Current IssuePrevious Issue   Next Issue

Volume 21 No. 2
01 April 2016

Siqi Ji,Baochun Li

2016, 21(2): 125-135.   doi:10.1109/TST.2016.7442496
Abstract ( 238 HTML ( 4   PDF(3639KB) ( 253 )   Save

Big data analytics, the process of organizing and analyzing data to get useful information, is one of the primary uses of cloud services today. Traditionally, collections of data are stored and processed in a single datacenter. As the volume of data grows at a tremendous rate, it is less efficient for only one datacenter to handle such large volumes of data from a performance point of view. Large cloud service providers are deploying datacenters geographically around the world for better perf...

Yinjun Wu,Zhen Chen,Yuhao Wen,Wenxun Zheng,Junwei Cao

2016, 21(2): 136-145.   doi:10.1109/TST.2016.7442497
Abstract ( 235 HTML ( 3   PDF(5907KB) ( 186 )   Save

Bitmap indexing has been widely used in various applications due to its speed in bitwise operations. However, it can consume large amounts of memory. To solve this problem, various bitmap coding algorithms have been proposed. In this paper, we present COMbining Binary And Ternary encoding (COMBAT), a new bitmap index coding algorithm. Typical algorithms derived from Word Aligned Hybrid (WAH) are COMPressed Adaptive indeX (COMPAX) and Compressed “n” Composable Integer Set (CONCISE), which can ...

Wei Dai,Yufeng Wang,Qun Jin,Jianhua Ma

2016, 21(2): 146-156.   doi:10.1109/TST.2016.7442498
Abstract ( 220 HTML ( 1   PDF(2105KB) ( 270 )   Save

Currently, mobile devices (e.g., smartphones) are equipped with multiple wireless interfaces and rich built-in functional sensors that possess powerful computation and communication capabilities, and enable numerous Mobile Crowdsourced Sensing (MCS) applications. Generally, an MCS system is composed of three components: a publisher of sensing tasks, crowd participants who complete the crowdsourced tasks for some kinds of rewards, and the crowdsourcing platform that facilitates the interaction...

Zhiyao Hu,Xiaoqiang Teng,Deke Guo,Bangbang Ren,Pin Lv,Zhong Liu

2016, 21(2): 157-167.   doi:10.1109/TST.2016.7442499
Abstract ( 224 HTML ( 4   PDF(1307KB) ( 317 )   Save

Set reconciliation between two nodes is widely used in network applications. The basic idea is that each member of a node pair has an object set and seeks to deliver its unique objects to the other member. The Standard Bloom Filter (SBF) and its variants, such as the Invertible Bloom Filter (IBF), are effective approaches to solving the set reconciliation problem. The SBF-based method requires each node to represent its objects using an SBF, which is exchanged with the other node. A receiving...

Xiang Zhang,Wenyao Cheng

2016, 21(2): 168-175.   doi:10.1109/TST.2016.7442500
Abstract ( 188 HTML ( 0   PDF(1206KB) ( 182 )   Save

Link patterns are consensus practices characterizing how different types of objects are typically interlinked in linked data. Mining link patterns in large-scale linked data has been inefficient due to the computational complexity of mining algorithms and memory limitations. To improve scalability, partitioning strategies for pattern mining have been proposed. But the efficiency and completeness of mining results are still under discussion. In this paper we propose a novel partitioning strate...

Benika Hall,Andrew Quitadamo,Xinghua Shi

2016, 21(2): 176-195.   doi:10.1109/TST.2016.7442501
Abstract ( 364 HTML ( 1   PDF(2247KB) ( 227 )   Save

Integrative network analysis is powerful in helping understand the underlying mechanisms of genetic and epigenetic perturbations for disease studies. Although it becomes clear that microRNAs, one type of epigenetic factors, have direct effect on target genes, it is unclear how microRNAs perturb downstream genetic neighborhood. Hence, we propose a network community approach to integrate microRNA and gene expression profiles, to construct an integrative genetic network perturbed by microRNAs. W...

Chang Chen,Xiaohe Hu,Kai Zheng,Xiang Wang,Yang Xiang,Jun Li

2016, 21(2): 196-209.   doi:10.1109/TST.2016.7442502
Abstract ( 163 HTML ( 0   PDF(2189KB) ( 241 )   Save

Most types of Software-Defined Networking (SDN) architectures employ reactive rule dispatching to enhance real-time network control. The rule dispatcher, as one of the key components of the network controller, generates and dispatches the cache rules with response for the packet-in messages from the forwarding devices. It is important not only for ensuring semantic integrity between the control plane and the data plane, but also for preserving the performance and efficiency of the forwarding ...

Yanting Ren,Liji Wu,Hexin Li,Xiangyu Li,Xiangmin Zhang,An Wang,Hongyi Chen

2016, 21(2): 210-220.   doi:10.1109/TST.2016.7442503
Abstract ( 210 HTML ( 1   PDF(11553KB) ( 98 )   Save

The security of CPU smart cards, which are widely used throughout China, is currently being threatened by side-channel analysis. Typical countermeasures to side-channel analysis involve adding noise and filtering the power consumption signal. In this paper, we integrate appropriate preprocessing methods with an improved attack strategy to generate a key recovery solution to the shortcomings of these countermeasures. Our proposed attack strategy improves the attack result by combining informat...

Jinghuan Wen,Huimin Ma,Xiaoqin Zhang

2016, 21(2): 221-230.   doi:10.1109/TST.2016.7442504
Abstract ( 203 HTML ( 1   PDF(4375KB) ( 262 )   Save

Interference and anti-interference are two opposite and important issues in visual tracking. Occlusion interference can disguise the features of a target and can also be used as an effective benchmark to determine whether a tracking algorithm is reliable. In this paper, we proposed an inner Particle Swarm Optimization (PSO) algorithm to locate the optimal occlusion strategy under different tracking conditions and to identify the most effective occlusion positions and direction of movement to ...

Jiangzhou He,Wenguang Chen,Zhizhong Tang

2016, 21(2): 231-240.   doi:10.1109/TST.2016.7442505
Abstract ( 188 HTML ( 1   PDF(5523KB) ( 200 )   Save

Structure Data Layout Optimization (SDLO) is a prevailing compiler optimization technique to improve cache efficiency. Structure transformation is a critical step for SDLO. Diversity of transformation methods and existence of complex data types are major challenges for structure transformation. We have designed and implemented STrans, a well-defined system which provides controllable and comprehensive functionality on structure transformation. Compared to known systems, it has less limitation...

2016, 21(2): 242-242.   doi:10.1109/TST.2016.7442438
Abstract ( 78 HTML ( 1   PDF(55KB) ( 106 )   Save