The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Personal emergency response systems (PERS) such as Philips Lifeline help seniors maintain independence and age in place. PERS can use predictive analytics to help risk stratification and promote response-efficient emergency services. This paper presents a framework for estimating significant associations between Lifeline user characteristics and occurrence of emergency events. Predictive variables...
Low-level design parameters such as router micro-architecture (RMA), flow controls (resource allocation), routing techniques and traffic patterns have a major significance on cost and performance of Network on Chip (NOC) design. This work proposes an efficient virtual channel (VC) buffer management structure and a dynamic VC allocation mechanism for the router to minimize latency, and area (buffer...
Abstract-In this paper, we present PYTHIA, deadline-awareadmission control for systems that execute jobs from multiple bigdata (batch) frameworks using shared resources. PYTHIA addssupport for deadline-driven workloads in resource-constrainedcloud settings, for use by resource negotiators such as ApacheMesos or YARN. PYTHIA uses histories of job statistics toestimate the minimum number of CPUs to...
Current trends in many-core system design show an increasing desire to integrate several cores and accelerators on a single chip in order to support better parallel applications. Moreover, the increasing number of parallel applications and tasks result in heavy memory utilization. Non-Volatile Memories (NVMs) prevail as a replacement of DRAM due to low leakage power and higher density. However, NVMs...
Accounts are often shared by multiple users, eachof them having different item consumption and temporal habits. Identifying of the active user can lead to improvements ina variety of services by switching from account personalizedservices to user personalized services. To do so, we developa topic model extending the Latent Dirichlet Allocation usinga hidden variable representing the active user and...
Current PaaS platforms enable single or hybrid cloud deployments. However, such deployment types cannot best cover the user application requirements as they do not consider the great variety of services offered by different cloud providers and the effects of vendor lock-in. On the other hand, multi-cloud deployment enables selecting the best possible service among equivalent ones providing the best...
Prior research has shown that source code and its changes are repetitive. Several approaches have leveraged that phenomenon to detect and recommend change and fix patterns. In this paper, we propose TasC, a model that leverages the context of change tasks in development history to suggest fine-grained code change and fix at the program statement level. We use Latent Dirichlet Allocation (LDA) to capture...
Designing distributed protocols with limited requirements for exchange of feedback information between the nodes is a key element in the development of cognitive and self-organizing ad hoc networks. We argue that the Minority Game (MG) and its variations can constitute useful tools towards this direction. In particular, the MG formulation is well suited for addressing a variety of resource allocation...
Cloud computing has recently attracted a substantial amount of attention from both industry and academia. Its growing demand gives normal users an opportunity to sell their local resources to the cloud market, which introduces new challenges for the existing coarse-grained pricing models. In this paper, we examine the potential of applying continuous double auction framework to handle these heterogeneous...
With vast amount of medical records being digitized in recent years in the form of Electronic Health Records (EHRs), accurate and large scale automated prognosis of diseases has become a possibility. However, most existing works in disease prediction have focused on a single condition or a few related conditions. Such models do not account for the fact that multiple conditions may co-occur in patients...
With the evolution of various new types of application services for mobile devices, cellular operators have started providing multiple subscription plans to the mobile users. The plan subscribed determines the Quality of Service (QoS) to be provided to the user, and operators distinguish users as priority users and non-priority users, accordingly. To ensure better QoS to the priority users, necessary...
High-Assurance applications usually require achieving fast response time and high throughput on a constant basis. To fulfil these stringent quality of service requirements, these applications are commonly deployed in clustered instances. However, how to effectively manage these clusters has become a new challenge. A common approach is to deploy a front-end load balancer to optimise the workload distribution...
In this paper we analyze the problem of distributed coalition formation (CF) and bandwidth allocation in ad hoc cognitive radio networks. We develop a CF algorithm to self organize distributed secondary links into disjoint coalitions and apply the concept of frequency reuse over different coalitions, such that the members of each coalition will transmit over orthogonal sub-bands with the available...
Topic modeling has been applied to several areas of software engineering, such as bug localization, feature location, triaging change requests, and traceability link recovery. Many of these approaches combine mining unstructured data, such as bug reports, with topic modeling a snapshot (or release) of source code. However, source code evolves, which causes models to become obsolete. In this paper,...
Researches on resource allocations in business process management systems leave an impact to adopt a concrete method for resource performance analysis and evaluations. One established way is a posterior performance evaluation. The ultimate aim in these evaluation methods is identification of most appropriate combination of resources. But, it is found that different types of resources are showing different...
In-network caching is a core technology for saving network resources and improving the response time in Information-/Content-Centric Networking (ICN/CCN). In an ordinary ICN/CCN, content name based routing is used to find cached content in the network. Although there have been several studies on effective and efficient cache retrieval from in-network caches, we propose a novel content hunting scheme,...
Volunteer cloud federations (VCFs) are cloud federations where clouds may join and leave a federation without restrictions and may contribute resources to the federation without long term commitment. This makes it difficult to predict the long term availability of resources. Also, in IaaS VCFs, volunteers may collectively contribute a large number of heterogeneous virtual machine instances. In this...
Multidimensional array is commonly used in data warehouse or in many scientific computation of OLAP for dealing with application dataset. Different models of multidimensional array have been introduced to do this job like Traditional Multidimensional Array, Extendible array, Extended Karnaugh Map Representation etc. But Application that requires operation on large amount of data cannot be handled...
Most exiting delay-tolerant network (DTN) routing algorithms consider only the impact of node mobility such as contact frequency and contact duration on data delivery without considering the effects of available resources in terms of storage, energy and processing power. In realistic DTNs, these resources may be constrained. In this paper, we propose a Buffer Aware Routing (BAR) mechanism for resource...
We construct a dynamic version of the VCG pivot mechanism applicable to private value environments in which the allocation space in each period is random. A key characteristic of this setting is that while the allocations chosen by the coordinator in each stage are based on the actual realization of the random set of feasible allocations, the agent's reports in each step are made prior to this realization...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.