The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Benchmarking and profiling virtual network functions (VNFs) generates input knowledge for resource management decisions taken by management and orchestration systems. Such VNFs are usually not executed in isolation but are often deployed as part of a service function chain (SFC) that connects single functions into complex structures. To manage such chains, isolated performance profiles of single functions...
Research objects were designed in data-intensive science under the premises of interoperability and machine-readability to describe scientific processes and findings including all the resources that were used in the research endeavour. In this poster we present our work with Earth Science communities, that have embraced the research object model for long-term preservation and reuse of knowledge, to...
Many games use dynamic difficulty adjustment (DDA) to promote the achievement of flow and consequent positive affective states. However, performance based DDA assume a specific ludic attitude: that of the hard-core gamer. An alternative approach is to apply affective computing techniques to monitor players adjust difficulty to achieve the desired affective state directly. Such an emotion-controlled...
AMNESiA is an affinity measurement platform for NFV-enabled networks, designed to consolidate and interpret existing monitoring data into an affinity metric, aiding operators to identify affinity and anti-affinity relations in the network. AMNESiA uses the latest snapshot of usage data, collected through a generic monitoring solution, from the database to measure affinity between VNFs.
Enhanced Course of Action (CoA) generation is a fundamental component of effective risk management and mitigation. This paper presents an extension of a system capable of integrating physics-based (hard) and people-generated (soft) data, for the purpose of achieving increased situational assessment and automatic CoA generation upon risk identification. The system's capabilities are enhanced through...
Devices that monitor and measure various system parameters or physical phenomena form an integral part of cyber-physical systems. Such devices usually operate continuously and gather important data that is often critical for the operation of the underlying system. Thus, it becomes important to understand and detect abnormal or malicious device behavior, false injection of data by an adversary, or...
Large-scale, carrier-grade Network Functions Virtualisation (NFV) services are expected to involve a significant number of Virtual Network Functions, deployed across multiple Points-of-Presence (PoPs) and possibly in heterogeneous infrastructures. While proper monitoring is crucial for the commercial viability of NFV services, effectively and efficiently monitoring a huge number of VNF instances,...
In batch systems monitoring information at the level of individual jobs is crucial to optimize resource utilization and prevent misusage. However, especially the usage of network resources is difficult to track. In order to understand usage patterns in modern computing clusters, a more detailed monitoring than existent solutions is required. A monitoring on job level leads to dynamic graphs of processes...
In this work we propose a design for a new distributed modular monitoring system framework, which allows combining both monitoring tasks (supercomputer health and performance monitoring) in one monitoring system. Our approach allows different part of monitoring system to process only the data needed for the task assigned to this part. Another feature of our framework is the ability to calculate performance...
Cloud computing services are seeing great success in IT scenarios. Dynamic reservation and allocation of network, storage and computational resources, the hiding of visibility of internal IT components, as well as the pay-per-use paradigm are nowadays more and more widespread ways to provide and consume services. Their complexity, however, is clearly visible in composing services to satisfy users'...
For enterprises, it is important to know how the IT infrastructure contributes to the business goals set. The COBIT IT governance framework provides a high-level view how this can be achieved. However, COBIT provides no machine-readable model that allows to refer to entities (processes, goals, actions, metrics etc.). In this paper, we present an approach to create a formal model for COBIT using an...
The focus of this paper is a discussion on the organizational integration of BDIM activities into an IT infrastructure. In particular, this paper provides a definition of the usefulness of a center of excellence within information systems, its structure and measurement of capabilities. The organizational capabilities pertaining to BDIM can be measured through the introduction of a maturity model,...
We propose a Cloud Advisor framework that couples two salient features: trustworthiness and transparency measurement. It provides a mechanism to measure trustworthiness based on the history of the cloud provider taking into account evidence support and to measure transparency based on the Cloud Controls Matrix (CCM) framework. The selection process is based on a set of assurance requirements that...
The paper discusses the deployment of wireless sensor networks for intra-car monitoring and control in various automotive application scenarios. Major challenges consist of enabling robust radio communication protocols for challenging environments like the car body and offering high confidence guarantees on timely data collection and quality. Simulation results are introduced and discussed for radio...
We investigate the problem of placing a given number of monitors in a communication network to identify the maximum number of link metrics from end-to-end measurements between monitors, assuming that link metrics are additive, and measurement paths cannot contain cycles. Motivated by our previous result that complete identification of all link metrics can require a large number of monitors, we focus...
Execution profiles form the basis of many dynamic program analysis techniques developed to solve problems in fields such as software testing, fault localization, and program comprehension. A typical profile comprises information that approximates the execution path of a program, specifically, the frequency of occurrence of program elements that are structural in nature, such as statements, branches,...
Mobility management in Wireless Sensor Networks is considered to be of an up most importance for today's critical applications. In this paper, we present a soft mobility management solution where the mobility procedures are supported by fuzzy logic techniques. Our solution was designed and implemented to support the movement of a mobile worker inside an oil refinery area. The results show that the...
A Cloud is a very dynamic environment where resources offered by a Cloud Service Provider (CSP), out of one or more Cloud Data Centers (DCs) are acquired or released (by an enterprise (tenant) on-demand and at any scale. Typically a tenant will use Cloud service interfaces to acquire or release resources directly. This process can be automated by a CSP by providing auto-scaling capability where a...
Content pollution is one of the major issues affecting P2P file sharing networks. However, since early studies on FastTrack and Overnet, no recent investigation has reported its impact on current P2P networks. In this paper, we present a method and the supporting architecture to quantify the pollution of contents in the KAD network. We first collect information on many popular files shared in this...
Cloud computing and virtualization platforms grant on demand access to resources and services independently of complex underlying infrastructure. Resources can be added or removed on the fly. In this paper we propose a cloud monitoring method based on prediction. The goal of this method is to 1. achieve monitoring state alert prediction 2. forecast virtual resource usage of the cloud system
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.