The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The ability to continuously detect the interesting subgraph patterns over dynamic graph-structured data in real time is crucial to many applications. Generally, the edges of such subgraphs have temporal relation. In this paper, the stream model is used to describe the dynamic graph, in which the edges are processed in chronological order. In order to reduce the intermediate results, we propose a topological...
The full behavior of software-intensive systems of systems (SoS) emerges during operation only. Runtime monitoring approaches have thus been proposed to detect deviations from the expected behavior. They commonly rely on temporal logic or domain-specific languages to formally define requirements, which are then checked by analyzing the stream of monitored events and event data. Some approaches also...
In this paper, we investigate the quality of information (QoI) maximization problem by jointly optimizing the sampling rate, packet-dropped rate, and transmit power in wireless sensor networks (WSNs). We consider a complicated but practical scenario, where various tasks with heterogeneous traffic are supported by one WSN simultaneously. Accordingly, the QoI maximization problem is formulated as a...
This paper examines the model of alarming information processing in the measuring system, which integrates the properties of remote signaling system and telemetry system. The overshoot of the controlled parameter beyond the threshold level is the measurement result in the system, i.e., the alarm signal. The exponential character of the alarm level distribution at the input of an analog-to-digital...
Inferring fine-grained link metrics by using aggregated path measurements, known as network tomography, is essential for various network operations, such as network monitoring, load balancing, and failure diagnosis. Given a set of interesting links and the changing topologies of a dynamic network, we study the problem of calculating the link metrics of these links by end-to-end cycle-free path measurements...
Sensor networks have been widely used in environment monitoring. Although there are some related works about water pollution monitoring and water pollution source localization using sensor networks, there are many problems which have not been solved so far. In this paper, the current research status on water pollution monitoring and water pollution source localization in sensor networks is illustrated...
Malware is a widespread problem and despite the common use of anti-virus software, the diversity of malware is still increasing. A major challenge facing the anti-virus industry is how to effectively detect thousands of malware samples that are received every day. In this paper, a novel approach based Run Length Encoding (RLE) algorithm and n-gram are proposed to improve malware detect on dynamic...
Several applications, such as phasor measurements in Phasor Measurement Unit (PMU), require to retrieve only one spectral component of the whole signal. In such situations, the classical DFT and FFT algorithms may become computationally inefficient and several alternative methods have been proposed to measure a single spectral component in an efficient way. This paper proposes a modified Taylor-Fourier...
In last few decades, as a result of the advances in microelectromechanical systems, Wireless Sensor Networks (WSNs) have gained a considerable attention due to their low-cost, low-power and small-scale sensor nodes which are used to integrate sensing, processing, communicating capabilities to solve many different real world problems. The placement of sensor nodes is a very important step to cover...
Excessive memory usage in software applications has become a frequent issue. A high degree of parallelism and the monitoring difficulty for the developer can quickly lead to memory shortage, or can increase the duration of garbage collection cycles. There are several solutions introduced to monitor memory usage in software. However they are neither efficient nor scalable. In this paper, we propose...
This article selects load balancing system technology to analyze, combines the live migration technology of virtual machine, and studys the frame of virtual machine live migration as well as the mathematical model applied to concrete process of the migration. The article presents that the process of combining the specific strategies of load balance to the frame of live migration, that the simulation...
Distributed real-time computing system JStrom significantly improves performance on real-time data computing. However, JStorm may lead to a single point of failure, and upgrading JStorm system may cause instability of system. To efficiently solve these problems, we propose a task detection model based on the heartbeat detection and a two-level cluster load balancing model separately. We discover the...
Reproducibility of the execution of scientific applications on parallel and distributed systems is a growing interest, underlying the trustworthiness of the experiments and the conclusions derived from experiments. Dynamic loop scheduling (DLS) techniques are an effective approach towards performance improvement of scientific applications via load balancing. These techniques address algorithmic and...
The number of highly sophisticated software-based attacks on ATMs is growing these days. New types of threats require new ways of system protection. Most secure solutions are based on whitelists and sandboxes, which unlike antivirus solutions are able to protect the system against any new threat. Sadly, they are hard to configure therefore require an expert-level knowledge of operating system mechanisms...
Recently multi-agent patrolling became more and more crucial in security, monitoring, etc. applications. It can be used, for example, to monitor points of interest in space, such as measurement points or entrances to a guarded area. A good patrolling strategy would ensure frequent visits to all points of interest defined by a user. A variety of centralized and distributed approaches exist already...
In order to improve the technical level of the grid state operation, the ant colony algorithm based on dynamic updating is proposed for the massive signal analysis in grid state system with the complexity of the structure and the high reliability. Though data mining and updating in dynamic correlation rules of device monitoring signals with evolutionary genetic algorithm, the correlation analysis...
We present a method for developing executable algorithms for quantitative cyber-risk assessment. Exploiting techniques from security risk modeling and actuarial approaches, the method pragmatically combines use of available empirical data and expert judgments. The input to the algorithms are indicators providing information about the target of analysis, such as suspicious events observed in the network...
An optical network, like any system, has to be observable before it can become subject to optimization. This is the main capability that the ORCHESTRA project introduces. ORCHESTRA's high observability relies on information provided by the coherent transceivers that can be extended, almost for free, to operate as software defined optical performance monitors (soft-OPM). Monitoring information is processed...
Cloud platforms and services usually provide an APIlayer as decoupled, language agnostic interface for both front-endclient integration and back-end data and/or function access. Theavailability and performance of the APIs have significant impact onthe quality of end user or client experiences due to its nature ofinteraction endpoints. However, the extreme dynamics, complexityand scale of the current...
In this paper, we develop a human social intelligence inspired population-based optimization algorithm called Higher Order Cognitive Optimization (HOCO) algorithm. Each of the individuals in this HOCO possess human-like characteristics such as decision making ability, self/social-awareness, self/social belief, shared information processing, and self-regulation. These characteristics are modeled as...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.