The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud platforms and services usually provide an APIlayer as decoupled, language agnostic interface for both front-endclient integration and back-end data and/or function access. Theavailability and performance of the APIs have significant impact onthe quality of end user or client experiences due to its nature ofinteraction endpoints. However, the extreme dynamics, complexityand scale of the current...
A large amount of information is continuously generated in intensive health care. An analysis of these data streams can supply valuable insights to improve the monitoring of the patients. The volume, frequency and complexity of data, which come unlabeled, make their analysis a challenging task. Machine learning (ML) techniques have been successfully employed for mining data streams to extract useful...
In this work, we propose a GRASP+VNS algorithm for solving the allocation of Roadside Units (RSUs) in a Vehicular Network. Our main objective is to find the minimum set of RSUs to meet a Deployment Delta (ρ1,ρ2). The Deployment Delta (ρ1,ρ2) is a metric for specifying minimal communication guarantees from the infrastructure supporting the Vehicular Network. We compare GRASP+VNS to some baseline algorithms:...
Monitoring is a common requirement in everyday modern life, from anti-virus scanners on personal computers to securing large multinational systems' health and status. Such monitoring is a fundamental process which must be undertaken where resources are offered as a service as in the cloud, to make sure that the service has been delivered to meet all contractual obligations. However, with a dynamic...
Internet of Things (IoT) services are increasingly deployed at the edge to access and control Things. The execution of such services needs to be monitored to provide information for security, service contract, and system operation management. Although different techniques have been proposed for deploying and executing IoT services in IoT gateways and edge servers, there is a lack of generic policy...
In LTE/LTE-A the Discontinuous Reception (DRX) mechanism is the main approach for power saving in User Equipments (UEs) when in Connected and Idle mode. In this paper, an Idle mode DRX mechanism model is proposed also enabling evaluation of closely related mechanisms such as paging and Tracking Area Update (TAU). Two performance metrics are derived, namely the reachability delay and the power saving...
Nowadays, Cloud providers revise the terms of their Service Level Agreements (SLAs) to include security provisions due to their criticality for their customers. In order to speed up their adoption by service providers and consumers and to make them more actionable, security SLAs monitoring should be described in a machine-processable, agile and extensible way. Several tools for SLA management are...
Detecting runtime anomalies is very important to monitoring and maintenance of distributed services. People often use execution logs for troubleshooting and problem diagnosis manually, which is time consuming and error-prone. In this paper, we propose an approach for automatic anomaly detection based on logs. We first mine a hybrid graph model that captures normal execution flows inter and intra services,...
Applications like environmental sensing, and health and activity sensing, are supported by networks of devices (nodes) that send periodic packet transmissions over the wireless channel to a sink node. We look at simple abstractions that capture the following commonalities of such networks (a) the nodes send periodically sensed information that is temporal and must be delivered in a timely manner,...
Using an age of information (AoI) metric, we examine the transmission of coded updates through a binary erasure channel to a monitor/receiver. We start by deriving the average status update age of an infinite incremental redundancy (IIR) system in which the transmission of a k-symbol update continues until k symbols are received. This system is then compared to a fixed redundancy (FR) system in which...
We consider a system where a local cache maintains a collection of N dynamic content items that are randomly requested by local users. A capacity-constrained link to a remote network server limits the ability of the cache to hold the latest version of each item at all times, making it necessary to design an update policy. Using an age of information metric, we show under a relaxed problem formulation...
Elasticity is the key feature of cloud computing to scale computing resources according to application workloads timely. In the literature as well as in industrial products, much attention was given to the elasticity of virtual machines, but much less to the elasticity of containers. However, containers are the new trend for packaging and deploying microservices-based applications. Moreover, most...
Detecting anomalous behaviors of cloud platforms is one of critical tasks for cloud providers. Every anomalous behavior potentially causes incidents, especially some unaware and/or unknown issues, which severely harm their SLA (Service Level Agreement). Existing solutions generally monitor cloud platform at different layers and then detect anomalies based on rules or learning algorithms on monitoring...
The crowdsourcing (CS) is a software development practice that increases in the productive sector. This environment is supported by a platform which relates the crowd, the provider, the sponsor and the developer. Microtasks are executed by people, and these are joining in a large project. The teaching of crowdsourcing in undergraduate courses is minimal compared to the teaching of traditional Distributed...
As 802.11 network has become an important infrastructure for the Mobile Internet, the performance of WLAN handoff is critical to the quality of user's experience. Although it has shown that there are a large number of invalid handoffs in large-scale 802.11 networks with dense AP, the reason and seriousness still remain unclear. In this paper, we propose HandoffAnalyser, a client-network collaborative...
To meet the communication expectations of the future, mobile networks need to evolve quicker than ever toward systems with ultra-low latency, huge traffic volume and higher data rates. Cloud-enabled radio systems have been introduced as a promising solution to meet these demands with the help of network functions virtualization techniques and network edge processing capabilities, which allow for increased...
Nowadays, more and more enterprises and research institutes choose to build mini-datacenters and deploy private cloud environments to meet growing business and research needs. To make users can run different application frameworks on the same datacenter, Cao et al. [5] proposed a new service model named ClaaS (Cluster as a Service) and developed a lightweight prototype system named Docklet which is...
With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable...
With the raise of computer systems' complexity, greater number of modules, technologies involved and functionalities, monitoring and keeping up with such systems in real time has become an indispensable task, given the fact that the quality of production software impacts directly on decision making and risk management by organizations. Knowing what to observe, which metrics are being more used for...
Due to the constant evolution of technology, each day brings new programming languages, development paradigms, and ways of evaluating processes. This is no different with source code metrics, where there is always new metric classes. To use a software metric to support decisions, it is necessary to understand how to perform the metric collection, calculation, interpretation, and analysis. The tasks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.