The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modern cloud computing systems have been using multiple processing units on servers to increase their processing capability. Recently, applications with multiple parallelization options have been witnessed, and serve as a promising model for efficiently utilizing the processing capacity of the system. In this paper, we consider utility-based scheduling for periodic multisegment tasks with multiple...
On a cluster system running behind the Cloud computing, multiple processes are generated from most applications and then executed on multiple computing nodes. Their processes communicate with each other during their execution. The communication performance among multiple processes plays an important role in the total execution performance of an application. The SDN-enhanced JMS, which we have developed...
With virtualization technique, cloud computing is developed rapidly. However, aspects of the collecting of digital proofs for forensics in cloud computing environment, certain guideline is not yet. Therefore, cloud forensic researches in progress for reactivating security incidents in cloud computing. In this paper, we analyze forensic issue, challenges, already proposed forensic model in previous...
Fog computing is a promising paradigm in terms of extending cloud computing to an edge network. In a broad sense, fog computing in Internet-of-Vehicles(IoV) provides low-latency services since fog nodes are closely located with moving cars and are locally distributed. In this paper, we propose a fog computing architecture based on a publish/subscribe model. After that, we describe a traffic congestion...
Saving power becomes one of the main objectives in information technology industry and research. Companies consume a lot of money in the shape of power consuming. Virtual Desktop Infrastructure (VDI) is a new shape of delivering operating systems remotely. Operating systems are executing in a cloud data center. Users desktops and applications can be accessed by using thin client devices. Thin client...
Kiwano is a distributed system that enables an unlimited number of avatars interact in the same virtual space. By separating the management of virtual world components -avatars, moving objects from the static décor- we take a novel approach and introduce a neighborhood relation between avatars. In Kiwano we employ Delaunay triangulations to provide each avatar with a constant number of neighbors independently...
To support the various services quickly and flexibly, intelligence and automation are the key characters for future network resource management. How to build a big data based Telco cloud resource management framework is very important currently, which can leverages the power of Network Function Virtualization (NFV) and enhances telecom operators' availability of service, efficiency of resource, and...
Data deduplication is a technique that removes redundancy of data on the storage. For cloud storage services, enabling deduplication over encrypted data is of vital importance to achieve both cost savings and keeping data confidentiality simultaneously. Recently proposed solutions are not sufficient because of lacking desired level of security and efficiency. In this paper, we propose SEED, a novel...
We study the dynamic energy optimization problem in data centers. We formulate and solve the following offline problem: given a set of jobs to process, where the jobs are characterized by arrival instances, required processing time, and completion deadlines, and given the energy requirements of switching servers ON or OFF, in which time-slot which server has to be assigned to which job, and in which...
Dynamic Proof of Storage (PoS) is a useful cryptographic primitive that enables a user to check the integrity of outsourced files and to efficiently update the files in a cloud server. Although researchers have proposed many dynamic PoS schemes in single-user environments, the problem in multi-user environments has not been investigated sufficiently. A practical multi-user cloud storage system needs...
paper deals with the transition of companies to information systems operated using cloud computing services. The influence on the competitiveness of company and its organizational support is analysed. The developmental trends and their impact on company management are also described. The benefits and drawbacks from the transition to flexible ICT architecture are emphasized. Theoretical framework and...
Mobile devices are expected to perform complex tasks exceeding their current hardware capabilities. Traditional cloud-based solutions are often useful, but fail in adversarial environments with limited communication connectivity. This can be exemplified in battlefield scenarios where soldiers may require access to large processing capabilities, without sacrificing their own mobility. In this paper,...
Massive data applications such as E-science applications are characterized by complex treatments on large amounts of data which need to be stored in distributed data centers. In fact, when one task needs several datasets from different data centers, moving these data may cost a lot of time and cause energy's high consumption. Moreover, when the number of the data centers involved in the execution...
In the recent years cloud computing has become one of the hottest topics in the field of information technology. It links a certain amount of computing, storage and software resources to make a huge scale of shared virtual IT resource pool, providing unlimited capacity IT services for remote computer users. Cloud computing attracts the attention of more and more enterprises by using its advantages...
Hadoop is a popular open-source MapReduce implementation and has been widely used in many large scale systems. For improving I/O performance of Hadoop, a method which controlled file storing location based on sequential I/O speed of the storage device was proposed. However, the method did not take account of virtualized environment. In this paper, we focus on virtualized environment with a fixed number...
A cheating detectable secret sharing scheme is a secret sharing scheme that can detect forged shares in reconstructing a secret. For example, if we store shares in cloud storage, there is a possibility of it being forged. If the administrators of cloud storage are malicious, it is easy for them to forge a share. Therefore, cheating detectable secret sharing schemes have attracted attention, and many...
Nowadays, big data problems are ubiquitous, which in turn creates huge demand for data-intensive computing. The advent of Cloud Computing has made data-intensive computing much more accessible and affordable than ever before. One of the crucial issues that can significantly affect the performance of data-intensive applications is the load balance among cluster nodes. In this paper, we address the...
This work focuses on the issue of a high performance computing education based on systems such as grid, cloud, HPC cluster or systems with hybrid environments. The goal is based on the analysis of the High Performance Computing Strategic Research Agenda in Europe and the published findings in USA in context of needs for education and training specifically in HPC and Compute Intensive Science. In order...
Automation has gained the most famous and biggest attention in the industrial world lately. This is because it causes less man involvement, higher accuracy, money and time savings, unlike the conventional methods. Thus, the “Internet of Things” (IoT) concept came to the picture. This research paper reveals an implementing method of IoT concept for a manufacturing line to inspect and control an automatic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.