The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: vehicle detection; discrete time queueing system; CBMLAD; linear programming model; surface water quality assessment; fuzzy subgroups; computer aided optimum design; aerodynamic modeling; fuzzy logic controller; adaptive neural network; trajectory planning; nurbs model; XML data safety; sparse signal estimation; condition monitoring information model; ECG extraction;...
The following topics are dealt with : computer architecture; data intensive and I/O computing; algorithm and application; P2P computing; service-oriented architecture; cluster computing; grid computing; cloud computing; performance evaluation; compilers and language; information retrieval; knowledge discovery; OS/resource management; wireless networks; and pervasive computing.
This paper is concerned with understanding the connection between the existing Internet congestion control algorithms and the optimal control theory. The available resource allocation controllers are mainly devised to derive the state of the system to a desired equilibrium point and, therefore, they are oblivious to the transient behavior of the closed-loop system. This work aims to investigate what...
A grid system connects a huge number of computers in the Internet. It integrates the distributed computational resources and data resources. A complex grid system needs to have a characteristic of self-managing. Autonomic computing aims to overcome the rapidly growing complexity of computing system management. It can be implemented to manage complex computing resources in grid systems. We present...
Information infrastructures such as Internet have been a great success in the past few decades and gradually become mature, diversified user requirements continue to grow at a fabulous speed. Multiplex services on secure networked environments are now deemed as an application licensed to customers for use as a trustworthy service on demand. The flexible reconfiguration network is the next step to...
This paper presents a comprehensive load balancing approach using priority based migration (PBM) mechanism for a trusted small scale distributed computing environment. A process migration server (PMS) that acts as a cluster management server reduces latency time in migrated process execution; leading to no starvation condition for any process thus achieving uniform distribution of load among all the...
Load balancing among application layer peer-to-peer (P2P) networks is critical for its effectiveness but, are considered to be the most important development for next-generation Internet infrastructure. Most structured P2P systems rely on ID-space partitioning schemes to solve the load imbalance problem and have been known to result in an imbalance factor of ?? (log N) in the zone sizes. Two important...
With the rapid development of Internet, the scale of WEB service is expanding. WEB cluster technology is required to support the large-scale WEB applications. WEB load management is a critical technology of WEB clusters. In this paper, a load management mechanism is presented and a system based on it is implemented. To implement the system, share memory technology and synchronization hash technology...
In this paper, we present a system that optimally and dynamically allocates the available computing resources to virtual machines that support virtual collaboration environments. Such environments are emerging fast via on-line social networks, virtual worlds, and the "Web 3.0" or "collaborative Web" paradigm. We use a utility-based framework to differentiate the applications hosted...
The server mirroring method has extensively used as the technology for contents delivery networks. Several mirror servers that serve same contents are located in a network, and an access is navigated to one of the mirror servers based on the delay time and the load balance. The location of the mirror servers with high reliability against a failure and small delay times of accesses is important. In...
As part of the resource allocation mechanisms, each router must implement some queuing discipline that governs how packets are buffered while waiting to be transmitted. Various queuing disciplines can be used to control which packets get transmitted (bandwidth allocation) and which packets get dropped (buffer space). The queuing discipline also affects the latency experienced by a packet, by determining...
The resource space model (RSM) is a semantic data model for specifying, storing, managing and locating Web resources by appropriately classifying the contents of resources in the future interconnection environment. For resolving the limitation in the first normal form of relational data model which requires the flat table and atomic fields, this paper presents an approach which uses RSM for managing...
Resource sharing on the Internet is becoming increasingly pervasive. Recently, there is growing interest in distributed systems such as peer-to-peer and grid, with efforts being directed towards resource allocation strategies that incentivize users to share resources. While combinatorial auctions can perform multiple resource type allocations, it is computationally a NP-complete problem. Thus, allocation...
Distributed systems such as peer-to-peer overlays have been shown to efficiently support the processing of range queries over large numbers of participating hosts. In such systems, uneven load allocation has to be effectively tackled in order to minimize overloaded peers and optimize their performance. In this work, we detect and analyze the two basic methodologies used to achieve load-balancing:...
A kind of network model is presented in this paper , it analyzes the optimized problem of network resources based on this model, and converts the computer network resources problem into shape transformed process of computing multi-dimension flexible cyberspace. This model and method can depict complicated social mutual behavior among the base nodes in the multi-dimension flexible cyberspace, it also...
Multi-nexthop routing mechanisms is the key point in network congestion, and the essential question is how to forward packets among multi-nexthop to reach equiponderant forwarding. This paper proposes an equiponderant forwarding strategy in multi-nexthop routing, which forwards the packets according to the actual capability of each node, and resolves the equiponderant forwarding problem of multi-nexthop...
Transportation equity maps are essential for allocating limited public resources to achieve social equity. Transportation equity mapping uses accessibility as a primary indicator to measure inequity in a region. Traditional place-based accessibility measures can not offer fine-grained information to describe socio-economic characteristics and travel patterns individually. People-base accessibility...
Much work is under way within the resource management community on issues associated with grid scheduling upon dynamically discovered information. In this paper we tackle the problem by exploiting a bio-inspired resource discovery mechanism, where information is provided by ant-based lightweight mobile agents traveling across a grid network and collecting data from each visited node. We start by providing...
In this paper, we propose an architecture for load balancing, which contains an adaptive packet scheduler with a bursty traffic splitting algorithm. The scheduler has one classifier which classifies the flows into aggressive and normal flow. Aggressive flows are treated as high priority flows. Based on the buffer occupancy threshold, a trigger handler checks for load un-balance of the network and...
Calculation of Web request load is an important prerequisite for the realization of Web server cluster's load-balancing, usually fuzzy mapping can be used to achieve this purpose, but if the fuzzy system was designed according to the conventional method, the system maybe show ldquorules explosionrdquo phenomenon, because the diverse types of Web requests need many system inputs, which lead to the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.