The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the energy-efficient coordination of a set of appliances in a smart-building. We introduce a theoretical formulation of the coordination problem and an Integer Linear Programming model for its resolution. Our formalization is complemented by an analysis of the properties and limits of the model. We also define a practical smart-building setting in which our formalization...
The elastic provisioning of Virtual Infrastructures (VIs) enables a dynamic management of cloud resources (computing and communication) in order to meet the hosted application's requirements. Thus, to perform elasticity requests, providers usually rely on reallocation mechanisms and policies. The concerns regarding the environment and the operational costs indicate energy consumption of the data centers...
Through analyzing the characteristics of the data processing in the environment of cloud computing, the author puts forward the distributed optimization storage model based on hash distribution. Based on massive amounts of data distribution, this model completed the data backup protocol based on master copy of distributed design and the Paxos distributed system protocol design on the basis of the...
We propose a novel personalized recommendation model for social network users based on location computing. The novelty of our model is that we deal with the location based recommendation by combing logistic regression with collaborative filtering method. The logistic regression is used to train the weights of items' features, i.e., the recommendation sort list. On the other hand, the collaborative...
The rise of the network economy and E-commerce has pushed the rapid development of logistics market. The Multi-tier Shuttle Warehousing System (MSWS) as a new autonomous unit load storage/retrieval system, which flexibility and work efficiency is much-improved compared with the conventional AS/RS, has attracted more and more attention of logistics enterprises both at home and abroad. MSWS is composed...
Although federated cloud computing has emerged as a promising paradigm, autonomous orchestration of resource utilization within the federation is still required to be balanced on the basis of workload assignment at a given time. Such potential imbalance of workload allocation as well as resource utilization may lead to a negative cloudburst within the federation. The analytical models found in the...
With the development of Internet technology, Automatic Train Supervision (ATS) simulation system with traditional C/S architecture is more and more inconvenience for its incompatibility with internet and the high cost of maintenance and development. It is more practical to use B/S structure. However, computer interlocking(CI) system with ATC system using UDP protocol is not compatible with remote...
The computing systems used by LHC experiments has historically consisted of the federation of hundreds to thousands of distributed resources, ranging from small to mid-size re-source. In spite of the impressive scale of the existing distributed computing solutions, the federation of small to mid-size resources will be insufficient to meet projected future demands. This paper is a case study of how...
Mobile edge computing (MEC) has recently emerged as an important paradigm to bring computation and cache resources to the edge of core networks. However, the resources of edge network are relatively limited, so it is necessary to cooperate with data center (DC) which has sufficient computational resources. In this paper, we aim at designing a computation offloading and data caching model under the...
The distinguishing feature of the Fog Computing (FC) paradigm is that FC spreads communication and computing resources over the wireless access network, so as to provide resource augmentation to resource and energy-limited wireless (possibly mobile) devices. Since FC would lead to substantial reductions in energy consumption and access latency, it will play a key role in the realization of the Fog...
System identification is a powerful technique for building accurate mathematical models of complex systems from experimental input/output data. Mathematical models that predict the behavior of the column are highly useful to improve the working conditions of distillation columns and increase throughput or lower energy consumption. This paper models a pseudo binary distillation column using a black-box...
A large portion of data mining and analytic services use modern machine learning techniques, such as deep learning. The state-of-the-art results by deep learning come at the price of an intensive use of computing resources. The leading frameworks (e.g., TensorFlow) are executed on GPUs or on high-end servers in datacenters. On the other end, there is a proliferation of personal devices with possibly...
All new Microsoft Azure and Bing servers are being deployed with an FPGA that sits both between the server and the data center network and on the PCIe bus. The FPGA is currently being used to accelerate networking on Azure machines and search on Bing machines, but could very quickly and easily be retargeted to other uses as needed. In this talk, I will describe how we decided on this architecture,...
Anomaly detection is the process of identifying unusual signals in a set of observations. This is a vital task in a variety of fields including cybersecurity and the battlefield. In many scenarios, observations are gathered from a set of distributed mobile or small form factor devices. Traditionally, the observations are sent to centralized servers where large-scale systems perform analytics on the...
Large scale distributed simulation should be well planned before the execution, since applying unnecessary hardware only wastes our time and money. On the other side, we need enough hardware to achieve an acceptable performance. Thus, it is considerable to estimate the performance of a large scale distributed simulation before the execution. Such an estimation also improves the efficiency of the applied...
This paper proposes an approach to modelling and analysis of distributed real-time actor systems, which is based on the Uppaal statistical model checker (SMC). SMC was chosen because it automatizes simulations, offers a temporal logic language to formalize specifications and exploits statistical techniques to infer quantitative measures about a model. The approach is integrated in a system life-cycle...
The perfect relationship between deployment costs and systems availability is one of the primary goals of companies that wish to provide some computer environment or service through the Internet. The question that everyone wants to know the answer is: How much may I save and still improve the availability of my system avoiding financial losses with an SLA contract breach? This paper attempts to respond...
Online transaction failures often show up as "500: Internal Server Error" in web server access logs. In many instances determining the root cause of the failure is a difficult task. It could either be a bug associated with a specific HTTP request alone or the result of an undesirable state created by previous HTTP transactions. The latter case, which we call workload dependent faults, are...
As more and more Internet of Things (IoT) devices are connected to the cloud services, fog computing has emerged as a new computing model to provide analytic and intelligent services to the end users for fast response time. Among the application layer protocols used for IoT, MQTT and CoAP are two well-known lightweight protocols that run on top of TCP and UDP, respectively. MQTT supports publish/subscribe...
Model slicers are tools which provide two services: (a) finding parts of interest in a model and (b) displaying these parts somehow or extract these parts as a new, autonomous model, which is referred to as slice or sub-model. This paper focuses on the creation of editable slices, which can be processed by model editors, analysis tools, model management tools etc. Slices are useful if, e.g., only...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.