The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the advances of wireless sensor networks, radiofrequency identification (RFID) and Web-based services, large volume of devices have been interconnected to the Internet of Things (IoT). In addition, the tremendous number of IoT services provided by service providers arises an urgent need to propose effective recommendation methods to discover suitable services to users. In this paper, we propose...
P2P media streaming is the most renowned application on the web. In live media streaming nearest neighbor should discover as quick as possible. It is the most time constrained application to find nearest peer over the internet. Scalability, QoS and low latency are the objectives of media streaming. To achieve these objectives a system is needed which speedily and perfectly finds the nearby peer by...
As an emerging technology, Mobile Edge Computing (MEC) is introduced to reduce network delay and provide context-aware services. MEC servers are located in close proximity to users, enabling users to seamlessly access services running on edge facilities. However, capacity and bandwidth constraints of MEC servers limit the number of services to be deployed. Therefore, an important problem is how to...
With SDN increasingly becoming an enabling technology for NFV in the cloud, many virtualized network functions need to monitor the network state in order to function properly. An outdated network view at the controllers can impact the performance of those virtualized network functions. In earlier work, we identified two main factors contributing to an outdated network view in the case of a load-balancer:...
In this paper, we investigate the provision of a new form of resilience, namely information resilience - targeting reliable communication of information under normal and adverse network conditions. We harness the power and flexibility of information-centric networking (ICN) paradigm where content are named and can be explicitly identified as opposed to the current host-centric Internet. Using ICN...
The problem of energy consumption is topical in every sphere of human activity nowadays. This problem is especially important for IT (information technologies), where the amount of data that needs to be processed is growing every day. In this paper PCPB (Power Consumption and Performance Balance) algorithm has been proposed. It is an energy-aware scheduling algorithm which is aimed at reducing power...
A technique and algorithms for early detection of the started attack and subsequent blocking of malicious traffic are proposed. The primary separation of mixed traffic into trustworthy and malicious traffic was carried out using cluster analysis. Classification of newly arrived requests was done using different classifiers with the help of received training samples and developed success criteria.
Visualization became one of the solutions in showing the attack on the network. With Visualize the attack, it would be easier in recognizing and conclude the pattern from the complex image visual. The target of DoS attacks can be addressed to the various parts of the network, it can be routing, web, electronic mail or DNS servers (Domain Name System). The purpose of the DoS attacks create a server...
Cloud Computing is the current trend and will be future era because of its advantages like pay per usage and on demand services. Load Balancing is a key aspect of Cloud Computing. It is the distribution of network or applications traffic across a number of servers. As the volume of data is increasing day by day the organizations will migrate from traditional computer system to the cloud based system...
The accuracy of user location information is inversely proportional to the user's privacy preserving degree k, and is proportional to quality of query service. In order to balance the conflict between privacy preserving security and query quality caused by the accuracy of location information, A clustering algorithm aiming at eliminating outliers based on k-anonymity location privacy preserving model...
Resource management systems like YARN or Mesos enable users to share cluster infrastructures by running analytics jobs in temporarily reserved containers. These containers are typically not isolated to achieve high degrees of overall resource utilizations despite the often fluctuating resource usage of single analytic jobs. However, some combinations of jobs utilize the resources better and interfere...
In large-scale distributed computing clusters, such as Amazon EC2, there are several types of “system noise” that can result in major degradation of performance: system failures, bottlenecks due to limited communication bandwidth, latency due to straggler nodes, etc. On the other hand, these systems enjoy abundance of redundancy — a vast number of computing nodes and large storage capacity. There...
Network Function Virtualization has attracted attention from both academia and industry as it can help the service provider to obtain agility and flexibility in network service deployment. In general, the enterprises require their flows to pass through a specific sequence of virtual network function (VNF) that varies from service to service. In addition, for each VNF required in the coming service...
In order to address the high transmission bandwidth requirement of an Internet-of-Video-Things (IoVT), an object-based on-line video summarization algorithm is proposed to summarize the captured video information at the sensor nodes before being transmitted to the server. It is composed of two stages: intra-view and inter-view stages. In the intra-view stage, human object detector is employed with...
Live virtual machine (VM) migration is defined as a technique that migrates the entire operating system (OS) and its associated applications from one host/physical server to another providing that users should not notice any interruption in their services. Live VM migration plays an important role to facilitate online maintenance, load balancing, and energy management as part of resource management...
Virtual machines are now widely used to support applications with virtual computation service in server clusters. Here, a virtual machine can migrate to a guest server while processes are being performed. In this paper, we discuss a virtual machine migration approach to reducing the electric energy consumption of servers. We newly propose two types of algorithms, energy-aware virtual machine selection...
It is critical to reduce the electric energy consumed in server clusters in order to realize eco society. In our previous studies, a server is selected to perform a process by estimating the termination time of every current process and then the electric energy consumption of servers. However, it is not easy and takes time to collect the state of each process and estimate the termination time of each...
In clusters of servers like cloud computing systems, computation resources like CPUs and storages are virtualized. Virtual machines are now widely used to support applications with virtual computation service on computation resources. Application processes are performed on virtual machines independently of which servers of which architectures are used. Furthermore, a virtual machine can migrate from...
Server cluster systems are widely used to provide not only scalablebut also fault-tolerant distributed application services. Eachapplication process has to be reliably performed in presence of serverfault to provide reliable application services. One way to reliablyperform an application process is that replicas of each applicationprocess are performed on multiple servers. However, a larger electricenergy...
Application processes like Web applications use not only CPU but also storages like HDD. In our previous studies, the algorithms to select a server in a cluster are proposed to energy efficiently perform processes which use either CPU or storages. In this paper, we consider a more general type of processes which do both the computation and access to storages. In this paper, we propose a computation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.