The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
as the deceleration of processor scaling due to Moore's law accelerates research in new types of computing structures, the need arises for rethinking operating systems paradigms. Traditionally, an operating system is a layer between hardware and applications and its primary function is in managing hardware resources and providing a common abstraction to applications. How does this function apply,...
An idea or a concept can be classified as transformational, operational or tactical. In the recent past, there have been more rational developments in software testing techniques outsmarting the ones prevailing earlier which weighed more in favor of empirical rather than logical aspects of software testing. This paper presents one of a kind of developments in software testing methodologies that were...
Analyzing the behavioral patterns to maintain the workload in cloud computing is very important. There are number of cloud data centers that have the facility to maintain this. But this paper has provided the approach for resource utilization based on two metrics, energy and cost function. This approach works within the workload which helps to understand the relationship between users and servers,...
Advancement in computing technologies and increasing demand of computing resources (such as network, storage, servers, applications etc.) has made cloud computing as main computing basis for small or large IT enterprises. The enterprises which are not able to establish their own infrastructure and resources are taking help of different (Infrastructure as a Service) IaaS service providers on basis...
Grid technology is the structure of technology that provides highly efficient performance in the grid environment. Design of an efficient and reliable task scheduling algorithm is one of the challenging issues in grid computing. A novel improvised scheduling algorithm (IDSA) with deadline limitation for efficient job execution is proposed in this paper. This algorithm is compared with renowned task...
In order to improve the cloud computing utilization, an Improved Ant Colony Optimization (IACO) is proposed. The proposed IACO algorithm improves pheromone factors and inspired factors innovatively based on the existent algorithms. Emulation tests are conducted in the CloudSim and the results indicate that IACO is superior to the conventional ACO and the latest IABC in task executing efficiency.
The future of Moore's Law is in jeopardy. The number of cores of many-core systems is steadily increasing for every technology node generation. Voltage scaling does not keep pace with the unabated decrease of transistor size. Higher leakage power and manufacturing variabilities are the consequences and lead to extremely critical power as well as thermal issues. These phenomena can downgrade the performance...
The Cloud supports diverse workloads and simple schemes are needed to allocate jobs with satisfactory QoS and low overhead. This paper presents a further study on the potential of an online work distribution approach in adaptively distributing workloads under variable load conditions for optimizing the two contradictory criteria: reducing the energy consumption per job while maintaining the best possible...
The possibility for theft or misuse of legitimate user credentials is a potential cyber-security weakness in any enterprise computer network which is almost impossible to eradicate. However, by monitoring the network traffic patterns, it can be possible to detect misuse of credentials. This article presents an initial investigation into deconvolving the mixture behaviour of several individuals within...
With the rapid development of database and web technology, the way data organized and presented is becoming increasingly complicated while data sources are also intermingled with inaccurate information. Therefore, studies in truth discovery becomes overwhelmingly significant for it is critical for netizens to identify sources of high quality as well as to select the most accurate information from...
In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich...
An improved cloud resource revenue optimization models are proposed, which include the benefits of service providers and users negotiate SLA agreement. And the models define the constraint mechanism for describing service quality problems such as service response time and customer satisfaction. We design the comprehensive response indicator and use this indicator to quantify the rationality of the...
In this paper, we propose a resource allocation algorithm for secure communications in OFDMA relay networks. In our model, a base station wants to securely communicate with a set of users using a set of decode and forward (DF) relay stations (RS) while at the same time, a set of malicious users are eavesdropping the link between the BS and the relays. Our problem is to maximize the total secrecy rate...
Monte Carlo Tree Search (MCTS) is a popular approach for tree search in a variety of games. While MCTS allows for fine-grained time control, not much has been published on time management for MCTS programs under tournament conditions. This paper first investigates the effects of various time-management strategies on playing strength in the challenging game of Go. A number of domain-independent strategies...
We consider a practical makespan minimization problem that arises in a multiprocessor computer system where some processors may be shut down during computation to save an amount of shared power. The system consists of m processors driven by a common power source. The processors are modeled as a set of identical parallel machines. Moreover, we consider a set of n independent, nonpreemptive jobs which...
The resource allocation is an essential aspect of Data Center performance. The strategy between dynamic and dedicated resource allocation have objectives in performance and reliability. The performance consists of workload, usage, and processing performance. The study works in workload performance test in dynamic resource allocation. The research present the correlation between load handling memory...
As the rate of information growth intensifies, so has the study of cloud resource management because cloud computing can generate powerful online resource convergence. This paper presents a new cloud computing resource allocation model based on combinatorial double auction mechanism (CDA-CCRA) for more effective resource utilization. The CDA-CCRA model can simultaneously satisfy the requirements of...
The necessity of making a system robust to the uncertainties of the different measures taken from the computing infrastructure is one of the Grid Computing research challenges. In particular, taking relevant information to tasks scheduling from a set of heterogeneous sources and dynamic behavior has been the focus of a significant number of studies. Considering this background, this paper aims to...
This paper focuses on the coordination of a population of thermostatically controlled loads (TCLs) with unknown parameters to achieve group objectives. The problem involves designing the device bidding and market clearing strategies to motivate self-interested users to realize efficient energy allocation subject to a peak energy constraint. This coordination problem is formulated as a mechanism design...
This two-part paper considers the coordination of a population of thermostatically controlled loads (TCLs) with unknown parameters to achieve group objectives. The problem involves designing the bidding and market clearing strategy to motivate self-interested users to realize efficient energy allocation subject to a peak energy constraint. The companion paper (Part I) formulates the problem and proposes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.