The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the fundamental trade-off between quality and timeliness of planning, designers of self-adaptive systems often have to compromise between an approach that is quick to find an adaptation plan and an approach that is slow but finds a quality adaptation plan. To deal with this trade-off, in our previous work, we proposed a hybrid planning approach that combines a deliberative and a reactive planning...
This paper evaluates a mechanism for applying machine learning (ML) to identify over-constrained IaaS virtual machines (VMs). Herein, over-constrained VMs are defined as those who are not given sufficient system resources to meet their workload specific objective functions. To validate our approach, a variety of workload-specific benchmarks inspired by common Infrastructure-as-a-Service (IaaS) cloud...
AMNESiA is an affinity measurement platform for NFV-enabled networks, designed to consolidate and interpret existing monitoring data into an affinity metric, aiding operators to identify affinity and anti-affinity relations in the network. AMNESiA uses the latest snapshot of usage data, collected through a generic monitoring solution, from the database to measure affinity between VNFs.
Medical image is an effective means to identify medical abnormalities. Patients typically have medical images taken at different clinics during lifetime, and they often wish to have second interpretation on medical images showing substantial diseases. With these two motivations, we design MIaaS which is a cloud service for archiving medical images and analyzing medical images by software and/or physicians...
The recent advances in sensor/actuator and RFID technologies have spun out a new healthcare model enabling capture and dissemination of patient vital signs over the Internet for ubiquitous monitoring of these patients anytime and from anywhere. This provides new opportunities for enhancing healthcare through participatory consultation, medical diagnosis and many other novel healthcare services. Some...
With the recent advancements in the field of robotics and cloud computing, one technology backing the other can have a huge potential under the domain of Cloud Robotics. Majority of systems are still operating independently using on-board computation, and confined memory and storage. Cloud Computing is a promising technology which is intended to harness the power of networked computers and communication...
MOOCs have expanded educational access beyond the traditional scope and masses. Cloud computing, open source platforms and software frameworks have provided the MOOC elements to support the creation of cost effective infrastructures, minimizing costs with widespread accessibility. However, these foundational elements present security concerns, which include non-enforceable policies, system and software...
NoSQL databases are the new breed of databases developed to overcome the drawbacks of RDBMS. The goal of NoSQL is to provide scalability, availability and meet other requirements of cloud computing. The common motivation of NoSQL design is to meet scalability and fail over. In most of the NoSQL database systems, data is partitioned and replicated across multiple nodes. Inherently, most of them use...
Elastic cloud storage services have revitalised network storage techniques. The convenience of using them is attractive to many users. What holds back adoption are concerns about security, privacy, reliability and other quality factors. These risks have been converted into challenges by researchers who investigate flexible user-controlled storage systems such as file storage integrators and databases...
With this paper we show through example how to determine acceptable response time of information system (IS) as part of Service level agreement (SLA) in cloud based information systems (CBIS) for randomly selected requirements and hardware infrastructure. IS which we analyzed is implemented on three different database management systems (DBMS): MS SQL Server - as commercial relational database management...
In this paper, we present a novel approach to solve the cloud storage issues and provide a fast load balancing algorithm. Our approach is based on partitioning and dual direction download of the files by multiple cloud nodes. Partitions of the files are also saved into the cloud rather than the full files, which provide a good optimization to the cloud storage usage. Only partial replication is used...
Web application development is confronted with increasing system complexity, new technical specification requirements, progressive changing of client terminal devices and security problems triggered by new cracking techniques. In this context, providing new methods for effectively developing Web application in low cost becomes paramount. This brings new technical challenges of developing new data...
Cloud computing has been rapidly adopted by enterprises worldwide in the recent years. During this period, both best practices and lessons learned have been accumulated and have been put into practice. However, few systematic works focus on engineering enterprise applications specifically for the cloud, or on re-engineering and migrating existing ones. The International Workshop on Engineering Cloud...
Cloud computing is the provision and delivery of computing resources as services over the Internet. The cloud computing business model also is a revolutionary change from what it had been as the service delivery and charge follows a utility model where customers are required to pay only for what is accessed and the duration of usage. Since the introduction of cloud computing to the market, service...
We present a novel security monitoring framework for intrusion detection in IaaS cloud infrastructures. The framework uses statistical anomaly detection techniques over data monitored both inside and outside each Virtual Machine instance. We present the architecture of our monitoring framework and describe the implementation of the real-time monitors and detectors. We also describe how the framework...
Multi-tenancy is an essential property of Cloud computing. It helps service providers to maximize resource utilization and reduce servicing costs per customer. It is therefore important for key components of the contemporary enterprise environment like the Enterprise Service Bus (ESB) to support and enable multi-tenancy. For this purpose, in this work we investigate the requirements for multi-tenant...
We propose a Map Reduce based stream processing system, called SSS, which is capable of processing stream along with large scale static data. Unlike the existing stream processing systems that can work only on the relatively small on-memory data-set, SSS can process incoming streamed data consulting the stored data. SSS processes streamed data with continuous Mappers and Reducers, which are periodically...
Cloud-Computing has gained high attention in industry. Cloud-services provided by cloud-computing are spreading quickly in enterprises. One root for the success of Cloud-Computing is on-demand self-service. Therefore, to appropriately elicit the requirements for cloud-computing, it is not sufficient to define the cloud-services but also the associated automated management interactions implementing...
This paper introduces a framework and a methodology to manage a SaaS application on top of a PaaS infrastructure. This framework utilizes PaaS policy sets to implement the SaaS providers elasticity policy for its application server tier. A strategy-tree is utilized at the SaaS layer to actively guide policy set selection at runtime in order to maintain alignment with the SaaS providers business objectives...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.