The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Motivated by the high complexity of today’s datacenters, a large body of studies tries to understand workloads and resource utilization in datacenters. However, there is little work on exploring unsuccessful job and task executions. In this article, we study and predict three types of unsuccessful executions in traces of a Google datacenter, namely $\sf {fail}$<alternatives> <inline-graphic xlink:href="rosa-ieq1-2543718.gif"/></alternatives>...
Wimpy virtual instances equipped with small numbers of cores and RAM are popular public and private cloud offerings because of their low cost for hosting applications. The challenge is how to run latency-sensitive applications using such instances, which trade off performance for cost. In this study, we analytically and experimentally show that simultaneously scaling resources at coarse granularity...
To ensure the scalability of big data analytics, approximate MapReduce platforms emerge to explicitly trade off accuracy for latency. A key step to determine optimal approximation levels is to capture the latency of big data jobs, which is long deemed challenging due to the complex dependency among data inputs and map/reduce tasks. In this paper, we use matrix analytic methods to derive stochastic...
The performance of primary health care clinic can be impacted by both of patient behavior and appointment rules. In this paper, we compare and evaluate the level of patient service and clinic performance of different overbooking appointment rules under changing patient behavior. The focus is on the appropriate selection of overbooking rules based on panel characteristics. Analysis methodology involves...
A cash-constrained two-level supply chain with a supplier and a single retailer facing stochastic demand is considered in this paper. Two different financing strategies are investigated and the resulting expected return of the supplier, retailer, and bank are examined. Our numerical study shows that by sharing revenue and risk among supplier, retailer, and bank, the joint financing strategy can improve...
The costs incurred by cloud providers towards operating their data centers are often determined in large part by their peak demands. The pricing schemes currently used by cloud providers to recoup these costs from their tenants, however, do not distinguish tenants based on their contributions to the cloud's overall peak demand. Using the concrete example of peak-based pricing as employed by many electric...
By translationally moving a magnetic source above a conductive plate guideway both levitation and drag forces are created. Unfortunately, the electrodynamic drag force can be quite high [1]. Kratz studied a double Halbach array topology, such as shown in Fig 1 [1], and used a simple curve fitting approximation to model the forces. Kratz experimentally showed that a significant reduction in drag force...
Big-data applications are being increasingly used in today's large-scale data enters for a large variety of purposes, such as solving scientific problems, running enterprise services, and computing data-intensive tasks. Due to the growing scale of these systems and the complexity of running applications, jobs running in big-data systems experience unsuccessful terminations of different nature. While...
Provisioning strategies relying on CPU load may be suboptimal for many applications, because the relation between CPU load and application performance can be non-linear and complex. With the knowledge of the relation between CPU load and application performance, resource provisioning strategies could be tuned to a particular application, but the required knowledge is difficut to obtain, because classic...
In this paper, we present ParSim, a software tool designed for modeling parallel applications. The tool reproduces a workload, including its parallel characteristics specified by the users, on the target multicore or multiCPU system, and analyzes the collected data. The objective of ParSim is to close the gap between the "generalized" benchmarks, designed for conventional system architectures,...
This paper proposes a dual Halbach array to improve the thrust force of tubular linear machines. The force output of a single phase permanent magnet tubular linear motor (PMTLM) is obtained analytically. It is validated with finite element method (FEM). Based on the analytical force model, penalty method and scanning method are employed to conduct parameter optimization to maximize the force output...
This paper extends the Restricted Admission Control (RAC) theoretical model to cover the multiple-view cases in View-Oriented Transactional Memory (VOTM) to analyze potential performance gain in VOTM when shared data is partitioned into multiple views. Experimental results show that partitioning shared data into separate views, each of which is independently controlled by RAC, can improve performance...
The aim of this study is to investigate the relationship between online gaming behavior and special underlying social group structures through the use of player information of a certain MMORPG. Data were collected from the logs of an MMORPG in 2011, recording five types of gaming behaviors, player gender, avatar gender and avatar occupation types to investigate whether different avatars affect gaming...
This paper proposes a novel nonlinear manifold learning method for addressing the ill-posed problem of occluded human action analysis. As we know, a person can perform a broad variety of movements. To capture the multiplicity of a human action, this paper creates a low-dimensional manifold for capturing the intra-path and inter-path contexts of an event. Then, an action path matching scheme can be...
This paper proposes an analytical model for dimensioning transport bandwidths in the Long Term Evolution (LTE) access network. In this work the criterion for dimensioning is the transport network delay QoS (at the packet level). The presented analytical model takes into considerations the key features of the LTE radio interface and the use of Differentiated Service (DiffServ) QoS scheme in the LTE...
Adequate ESD protection is a new design challenge for HV electronics. This paper presents design, failure analysis and optimization of a HVggLDMOS ESD protection structure in a HV BCD process. Theoretical analysis involving Kirk effect and mixed-mode ESD simulation-design technique were used to analyze experimental results and to optimize the HV ESD protection structure.
Recently, the Session Initiation Protocol (SIP) has been adopted as the signaling protocol for multimedia services. In this paper, we present a SIP traffic modeling and analysis system for Internet telephony services. The proposed modeling process mainly uses statistical analysis schemes, such as the Mahalanobis distance and a weighted sliding windows; this process can build traffic profiles after...
In this paper we study the content retrieval delay in a hybrid content distribution system, e.g., emerging content clouds [1], where a requested content item can be vertically retrieved from the central server and horizontally retrieved from network nodes. The content retrieval delay depends on the load intensities of the retrieval sources, which have asymmetric system properties such as bandwidth...
Exact matchings have been extensively studied in the past, but there is relatively little work about approximate matchings. We present a throughput analysis when random arbitration is used to obtain approximate matchings. We compute the throughput by the average available credits at outputs, which is obtained through a DTMC modeling. We also devise an iterative solving procedure for the DTMC of available...
In VoIP service network, attack traffic has abnormal characteristics according to the kind of attack. Mass Call Spam (MCS) attack that spammers send via Internet Telephony service to a large number of users has also an abnormal traffic pattern. We propose an analysis scheme for detecting MCS in Session Initiation Protocol (SIP)-based Internet Telephony service. In the proposed scheme, efficient statistical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.