The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Quality of service and quality of experience are of increasingly interest for successful communication network applications, particularly for decentralized networks, such as peer-to-peer (p2p) networks. They need sophisticated monitoring mechanisms to be able to adapt the system's parameters to maintain a certain level of quality of service. In the literature, several well-studied approaches, classified...
Nowadays, Cloud providers revise the terms of their Service Level Agreements (SLAs) to include security provisions due to their criticality for their customers. In order to speed up their adoption by service providers and consumers and to make them more actionable, security SLAs monitoring should be described in a machine-processable, agile and extensible way. Several tools for SLA management are...
With cloud computing consolidation, Platform-as-a-Service (PaaS) has been used as a solution for developing applications with low cost and maximum flexibility. However, an open challenge related to PaaS is the proper handling of multi-tier and stateful applications with support for high availability (HA); and scalability can be considered an essential feature for HA. However, dealing with several...
MOOCs (Massive Open Online Courses) have changed the approach to education forever. With all the benefits that they brought they also revealed a lot of problems in the brick-and-mortar universities. It turned out that the courses in the latter were often outdated, irrelevant or simply not as good as the online ones. MOOCs set up the natural competition between the educational institutions. Thus there...
In batch systems monitoring information at the level of individual jobs is crucial to optimize resource utilization and prevent misusage. However, especially the usage of network resources is difficult to track. In order to understand usage patterns in modern computing clusters, a more detailed monitoring than existent solutions is required. A monitoring on job level leads to dynamic graphs of processes...
For a variety of economic and practical reasons, security patches often cannot be deployed immediately after a patch’s release. To mitigate attacks against unpatched software, we present the design and evaluation of a Moving Target tech- nique that uses a form of software diversity called multi-variant execution. Our technique decomposes the software’s behavior into its low-level system calls and...
Software-Defined Networking (SDN) is an emerging paradigm that arguably facilitates network innovation and simplifies network management. However, in the context of SDN, management activities, such as monitoring, visualization, and configuration can be considerably different from traditional networks. An SDN controller, for example, can be customized by network administrators according to their needs...
Service compositions have recently been in the spotlight. Although they are not something new, as the complexity of service based systems grows, we observe an ever increasing interest in these approaches. Choreographies are one specific kind of service composition in which the responsibilities for the execution of the system are shared by its service components without any central point of coordination...
In this paper, we consider the problem of evaluating the similarity of two sets of linguistic summaries of sensor data. Huge amounts of available data cause a dramatic need for summarization. In continuous monitoring, it is useful to compare one time interval of data with another, for example, to detect anomalies or to predict the onset of a change from a normal state. Assuming that summaries capture...
As the Web Services technology is widely used in the enterprise's core business, how to manage these resources is becoming to extremely important problem. In this paper, after analysising the characteristics of resouce management in distributed environment and the main content of WSDM, a novel Web Service management scheme is introduced, and then the main components in the scheme is introduced, as...
This paper reports ongoing work on a novel mission-oriented information assurance (IA) assessment approach that contrasts runtime measurements and observations against user-specified requirements.
Content Delivery Networks (CDNs) are increasingly being used to deliver live streaming on today's Internet. The new application type of live streaming exposes unique characteristics and challenges that require more advanced design of CDN infrastructure. Unlike traditional web-object delivering, which allows CDN content servers to cache contents and thus typically only involves certain CDN servers...
This paper describes how information collected by enterprise system management (ESM) platforms can be utilized in a novel approach to assess the information assurance delivered by an information system. We describe the assessment approach first and then explain the interaction patterns between the ESM platform and the assessment mechanism in the context of our prototype implementation.
Versatile storage systems aim to maximize storage resource utilization by supporting the ability to `morph' the storage system to best match the application's demands. To this end, versatile storage systems significantly extend the deployment- or run-time configurability of the storage system. This flexibility, however, introduces a new problem: a much larger, and potentially dynamic, configuration...
Enterprise applications today are composed of multiple independently executing services and processes that collectively provide a solution to a business problem. These composite applications contain a heterogeneous collection of services that execute in a variety of runtimes making them difficult to manage while maintaining a business centric point of view, as opposed to a service point of view. This...
Recently, strong interests in the real-time performance management are increasing to gain competitive advantages in the rapidly changing business environment. For better business performance or continuous process improvement of an enterprise, real-time measurement and analysis of the performance of managerial activities is essential. Business activity monitoring (BAM) which provides real-time access...
Gas insulated transformers are usually installed at underground substations located in the urban area, and it is worried that abnormalities caused by the progress of deterioration may soon start to appear as 30 years have passed since the first gas insulated transformer was installed in Japan. Therefore, the diagnostic technique without stopping the gas insulated transformer operation has become necessary...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.