This document lists publications related to SDN/NFV, cloud computing & data center networks, network virtualization, and optical networks by Hongfang Yu and collaborators. It includes 29 publications related to SDN/NFV, 16 related to cloud computing & data center networks, 23 related to network virtualization, and 15 related to optical networks. The publications span conference proceedings, journal articles, and book chapters covering topics such as flow table aggregation, service function chaining, virtual network mapping, coflow scheduling, data center topology design, network function consolidation, reliable virtual infrastructure design, and impairment-aware routing.
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
IT Industry publishes original research articles, review articles, and extended versions of conference papers. Articles resulting from research of both theoretical and/or practical natures performed by academics and/or industry practitioners are welcome. IT in Industry aims to become a leading IT journal with a high impact factor.
International Journal on Web Service Computing (IJWSC)ijwscjournal
Web Service Computing is a recent evolution in Distributed Computing series and it is an emerging and fast growing paradigm in the present scenario. Web Service Computing is a diversified discipline suite that related to the technologies of Business Process Integration and Management, Grid / Utility / Cloud Computing paradigms, autonomic computing, as well as the business and scientific applications. It applies the theories of Science and Technology for bridging the gap between Business Services and IT Services. Service oriented computing addresses how to enable the technology to help people to perform business processes more efficiently and effectively, ultimately resulting in creating WIN-WIN strategy between the business organizations and end users. The greatest significance of the web services is their interoperability, which allows businesses to dynamically publish, discover, and aggregate a range of Web services through the Internet to more easily create innovative products, business processes and value chains both from organization and end user points of views. Due to these, this cross discipline attracts the variety of researchers from various disciplines to conduct the versatile research and experiments in this area.
Top 5 most viewed articles from academia in 2019 - gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications
The document summarizes the discussions and outcomes of a Dagstuhl Perspectives Workshop on applying tensor computing methods to problems in the Internet of Things (IoT). At the workshop, researchers from both industry and academia presented on challenges involving analyzing large, multi-dimensional streaming data from IoT devices and cyber-physical systems. Tensors provide a natural way to represent such data and can enable more efficient information extraction than alternative methods. However, further work is needed to develop benchmark challenges, datasets, and frameworks to make tensor methods more accessible and applicable to industrial IoT problems. The group discussed forming a knowledge hub and collaborating on data challenges to help establish tensor computing as a solution for machine learning on cyber-physical systems.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
- The document describes a method for understanding city traffic dynamics by utilizing sensor data that measures average speed and link travel time, as well as textual data from tweets and official traffic reports.
- It builds statistical models to learn normal traffic patterns from historical sensor data and identifies anomalies, then correlates anomalies with relevant traffic events extracted from tweets and reports.
- The method was evaluated on data collected for the San Francisco Bay Area, and it was able to scale to large real-world datasets by exploiting the problem structure and using Apache Spark for distributed processing. Events extracted from social media provided complementary information to sensor data for explaining traffic anomalies.
There is a rapid intertwining of sensors and mobile devices into the fabric of our lives. This has resulted in unprecedented growth in the number of observations from the physical and social worlds reported in the cyber world. Sensing and computational components embedded in the physical world is termed as Cyber-Physical System (CPS). Current science of CPS is yet to effectively integrate citizen observations in CPS analysis. We demonstrate the role of citizen observations in CPS and propose a novel approach to perform a holistic analysis of machine and citizen sensor observations. Specifically, we demonstrate the complementary, corroborative, and timely aspects of citizen sensor observations compared to machine sensor observations in Physical-Cyber-Social (PCS) Systems.
Physical processes are inherently complex and embody uncertainties. They manifest as machine and citizen sensor observations in PCS Systems. We propose a generic framework to move from observations to decision-making and actions in PCS systems consisting of: (a) PCS event extraction, (b) PCS event understanding, and (c) PCS action recommendation. We demonstrate the role of Probabilistic Graphical Models (PGMs) as a unified framework to deal with uncertainty, complexity, and dynamism that help translate observations into actions. Data driven approaches alone are not guaranteed to be able to synthesize PGMs reflecting real-world dependencies accurately. To overcome this limitation, we propose to empower PGMs using the declarative domain knowledge. Specifically, we propose four techniques: (a) automatic creation of massive training data for Conditional Random Fields (CRFs) using domain knowledge of entities used in PCS event extraction, (b) Bayesian Network structure refinement using causal knowledge from Concept Net used in PCS event understanding, (c) knowledge-driven piecewise linear approximation of nonlinear time series dynamics using Linear Dynamical Systems (LDS) used in PCS event understanding, and the (d) transforming knowledge of goals and actions into a Markov Decision Process (MDP) model used in PCS action recommendation.
We evaluate the benefits of the proposed techniques on real-world applications involving traffic analytics and Internet of Things (IoT).
Cities are composed of complex systems with physical, cyber, and social components. Current works on extracting and understanding city events mainly rely on technology enabled infrastructure to observe and record events. In this work, we propose an approach to leverage citizen observations of various city systems and services such as traffic, public transport, water supply, weather, sewage, and public safety as a source of city events. We investigate the feasibility of using such textual streams for extracting city events from annotated text. We formalize the problem of annotating social streams such as microblogs as a sequence labeling problem. We present a novel training data creation process for training sequence labeling models. Our automatic training data creation process utilizes instance level domain knowledge (e.g., locations in a city, possible event terms). We compare this automated annotation process to a state-of-the-art tool that needs manually created training data and show that it has comparable performance in annotation tasks. An aggregation algorithm is then presented for event extraction from annotated text. We carry out a comprehensive evaluation of the event annotation and event extraction on a real-world dataset consisting of event reports and tweets collected over four months from San Francisco Bay Area. The evaluation results are promising and provide insights into the utility of social stream for extracting city events.
Information Technology in Industry(ITII) - November Issue 2018ITIIIndustries
IT Industry publishes original research articles, review articles, and extended versions of conference papers. Articles resulting from research of both theoretical and/or practical natures performed by academics and/or industry practitioners are welcome. IT in Industry aims to become a leading IT journal with a high impact factor.
International Journal on Web Service Computing (IJWSC)ijwscjournal
Web Service Computing is a recent evolution in Distributed Computing series and it is an emerging and fast growing paradigm in the present scenario. Web Service Computing is a diversified discipline suite that related to the technologies of Business Process Integration and Management, Grid / Utility / Cloud Computing paradigms, autonomic computing, as well as the business and scientific applications. It applies the theories of Science and Technology for bridging the gap between Business Services and IT Services. Service oriented computing addresses how to enable the technology to help people to perform business processes more efficiently and effectively, ultimately resulting in creating WIN-WIN strategy between the business organizations and end users. The greatest significance of the web services is their interoperability, which allows businesses to dynamically publish, discover, and aggregate a range of Web services through the Internet to more easily create innovative products, business processes and value chains both from organization and end user points of views. Due to these, this cross discipline attracts the variety of researchers from various disciplines to conduct the versatile research and experiments in this area.
Top 5 most viewed articles from academia in 2019 - gerogepatton
The International Journal of Artificial Intelligence & Applications (IJAIA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the Artificial Intelligence & Applications (IJAIA). It is an international journal intended for professionals and researchers in all fields of AI for researchers, programmers, and software and hardware manufacturers. The journal also aims to publish new attempts in the form of special issues on emerging areas in Artificial Intelligence and applications
The document summarizes the discussions and outcomes of a Dagstuhl Perspectives Workshop on applying tensor computing methods to problems in the Internet of Things (IoT). At the workshop, researchers from both industry and academia presented on challenges involving analyzing large, multi-dimensional streaming data from IoT devices and cyber-physical systems. Tensors provide a natural way to represent such data and can enable more efficient information extraction than alternative methods. However, further work is needed to develop benchmark challenges, datasets, and frameworks to make tensor methods more accessible and applicable to industrial IoT problems. The group discussed forming a knowledge hub and collaborating on data challenges to help establish tensor computing as a solution for machine learning on cyber-physical systems.
8 of the Must-Read Network & Data Communication Articles Published this weeke...IJCNCJournal
Beamforming for millimetre-wave (mmWave) frequencies has been studied for many years. It is considered as an important enabling technology for communications in these high-frequency ranges and it received a lot of attention in the research community. The special characteristics of the mmWave band made the beamforming problem a challenging one because it depends on many environmental and operational factors. These challenges made any model-based architecture fit only special applications, working scenarios, and specific environment geometry. All these reasons increased the need for more general machine learning based beamforming systems that can work in different environments and conditions. This increased the need for an extended adjustable dataset that can serve as a tool for any machine learning technique to build an efficient beamforming architecture. Deep MIMO dataset has been used in many architectures and designs and has proved its benefits and flexibility to fit in many cases. In this paper, we study the extension of collaborative beamforming that includes many cooperating base stations by studying the impact of User Equipment (UE) speed ranges on the beamforming performance, optimizing the parameters of the neural network architecture of the beamforming design, and suggesting the optimal design that gives the best performance for as a small dataset as possible. Suggested architecture can achieve the same performance achieved before with up to 33% reduction in the dataset size used to train the system which provides a huge reduction in the data collection and processing time.
- The document describes a method for understanding city traffic dynamics by utilizing sensor data that measures average speed and link travel time, as well as textual data from tweets and official traffic reports.
- It builds statistical models to learn normal traffic patterns from historical sensor data and identifies anomalies, then correlates anomalies with relevant traffic events extracted from tweets and reports.
- The method was evaluated on data collected for the San Francisco Bay Area, and it was able to scale to large real-world datasets by exploiting the problem structure and using Apache Spark for distributed processing. Events extracted from social media provided complementary information to sensor data for explaining traffic anomalies.
There is a rapid intertwining of sensors and mobile devices into the fabric of our lives. This has resulted in unprecedented growth in the number of observations from the physical and social worlds reported in the cyber world. Sensing and computational components embedded in the physical world is termed as Cyber-Physical System (CPS). Current science of CPS is yet to effectively integrate citizen observations in CPS analysis. We demonstrate the role of citizen observations in CPS and propose a novel approach to perform a holistic analysis of machine and citizen sensor observations. Specifically, we demonstrate the complementary, corroborative, and timely aspects of citizen sensor observations compared to machine sensor observations in Physical-Cyber-Social (PCS) Systems.
Physical processes are inherently complex and embody uncertainties. They manifest as machine and citizen sensor observations in PCS Systems. We propose a generic framework to move from observations to decision-making and actions in PCS systems consisting of: (a) PCS event extraction, (b) PCS event understanding, and (c) PCS action recommendation. We demonstrate the role of Probabilistic Graphical Models (PGMs) as a unified framework to deal with uncertainty, complexity, and dynamism that help translate observations into actions. Data driven approaches alone are not guaranteed to be able to synthesize PGMs reflecting real-world dependencies accurately. To overcome this limitation, we propose to empower PGMs using the declarative domain knowledge. Specifically, we propose four techniques: (a) automatic creation of massive training data for Conditional Random Fields (CRFs) using domain knowledge of entities used in PCS event extraction, (b) Bayesian Network structure refinement using causal knowledge from Concept Net used in PCS event understanding, (c) knowledge-driven piecewise linear approximation of nonlinear time series dynamics using Linear Dynamical Systems (LDS) used in PCS event understanding, and the (d) transforming knowledge of goals and actions into a Markov Decision Process (MDP) model used in PCS action recommendation.
We evaluate the benefits of the proposed techniques on real-world applications involving traffic analytics and Internet of Things (IoT).
Cities are composed of complex systems with physical, cyber, and social components. Current works on extracting and understanding city events mainly rely on technology enabled infrastructure to observe and record events. In this work, we propose an approach to leverage citizen observations of various city systems and services such as traffic, public transport, water supply, weather, sewage, and public safety as a source of city events. We investigate the feasibility of using such textual streams for extracting city events from annotated text. We formalize the problem of annotating social streams such as microblogs as a sequence labeling problem. We present a novel training data creation process for training sequence labeling models. Our automatic training data creation process utilizes instance level domain knowledge (e.g., locations in a city, possible event terms). We compare this automated annotation process to a state-of-the-art tool that needs manually created training data and show that it has comparable performance in annotation tasks. An aggregation algorithm is then presented for event extraction from annotated text. We carry out a comprehensive evaluation of the event annotation and event extraction on a real-world dataset consisting of event reports and tweets collected over four months from San Francisco Bay Area. The evaluation results are promising and provide insights into the utility of social stream for extracting city events.
This document contains the curriculum vitae of Shrivishal Tripathi, a Ph.D. student at the Indian Institute of Technology Jodhpur. It outlines his education history including degrees from IIT Jodhpur, PEC University of Technology, and others. It also details his work experience as an assistant professor, research interests in fractal antennas, publications, awards and honors, and references.
Clinical Decision Support Systems (CDSS) were explicitly introduced in the 90’s with the aim of providing knowledge to clinicians in order to influence its decisions and, therefore, improve patients’ health care. There are different architectural approaches for implementing CDSS. Some of these approaches are based on cloud computing, which provides on-demand computing resources over the internet. The goal of this paper is to determine and discuss key issues and approaches involving architectural designs in implementing a CDSS using cloud computing. To this end, we performed a standard Systematic Literature Review (SLR) of primary studies showing the intervention of cloud computing on CDSS implementations. Twenty-one primary studies were reviewed. We found that CDSS architectural components are similar in most of the studies. Cloud-based CDSS are most used in Home Healthcare and Emergency Medical Systems. Alerts/Reminders and Knowledge Service are the most common implementations. Major challenges are around security, performance, and compatibility. We concluded on the benefits of implementing a cloud-based CDSS since it allows cost-efficient, ubiquitous and elastic computing resources. We highlight that some studies show weaknesses regarding the conceptualization of a cloud-based computing approach and lack of a formal methodology in the architectural design process.
New research article 2020 june isuue international journal on cloud computing...ijccsa
Cloud computing helps enterprises transform business and technology. Companies have begun to look for solutions that would help reduce their infrastructures costs and improve profitability. Cloud computing is becoming a foundation for benefits well beyond IT cost savings. Yet, many business leaders are concerned about cloud security, privacy, availability, and data protection. To discuss and address these issues, we invite researches who focus on cloud computing to shed more light on this emerging field. This peer-reviewed open access Journal aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including (but not limited to):
PetaJakarta.org program Co-Chief Investigators Dr Tomas Holderness & Dr Etienne Turpin presented an overview of the PetaJakarta.org White Paper as part of the SMART Seminar Series. This presentation took place on Tuesday, 23 June 2015 at SMART Infrastructure Facility.
Presented at the Panel on
Sensor, Data, Analytics and Integration in Advanced Manufacturing, at the Connected Manufacturing track of Bosch-USA organized "Leveraging Public-Private Partnerships for Regional Growth Summit". Panel statement: Sensors, data and analytics are the core of any smart manufacturing system. What are the main challenges to create actionable outputs, replicate systems and scale efficiency gains across industries?
Moderator: Thomas Stiedl, Bosch
Panelists:
1. Amit Sheth, Wright State University
2. Howie Choset, Carnegie Melon University
3. Nagi Gebraeel, Georgia Institute of Technology
4. Brian Anthony, Massachusetts Institute of Technology
5. Yarom Polosky, Oak Ridget National Laboratory
For in-depth look:
Smart IoT: IoT as a human agent, human extension, and human complement
http://amitsheth.blogspot.com/2015/03/smart-iot-iot-as-human-agent-human.html
Semantic Gateway: http://knoesis.org/library/resource.php?id=2154
SSN Ontology: http://knoesis.org/library/resource.php?id=1659
Applications of Multimodal Physical (IoT), Cyber and Social Data for Reliable and Actionable Insights: http://knoesis.org/library/resource.php?id=2018
Smart Data: Transforming Big Data into Smart Data...: http://wiki.knoesis.org/index.php/Smart_Data
Historic use of the term Smart Data (2004): http://www.scribd.com/doc/186588820
An Environmental Chargeback for Data Center and Cloud Computing ConsumersEdward Curry
Government, business, and the general public increasingly agree that the polluter should pay. Carbon dioxide and environmental damage are considered viable chargeable commodities. The net effect of this for data center and cloud computing operators is that they should look to “chargeback” the environmental impacts of their services to the consuming end-users. An environmental chargeback model can have a positive effect on environmental impacts by linking consumers to the indirect impacts of their usage, facilitating clearer understanding of the impact of their actions. In this paper we motivate the need for environmental chargeback mechanisms. The environmental chargeback model is described including requirements, methodology for definition, and environmental impact allocation strategies. The paper details a proof-of-concept within an operational data center together with discussion on experiences gained and future research directions.
Curry, E.; Hasan, S.; White, M.; and Melvin, H. 2012. An Environmental Chargeback for Data Center and Cloud Computing Consumers. In Huusko, J.; de Meer, H.; Klingert, S.; and Somov, A., eds., First International Workshop on Energy-Efficient Data Centers. Madrid, Spain: Springer Berlin / Heidelberg.
Presentation on the work we've done within BeSTGRID as it relates to bioinformatics in NZ, for the 2010 Bioinformatics Symposium https://www.bestgrid.org/NZ-Bioinformatics-Symposium-2010
This document discusses how grid technologies can be used for disaster management and infrastructure protection. It describes how a grid of grids approach allows linking of various resources like commanders, troops, data, simulations and more. It also discusses using grids for crisis management and response by linking sensors, managers and first responders to decision support systems. Various examples of infrastructure grids for floods, earthquakes are also presented.
Computing is fundamental to all instructional technologies. VT should ensure students, faculty and staff are proficient in computational thinking and data-driven decision making. Ongoing research in areas like learning science and ubiquitous computing will lay the foundations for future educational practices. Digital libraries can transform learning by providing personalized educational resources and services through integrated virtual learning environments and educational metadata standards.
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim IJECEIAES
This document discusses virtual machine allocation policies in cloud computing environments using the CloudSim simulation tool. It begins with an introduction to cloud computing and discusses challenges related to resource management and energy consumption. It then reviews previous research on modeling approaches, energy optimization techniques, and network topologies. A UML class model is presented for analyzing energy consumption when accessing cloud servers arranged in a step network topology. The methodology section outlines how energy consumption by system components like processors, RAM, hard disks, and motherboards will be calculated. Simulation results will depict response times and cost details for different data center configurations and allocation policies.
1) The document discusses a semantics-based approach to machine perception that uses semantic web technologies to derive abstractions from sensor data using background knowledge on the web.
2) It addresses three primary issues: annotation of sensor data, developing a semantic sensor web, and enabling semantic perception intelligence at the edge on resource-constrained devices.
3) The approach represents background knowledge and sensor observations using ontologies, and uses deductive and abductive reasoning over these representations to interpret sensor data at multiple levels of abstraction.
This document discusses how human beings can play an important role in making sense of big data beyond just visualization. It presents a case study where students transformed a large dataset into a visual language and "text" that could be interpreted. The document argues that current sense-making models are too technology-centric and that meaningful interpretation emerges from collaboration between algorithms, data, and human beings. Human perceptual abilities allow them to recognize patterns where computers see only numbers.
Grid computing combines the resources of multiple computers from different organizations to solve large problems. It works by sharing computing power, memory, storage and other resources across an authorized network. Examples of grid computing include projects that analyze large datasets like genome sequencing or simulate complex systems like climate modeling. Major grid computing projects include those run by scientific organizations like CERN and SETI@home, which analyzes radio telescope data using volunteers' computers. Grid computing infrastructure allows resources to be accessed easily like a utility over the network.
This document summarizes a book and 28 journal articles and conference papers authored or co-authored by C.G. Dethe. It includes the following key information:
- A book on performance evaluation of intelligent WLAN systems in multipath fading environments.
- 28 journal articles published in various international journals between 2009-2012 related to topics like UWB antenna design, resource allocation in MC-CDMA, medical image analysis, and video processing.
- 22 papers presented at international conferences between 2003-2013 on similar topics as the journal articles.
- 7 papers presented at national conferences in India between 2009-2014 related to wireless sensor networks, network traffic analysis, and intelligent transportation systems.
Artificial intelligence has been a buzz word that is impacting every industry in the world. With the rise of such advanced technology, there will be always a question regarding its impact on our social life, environment and economy thus impacting all efforts exerted towards sustainable development. In the information era, enormous amounts of data have become available on hand to decision makers. Big data refers to datasets that are not only big, but also high in variety and velocity, which makes them difficult to handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be studied and provided in order to handle and extract value and knowledge from these datasets for different industries and business operations. Numerous use cases have shown that AI can ensure an effective supply of information to citizens, users and customers in times of crisis. This paper aims to analyse some of the different methods and scenario which can be applied to AI and big data, as well as the opportunities provided by the application in various business operations and crisis management domains.
Top downloaded article in academia 2020 - International Journal of Informatio...Zac Darcy
The International Journal of Information Technology, Modeling and Computing (IJITMC) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology, Modeling and Computing. With the advances of Information Technology, there is an active multi-disciplinary research in the areas of IT, CSE, Modeling and Simulation with numerous applications in various fields. The International Journal of Information Technology, Modeling and Computing (IJITMC) is an abstracted and indexed international journal of high quality devoted to the publication of original research papers from IT, Modeling, CSE and Control Engineering with some emphasis on all areas and subareas of computer science, IT, scientific modeling, simulation, visualization and control systems and their broad range of applications.
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
This paper describes the curriculum of the three year IT undergraduate program at La Trobe University, and the faculty requirements in designing a capstone subject, followed by the ACM’s recommended IT curriculum covering the five pillars of the IT discipline. Cloud robotics, a broad multidisciplinary research area, requiring expertise in all five pillars with mechatronics, is an ideal candidate to offer capstone experiences to IT students. Therefore, in this paper, we propose a long term master project in developing a cloud robotics testbed, with many capstone sub-projects spanning across the five IT pillars, to meet the objectives of capstone experience. This paper also describes the design and implementation of the testbed, and proposes potential capstone projects for students with different interests.
Ahead of the time, the mandate of a Strategist... Back in 2015 I published this feature to highlight the absolute necessity to develop an industry-wide aviation cyber security strategy to support the airline industry in addressing this ever-evolving threat.
Publication in Aviation Business Middle East January 2016
(http://edition.pagesuite-professional.co.uk//launch.aspx?eid=8a766d68-5eb0-4f45-9c10-7c9fd9837d96)
The document summarizes a team's research on Prudential's benefits package. They surveyed 110 students, comparing Prudential's offerings to other companies. Key findings include that 53% of respondents valued work environment and family culture. Prudential provides benefits such as health and wellness programs, adoption assistance, and flexible work schedules. The career development program and family-oriented culture were highlighted as strengths.
Este documento fornece uma lista de 10 passos para organizar um evento de forma eficaz, incluindo definir objetivos, planejar itens necessários, escolher uma data, criar uma marca, desenvolver um plano detalhado, gerenciar a equipe, encontrar patrocinadores, criar um plano de marketing e medir o sucesso. O foco é ajudar os organizadores a planejarem todos os aspectos necessários para executar um evento de sucesso.
Faheem-ul-Haq Farooq has over 13 years of experience in sales, business development, product marketing and project execution with Siemens Pakistan. He is currently seeking a professional position that allows for career growth and professional development. He has a Bachelor's degree in Electrical Engineering and has extensive experience managing sales in the Islamabad region for Siemens Pakistan products including motors, drives, automation systems and more. He is proficient in English and Urdu.
This document contains the curriculum vitae of Shrivishal Tripathi, a Ph.D. student at the Indian Institute of Technology Jodhpur. It outlines his education history including degrees from IIT Jodhpur, PEC University of Technology, and others. It also details his work experience as an assistant professor, research interests in fractal antennas, publications, awards and honors, and references.
Clinical Decision Support Systems (CDSS) were explicitly introduced in the 90’s with the aim of providing knowledge to clinicians in order to influence its decisions and, therefore, improve patients’ health care. There are different architectural approaches for implementing CDSS. Some of these approaches are based on cloud computing, which provides on-demand computing resources over the internet. The goal of this paper is to determine and discuss key issues and approaches involving architectural designs in implementing a CDSS using cloud computing. To this end, we performed a standard Systematic Literature Review (SLR) of primary studies showing the intervention of cloud computing on CDSS implementations. Twenty-one primary studies were reviewed. We found that CDSS architectural components are similar in most of the studies. Cloud-based CDSS are most used in Home Healthcare and Emergency Medical Systems. Alerts/Reminders and Knowledge Service are the most common implementations. Major challenges are around security, performance, and compatibility. We concluded on the benefits of implementing a cloud-based CDSS since it allows cost-efficient, ubiquitous and elastic computing resources. We highlight that some studies show weaknesses regarding the conceptualization of a cloud-based computing approach and lack of a formal methodology in the architectural design process.
New research article 2020 june isuue international journal on cloud computing...ijccsa
Cloud computing helps enterprises transform business and technology. Companies have begun to look for solutions that would help reduce their infrastructures costs and improve profitability. Cloud computing is becoming a foundation for benefits well beyond IT cost savings. Yet, many business leaders are concerned about cloud security, privacy, availability, and data protection. To discuss and address these issues, we invite researches who focus on cloud computing to shed more light on this emerging field. This peer-reviewed open access Journal aims to bring together researchers and practitioners in all security aspects of cloud-centric and outsourced computing, including (but not limited to):
PetaJakarta.org program Co-Chief Investigators Dr Tomas Holderness & Dr Etienne Turpin presented an overview of the PetaJakarta.org White Paper as part of the SMART Seminar Series. This presentation took place on Tuesday, 23 June 2015 at SMART Infrastructure Facility.
Presented at the Panel on
Sensor, Data, Analytics and Integration in Advanced Manufacturing, at the Connected Manufacturing track of Bosch-USA organized "Leveraging Public-Private Partnerships for Regional Growth Summit". Panel statement: Sensors, data and analytics are the core of any smart manufacturing system. What are the main challenges to create actionable outputs, replicate systems and scale efficiency gains across industries?
Moderator: Thomas Stiedl, Bosch
Panelists:
1. Amit Sheth, Wright State University
2. Howie Choset, Carnegie Melon University
3. Nagi Gebraeel, Georgia Institute of Technology
4. Brian Anthony, Massachusetts Institute of Technology
5. Yarom Polosky, Oak Ridget National Laboratory
For in-depth look:
Smart IoT: IoT as a human agent, human extension, and human complement
http://amitsheth.blogspot.com/2015/03/smart-iot-iot-as-human-agent-human.html
Semantic Gateway: http://knoesis.org/library/resource.php?id=2154
SSN Ontology: http://knoesis.org/library/resource.php?id=1659
Applications of Multimodal Physical (IoT), Cyber and Social Data for Reliable and Actionable Insights: http://knoesis.org/library/resource.php?id=2018
Smart Data: Transforming Big Data into Smart Data...: http://wiki.knoesis.org/index.php/Smart_Data
Historic use of the term Smart Data (2004): http://www.scribd.com/doc/186588820
An Environmental Chargeback for Data Center and Cloud Computing ConsumersEdward Curry
Government, business, and the general public increasingly agree that the polluter should pay. Carbon dioxide and environmental damage are considered viable chargeable commodities. The net effect of this for data center and cloud computing operators is that they should look to “chargeback” the environmental impacts of their services to the consuming end-users. An environmental chargeback model can have a positive effect on environmental impacts by linking consumers to the indirect impacts of their usage, facilitating clearer understanding of the impact of their actions. In this paper we motivate the need for environmental chargeback mechanisms. The environmental chargeback model is described including requirements, methodology for definition, and environmental impact allocation strategies. The paper details a proof-of-concept within an operational data center together with discussion on experiences gained and future research directions.
Curry, E.; Hasan, S.; White, M.; and Melvin, H. 2012. An Environmental Chargeback for Data Center and Cloud Computing Consumers. In Huusko, J.; de Meer, H.; Klingert, S.; and Somov, A., eds., First International Workshop on Energy-Efficient Data Centers. Madrid, Spain: Springer Berlin / Heidelberg.
Presentation on the work we've done within BeSTGRID as it relates to bioinformatics in NZ, for the 2010 Bioinformatics Symposium https://www.bestgrid.org/NZ-Bioinformatics-Symposium-2010
This document discusses how grid technologies can be used for disaster management and infrastructure protection. It describes how a grid of grids approach allows linking of various resources like commanders, troops, data, simulations and more. It also discusses using grids for crisis management and response by linking sensors, managers and first responders to decision support systems. Various examples of infrastructure grids for floods, earthquakes are also presented.
Computing is fundamental to all instructional technologies. VT should ensure students, faculty and staff are proficient in computational thinking and data-driven decision making. Ongoing research in areas like learning science and ubiquitous computing will lay the foundations for future educational practices. Digital libraries can transform learning by providing personalized educational resources and services through integrated virtual learning environments and educational metadata standards.
Virtual Machine Allocation Policy in Cloud Computing Environment using CloudSim IJECEIAES
This document discusses virtual machine allocation policies in cloud computing environments using the CloudSim simulation tool. It begins with an introduction to cloud computing and discusses challenges related to resource management and energy consumption. It then reviews previous research on modeling approaches, energy optimization techniques, and network topologies. A UML class model is presented for analyzing energy consumption when accessing cloud servers arranged in a step network topology. The methodology section outlines how energy consumption by system components like processors, RAM, hard disks, and motherboards will be calculated. Simulation results will depict response times and cost details for different data center configurations and allocation policies.
1) The document discusses a semantics-based approach to machine perception that uses semantic web technologies to derive abstractions from sensor data using background knowledge on the web.
2) It addresses three primary issues: annotation of sensor data, developing a semantic sensor web, and enabling semantic perception intelligence at the edge on resource-constrained devices.
3) The approach represents background knowledge and sensor observations using ontologies, and uses deductive and abductive reasoning over these representations to interpret sensor data at multiple levels of abstraction.
This document discusses how human beings can play an important role in making sense of big data beyond just visualization. It presents a case study where students transformed a large dataset into a visual language and "text" that could be interpreted. The document argues that current sense-making models are too technology-centric and that meaningful interpretation emerges from collaboration between algorithms, data, and human beings. Human perceptual abilities allow them to recognize patterns where computers see only numbers.
Grid computing combines the resources of multiple computers from different organizations to solve large problems. It works by sharing computing power, memory, storage and other resources across an authorized network. Examples of grid computing include projects that analyze large datasets like genome sequencing or simulate complex systems like climate modeling. Major grid computing projects include those run by scientific organizations like CERN and SETI@home, which analyzes radio telescope data using volunteers' computers. Grid computing infrastructure allows resources to be accessed easily like a utility over the network.
This document summarizes a book and 28 journal articles and conference papers authored or co-authored by C.G. Dethe. It includes the following key information:
- A book on performance evaluation of intelligent WLAN systems in multipath fading environments.
- 28 journal articles published in various international journals between 2009-2012 related to topics like UWB antenna design, resource allocation in MC-CDMA, medical image analysis, and video processing.
- 22 papers presented at international conferences between 2003-2013 on similar topics as the journal articles.
- 7 papers presented at national conferences in India between 2009-2014 related to wireless sensor networks, network traffic analysis, and intelligent transportation systems.
Artificial intelligence has been a buzz word that is impacting every industry in the world. With the rise of such advanced technology, there will be always a question regarding its impact on our social life, environment and economy thus impacting all efforts exerted towards sustainable development. In the information era, enormous amounts of data have become available on hand to decision makers. Big data refers to datasets that are not only big, but also high in variety and velocity, which makes them difficult to handle using traditional tools and techniques. Due to the rapid growth of such data, solutions need to be studied and provided in order to handle and extract value and knowledge from these datasets for different industries and business operations. Numerous use cases have shown that AI can ensure an effective supply of information to citizens, users and customers in times of crisis. This paper aims to analyse some of the different methods and scenario which can be applied to AI and big data, as well as the opportunities provided by the application in various business operations and crisis management domains.
Top downloaded article in academia 2020 - International Journal of Informatio...Zac Darcy
The International Journal of Information Technology, Modeling and Computing (IJITMC) is an open access peer-reviewed journal that publishes articles which contribute new results in all areas of Information Technology, Modeling and Computing. With the advances of Information Technology, there is an active multi-disciplinary research in the areas of IT, CSE, Modeling and Simulation with numerous applications in various fields. The International Journal of Information Technology, Modeling and Computing (IJITMC) is an abstracted and indexed international journal of high quality devoted to the publication of original research papers from IT, Modeling, CSE and Control Engineering with some emphasis on all areas and subareas of computer science, IT, scientific modeling, simulation, visualization and control systems and their broad range of applications.
Design of an IT Capstone Subject - Cloud RoboticsITIIIndustries
This paper describes the curriculum of the three year IT undergraduate program at La Trobe University, and the faculty requirements in designing a capstone subject, followed by the ACM’s recommended IT curriculum covering the five pillars of the IT discipline. Cloud robotics, a broad multidisciplinary research area, requiring expertise in all five pillars with mechatronics, is an ideal candidate to offer capstone experiences to IT students. Therefore, in this paper, we propose a long term master project in developing a cloud robotics testbed, with many capstone sub-projects spanning across the five IT pillars, to meet the objectives of capstone experience. This paper also describes the design and implementation of the testbed, and proposes potential capstone projects for students with different interests.
Ahead of the time, the mandate of a Strategist... Back in 2015 I published this feature to highlight the absolute necessity to develop an industry-wide aviation cyber security strategy to support the airline industry in addressing this ever-evolving threat.
Publication in Aviation Business Middle East January 2016
(http://edition.pagesuite-professional.co.uk//launch.aspx?eid=8a766d68-5eb0-4f45-9c10-7c9fd9837d96)
The document summarizes a team's research on Prudential's benefits package. They surveyed 110 students, comparing Prudential's offerings to other companies. Key findings include that 53% of respondents valued work environment and family culture. Prudential provides benefits such as health and wellness programs, adoption assistance, and flexible work schedules. The career development program and family-oriented culture were highlighted as strengths.
Este documento fornece uma lista de 10 passos para organizar um evento de forma eficaz, incluindo definir objetivos, planejar itens necessários, escolher uma data, criar uma marca, desenvolver um plano detalhado, gerenciar a equipe, encontrar patrocinadores, criar um plano de marketing e medir o sucesso. O foco é ajudar os organizadores a planejarem todos os aspectos necessários para executar um evento de sucesso.
Faheem-ul-Haq Farooq has over 13 years of experience in sales, business development, product marketing and project execution with Siemens Pakistan. He is currently seeking a professional position that allows for career growth and professional development. He has a Bachelor's degree in Electrical Engineering and has extensive experience managing sales in the Islamabad region for Siemens Pakistan products including motors, drives, automation systems and more. He is proficient in English and Urdu.
Reading Group Presentation: Web Attacks on Host-Proof Encrypted StorageMichael Rushanan
This presentation exposes the current threat model to host-proof encrypted storage, details of vulnerability exploitation per application, and multiple pointers to relevant academic research in web security. I presented these works to a weekly Security and Privacy reading group.
The academic proceeding can be found here:
https://www.usenix.org/conference/woot12/web-based-attacks-host-proof-encrypted-storage
User Percieved Performance @ San Francisco Ember.js Meetup - 8/25/2015.
The perception of performance is as important as performance its self. In this talk I'll cover some aspects of user perception, talk about performance instrumentation, and then share some UX tips to keep your users more engaged -- even when they're waiting
El documento describe un sistema de gestión documental, incluyendo su misión de rastrear, almacenar y organizar documentos electrónicos, su visión de lograr una gestión integral de todos los recursos de información contenidos en los documentos de una organización, y algunos de sus procesos y beneficios como el acceso rápido a documentos, ahorro de espacio y mayor seguridad de los documentos.
(1) O documento descreve as etapas para elaborar um Plano Director de Sistemas de Informação (PDSI) em uma universidade, incluindo análise dos processos organizacionais, requisitos de dados e apoio atual dos sistemas de informação.
(2) As etapas propostas incluem preparação, entrevistas, sistematização de informações, definição de prioridades de implementação e análise da gestão da informação.
(3) Um PDSI é um plano estratégico que mapeia como os sistemas de inform
El documento presenta información sobre patrones y ecuaciones. Explica qué es una ecuación, dando ejemplos como x + 3 = 8. Indica que para resolver una ecuación se debe despejar la incógnita aplicando la operación contraria, como restar x de ambos lados si hay un sumando x. También presenta algunos problemas y sus resoluciones paso a paso como ejemplos. Por último, asigna como tarea resolver ejercicios de la página 121.
LogicalDOC is the best choice among document management solutions. It features an intuitive interface that is so easy to use it requires no training. It utilizes advanced technology and widely-accepted international standards to facilitate a non-invasive integration with your system. LogicalDOC will solve all of your document management needs.
1. Islam mengatur berbagai aspek hubungan antarmanusia termasuk muamalah untuk kemaslahatan umat.
2. Fikih muamalah membahas hukum-hukum transaksi yang memungkinkan pertukaran harta secara sah menurut syariat.
3. Al-Quran dan hadis menjelaskan larangan terhadap transaksi yang merugikan dan menganjurkan yang memberikan manfaat.
Yanjiao Chen is a professor specializing in network economics, wireless networks, crowdsourcing, and cloud computing. She received her Ph.D. from Hong Kong University of Science and Technology in 2015
This curriculum vitae summarizes the qualifications of Yang Hu, a Ph.D. candidate in computer engineering at the University of Florida. It outlines his education history, awards, academic talks, publications, patents, research projects and experience. Some of his research has focused on optimizing network function virtualization platforms, software-defined data center management, and renewable energy powered cloud computing infrastructures.
International Journal of Wireless & Mobile Networks (IJWMN)ijwmn
This document compares emerging wireless technologies for the Internet of Things (IoT), including ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and various versions of Wi-Fi such as 802.11ah. It evaluates the capabilities of each technology in terms of data range and rate, network size, frequency channels, bandwidth, and power consumption. The document concludes that a multifaceted approach is needed to enable interoperable and secure communication in IoT applications using different wireless technologies and standards.
Xiufeng Xie is a research engineer at Hewlett Packard Labs specializing in wireless networking, VR/AR, video analytics, and mobile edge computing. He received a Ph.D. in Computer Engineering from University of Wisconsin-Madison and has published 15 papers, including 11 as first author, on topics related to 5G networks, massive MIMO, full-duplex radio, and mobile video. He has worked at the University of Michigan, NEC Labs America, and held internships focused on LTE, MIMO beamforming, and coexistence between WiFi and LTE.
New research articles 2019 - July issue : International Journal of Computer ...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
TOP CITED UBICOMPUTING ARTICLES IN 2013 - International Journal of Ubiquitous...ijujournal
International Journal of Ubiquitous Computing (IJU) is a quarterly open access peer-reviewed journal that provides excellent international forum for sharing knowledge and results in theory, methodology and applications of ubiquitous computing. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Ubiquitous Computing presents a rather arduous requirement of robustness, reliability and availability to the end user. Ubiquitous computing has received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the journal is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field
The document discusses Internet of Things (IoT). It defines IoT and provides a brief history. It discusses common IoT protocols like MQTT, CoAP, AMQP, and websockets. It also mentions some popular operating systems for IoT like Contiki and RIOT. Popular hardware devices for IoT development include Arduino, Raspberry Pi and BeagleBone. The document outlines several application areas for IoT and envisions future advancements in IoT technology and its increasing role in various industries.
November 2021 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
January 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
May 2024 - Top 10 Read Articles in Network Security & Its Applications.pdfIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
The AIRCC's International Journal of Computer Science and Information Technology (IJCSIT) is devoted to fields of Computer Science and Information Systems. The IJCSIT is a open access peer-reviewed scientific journal published in electronic form as well as print form. The mission of this journal is to publish original contributions in its field in order to propagate knowledge amongst its readers and to be a reference publication.
February 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
March 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
April 2024 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
October 2022: Top 10 Read Articles in Network Security & Its Applications
Publication
1. SDN/NFV
1. 1. Shouxi Luo, Hongfang Yu, and Lemin Li, Practical Flow Table Aggregation in SDN, Computer
Networks, Volume 92, Part 1, 9 December 2015, Pages 72–88.
2. 2. Zhilong Ye, Xiaojun Cao, Jianping Wang, Hongfang Yu, Chunming Qiao, Joint Topology
Design and Mapping of Service Function Chains for Efficient, Scalable and Reliable Network
Function Virtualization, accepted by IEEE Network Magazine
3. 3. Shouxi Luo, Hongfang Yu, and Lemin Li, Consistency is Not Easy: How to Use Two-phase
Update for Wildcard Rules?, IEEE Communications Letters, vol.19, no.3, 2015, pp.347-350.
4. 4. Long Luo, Hongfang Yu, Shouxi Luo, Mingui Zhang, Fast Lossless Traffic Migration for SDN
Updates, In Proc. of IEEE ICC, London, UK, Jun 2015.
5. 5. Shouxi Luo, Hongfang Yu, and Lemin Li, Fast Incremental Flow Table Aggregation in SDN, In
Proc. of IEEE ICCCN, Shanghai, China, Aug 2014.
6. 6. 刘鎏、虞红芳. 基于资源拆分的虚拟网络功能服务链映射算法.计算机应用研究[J].
7. 7. Information-agnostic Coflow Scheduling with Optimal Demotion Thresholds, Yuanxiang
Gao, Hongfang Yu, Shouxi Luo and Shui Yu, ICC 2016
8. 8. Achieving Consistent, Fast and Light-weight Updates using Segment Routing in SDN, Long
Luo, Hongfang Yu, Shouxi Luo, Mingui Zhang∗ and Shui Yu†, ICC 2016
9. 9. Network Function Consolidation in Service Function Chaining Orchestration(ICC 审稿
中),Tao Wen, Hongfang Yu, Liu Liu, ICC 2016
Cloud Computing &Data Center Network
1. Shouxi Luo, Hongfang Yu, Yangming Zhao, Bin Wu, Sheng Wang, and Lemin Li, Minimizing
Average Coflow Completion Time with Decentralized Scheduling, In Proc. of IEEE ICC, London,
UK, Jun 2015.
2. Shouxi Luo, Hongfang Yu, Yangming Zhao, Sheng Wang, Shui Yu, and Lemin Li, Towards
Practical and Near-optimal Coflow Scheduling for Data Center Networks, IEEE Transactions
on Parallel and Distributed Systems (TPDS), (second review)
3. Yangming Zhao, Sheng Wang, Shouxi Luo, Vishal Anand, Hongfang Yu, Shizhong Xu and
Xiaoning Zhang, Dynamic Topology Management in Optical Datacenter Networks, Journal
of Lightwave Technology, vol.33, no.19, pp.4050-4062, Oct.1, 1 2015.
4. Hongfang Yu, Shouxi Luo, Yangming Zhao, Sheng Wang, Shizhong Xu and Xiaoning Zhang, A
Progressive Topology Reconfiguration Algorithm in Optical Data Center Networks (invited
talk), In Proc. of International Conference on Optical Communications and Networks (ICOCN),
Nanjing, China, Jul. 2015.
5. Yangming Zhao, ShengWang, Shouxi Luo, Hongfang Yu, Shizhong Xu and Xiaoning Zhang,
Dynamic Topology Management in Optical Datacenter Networks, In Proc. of IEEE GLOBECOM,
Austin, USA, Dec. 2014.
6. Shouxi Luo, Hongfang Yu, Lemin Li, Dan Liao, and Gang Sun, Traffic-aware VDC Embedding in
DataCenter: A Case Study of FatTree (extended), China Communications, vol.11.7,
pp.142-152, Jul 2014
2. 7. Shouxi Luo, Hongfang Yu, Lemin Li, Dan Liao and Gang Sun, Traffic-aware VDC Embedding in
DataCenter: A Case Study of FatTree, In Proc. of COIN 2013, Aug 2014 (Best Student Paper
Award)
8. Xuejiao Lai, Shouxi Luo, Hongfang Yu, Dan Liao, Gang Sun, Towards Energy Saving in Data
Centers Using Traffic-aware VM Migration, Fiber Optics and Optical Communications 2014,
Vol. 43.
9. L.Liu, S. Zheng, H. Yu, et al. Correlation-based virtual machine migration in dynamic cloud
environments[J]. Photonic Network Communications, 2015:1-11.
10. L. Liu, J. Xu, H. Yu, et al. A novel performance preserving VM Splitting and Assignment
Scheme[C]. 2014 IEEE International Conference on Communications (ICC), Sydney, Australia,
2014, 4215-4220.
11. L. Liu, J. Xu, H. Yu, et al. Joint admission control and provisioning for virtual machines[C].
2015 IEEE International Conference on Communications (ICC), London, UK, 2015, 332-337.
12. Z. Yang, L. Liu, C. Qiao, et al. Availability-aware energy-efficient virtual machine placement[C].
2015 IEEE International Conference on Communications (ICC), London, UK, 2015, 5853-5858.
13. 刘鎏,虞红芳,郑少平. 面向业务动态变化的虚拟机迁移技术研究.计算机应用研究[J].
(已录用,待刊)
14. L. Liu, J. Xu, H. Yu et al.VMSA: A Performance Preserving Online VM Splitting and Placement
Algorithm in Dynamic Cloud Environments. Submitted to The Journal of Supercomputing[J].
(SCI 刊源,审稿中)
15. 左成、虞红芳,可靠性感知的虚拟数据中心映射算法,计算机应用, 2015, 35(02):299-304
16. Shouxi Luo, Hongfang Yu, Lemin Li, Dan Liao, Gang Sun. Traffic-aware VDC Embedding in
DataCenter: A Case Study of FatTree. China Communications, Vol.11, Issue.7, PP.142-152,
July 2014.
Network Virtualization
1. Hongfang Yu, Chunming Qiao, Jianping Wang, Lemin Li, and Bin Wu, “A Virtualization
Layer Approach to Survivability”, IEEE Transaction on Networking and Service Management,
Dec 2014,11(4), pp.504-515.
2. Hongfang Yu, Chunming Qiao, Jianping Wang, Lemin Li, Vishal Anand, and Bin Wu, Regional
Failure-Resilient Virtual Infrastructure Mapping in a Federated Computing and Networking
System, IEEE/OSA Journal of Optical Communications and Networking, Vol.6, No.11, Nov.
2014
3. Hongfang Yu, Tao Wen, Hao Di, Vishal Anand, Lemin Li, Cost Efficient Virtual Network
Mapping Across Multiple Domains with Joint Intra-domain and Inter-domain Mapping,
Optical Switching and Networking, Volume 14, Part 3, Pages 195-302 (August 2014), SI:
Optimization and Application in Converged Optical and Data Center Networks
4. Bingli Guo, Chunming Qiao, Jianping Wang, Hongfang Yu, Yongxia Zuo, Juhao Li, Zhangyuan
Chen, Yongqi He, "Survivable Virtual Network Design and Embedding to Survive a Facility
Node Failure", IEEE/OSA Journal of Lightwave Technology, 32(3),PP. 483-493, 2014.
3. 5. Gang Sun, Hongfang Yu, Vishal Anand, Dan Liao, Lemin Li. Power-efficient provisioning for
online virtual network requests in cloud-based datacenters. IEEE Systems Journal, 2014:
6. 温涛、虞红芳、李乐民,网络虚拟化的过去、现在和未来,中兴通讯,网络以及功能虚
拟化专刊,2014 年 5 月
7. Hao Di, Vishal Anand, Dan Liao, Du Xu, Lemin Li,Gang Sun, Ninghai Bao. Local Protection: A
Cost Efficient Technique for Reliable Virtual Infrastructure Design. Optical Switching and
Networking, Volume 11, Part B, January 2014, Pages 154–166
8. Hao Di, Vishal Anand, Hongfang Yu, Lemin Li, Gang Sun. Design of Reliable Virtual
Infrastructure with Resource Sharing. Computer Networks, Vol.62, April 2014:137-151
9. Gang Sun, Hongfang Yu, Vishal Anand, Lemin Li. A Cost Efficient Framework and
Algorithm for Embedding Dynamic Virtual Network Requests. Future Generation Computer
Systems, 2013, 29(5): 1265-1277. (SCI 检索)
10. Hao Di, Hongfang Yu, Vishal Anand, Lemin Li, Gang Sun, Binhong Dong, “Efficient Online
Virtual Network Mapping Using Resource Evaluation”, Journal of Network and Systems
Management, 20(4):468-488, 2012/11 (SCI:013XY)
11. Gang Sun, Hongfang Yu, Lemin Li, Vishal Anand, Yanyang Cai, Hao Di. Exploring online
virtual networks mapping with stochastic bandwidth demand in multi-datacenter. Photonic
Network Communications, 2012, 23(2): 109-122. (SCI: 906GJ)
12. Gang Sun, Hongfang Yu, Vishal Anand, Lemin Li, Hao Di. Optimal Provisioning for Virtual
Network Request in Cloud-based Data Centers. Photonic Network Communications, 2012,
24(2):118-131. (SCI: 999QZ)
13. Hao Di, Hongfang Yu, Lemin Li, Dan Liao and Gang Sun, Cost Efficient Reliable Virtual
Infrastructure Design,11th International Conference on Optical Internet (COIN2013), Beijing,
China, October 18-20,2013
14. Hongfang Yu, Gang Sun, Chunming Qiao, Jianping Wang, Survivable Virtual Infrastructure
Mappings in Multi-datacenter Systems (invited paper), 5th International Workshop on
Reliable Networks Design and Modeling (RNDM 2013), September 10-13, 2013, Almaty,
Kazakhstan
15. Gang Sun, Vishal Anand, Hongfang Yu, Dan Liao, Lemin Li. Optimal Provisioning for Elastic
Service Oriented Virtual Network Request in Cloud Computing. IEEE GLOBECOM,
Anaheim, CA, 2012/12/02-08.
16. Gang Sun, Vishal Anand, Hongfang Yu, Dan Liao, Yanyang Cai, Lemin Li. Adaptive
Provisioning for Evolving Virtual Network Request in Cloud-based Datacenters. IEEE
GLOBECOM, Anaheim, CA, 2012/12/02-08.
17. Hao Di, Vishal Anand, Hongfang Yu, Lemin Li, Binhong Dong, Qingrui Meng, “Reliable
Virtual Infrastructure Mapping with Efficient Resource Sharing”, ICCCAS, pp. 198-202,
2012/08/08-12, TaiWan
18. Hongfang Yu, Yanyang Cai, Vishal Anand, “Reliable Virtual Infrastructure Designs to
Recover From Facility Node and Link Failures (invited paper)”, The 6th International
Conference on Ubiquitous Information Technologies & Applications (CUTE2011),
Dec.15-17, Korea
19. Gang Sun, Hongfang Yu, Vishal Anand, Lemin Li et al., “Mapping the virtual networks with
stochastic bandwidth resource request in multi-datacenters” IET AIAI, pp.234-238, 2011.
20. Hongfang Yu, Xiaoning Zhang, Li Wang, Vishal Anand, “Cost-effective Multilayer Network
4. Optimization: A top down decomposition solution (invited paper)”, Chinacom 2011, August
17-19, Haerbin, China
21. Hongfang Yu, Vishal Anand, Chunming Qiao, et al.,” Cost Efficient Design of Survivable
Virtual Infrastructure to Recover from Facility Node Failures”, ICC 2011, June 5-9,
Ktoyo,Japan
22. Hongfang Yu, Vishal Anand, Chunming Qiao, et al., “Migration based Protection for Virtual
Infrastructure Survivability for Link Failure”, OFC/NFOEC 2011, March 2011, Los Angeles,
California, USA
23. Hongfang Yu, Vishal Anand, Chunming Qiao and Gang Sun,” Enhancing Virtual
Infrastructure to Survive Facility Node Failures”, OFC/NFOEC 2011, March 201,1 Los
Angeles, California, USA
24. Jianping Wang, Chunming Qiao, Hongfang Yu, “Progressive Network Recovery After a Major
Disruption”, IEEE Infocom 2011, May, Shanghai, China
Optical Networks
1. Ning-Hai Bao, Le-Min Li, Hong-Fang Yu, Zhi-Zhong Zhang, Hong-Bin Luo, “Power-aware
Provisioning Strategy with Shared Path Protection in Optical WDM Networks,” Optical Fiber
Technology, 18(3),March 2012:81-87.
2. Ning-Hai Bao, Le-Min Li, Hong-Bin Luo, Hong-Fang Yu, Zhi-Zhong Zhang, “Impairment
Aware Sharing Constraint Relaxed Path Protection in Translucent Optical Networks,” Optical
Engineering, April 2012, 51(4): 045002-045002-6
3. Ning-Hai Bao, Zhi-Zhong Zhang, Le-Min Li, Hong-Fang Yu, Hong-Bin Luo, “A hybrid
protection strategy based on node-disjointness against double failures in optical mesh
networks,” Photonic Network Communications 2011, vol.22, no.1:13-22.
4. Hongfang Yu and Chunxia Yang, ”Partial Network Recovery to Maximize Traffic Demand,
IEEE Communication Letter,No.12, 2011
5. Hongfang Yu, Vishal Anand, Chunming Qiao, Hao Di and Xuetao Wei, Cost Efficient Design
of Virtual Infrastructure with Joint Node and Link Mapping, Journal of Network System
Management,no.3, 1-19 (2011).
6. Gang Sun, Hongfang Yu, Lemin Li, Vishal Anand et al, “The Framework and Algorithms for
Survivable Mapping Virtual Network onto a Substrate Network,” IETE Technical Review,
Vol. 28, No.5, pp. 381-391, 2011.
7. Gang Sun, Hongfang Yu, Lemin Li, Vishal Anand et al., “Exploring Online Virtual Networks
Mapping with Stochastic Bandwidth Demand in Multi-datacenter,” Photonic Network
Communications, vol.23,issue.2, pp.109-123, April 2012.
8. Gang Sun, Hongfang Yu, Lemin Li, Vishal Anand et al., “Rate Control based Framework and
Algorithm for Optimal Provisioning,”Photonic Network Communications, Vol. 22, No.2, pp.
180-190, 2011
9. Gang Sun, Lemin Li and Hongfang Yu and Hao Di, “A distributed algorithm for optimal
network resource allocation considering delay sensitive traffic”, IEEE ICCCAS, pp. 298-302,
2010. (EI 检索号: 20104613394050)
10. Ning-Hai Bao, Zhi-Zhong Zhang, Le-Min Li, Hong-Fang Yu, Hong-Bin Luo, A Hybrid
Protection Strategy Based on Node-disjointness Against Double Failures in Optical Mesh
Networks, Photonic Network Communications,vol.22, issue.1, pp.13-22, Aug. 2011
5. 11. Hongbin Luo, Lemin Li, Hongfang Yu, "Routing connections with differentiated reliability
requirements in WDM mesh networks”, IEEE/ACM Transactions on Networking, Vol. 17,
No. 1, pp. 253-266, 2009 (SCI,EI)
12. Hongfang Yu, Lemin Li, Sheng Wang. 光纤通信网络的生存性研究. 光纤通信信息集锦.
2008.12
13. Sheng Wang, Hongfang Yu, Du Xu and Lemin Li. 新一代高可信网络的研究. 中兴通讯专
刊. 2008.5
14. Hongbin Luo, Lemin Li, Hongfang Yu, Sheng Wang, “Achieving shared protection for
dynamic multicast sessions in survivable mesh WDM networks”, IEEE Journal on Selected
Areas in Communications, Vol. 25, No. 9, pp. 83-95, Dec. 2007. (SCI)
15. Hongbin Luo, Hongfang Yu, and Lemin Li, “Comments on ‘Segment shared protection in
mesh communication networks with bandwidth guaranteed tunnels’”, IEEE/ACM
Transaction on Networking, vol.15, no. 6, p. 1616, Dec. 2007. (SCI)
16. Hongfang Yu, Dongling Wu, Lemin Li, Fiber-Level P-Cycles Optimal Design for Survivable
Mesh WDM Networks, Journal of University of Electronic Science and Technology of
China,2007 February, No.2
17. Jin Cao, Lei Guo, Hongfang Yu, Lemin Li, Partial SRLG-disjoint Shared Path Protection with
Differentiated Reliability in Survivable WDM Network, International Journal of Electronic &
Communication, Volume 61, Issue 6, June 2007: 353-362
18. Lei Guo, Jin Cao, Hongfang Yu, and Lemin Li. A new shared-risk link groups (SRLG)-
disjoint path provisioning with shared protection in WDM optical networks. Journal of
Network and Computer Applications, Elsevier Journal, April 2007, 30(2)
19. Jin Cao, Lei Guo, Hongfang Yu, Lemin Li, A Novel Recursive Shared Segment Protection
Algorithm in Survivable WDM Networks, Journal of Network and Computer
-694, April 2007
20. Rongping Lin, Sheng Wang, Lemin Li, Protections for Multicast Session in WDM Optical
Networks Under Reliability Constraints, Journal of Network and Computer
-705 , April 2007.
21. Lei Guo, Lemin Li, Hongfang Yu, and Jin Cao. New and enhanced protection scheme in
survivable meshed WDM optical networks. European Transactions on
Telecommunications.18.163-168, March 2007
22. Lei Guo, Lemin Li, Jin Cao,Hongfang Yu and Xuetao Wei. On finding feasible solutions with
shared backup resources for surviving double-link failures in path protected WDM mesh
networks. IEEE Journal of Lightwave Technology, 25(1), January 2007:287-296.
23. Lei Guo, Hongfang Yu, and Lemin Li. Dynamic survivable algorithm for meshed WDM
optical networks. Journal of Network and Computer Applications.30.282-295, January 2007
24. Lei Guo, Lemin Li, Hongfang Yu, and Jin Cao. An effective survivable routing algorithm with
sharing spare resources and fast failures recovery in WDM mesh networks. Optical
Engineering, SPIE Journal, 2007 January, vol.46 (1).
25. Hongbin Luo, Lemin Li, and Hongfang Yu. Algorithm for protecting light-trees in survivable
-1083,2006
26. Taifei Zhao, Lemin Li, Jin Cao, and Hongfang Yu. Optimal Capacity Assignment for p-Cycle
-9, December 2006
6. 27. Hongbin Luo, Hongfang Yu, Lemin Li. A heuristic algorithm for shared segment protection in
mesh WDM networks with limited backup path/segments length. Computer
-3213,2006.
Satellite Networks
1. 申建平, 虞红芳,章小宁, 王海燕. 基于 OPNET 的低轨卫星网络仿真平台研究.计算机工
程,2009,18
2. Feng Shen, Hongfang Yu, Xiaoning Zhang, Dan Liao HATS: a handover optimized routing
algorithm for the Low Earth Orbit (LEO) satellite networks. 7th International Conference on
Information, Communications and Signal Processing. 2009 (EI,ISTP)
3. Jianping Shen, Hongfang Yu, Xiaoning Zhang, Dan Liao. A Performance Enhancing Proxy for
Terrestrial-Satellite Hybrid Networks. ICCCAS, 2008 May, (EI 检索:090211852588, funded
by 60872032)