The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
PHP is the dominant server-side scripting language used to implement dynamic web content. Just-in-time compilation, as implemented in Facebook's state-of-the-art HipHopVM, helps mitigate the poor performance of PHP, but substantial overheads remain, especially for realistic, large-scale PHP applications. This paper analyzes such applications and shows that there is little opportunity for conventional...
Multipath TCP (MPTCP) has gained great attention by the researchers and network application developers due to its features providing better bandwidth utilization and higher reliability recently. Utilizing MPTCP in the datacenters provides performance gain to the applications. If the underlying network has Software Defined Networking (SDN) architecture, the routing of the MPTCP subflows can be specialized...
This paper provides details on the new Broadwell server product family designed on 14nm Intel process. This was the first Xeon® server product on this process node. Low power, density optimized product, Broadwell-DE, has upto 8 dual-threaded 64b Broadwell cores [1], 12MB L3 cache, 2 10GT/s Ethernet KR lanes, 2 DDR4–2400MHz memory channels and 24 8GT/s PCIe lanes. Broadwell-SP, a high performance server...
Cloud computing is attracting increasing attention since it enables clients with limited computing resources to perform and complete large-scale computations. However, it also comes up with some security and privacy concerns and challenges, such as the input and output privacy of the client, and cheating behaviors of the cloud. Motivated by these issues and focused on engineering optimization tasks,...
We consider a mobile-CDN system where base stations (BSs) are equipped with storage for replicating and distributing content. In such a system, BSs cooperation in replying user requests is a widely adopted mechanism. For such cooperative caching, a key issue is the joint optimization of content placement and request redirection, which has been intensively investigated in the literature. However, optimizing...
Long transactions, high concurrency, and frequent activity situations occur in many areas. The intermediate process of long transactions in the process of execution is more, in the process, therefore, can not avoid frequent access to the data, the system overhead of the data access process is relatively large, which reduces the efficiency of the system and increase the pressure of the server. The...
In order to improve the quality of teaching of Japanese intensive reading courses, improve the quality of higher education, improve the quality of personnel training, and improve the level of scientific research, strengthen the social service ability, optimize the Japanese intensive reading courses in discipline. Put forward the curriculum design of Web network based on the teaching of Japanese intensive...
Mobile edge computing (MEC) has recently emerged as an important paradigm to bring computation and cache resources to the edge of core networks. However, the resources of edge network are relatively limited, so it is necessary to cooperate with data center (DC) which has sufficient computational resources. In this paper, we aim at designing a computation offloading and data caching model under the...
Virtual Content Delivery Network (vCDN) orchestration is necessary to optimize the use of resources and improve the performance of the overall SDN/NFV-based CDN function in terms of network operator cost reduction and high streaming quality. It requires intelligent and enticed joint SDN/NFV orchestration algorithm due to the evident huge amount of traffic to be delivered to end customers of the network...
The collection and analysis of event logs allows detection and debugging of operating system and application configuration errors. An appropriate selection of event logs allows you to detect cyber-attacks and prevent potential damage. In the article, we focused on the selection and optimization of event logs for the Microsoft Windows operating system. We have experimentally verified the structure...
Large scale distributed simulation should be well planned before the execution, since applying unnecessary hardware only wastes our time and money. On the other side, we need enough hardware to achieve an acceptable performance. Thus, it is considerable to estimate the performance of a large scale distributed simulation before the execution. Such an estimation also improves the efficiency of the applied...
Fuelled by the proliferation of smartphones, wireless traffic has experienced huge growth, which will continue with the emergence of ultra-broadband 5G applications, and exacerbate the capacity strain in cellular networks. Deployment of pico access points, reducing cell sizes and allowing more efficient reuse of limited radio spectrum, provides a powerful approach to cope with traffic hot spots and...
Scale-out distributed storage systems have recently gained high attentions with the emergence of big data and cloud computing technologies. However, these storage systems sometimes suffer from performance degradation, especially when the communication subsystem is not fully optimized. The problem becomes worse as the network bandwidth and its corresponding traffic increase. In this paper, we first...
To solve the problems of heterogeneous data types and large amount of calculation in making decision for big data, an optimized distributed OLAP system for big data is proposed in this paper. The system provides data acquisition for different data sources, and supports two types of OLAP engines, Impala and Kylin. First of all, the architecture of the system is proposed, consisting of four modules,...
In this paper, an implementation of a traffic management scheme is presented for autonomous vehicles at intersections. Using bi-directional communication provided by a cellular network, the intersection controller is capable of receiving the status of the approaching vehicles, calculating an optimal arrival schedule, and sending the obtained schedule to individual vehicles. The proposed algorithm...
Location-Based Service (LBS) becomes increasingly important for our daily life. However, the localization information in the air is vulnerable to various attacks, which result in serious privacy concerns. To overcome this problem, we formulate a multi-objective optimization problem with considering both the query probability and the practical dummy location region. A low complexity dummy location...
Kernel Samepage Merging (KSM) is a Linux kernel module for improving memory utilization by searching and merging the redundant memory pages. When working with the hypervisors, such as Kernel-based Virtual Machine, KSM helps share identical memory pages of the hosted virtual servers so as to increase the server density. Nevertheless, while KSM improves the efficiency of the host system, it hurts the...
Caching is a technique to reduce the peak network load by pre-fetching some popular contents at the local caches of end users. Coded caching can facilitate and exploit the coded-multicasting opportunities for users with different demands, resulting in an additional and significant reduction of the peak traffic. However, most existing researches on coded caching are limited by the assumption that all...
The objective of the work is to provide a recommender system through optimization. The users place orders to suppliers through email, requesting preferences based on cost and delivery date. Optimization algorithms are formulated to provide an optimal mix of the products to the users based on the cost and speed of delivery. The algorithm takes the availability and cost of the products with the suppliers...
Cloud federation allows interconnected Cloud Computing environments of different Cloud Service Providers (CSPs) to share their resources and deliver more efficient service performance. However, each CSP provides a different level of security in terms of cost and performance. Instead of consuming the whole set of Cloud services that are required to deploy an application through a single CSP, consumers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.