Volume 1, Issue 4, November 2013
Pages: 187 - 195
We propose a novel approach by utilizing human-computer interaction data to extract user interests from web-based learning systems. The proposed approach is based on user access and a wearable context recognition system. Under our approach, a series of screen images are captured by an imaging device...
Pages: 196 - 212
Checkpoint/restart has been an effective mechanism to achieve fault tolerance for many long-running
scientific applications. The common approach is to save computation states in memory and secondary
storage for execution resumption. However, as the GPU plays a much bigger role in high performance
Pages: 213 - 225
Many/multi-core supercomputers provide a natural programming paradigm for hybrid MPI/OpenMP
scientific applications. In this paper, we investigate the performance characteristics of five hybrid MPI/OpenMP
scientific applications (two NAS Parallel benchmarks Multi-Zone SP-MZ and BT-MZ, an earthquake...
Pages: 226 - 238
Since distributed stream analytics is treated as a kind of cloud service, there exists a pressing need for its reliability and fault-tolerance, to guarantee the streaming data tuples to be processed in the order of their generation in every dataflow path, with each tuple processed once and only once....
Pages: 239 - 250
In recent years, because of the popularity of Internet and the rapid growth of multimedia applications, the
requirements of bandwidth from users increase violently in optical networks. Various multicast multimedia services
also bring challenges to next generation optical networks. As the rapid advance...
Pages: 251 - 259
Recently, peer-to-peer (P2P) traffic is increasing rapidly in volume day by day. One of the main causes
is that most of P2P applications including file sharing and streaming applications often form overlay networks
for exchanging data that are oblivious to the underlay network topology. As a result,...
Pages: 260 - 269
In the current Internet system, there are many problems using anonymity of the network communication such as personal information leak and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data,...