Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Finding approximated shortest paths for extremely large-scale complex networks is a challenging problem, where existing works require large overhead to achieve high accuracy and diversity for estimated paths, especially for large graphs with millions of vertices. In this paper, we propose an online search approach based on preprocessed indexes, to approximate point-to-point shortest paths. The approach...
The paper presents a concept and an implementation for an image registry for virtual collaborative environments (ViCE). This cross-platform and cross-organizational image registry bridges gaps between execution environment platforms and user communities. The presented concept consists of a conceptual architecture and a sophisticated set of metadata fields to describe images as virtual environments...
Containerization, or OS-level virtualization has taken root within the computing industry. However, container utilization and its impact on performance and functionality within High Performance Computing (HPC) is still relatively undefined. This paper investigates the use of containers with advanced supercomputing and HPC system software. With this, we define a model for parallel MPI application DevOps...
Supervisory Control and Data Acquisition (SCADA) is a typical OT (Operational Technology) system that uses computers, networked data communications and graphical user interface for process supervisory management. SCADA systems are managing industrial processes or mission-critical infrastructure, and most installations are not making use of cloud-based infrastructure. In this paper, we present different...
Provides an abstract for each of the tutorial presentations and may include a brief professional biography of each presenter. The complete presentations were not made available for publication as part of the conference proceedings.
Since Infrastructure-as-a-Service (IaaS) clouds contain many vulnerable virtual machines (VMs), intrusion detection systems (IDSes) should be run for all the VMs. IDS offloading is promising for this purpose in that it allows IaaS providers to run IDSes outside VMs without any cooperation of users. However, IDS offloading makes performance isolation between VMs difficult because IDSes offloaded from...
The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and Information Systems (IS) literature. However, emerging technologies such as the ever-changing complex area of cloud computing present new challenges and opportunities for demonstrating how IT investments lead to business value. This paper conducts a multidisciplinary systematic...
Data Science is currently a popular field of science attracting expertise from very diverse backgrounds. Current learning practices need to acknowledge this and adapt to it. This paper summarises some experiences relating to such learning approaches from teaching a postgraduate Data Science module, and draws some learned lessons that are of relevance to others teaching Data Science.
The paper presents C2 Platform that covers both the telecommunication and enterprise cloud cases. The C2 architecture incorporates as the network service orchestration as service life-cycle management. C2 implementation follows ETSI NFV MANO standard and uses TOSCA to describe network functions. The paper provides the experiment's methodology and experimental measurements of the platform efficiency,...
The rapid development of cloud computing goes along with the explosion of internal network traffic in the cloud. In this paper, we analyzed the usage of fields of internal packet of cloud, and customize the packets based on the statistical results. We remove unneeded fields of header in order to compress the packet size. Because other machines can not read customized packets, we modify the network...
High-performance R&E networks and clouds enable the construction of a secure virtual cloud environment over their resources. However, it is not easy for general users to construct such an environment and build an application over the environment, as this would require each user to not only have knowledge about the target application, but also about the cloud APIs and resource optimization. This...
Many applications are distributed in cloud as they consist of different modules and tiers. Cloud tenant must be able to monitor the deployed applications to ensure that it is operating correctly, meeting its SLAs, and fulfilling business requirements. Activating all type of monitoring functions for all tenant's applications at the same time is costly. The more required monitoring functions the more...
Quality of Experience (QoE) anomalies widely exist in all types of video services. As video services migrate to the Cloud, unique challenges occur to deploy video services in the Cloud environment. We study the QoE anomalies for users in a video service deployed in a production Cloud CDN. We use a QoE anomaly identification system, QRank, to identify anomalous systems. We consider Cloud CDN servers,...
Continuously, i.e. automatically and repeatedly checking at what geographical locations cloud service components are hosted aims at validating that the cloud service satisfies regulatory and other compliance requirements. Yet continuous validation is challenging since it requires location techniques to adapt to network changes over time. In this paper, we present adaptive location classification,...
With the popularization of mobile smart devices (e.g., smartphones, tablets), the number of mobile game players increases significantly. This makes mobile gaming industry rise and take up a large piece of global game market. Different from the traditional players playing games on their personal computers with wired local area network or Wi-Fi access, mobile game players nowadays play online games...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.