The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
From operations management's point of view, the nature of business models is the tool for knowing data, processing data and extracting value from data. Recently many studies advocate big data research which one common object to bring in intelligence from the huge amount of data. Nevertheless, owing to the characteristics of unstructured data, extracting the value in the big data still requires further...
This paper presents P5, a programmable packet parser with packet-level parallel processing for FPGA-based switches. P5 overcomes both limitations. First, P5 has the programmability of dynamically updating parsing algorithms at run-time. Second, P5 exploits packet-level parallelism in the bottleneck of parsing pipeline to compensate FPGA’s low clock frequency, and reduces resource consumption through...
Frequent Itemsets Mining is a Data Mining technique that has been employed to extract useful knowledge from datasets; and recently, from data streams. Data streams are an unbounded and infinite flow of data arriving at high rates; therefore, traditional Data Mining approaches for Frequent Itemsets Mining cannot be used straightforwardly. Finding alternatives to improve the discovery of frequent itemsets...
Air traffic management (ATM) initiatives are developed and implemented to mitigate delays caused by uncertainty in weather and demand at an airport. ATM decisions are made by traffic flow management specialists, based on their judgment and experience. Historical data on airport operations can be used to assist decision-making by intelligently augmenting controller experience with a more systematic...
Stream-based data processing systems, such as Complex Event Processing or data stream mining systems, may be composed of several components which may be implemented in various programming languages. In distributed scenarios, computer networks typically represent important bottlenecks. However, the performance of data exchange in local contexts may be as important as the performance of data exchange...
In this paper we investigate a new application area for protoform-based linguistic summaries, namely process data. We are proposing four protoforms that are designed to capture process specific information. Linguistic summaries can capture information on the tasks or sequences of tasks that are frequently executed as well as properties of these tasks or sequences, such as their throughput and service...
Cycle time requirements from prime or major customers contradict the ever-increasing complexity of wafer fabrication. Lot size variations show up as significant cycle time improvement potential for single wafer processes. Further reduction potential aside of process times is shown regarding tool-internal waiting times. A model is elaborated to assure cost efficiency while significantly reducing lot...
Data provenance is the lineage of a digital artifact or object. Its capture in workflow-controlled distributed applications is well studied but less is known about quality of provenance captured solely through existing control infrastructures (i.e., middleware frameworks used for high throughput computing). We study completeness of provenance in case where information is only available from the middleware...
Data protection using backup is one of the most critical IT management operations to ensure business continuity, which is also constantly evolving due to the emerging challenges in the “Big Data Era.” In this paper, we introduce our ongoing research effort in designing intelligent enterprise backup management solutions by obtaining actionable insights from voluminous backup job metadata across data...
With the ever growing size and complexity of enterprise systems there is a pressing need for more detailed application performance management. Due to the high data rates, traditional database technology cannot sustain the required performance. Alternatives are the more lightweight and, thus, more performant key-value stores. However, these systems tend to sacrifice read performance in order to obtain...
In wireless mobile networks quality of user experience changes dynamically and depends on large variety of factors. Because of that mobile operators are willing to timely and effectively evaluate provided Quality of Service (QoS) in their networks. Nowadays the main tool for monitoring network state and performance is drive testing. To replace this expensive and mostly manual procedure, concept of...
This paper quantifies the impact of topological characteristics on the performance of single radio multichannel IEEE 802.11 mesh networks. Topological characteristics are the number of nodes per subnetwork, the hop count, the neighbor node density, the hidden nodes, the number of nodes in the neighborhood of the gateway, and the hidden nodes in the neighborhood of the gateway. Network performance...
Proliferation of web services opens an unleashed opportunity to the service providers compete themselves to satisfy a request. Since numerous functionally similar web services are readily available, identifying pertinent web service to the client's requirement is a challenge. Furthermore, recommending the pertinent web service and not missing the relevant web service are the two complex issues to...
In this paper, we study overload handling for frequent-pattern mining in online data streams. For a mining system with an e-deficient synopsis based algorithm, we propose a load shedding scheme to deal with the overload situation. The heavy workload of the mining algorithm lies mostly in the great deal of itemsets which need to be enumerated and counted by the mining algorithm. Therefore, our proposed...
Knowledge of in-the-field software operation is a broad but ill-defined and fragmentarily supported subject and it is unclear how software vendors can take advantage of such knowledge. This paper introduces and defines software operation knowledge to unify existing definitions, and presents an empirically evaluated framework that is designed to aid product software vendors in gaining insight in the...
Driven by upcoming simulation and optimization applications with increasing complexity, the demand for more detailed equipment models is growing. The effort to create and to parameterize practicable equipment models by providing capacity limitations and predicting processing times increases as well. Automated modeling strategies based on MES data using data mining techniques increase the efficiency...
Middleware has been the most popular runtime platform of modern IT systems and widely adopted in a number of major application domains. Middleware not only provides infrastructural services supporting applications, but also plays an important role in system management. Due to the ever-changing user requirements and application contexts along with the diverse usage patterns, only an individual middleware...
In order to achieve data load balancing of mining nodes in parallel data mining based on grid, this paper proposes a data mapping strategy based on minimum time cost: MapND. Firstly, MapND strategy divided data sets referenced in the data mining into data blocks; Then, the strategy respectively estimated the sum of transmission time and data mining time between each mining node and each data block,...
Expansion of IT applications creates serious needs for environments with huge storage. In storage systems, capacity and agility are two factors which face limitations. This article evaluates the role of different techniques with regard to the possible methods for accessing to the storage systems. We have prepared three different scenarios using direct, semi-virtual, and virtual attachment models....
For traditional data warehouses, mostly large and expensive server and storage systems are used. In particular, for small- and medium size companies, it is often too expensive to run or rent such systems. These companies might need analytical services only from time to time, for example at the end of a billing period. A solution to overcome these problems is to use Cloud Computing. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.