The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a power/energy profiling framework for collecting and analyzing energy consumption data in compute clouds. We implement a prototype of our profiling framework and test it in a cloud computing environment. By measuring the power/ energy consumption with various combinations of system configuration and settings, we build knowledge of the extent to which each factor influences...
With the booming trend of cloud computing, on-demand resource management is overwhelming static and dedicated strategy. The increasing demands introduce multiple challenges including energy efficiency, performance enhancement, and fault tolerance. Virtualized computing environment decouples OS and applications with hardware to best facilitate these on-demand cloud services. In this paper, we propose...
In this paper, we explore the structures of the optimal solutions for the minimum power broadcast tree problem in wireless ad hoc networks. We investigate the common properties of the optimal solutions found by the algorithms based on integer programming and use the found features to describe the property of optimal solutions. We also present a series of theoretically rigorous study of the found property,...
In the United States, there has been a high incidence of hurricanes over the past decade. Before a hurricane makes landfall it is important, for safety, that people who live in potentially dangerous areas, such as along the coast, evacuate. Nursing homes have an even greater concern during an evacuation as the patients are primarily elderly or disabled, and require additional assistance. In this paper...
Distributed Hash Table (DHT)-based peer-to-peer information discovery systems have emerged as highly scalable systems for information storage and discovery in massively distributed networks. Originally DHTs supported only point queries. However, recently they have been extended to support more complex queries, such as multiattribute range (MAR) queries. Generally, the support for MAR queries over...
Networked computer systems continue to grow in scale and in the complexity of their components and interactions. Component failures become norms instead of exceptions in these environments. A failure will cause one or multiple computer(s) to be unavailable, which affects the resource utilization and system throughput. When a computer fails to function properly, health-related data are valuable for...
MANETs are highly dynamic and suffer from frequent and unpredictable changes in the network topology due to the fact that devices are mobile and operate with low battery power. Due to limited computing power, high mobility and the lack of a central coordinating entity, service discovery in MANETs has been an attractive area of research. However, proposed solutions are broadcast-based and result in...
Reproducing non-deterministic bugs is challenging. Recording program execution in production environments and reproducing bugs is an effective way to re-enable cyclic debugging. Unfortunately, most current record-replay approaches introduce large perturbations to either environments and/or execution flow, in addition to performance penalty and high storage overhead, which make them impracticable to...
We evaluate the scalability of a multiple view distributed approach to recording presentations that utilizes camera equipped mobile devices. We show this approach is scalable in terms of video resolution, bandwidth and power. This scalability enables users with a broader range of mobile devices to effectively participate in presentations. We show our approach is less expensive, more scalable, flexible...
In largely distributed clusters, computing nodes are geographically deployed in various computing sites. Information processed in a distributed cluster is shared among a group of distributed processes or users by virtue of messages passing protocols (e.g. message passing interface - MPI) running on the Internet. Because of the open accessible nature of the Internet, data encryption for these large-scale...
Autonomous management of a multi-tier Internet service involves two critical and challenging tasks, one understanding its dynamic behavior when subjected to dynamic workload and second adaptive management of its resources to achieve performance guarantees. In this paper, we propose a statistical machine learning based approach to achieve session slowdown guarantees of a multi-tier Internet service...
This paper addresses the problem of video multicast for heterogeneous destinations in mobile ad hoc networks. Multiple Description Coding (MDC) is used for video coding. MDC generates multiple independent bit-streams, where the multiple bit-streams are referred to as multiple descriptions (MD). Furthermore, MDC enables a useful reproduction of the video when any description is correctly received....
Numerous studies based on complex measurement platforms have been carried out for over ten years now in order to discover the Internet topology on domain level. It turns out that this topology exhibits certain invariant properties such as a distribution of node degree. This distribution follows a power law. Moreover, the revealed topology is hierarchical. The hierarchy is caused by commercial contracts...
Due to the broadcast nature of wireless channels, neighbouring sensor nodes may overhear packets transmissions from each other even if they are not the intended recipients of these transmissions. This redundant packet reception leads to unnecessary expenditure of battery energy of the recipients. Particularly in highly dense sensor networks, overhearing or eavesdropping overheads can constitute a...
A file system snapshot is a stable image of all files and directories in a well-defined state. Local file systems offer point-in-time consistency of snapshots, which guarantees that all files are frozen in a state in which they were at the same point in time. However, this cannot be achieved in a distributed file system without global clocks or synchronous snapshot operations. We present an algorithm...
Deployment of video communication services over mobile ad hoc networks faces numerical obstacles since the networks are characterized by limited and unpredictable bandwidth. Following the tenet of service-orientation, this study proposes a cross-layer design for fine-grained adaptive transmission of real-time video over time-varying channels. Specifically, the sender accurately estimates the current...
This paper proposes ARM, an receiver-initiated MAC protocol with duty cycling to tackle control channel saturation, triple hidden terminal and low broadcast reliability problems in asynchronous multi-channel WSNs. By adopting a receiver-initiated transmission scheme and probability-based random channel selection, ARM effectively solves control channel saturation and triple hidden terminal problems...
In this paper, we study the problem of reducing the energy consumption for hard real-time systems based on fixed-priority (FP) scheme. To balance the static and dynamic energy consumption, the concept of critical speed was proposed. Moreover, when combined with the processor shutdown strategy, the critical speed was widely used as the lower bound for voltage scaling in literature. In this paper, we...
A network deployment of generally available operating systems (OS) usually takes in the order of tens of minutes. This is prohibitive in an environment in which OSs must be dynamically and frequently provisioned in response to external requests. By exploiting the fact that in general only a small part of an OS image is actually required to be present to perform useful tasks, we demonstrate how an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.