The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Planning and controlling autonomous vehicles requires one to be aware of the state of the vehicles and their configurations, the state of environment (obstacles, weather conditions), account for possible changes in mission requirements as well as hardware failures. Operations with multiple autonomous vehicles pose advantages in many scenarios but complicate even further the job of the human operator...
Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public cloud...
Cloud services are gaining popularity with times. Service level agreement (SLA) serves a basic understanding between the clients and cloud service providers (CSP). Ensuring secured and adequate service is a basic need of the customers. In this work a set of compliance parameters for cloud service level agreement is identified. A generic rule base is designed to empower the process with an automated...
In the context of the Open Network Automation Platform (ONAP), we develop in this paper a resource allocation strategy for deploying Virtualized Network Functions (VNFs) on distributed data centers. For this purpose, we rely on a three-level data center hierarchy exploiting co-location facilities available within Main and Core Central Offices. We precisely propose an active VNFs' placement strategy,...
Increasing dependence on groundwater as a reliable source of water in the rural areas has resulted in its indiscriminate extraction without considering the recharging capabilities of the aquifers as well as other environmental factors. As the availability of groundwater is highly inconsistent and exhibits substantial variations across the country, management of groundwater resources in the Indian...
As cloud computing becomes popular, Platform as a Service (PaaS) plays an important role in a modern cloud system. The orchestration and efficiency attract more attention and demand a more intelligent solution. In this paper, we present Next Generation PaaS (NG-PaaS) which provides resource management, application management and performance monitoring. The NG-PaaS is built on docker to enable fine-grained...
Edge computing, which is a fundamental component of emerging 5G architectures, involves onloading or offloading multiple virtual network functions from mobile devices to an edge network substrate. In this paper, we present a model for the complete edge function onloading problem, which consists of three main phases: (1) Cyber foraging, which involves discovery of resources monitoring the state of...
Among common disturbances in Electric Power Quality, the most relevant and with greatest rate of occurrence are voltage sags, which cause substantial economical loss to concessionary companies and to customers. Constant monitoring is an essential part of identifying existing disturbances. However, the costs involved make monitoring the complete system infeasible, thus only a reduced number of monitors...
High-performance processors utilize embedded thermal sensors to continuously monitor the temperature of the chip during runtime. However, the overheating locations change temporally and spatially, depending on the various workloads running on the chip. Moreover, on-chip thermal sensor readings are highly affected by noise due to fabrication variations and randomness, which make the task of thermal...
High data quality and low sensing cost are two primary goals in large-scale mobile crowdsensing applications. The oversampling and the undersampling are common problems which always result in a high cost or low data quality that can not satisfy the system requirement. To address this problem, taking into account low-rank latent structure, we propose a compressive and adaptive data sampling scheme...
Today, The cloud industry is adopting the container technology both for internal usage and as commercial offering. The use of containers as base technology for large-scale systems opens many challenges in the area of resource management at run-time. This paper addresses the problem of selecting the more appropriate performance metrics to activate auto-scaling actions. Specifically, we investigate...
The allocation of common-pool resources is an important topic in technical and socio-technical systems, and when left unmanaged, such systems often collapse to highly unequal and unsustainable outcomes. Recent work has highlighted a role for electronic institutions in managing such resources, to ensure socially-beneficial outcomes in the long term. However, open self-organising multi-agent systems...
The current management techniques of large scale cloud systems are inefficient, and lead to high operational costs. In this paper, we present a cross-layer management framework that overcomes the current IT management challenges of cloud systems and their applications. The proposed framework monitors and performs holistic analysis of the cloud system resource utilization from the physical layer, the...
This paper addresses the shared resource contention problem associated with the auto-parallelization of running queries in distributed stream processing engines. In such platforms, analyzing a large amount of data often requires to execute user-defined queries over continues raw-inputs in a parallel fashion at each single host. However, previous studies showed that the collocated applications can...
Multi-tiered memory systems, such as those based on Intel® Xeon Phi™processors, are equipped with several memory tiers with different characteristics including, among others, capacity, access latency, bandwidth, energy consumption, and volatility. The proper distribution of the application data objects into the available memory layers is key to shorten the time– to–solution, but the way developers...
The quality of service is one of challenges posed by the Cloud Computing. This issue plays an important role in making the Cloud services acceptable to customers, denotes the levels of performance, reliability, and availability offered by Cloud services. Literature has reported many implementations for measuring and ensuring QoS in Cloud Computing systems to achieve better results and meet the needs...
Excessive memory usage in software applications has become a frequent issue. A high degree of parallelism and the monitoring difficulty for the developer can quickly lead to memory shortage, or can increase the duration of garbage collection cycles. There are several solutions introduced to monitor memory usage in software. However they are neither efficient nor scalable. In this paper, we propose...
Law enforcement monitoring plays a significant role in preventing and forbidding illegal land use behavior, and provide an efficient method for promoting orderly use of land resources and arable land conservation. In order to optimize the efficiency of law enforcement monitoring, spatial analyzing techniques are adopted to calculate the dynamic change extent of land cover, comprehensive land use degree...
Emerging applications for the Internet of Things (IoT) are complex programs which are composed of multiple modules (or services). For scalability, reliability and performance, modular applications are distributed on infrastructures that support utility computing (e.g., Cloud, Fog). In order to simply operate such infrastructures, an Infrastructure-as-a-Service (IaaS) manager is required. OpenStack...
ICs are subject to many causes of malfunction such as aging or aggressive environment, while avoiding unwanted behavior of critical applications is a key issue. Monitoring is a cornerstone of safety policies, as it supports triggering counter measures on demand. High Level Synthesis (HLS) allows to easily implement applications in hardware, and some HLS compliant solutions have been reported. These...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.