167 - 176
Recently, the research of Hybrid ReRAM/MLC NAND SSD is rapidly expanding into the storage areas. Most existing researches of Hybrid SSD are based on a single storage, while the management of multiple nodes like HDFS is still immature. In this paper a new efficient cold data eviction scheme is proposed...

Load Balancing of Peer-to-Peer MMORPG Systems with Hierarchical Area-of-Interest Management

Satoshi Fujita
Pages: 177 - 184
This paper studies the load balancing problem in distributed systems designed for massively multiplayer online role-playing games (MMORPGs). More concretely, we consider a distributed system of master- worker type in which each worker is associated with a particular region in the game field, and propose...

Contour Completion of Partly Occluded Objects Based on Figural Goodness

Takahiro Hayashi, Tatsuya Ooi, Motoki Sasaki
Pages: 185 - 192
Object extraction has a crucial role in various visual semantic scenarios. In this paper, we propose a system for object extraction which can deal with an object partly occluded by other objects. In order to estimate the hidden part of the occluded object, the system combines different types of contour...

Development of an Effective Gaze Writing System with an Interface for Text Copy and Paste

Reo Kishi, Takahiro Hayashi
Pages: 193 - 201
While many interfaces for gaze writing (text entry by eye gaze) are available today, these interfaces are just a replacement of a keyboard. For more efficient gaze writing, this paper proposes a novel gaze writing system which has two kinds of gaze writing interfaces: (1) an interface for text entry...

A Routing Algorithm Solving the Container Problem in a Hypercube with Bit Constraint

Antoine Bossard, Keiichi Kaneko
Pages: 202 - 213
As reflected by the TOP500 list, hypercubes are popular interconnection networks for massively parallel systems, the main reason being the simplicity and ease of implementation of this network topology. In order to retain performance high and avoid bottleneck situation, routing algorithms are critical...

An Energy Efficient Clustering Algorithm for Maximizing the Lifetime of Wireless Sensor Network

Kyung Tae Kim, Man Youn Kim, Ji Hyeon Choi, Hee Yong Youn
Pages: 214 - 223
In this paper we propose an energy efficient clustering algorithm for maximizing the lifetime of WSNs. The proposed scheme decides the cluster head based on the energy level of the nodes, while tree topology is adopted to connect the nodes inside each cluster. A new model for deciding an optimal number...

Enhanced Hypervisor-based SSD Cache with Dynamic Cache Scanning and Allocation for Virtualized Cloud System

Hee Jung Park, Kyung Tae Kim, Man Yun Kim, Hee Yong Youn
Pages: 224 - 233
Recently, SSD caching is widely studied for VM-based systems. In this paper we propose a novel hypervisor-based SSD caching scheme, employing a new metric to accurately determine the demand on SSD cache space of each VM. Computer simulation confirms that it substantially improves the accuracy of cache...

Hybrid Approach of Ontology and Image Clustering for Automatic Generation of Hierarchic Image Database

Ryosuke Yamanishi, Ryoya Fujimoto, Yuji Iwahori, Robert J. Woodham
Pages: 234 - 242
This paper proposes a hybrid approach of ontology and image clustering to automatically generate hierarchic image database. In the field of computer vision, ”generic object recognition” is one of the most important topics. Generic object recognition needs three types of research: feature extraction,...

A GPU-based Pencil Beam Algorithm for Dose Calculations in Proton Radiation Therapy

Georgios Kalantzis, Theodora Leventouri, Hidenobu Tachibana, Charles Shang
Pages: 243 - 249
Recent developments in radiation therapy have been focused on applications of charged particles, especially protons. Proton therapy can allow higher dose conformality compared to conventional radiation therapy. Over the years several dose calculation methods have been proposed in proton therapy. A common...

Handover Management based on Asymmetric Nature of LTE-A HetNet using MCDM Algorithm

Xianda Chen, Young Ho Suh, Seung Wan Kim, Hee Yong Youn
Pages: 250 - 260
This paper proposes an efficient handover scheme considering the asymmetric characteristics of macro and pico cells in LTE-A HetNet. The proposed scheme detects a suitable target eNB for handover using a multi-criteria decision making algorithm and the mobility information of user equipment (UE). A prompt...

A Pruning Algorithm for Reverse Nearest Neighbors in Directed Road Networks

Rizwan Qamar, Muhammad Attique, Tae-Sun Chung
Pages: 261 - 272
In this paper, we studied the problem of continuous reverse k nearest neighbors (RkNN) in directed road network, where a road segment can have a particular orientation. A RNN query returns a set of data objects that take query point as their nearest neighbor. Although, much research has been done for...

A Theoretical Exploration of the Impact of Packet Loss on Network Intrusion Detection

Sidney C. Smith, Robert J. Hammell II, Travis W. Parker, Lisa M. Marvel
Pages: 1 - 10
In this paper we review the problem of packet loss as it pertains to Network Intrusion Detection, seeking to answer two fundamental research questions which are stepping stones towards building a model that can be used to predict the rate of alert loss based upon the rate of packet loss. The first question...

Extraction of Text Regions from Complex Background in Document Images by Multilevel Clustering

Hoai Nam Vu, Tuan Anh Tran, Na In Seop, Soo Hyung Kim
Pages: 11 - 21
Textual data plays an important role in a number of applications such as image database indexing, document understanding, and image-based web searching. The target of automatic real-life text extracting in document images without character recognition module is to identify image regions that contain...

On the Empirical Evaluation of Multicasting with Minimum Delay Variation

Nicklaus Rhodes, Shankar Banik
Pages: 22 - 31
In certain types of Internet applications, multicasting with Quality of Service (QoS) optimizations are required on both the end-to-end delay from the source to the destinations, as well as the difference in the end-to-end delay between the destinations. Examples of these applications include video-conferencing,...

Sorting Terms of “aaS” of Everything as a Service

Yucong Duan, Xiaobing Sun, Antonella Longo, Zhaoxin Lin, Shixiang Wan
Pages: 32 - 44
Numerous service models have been proposed in the form of ”as a Service” or ”aaS” in the past. This is especially eminent in the era of the Cloud under the term of anything as a service or everything as a service(XaaS). A unified view of XaaS can aid efficient classification of services for service registration,...

Automate Scientific Workflow Execution between Local Cluster and Cloud

Hao Qian, Daniel Andresen
Pages: 45 - 54
Scientific computational experiments often span multiple computational and analytical steps, and during execution, researchers need to store, access, transfer, and query information. Scientific workflow is a powerful tool to stream-line and organize scientific application. Numbers of tools have been...

Topic Model based Approach for Improved Indexing in Content based Document Retrieval

Moon Soo Cha, So Yeon Kim, Jae Hee Ha, Min-June Lee, Young-June Choi, Kyung-Ah Sohn
Pages: 55 - 64
Information Retrieval system plays an essential role in web services. However, the web services in which users can upload files as attachments typically do not support enough search conditions and often rely only on the title or the description that the users provide during upload. We present a topic-model...

Using SPIN to Check Simulink Stateflow Models

Chikatoshi Yamada, D. Michael Miller
Pages: 65 - 74
Verification is critical to the design of large and complex systems. SPIN is a well-known and extensively used verification tool. In this paper, we consider two tool chains, one existing, WSAT, and one introduced here, that support using SPIN to model check systems specified as Simulink Stateflow models....

Percolation Thresholds on Tree-Based Communities of Wireless Sensor Networks

Qiao Li, Zhendong Niu, Baihai Zhang, Lingguo Cui, Bin Wu
Pages: 75 - 84
Many efficient deployments of large-scale wireless sensor networks based on the tree-based community rise into view recently. Sensor nodes are severely resource constrained, and lack sophisticated defense mechanisms to fight virus attacks. Cyber viruses spread through node populations over the networks,...

Archaeological Distribution Map System Using Aggregate Information from Heterogeneous Information Sources

Ayako Hayashi, Teruhisa Hochin, Hiroki Nomiya
Pages: 85 - 95
This paper proposes archaeological distribution map system sharing archaeological information. Many archaeologists want to analyze the distribution of relics and/or remains. Excavation information, however, cannot be opened until verification and research are completed. Archaeological information sources...

Accelerated Diffusion-Based Recommendation Algorithm on Tripartite Graphs with GPU Clusters

Jingpeng Wang, Jie Huang, Mi Li
Pages: 96 - 105
Exorbitant computation cost hinders the practical application of recommendation algorithm, especially in time-critical application scenario. Although experiments show that recommendation algorithm based on an integrated diffusion on user-item-tag tripartite graphs can significantly improve accuracy,...

An Extended Web Displaying System based on Multiple Tablet Devices

Shota Imai, Shun Shiramatsu, Tadachika Ozono, Toramatsu Shintani
Pages: 106 - 115
We propose an extended Web displaying system based on multiple tablet devices to help users to conduct collaborative works anywhere without a large display. Users can use multiple tablet devices as a pseudo mobile large display on demand by using our system. For example, users can make discussions by...

IntegrityMR: Exploring Result Integrity Assurance Solutions for Big Data Computing Applications

Yongzhi Wang, Jinpeng Wei, Mudhakar Srivatsa, Yucong Duan, Wencai Du
Pages: 116 - 126
Large-scale adoption of MapReduce applications on public clouds is hindered by the lack of trust on the participating virtual machines deployed on the public cloud. In this paper, we propose IntegrityMR, a multi-public clouds architecture-based solution, which performs the MapReduce-based result integrity...

Hierarchical Latent Semantic Mapping for Automated Topic Generation

Guorui Zhou, Guang Chen
Pages: 127 - 136
Much of information sits in an unprecedented amount of text data. Managing allocation of these large scale text data is an important problem for many areas. Topic modeling performs well in this problem. The traditional generative models (PLSA,LDA) are the state-of-the-art approaches in topic modeling...

MLSA: a static bugs analysis tool based on LLVM IR

Hongliang Liang, Lei Wang, Dongyang Wu, Jiuyun Xu
Pages: 137 - 144
Program bugs may result in unexpected software error, crash or serious security attack. Static program analysis is one of the most common methods to find program bugs. In this paper we present MLSA -- a static analysis tool based on LLVM Intermediate Representation (IR), which can analyze programs written...

Adaptive Omni-directional Walking Method with Fuzzy Interpolation for Biped Robots

Haobin Shi, Xuesi Li, Huahui Chen, Shixiong Wang
Pages: 145 - 158
Omni-directional walking is an important part for biped robots. Whereas, the problems of complex model, low stability, low flexibility, etc., existing in walking planning of biped robots, attract interests of many researchers. This paper proposes an adaptive omni-directional walking method with fuzzy...

Distributed and High Performance Big-File Cloud Storage Based On Key-Value Store

Thanh Trung Nguyen, Minh Hieu Nguyen
Pages: 159 - 172
This research proposes a new Big File Cloud (BFC) with its architecture and algorithms to solve difficult problems of cloud-based storage using the advantages of key-value stores. There are many problems when designing an efficient storage engine for cloud-based storage systems with strict requirements...

Paralleled Fast Search and Find of Density Peaks Clustering Algorithm on GPUs with CUDA

Mi Li, Jie Huang, Jingpeng Wang
Pages: 173 - 181
Fast Search and Find of Density Peaks (FSFDP) is a newly proposed clustering algorithm that has already been successfully applied in many applications. However, this algorithm shows a dissatisfactory performance on large dataset due to the time-consuming calculation of the distance matrix and potentials....

A Scoring Rule-based Truthful Demand Response Mechanism

Keisuke Hara, Takayuki Ito
Pages: 182 - 192
Demand Response (DR) has been extensively studied as one of the important features of smart grid. The DR strategies can be grouped into two categories, one is incentive-based DR and the other is pricing-based DR. Our work focuses on DR involving both pricing factor and incentive factor using scoring...

Using SPIN to Check Simulink Stateflow Models

Chikatoshi Yamada, D. Michael Miller
Pages: 193 - 202
Verification is critical to the design of large and complex systems. SPIN is a well-known and extensively used verification tool. In this paper, we consider two tool chains, one existing, WSAT, and one introduced here, that support using SPIN to model check systems specified as Simulink Stateflow models....