Distributed Systems

2017


  1. two bestsellers (), Saccargia Holding BV Publisher, .

    BibTeX



  2. Planning meets activity recognition: Service coordination for intelligent buildings (, , , , and ), In Pervasive and Mobile Computing, Elsevier, volume 38, .

    BibTeX



    url
  3. Automated Generation Algorithm for Synthetic Medium Voltage Radial Distribution Systems (, , and ), In IEEE Journal on Emerging and Selected Topics in Circuits and Systems, volume 7, .

    BibTeX



    url
  4. Sizing and Siting of Large-Scale Batteries in Transmission Grids to Optimize the Use of Renewables (, , , and ), In IEEE Journal on Emerging and Selected Topics in Circuits and Systems, volume 7, .

    BibTeX



    url
  5. MuGKeG: Secure Multi-channel Group Key Generation Algorithm for Wireless Networks (, , and ), In Wireless Personal Communications, Springer, volume 96, .

    Abstract

    The broadcast nature of communication channels in infrastructureless wireless networks poses challenges to security. In this paper, we propose a novel technique namely secure multi-channel group key generation (MuGKeG) algorithm. We utilize the available channels switching behaviour between multiple nodes to hide our key from eavesdropper. We provide descriptions for an illustrative base case of three users and one eavesdropper and expand it for the case of N users with C channels and M eavesdroppers. Repeated application of the MuGKeG algorithm on the order of O(logN) allows scaling the size of the group in the order of millions. We provide an analytical closed-form solution for the entropy of the secret group key generated when eavesdroppers follow an optimal attack strategy, and verify it by ns-3 simulations. Comparison with previous state-of-the-art schemes suggests that MuGKeG can provide upto 20 kbps increase in secrecy rate with a scalable key size.


    BibTeX



    urldoi
  6. A Stochastic Model for Transit Latency in OpenFlow SDNs (, , , and ), In Computer Networks, Elsevier, volume 113, .

    Abstract

    Software defined networks (SDNs) introduced the concept of decoupling control and data planes which is a paradigm shift. The OpenFlow protocol is one of a number of technologies that enables this decoupling and, in effect, commodifies network equipment. As of now, there is still limited work that has been done towards modeling the transit delay across OpenFlow switches experienced by network traffic. In this work we develop a stochastic model for the path latency in Open vSwitch (used together with a POX controller) based on measurements made in experiments performed on three different platforms which include 1) Mininet, 2) MikroTik RouterBoard 750GL and 3) GENI testbed softswitch. We propose a log-normal mix model (LNMM) and show that it offers a R2 value of greater than 0.90 for most of our experiments. We also demonstrate how the M/M/1 models proposed in earlier studies is a poor fit.


    BibTeX



    urldoi
  7. Indoor self-localization via bluetooth low energy beacons (, , and ), In IDRBT JOURNAL OF IJBT, volume 1, .

    BibTeX



  8. Metrics for Sustainable Data Centers (, , , and ), In IEEE Transactions on Sustainable Computing, .

    BibTeX



  9. Automated compliance verification of business processes in Apromore (, and ), In Proceedings of the BPM Demo Track 2017, CEUR Workshop Proceedings (CEUR-WS.org), .

    Abstract

    This paper presents the integration of two plugins, a declarative process specification generator and a compliance verifier, into the Apromore advanced business process analytics platform. The integrated toolchain has a range of applications of interest to both practitioners and researchers. For example, it can be used in the areas of business process compliance, flexibility and variability. The generator can extract a set of formal specifications that declaratively describe a set of business process variants; whereas the verifier can check whether temporal properties over business process models hold. The verifier can use two different model checker tools: NuSMV2 and NuXMV. These plugins allow business analysts to verify if a newly developed process model adheres to rules and regulations or a specification dictated by existing process model variants.


    BibTeX



    urlpdf
  10. Post Summarization of Microblogs of Sporting Events (, , , , and ), In Proceedings of the 26th International Conference on World Wide Web Companion, .

    Abstract

    Every day 645 million Twitter users generate approximately 58 million tweets. This motivates the question if it is possible to generate a summary of events from this rich set of tweets only. Key challenges in post summarization from microblog posts include circumnavigating spam and conversational posts. In this study, we present a novel technique called lexi-temporal clustering (LTC), which identifies key events. LTC uses k-means clustering and we explore the use of various distance measures for clustering using Euclidean, cosine similarity and Manhattan distance. We collected three original data sets consisting of Twitter microblog posts covering sporting events, consisting of a cricket and two football matches. The match summaries generated by LTC were compared against standard summaries taken from sports sections of various news outlets, which yielded up to 81% precision, 58% recall and 62% F-measure on different data sets. In addition, we also report results of all three variants of the recall-oriented understudy for gisting evaluation (ROUGE) software, a tool which compares and scores automatically generated summaries against standard summaries.


    BibTeX



    urldoi
  11. Prediction of Running Injuries from Training Load: a Machine Learning Approach (, , and ), In International Conference on eHealth, Telemedicine, and Social Medicine, .

    BibTeX



    url
  12. Comparison of Energy Consumption in Wi-Fi and Bluetooth Communication in a Smart Building (, , and ), In IEEE Annual Computing and Communication Workshop and Conference, .

    BibTeX



    url
  13. Power-Based Device Recognition for Occupancy Detection (, , and ), In Service-Oriented Computing - ICSOC 2017 Workshops, volume in press, .

    BibTeX



    doi
  14. Semantic web and augmented reality for searching people, events and points of interest within of a university campus (, , and ), In 2017 XLIII Latin American Computer Conference (CLEI), .

    BibTeX



  15. Tv program recommender using user authentication on middleware ginga (, , , and ), In 2017 IEEE Second Ecuador Technical Chapters Meeting (ETCM), .

    BibTeX



  16. Runtime Modifications of Spark Data Processing Pipelines (, , , and ), In 2017 International Conference on Cloud and Autonomic Computing, ICCAC, .

    BibTeX



    url
  17. Methodological guidelines for publishing library data as linked data (, , , , and ), In 2017 International Conference on Information Systems and Computer Science (INCISCOS), .

    BibTeX



  18. Cloud Ready Applications Composed via HTN Planning (, , and ), In IEEE International Conference on Service Oriented Computing and Applications, .

    BibTeX



  19. iTrack: A residential energy monitoring system tailored to meet local needs (, , , , and ), In , .

    Abstract

    The Kingdom of Saudi Arabia, like many other Gulf Council Countries, is lately experiencing a very rapid population and industrial growth, which results in an increasing demand for energy. To meet this growing demand, the GCC too is transitioning towards a smarter electricity grid with increased penetration of renewable sources. However, all agree that the success of such a shift in paradigm also depends on demand side management, most of energy demands coming for residential area. Providing residents with real-time feedback on their energy consumption is a promising way to promote energy saving behavior through an increased awareness. This paper outlines the design and development phases of a residential energy monitoring system that has been tailored to meet local needs, that is to say a non-intrusive system with a user friendly interface available both in English and Arabic endowed with an alert system providing real-time consumption information, as well as energy saving and awareness tips.


    BibTeX



    doi
  20. Tracing back the chain: Cognitive pre-requisite analysis for CIS capstone project ( and ), In , volume Part F1346, .

    Abstract

    © 2017 Association for Computing Machinery. When teaching the first part of the capstone project to the senior students at the College of Computer Sciences and Information Technology, some problems have been reported for the past few semesters. This paper aims to identify the cause of the problem by comparing necessary skills for the capstone project to skills acquired in prior courses, tracing back through the pre-requisite dependency chain. The comparison is set between the Course Learning Outcomes identified in the capstone project and the Course Objectives of courses offered in previous years. The analysis revealed two main discrepancies, namely: Several mismatches and missing links that explained the problems initially observed. It also led to identifying a weakness in one of the previous courses and triggered an adjustment in the course content.


    Keywords: Bloom's taxonomy, CIS capstone, Course design, Course evaluation


    BibTeX



    doi
  21. Challenges and trends about smart big geospatial data: A position paper (, and ), In 2017 IEEE International Conference on Big Data (Big Data), .

    BibTeX