Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud...
Personal emergency response systems (PERS) such as Philips Lifeline help seniors maintain independence and age in place. PERS can use predictive analytics to help risk stratification and promote response-efficient emergency services. This paper presents a framework for estimating significant associations between Lifeline user characteristics and occurrence of emergency events. Predictive variables...
In this paper, we propose PreDA-a preferencebased truthful double auction for dynamic spectrum access (DSA) networks where multiple heterogeneous spectrum bands are sold by the primary users and bought by the secondary users. We consider channels' heterogeneity and multi-bids from buyers, and also consider buyers' preferences for the channels. We use the signal to interference and noise ratio (SINR)...
Memory leaks are one of the primary causes of software aging. Despite of recent countermeasures in C/C++ such as smart pointers, leak-related defects remain a troublesome issue in C/C++ code, especially in legacy applications.We propose an approach for automatic detection of memory leaks in C/C++ programs based on characterizing memory allocation sites via the age distribution of the non-disposed...
The key to maintaining high standards of quality and power conservation of physical machines in data centers lies in efficient consolidation of virtual machines (VMs). Several schemes have been proposed for this purpose; and these include online migration and VM placement — which can offer the best in terms of resource utilization. The consolidation process can be made effective by finding “opportunities”...
In wireless network system the resources are limited. Therefore, managing resources is considered as a challenging task. The resource are distributed among attached UEs, so allocating resources needs to be well controlled. Packet scheduler in LTE network is responsible for assigning resources to attached UEs. Also, femtocell network is considered as promising solution for poor channel in indoor environment...
Link prediction plays an important role in complex network analysis. It is to predict the existence of an unknown link or a future link in a network. Classical methods for link prediction evaluate the similarity of vertices based on common neighbors, and denote that every common neighbor makes equal contribution to the connection likelihood. However, common neighbors may play different roles depending...
Fragmentation in Elastic Optical Networks is an issue caused by isolated, non-aligned, and non-contiguous frequency slots that can not be used to allocate new connection request to the network, due to the optical layer restrictions imposed to the Routing and Spectrum Assignment (RSA) algorithms. To deal with this issue, several studies about Spectrum Defragmentation have been presented. In this work,...
Today, The cloud industry is adopting the container technology both for internal usage and as commercial offering. The use of containers as base technology for large-scale systems opens many challenges in the area of resource management at run-time. This paper addresses the problem of selecting the more appropriate performance metrics to activate auto-scaling actions. Specifically, we investigate...
We investigate a formal characterisation of interactional justice asa mechanism for self-organisation of institutional rules in an open system, in order to address issues of congruence, acceptability and risk. The process of interactional justice uses opinion formation over a social network with respect to a shared set of congruent values, to transform a set of individual, subjective self-assessments...
The increasing automation and capacity of communication of industrial systems brings new possibilities and challenges to the sector. We investigate a problem of distributed and collective supply and discuss solutions to the issue of fair and reliable decision making in open systems. By combining principles of social organisation with blockchain and smart-contract technologies, we show that it is possible...
Multi-tiered memory systems, such as those based on Intel® Xeon Phi™processors, are equipped with several memory tiers with different characteristics including, among others, capacity, access latency, bandwidth, energy consumption, and volatility. The proper distribution of the application data objects into the available memory layers is key to shorten the time– to–solution, but the way developers...
Achieving system fairness is a major design concern in current multicore processors. Unfairness arises due to contention in the shared resources of the system, such as the LLC and main memory. To address this problem, many research works have proposed novel cache partitioning policies aimed at addressing system fairness without harming performance. Unfortunately, existing proposals targeting fairness...
The present paper deals with online convex optimization involving adversarial loss functions and adversarial constraints, where the constraints are revealed after making decisions, and can be tolerable to instantaneous violations but must be satisfied in the long term. Performance of an online algorithm in this setting is assessed by: i) the difference of its losses relative to the best dynamic solution...
The ability to discover patterns of interest in criminal networks can support and ease the investigation tasks by security and law enforcement agencies. By considering criminal networks as a special case of social networks, we can properly reuse most of the state-of-the-art techniques to discover patterns of interests, i.e., hidden and potential links. Nevertheless, in time-sensible scenarios, like...
We design a metric to measure the occupied holding time difference of frequency slots. With the metric, a routing and spectrum allocation algorithm in dynamic scenario is proposed to improve the network spectral utilization. Evaluation results show the proposed algorithm outperforms obviously in blocking probability.
Latent Dirichlet Allocation has been developed as topic-based method which uses reasoning to determine the topics of a document. There are many methods of reasoning used for Latent Dirichlet Allocation, including the Gibbs Sampling and Mean Variational Inference, the most widely used in research. However, there have not been many studies that discuss the implementation of these methods on the Indonesian...
Cloud environments are criticized for their volatility in performance aspects, making it extremely difficult for time- critical applications owners to perform the decisive step for migration and owners of SaaS to present performance vs cost tradeoffs to their customers when acting as IaaS customers. The aim of this work is to present an architectural approach based on which a)IaaS providers may enhance...
Aiming at the inventory management problem of metro vehicle repairable spare parts, a two-echelon inventory model based on METRIC (Multi-Echelon Technique for Recoverable Item Control) theory is proposed. Firstly, analyze the state transition process of metro vehicle repairable spare parts. Secondly, establish the two-echelon inventory management model according to the inventory characteristics of...
Named Data Networking (NDN) is a promising Future Internet architecture to support efficient content distribution. Specifically, P2P may gain benefits from NDN, as NDN inherently provides a flexible forwarding plane for multi-source and multi-path communications. Existing studies in this area have proposed solutions, but these are adversely affected by link latency. This leads to illogical resource...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.