The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rise of the network economy and E-commerce has pushed the rapid development of logistics market. The Multi-tier Shuttle Warehousing System (MSWS) as a new autonomous unit load storage/retrieval system, which flexibility and work efficiency is much-improved compared with the conventional AS/RS, has attracted more and more attention of logistics enterprises both at home and abroad. MSWS is composed...
Although federated cloud computing has emerged as a promising paradigm, autonomous orchestration of resource utilization within the federation is still required to be balanced on the basis of workload assignment at a given time. Such potential imbalance of workload allocation as well as resource utilization may lead to a negative cloudburst within the federation. The analytical models found in the...
We present a novel input sensitive analysis of a deterministic online algorithm \cite{r_approx16} for the minimum metric bipartite matching problem. We show that, in the adversarial model, for any metric space \metric and a set of n servers S, the competitive ratio of this algorithm is O(\mu_{\metric}(S)\log^2 n); here \mu_{\metric}(S) is the maximum ratio of the traveling salesman tour and the diameter...
Block traces are widely used for system studies, model verifications, and design analyses in both industry and academia. While such traces include detailed block access patterns, existing trace-driven research unfortunately often fails to find true-north due to a lack of runtime contexts such as user idle periods and system delays, which are fundamentally linked to the characteristics of target storage...
This paper proposes an approach to modelling and analysis of distributed real-time actor systems, which is based on the Uppaal statistical model checker (SMC). SMC was chosen because it automatizes simulations, offers a temporal logic language to formalize specifications and exploits statistical techniques to infer quantitative measures about a model. The approach is integrated in a system life-cycle...
The need for performance has motivated the increasing adoption of solid-state drives (SSD) both in personal computers and data centers. However, the high cost per gigabyte and reduced lifetime hinder the thorough replacement of hard disk drives (HDD) with SSDs. To mitigate these issues, several architectures have been conceived based on hybrid storage systems, but performance and dependability models...
Advanced Persistent Threats are increasingly becoming one of the major concerns to many industries and organizations. Currently, there exists numerous articles and industrial reports describing various case studies of recent notable Advanced Persistent Threat attacks. However, these documents are expressed in natural language. This limits the efficient reusability of the threat intelligence information...
In this paper, we study the behavior of a large number N of parallel loss servers operating under a randomized power-of-d routing scheme for the arrivals. Such models are of importance in several cloud architectures that offer IaaS (Infrastructure as a Service). The probabilistic behavior of such modelshas previously been analyzed for jobs with exponential holding times. However, in most realistic...
Personal Cloud Storage (PCS) is a very popular Internet service. It allows users to backup data to the cloud as well as to perform collaborative work while sharing content. Notably, content sharing is a key feature for PCS users. It however comes with extra costs for service providers, as shared files must be synchronized to multiple user devices, generating more downloads from cloud servers. Despite...
Most load balancing techniques implemented in current data centers tend to rely on a mapping from packets to server IP addresses through a hash value calculated from the flow five-tuple. The hash calculation allows extremely fast packet forwarding and provides flow `stickiness', meaning that all packets belonging to the same flow get dispatched to the same server. Unfortunately, such static hashing...
This paper presents a preliminary framework using back propagation neural networks for performability evaluation of Kerberos servers. In the modelling approach, keys under pseudo-secure conditions are dynamically renewed and also, temporary interruption to link/server access is involved. This interruption has implications on mortification of system's performance. Since this effects the network communication's...
One technique of solving energy consumption and performance issues in virtualized data centers consists in migrating the virtual machines between the physical hosts, in order to achieve either resource consolidation or load balancing. These migrations, however, may degrade the performance of the virtualized applications and of the servers and network involved in the migration process. A possible solution...
Economic denial of sustainability (EDoS) is an emerging threat of cloud computing. This new form of attack is a breed of DDoS attack that exploits the volatility of cloud consumers utility cost model. EDoS attackers fraudulently consume resources that result multiple cloud instances due to auto scaling feature of cloud. Consequently, affected cloud consumer ends up with an excessive amount of payment...
It is difficult to assess the security of modern enterprise networks because they are usually dynamic with configuration changes (such as changes in topology, firewall rules, etc). Graphical security models (e.g., Attack Graphs and Attack Trees) and security metrics (e.g., attack cost, shortest attack path) are widely used to systematically analyse the security posture of network systems. However,...
Religious Courts of South Jakartais responsible for managing the filing of cases. However, the submission process uses manual and semi-automated systems that cause some problems, such as difficulties when requiring the exchange and accessing information between units in real-time. With regard to this problem, the performance of the system needs to be analyzed. In order to find the optimal modeling...
Performance is one of the main aspects that should be taken into consideration during the design, development, tuning and optimisation of computer networks supported by cloud computing platforms (CCPs). Queueing network models (QNMs) of CCPs constitute essential quantitative tools of investigation towards identifying acceptable levels of quality-of-service (QoS), whether for upgrading an existing...
The number of Internet users in Indonesia in 2020 will increase up to 136.2 million users, while the Internet traffic will increase up to 2.1 Exabyte per month. However, 88% of internet traffic goes to international link and only 12% of traffic goes to domestic server. The problem is that the current capacity of Indonesian international links is only 20 Gbps, while the the required capacity is predicted...
Clouds offer great flexibility for scaling applications due to the wide spectrum of resources with different cost-performance, inherent resource elasticity and pay-peruse charging. However, determining cost-time-efficient cloud configurations to execute a given application in the large resource configuration space remains a key challenge. The growing importance of elastic applications for which the...
Data acquisition systems for large-scale high-energy physics experiments have to handle hundreds of gigabytes per second of data, and are typically implemented as specialized data centers that connect a very large number of front-end electronics devices to an event detection and storage system. The design of such systems is often based on many assumptions, small-scale experiments and a substantial...
This paper proposes a new version of the Power of Two Choices, SQ(d), load balancing algorithm that improves the performance of the classical model based on the power of two choices randomized load balancing. This model considers jobs that arrive to a dispatcher as a Poisson stream of rate λn, λ 1, at a set of n servers. Using the power of two choices, the dispatcher chooses for each job some d constant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.