Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Live virtual machine (VM) migration is defined as a technique that migrates the entire operating system (OS) and its associated applications from one host/physical server to another providing that users should not notice any interruption in their services. Live VM migration plays an important role to facilitate online maintenance, load balancing, and energy management as part of resource management...
Modern botnets such as Zeus and Conficker com-monly utilize a technique called domain fluxing or a Domain Generation Algorithm (DGA) to generate a large number of pseudo-random domain names dynamically for botnet operators to control their bots. These botnets are becoming one of the most serious threats to the Internet security on a global scale. In this paper, we present a method based on analyzing...
Servers and network contribute about 60% to the total cost of data center in cloud computing. How to efficiently place virtual machines so that the cost can be saved as much as possible, while guaranteeing the quality of service plays a critical role in enhancing the competitiveness of service cloud provider. Considering the heterogeneous servers and the random property of multiple resources requirements...
Identification of VMs exhibiting similar behavior can improve scalability in monitoring and management of cloud data centers. Existing solutions for automatic VM clustering may be either very accurate, at the price of a high computational cost, or able to provide fast results with limited accuracy. Furthermore, the performance of most solutions may change significantly depending on the specific values...
Measurement studies of YouTube show that there are some distinctive properties regarding to video sharing service, e.g., small clip size, suggestion links between related clips. This observation motivates us to explore the possibility to use peerassisted approach to offload content providers. Specifically, we want to leverage the suggestion links between video clips to construct cooperative caching...
This work presents a classifier capable of classifying websites accessed by a community of users based on characteristics of web traffic they generate. The classifier introduced here can be used for engineering web traffic. This classifier is capable of identifying a few different classes of websites based on intensity of bursts of web requests made to each website in both the long and the short run...
The recent emergence of clouds with large, virtualized pools of compute and storage resources raises the possibility of a new compute paradigm for scientific research. With virtualization technologies, consolidation of scientific workflows presents a promising opportunity for energy and resource cost optimization, while achieving high performance. We have developed pSciMapper, a power-aware consolidation...
Botnet has become a prevalent platform for malicious attacks, which poses a significant threat to Internet security. Recently, botnets are inclined to utilize HTTP to route their command and control (C&C) communication instead of using the protocol Internet Relay Chat (IRC). And these web-based C&C bots try to blend into normal HTTP traffic, which makes them more difficult to be identified...
As the rapid increase of network security events, network security monitoring and management on network behavior become more and more focused in the fields of computer science. This paper develops a kind of fuzzy constraint correlation algorithm based on prerequisites and consequences of security event. The introduction of fuzzy constraint correlation can resolve the issues of false negatives and...
Self-adaptive and self-organizing systems must be self-monitoring. Recent research has shown that self-monitoring can be enabled by using correlations between monitoring variables (metrics). However, computer systems often make a very large number of metrics available for collection. Collecting them all not only reduces system performance, but also creates other overheads related to communication,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.