The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While the functions of Business Process Management (BPM) tools are already studied and standardized, new challenges regarding the architecture of such type of tools are emerging including the need for more scalability to support increasing demands, and more resilience of the overall solution to detect and avoid third-party code problems, that can causes failure of all the system. In this paper we...
While most microkernel-based systems implement non-essential software components as user space tasks and strictly separate those tasks during runtime, they often rely on a static configuration and composition of their software components to ensure safety and security. In this paper, we extend a microkernel-based system architecture with a Trusted Platform Module (TPM) and propose a verification mechanism...
Android smart phones are often reported to suffer from sluggish user interactions due to poor interactivity. This is because the Linux kernel may incur perceptibly long response time to user interactive tasks. Particularly, the completely fair scheduler (CFS) of Linux cannot systematically favor a user interactive task over background tasks since it fails to effectively distinguish between them. Even...
Server consolidation presents numerous opportunities for sharing memory between virtual machines. To intelligently share RAM across VMs, modern hyper visors use a technique called content-based page sharing (CBPS), in which duplicate copies of a page resident on a host are detected and a single copy of the page is shared, thereby reducing the memory footprint of resident VMs. One widely used implementation...
In the virtualized environment, memory can be efficiently utilized if the dynamic memory demands of virtual machines can be estimated at runtime. An efficient memory estimator should report the appropriate size of the memory which can be made full use of by the virtual machine while keeping reasonable performance. However, the appropriate size is hard to be estimated accurately with low overhead....
In the envisaged utility computing paradigm, a user taps a service provider's computing resources to accomplish her tasks, without deploying the needed hardware and software in her own IT infrastructure. To make the service profitable, the service provider charges the user based on the resources consumed. A commonly billed resource is CPU usage. A key factor to ensure the success of such a business...
The increasing computing requirements for GPUs (Graphics Processing Units) have favoured the design and marketing of commodity devices that nowadays can also be used to accelerate general purpose computing. Therefore, future high performance clusters intended for HPC (High Performance Computing) will likely include such devices. However, high-end GPU-based accelerators used in HPC feature a considerable...
For the traditional surveillance system with the weakness of over-reliance on monitor environment, poor mobility and so on, this paper proposed a monitoring scheme based on android smart phone terminal. By collecting and processing data at server, sending data to smart phone terminal via socket, it reaches the purpose of monitoring the target site anywhere and anytime under the coverage of wireless...
As data sizes continue to increase, the concept of active storage is well fitted for many data analysis kernels. Nevertheless, while this concept has been investigated and deployed in a number of forms, enabling it from the parallel I/O software stack has been largely unexplored. In this paper, we propose and evaluate an active storage system that allows data analysis, mining, and statistical operations...
Monitoring a process and its file I/O behaviors is important for security inspection for a data center server against intrusions, malware infection and information leakage. In the case of the Linux kernel 2.6, a set of hook functions called the Linux Security Module (LSM) has been implemented in order to monitor and control the system calls. By using the LSM we can inspect the activity of unknown...
A number of studies have examined anomaly detection systems based on training of system call sequences in the normal execution of applications. However, many of these anomaly detection systems have low detection accuracy when the training is not sufficient. This occurs because the normal behavior data obtained through training on one machine cannot be used for detection on another machine. In this...
In recent years, Java enterprise edition (Java EE) technologies keep expanding with more and more features. The customization of application server is becoming multifarious owing to different environments and domains. And delivering a continuous evolving application server is more frequent and costly. However, current application servers cannot meet such requirements, due to their inexplicit module...
In this paper, online system-level self-healing support is presented for embedded systems. Different from off-line log analysis methods used by conventional intrusion detection systems, our research focuses on analyzing runtime kernel data structures hence perform self-diagnosis and self-healing. Inside the infrastructure, self-diagnosis and self-healing solutions have been implemented based on several...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.