The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud provides user with requested services dynamically and efficiently. For this there is a need of effective resource allocation strategy. Jobs scheduling in cloud is tedious job and it is defined as a NP-Complete problem. This is a survey of various resource allocation strategies in cloud. The methods considered are Simulated Annealing which is used to find optimal solution for NP Hard problems,...
To improve the resource utilization jobs running in the production clusters shares the available resources by assigning with different priorities. Preemption is one of the common technique used by the schedulers in Hadoop systems to prevent the delay in the job completion, also to ensure that the available resource is effectively shared among the running jobs. In addition, this prevents large jobs,...
The problems of energy-constrained and time-constrained task scheduling on multiple heterogeneous computers are investigated as combinatorial optimization problems. For a given set of independent tasks, our strategy is to find a schedule of the tasks first, and then find a power allocation to the tasks, where the power allocation is performed in such a way that the total task execution time or the...
Distributed Processing Environment (DPE) refers multiple computers are linked together and forms a computer network to solve a common problem. In DPE many application elements that are spread over numerous computers, but work as a one processing system. DPE may include a local area network and computers are physically close together or it may be link by a wide area network and computers are geographically...
This paper presents a team-search based decentralized task allocation scheme for multiple homogeneous unmanned aerial vehicles (UAVs) to provide protection to static convoys of ground vehicles. The UAVs, during operation, protect the ground convoy by searching their vicinity for imminent threat, analyzing/ confirming threat level, attacking it and finally assessing the damage to confirm if the threat...
Today's virtualized resource management in datacenters is typically VM-centric, which has serious problems in scalability. We propose a shift from the traditional flat, fine-grained model towards a hierarchical, abstract model that facilitates decomposition of the complex resource allocation problem in a divide-and-conquer approach. In particular, this paper elaborates a pack-centric framework in...
A balanced team formation method is described for tasks with deadlines in multi-agent systems. With the advances that have been made in computer and network technologies, tasks that are achieved by multiple software/hardware entities are often required in many real-world applications. In addition, these tasks are usually required to be done by specified deadlines to avoid a failure of services or...
A lot of effort is still required in greening ICT and the use of ICT to green organisations. However, Green ICT initiatives are hard to sustain. In this context, Green ICT maturity models help by providing a benchmarking tool and a roadmap. However, several Green ICT maturity models have been proposed by different researchers over the years with no clear justification. This makes it difficult for...
In virtualized environment, several computers run on a physical computer. Many of virtualization systems have a ballooning function with which memory allocation size for a virtual machine can be dynamically changed without restarting the virtual machine. Thus, it is expected that performance of an applications in a virtual machine can be improved by dynamic optimization of the virtual machine memory...
Nowadays, Memory Forensics is more acceptable in Cyber Forensics Investigation because malware authors and attackers choose RAM or physical memory for storing critical information instead of hard disk. The volatile physical memory contains forensically relevant artifacts such as user credentials, chats, messages, running processes and its details like used dlls, files, command and network connections...
Dynamic memory allocation is one of the most ubiquitous operations in computer programs. In order to design effective memory allocation algorithms, it is a major requirement to understand the most frequent memory allocation patterns present in modern applications. In this paper, we present an experimental characterization study of dynamic memory allocations in seven real-world widely used applications...
Many recent studies have proposed energy efficient approaches that use various techniques such as Dynamic Voltage Scaling (DVFS), CPU idling, and server consolidation in data centers. Also, many networking problems could be introduced by server consolidation techniques. In this research, we introduce an enhanced technique called Network and Power Aware (NPA) server consolidation that will dynamically...
This paper presents a new concolic execution-based smart fuzzer for detecting heap-based buffer overflow in the executable codes. The proposed fuzzer executes the target program with concrete input data and calculates the constraints of the executed path symbolically. The path constraints are used to generate test data that traverse new execution paths in the target program. For each executed path,...
TeSCA is an assessment tool to measure the utilization of ICT for Indonesia' higher education institutions (HEI) using the “ZEN Framework” that will measure the various components. As an e-readiness assessment tool, the output of the measurement is index / rank that represent institutions' capabilities to utilize ICT for their academic operation. The question arise when we want to use TESCA as self-assessment...
Robot with different personality have different behavior patterns, and personality will improve the emotional intelligence of robot, while it provide more possibilities for robots cooperative work. A personalized multi robot pursuit task allocation algorithm is proposed, in which personalitys regulatory role is made full use in the process of robot pursuit task allocation. Using emotional cooperation...
Modern computing systems are dealing with a diverse set of complex and dynamic workloads in the presence of varying job arrival rates. This diversity is raising the need for the development of sophisticated run-time mechanisms that efficiently manage system's resources. In addition, moving towards kilo-core processor architectures, centralized resource management approaches will most probably form...
We introduce a model of evolutionary game dynamics for partition games - general class of resource allocation games. Our focus is on a computer modelling of the repeated partition games where the pure payoff matrix strategies are the actors of the population. At each instant, actor from one concurrent population is randomly matched with actor from other population, and they play a strategic form game...
Several programs demand large memory allocation to execute their tasks. Normally, the demands are based on intentions of program designers, users, and system administrators. Sometimes, however, faulty programs or malicious programs demand large memory without the intentions. These unexpected large memory demands may cause system instability. Generally, operating systems have resource limitation mechanisms...
Multi-NoC (multiple network-on-chip) has demonstrated its advantages in power gating for reducing leakage power. This work presents Chameleon, a novel heterogeneous Multi-NoC design. Chameleon employs a fine-grained power gating algorithm which exploits power saving opportunities at different levels of granularity simultaneously. Integrated with a performance-aware traffic allocation policy, Chameleon...
We review strategies for applying statistical inference to system design and management. In design, inferred models act as surrogates for expensive simulators and enable qualitatively new studies. In management, inferred models predict outcomes from allocation and scheduling decisions, and identify conditions that make performance stragglers more likely.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.