The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is a mature technology that provides a huge leap in elastic computation, and new development trends are shaped to compliment the cloud computing paradigm. Cisco recently introduced the concept of Fog Computing to enable applications on billions of devices that are already connected and form the Internet of Things at the edge of the network. With the view point that the fog computing...
The recent distributed online convex optimization framework has developed in Wireless sensor networks (WSN) provide the promising approach for solving approximately stochastic optimization problem over network of sensors follows distributed manner. In practice, most of real environmental sensing activities are highly dynamic where noisy sensory information often appears and affects to the learning...
Recommender agents are widely used in online markets, social networks and search engines. The recent online news recommendation systems such as Google News and Yahoo! News produce real-time decisions for ranking and displaying highlighted stories from massive news and users access per day. The more relevant highlighted items are suggested to users, the more interesting and better feedback from users...
Even though demand response of datacenters recently has received increasing attention due to huge demands and flexible power control knobs, most of current studies focus on the owner-operated datacenters, leaving behind another critical segment of datacenter business: multi-tenant colocation. In colocation datacenters, while there exist multiple tenants who manage their own servers, the colocation...
In this paper, the problem of resource allocation in cloud datacenters, that own highly complex and heterogeneous tasks and servers, is considered. To address this problem, a novel framework, dubbed joint operation cost and network traffic cost (JOT) framework, is proposed. This framework combines notions from Gibbs sampling and matching theory to find an efficient solution addressing the NP-hard...
Buildings and multi-tenant datacenters (MDCs) have been identified as crucial participants for emergency demand response (EDR) which is the last line of defense to avoid cascading failures during emergency events. One important overlooked fact is that the majority of MDCs are physically located in mixed-use buildings (MUBs) and share the electricity supply with other operations (e.g., office spaces)...
Workload consolidation is an efficient approach to reduce the power consumption of datacenters, meanwhile load balancing can reduce the datacenter’s user delay. Despite complexities of 1) the coupling between consolidation and load balancing methods for server allocation, and 2) the heterogeneity of server configurations, we address the joint consolidation and service-aware load balancing problem...
Both buildings and datacenters have emerged as critical resources for demand response, especially for emergency demand response (EDR) that helps avoid cascading failures during emergency events. Nonetheless, although the majority of datacenters are physically located in mixed-use buildings (MUBs) and share the main electrical power line with other operation (e.g., office) in the same MUB, the existing...
In the area of cloud infrastructure environment, the management tool to monitor and control the cloud resources is the important factor that can drive the cost benefit of the cloud vendors. But most these tools are bundled within the high cost commercial platforms and are optimized to run on desktop computers. With the vision that Mobile Cloud Computing will be the future technology paradigm that...
We take the first step to study the price competition in a heterogeneous market cloud computing formed by public provider and cloud broker, all of which are also known as cloud service providers. We formulate a price competition between cloud broker and public provider as a two-stage non-cooperative game. In stage one, where cloud service providers set their service prices to maximize their revenue,...
In cloud computing environment, power consumption is a critical factor for data centers. Effective power consumption control can improve significantly benefit for providers. In this paper, we derive from CloudNFV architecture, an open platform for implementing Network Functions Virtualization based on cloud computing and Software Defined Networking, to obtain an optimal power control strategy toward...
Large-scale Internet applications, such as content distribution networks, are deployed in a geographically distributed manner and emit massive amounts of carbon footprint at the data center. To provide uniform low access latencies, Cisco has introduced Fog computing as a new paradigm which can transform the network edge into a distributed computing infrastructure for applications. Fog nodes are geographically...
In Content Centric Network, caching and forwarding schemes can affect the performance of the whole network. The original caching and forwarding schemes are simple, but these schemes have some drawbacks. Firstly, the original caching scheme stores the same content on several neighboring routers along the request path. This redundant caching does not use the limited storage space available to the routers...
Together with the growth of Internet, e-commerce transactions play an important role in the modern society. As a result, phishing is a deliberate act by an individual or a group of people to steal personal information such as password, banking account, credit card information, etc. Most of these phishing web pages look similar to the real web pages in terms of website interface and uniform resource...
Cognitive Radio Network (CRN) is one of technologies to enhance the spectrum utilization by allowing unlicensed users to exploit the spectrum in an opportunistic manner. In CRN, the spectrum handoff function is a necessary component to provide a resilient service for the unlicensed users. This function is used to discover spectrum holes in a licensed network and avoid interference between unlicensed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.