The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Cloud supports diverse workloads and simple schemes are needed to allocate jobs with satisfactory QoS and low overhead. This paper presents a further study on the potential of an online work distribution approach in adaptively distributing workloads under variable load conditions for optimizing the two contradictory criteria: reducing the energy consumption per job while maintaining the best possible...
The possibility for theft or misuse of legitimate user credentials is a potential cyber-security weakness in any enterprise computer network which is almost impossible to eradicate. However, by monitoring the network traffic patterns, it can be possible to detect misuse of credentials. This article presents an initial investigation into deconvolving the mixture behaviour of several individuals within...
With the rapid development of database and web technology, the way data organized and presented is becoming increasingly complicated while data sources are also intermingled with inaccurate information. Therefore, studies in truth discovery becomes overwhelmingly significant for it is critical for netizens to identify sources of high quality as well as to select the most accurate information from...
In cloud investment markets, consumers are looking for the lowest cost and a desirable fairness while providers are looking for strategies to achieve the highest possible profit and return. Most existing models for auction-based resource allocation in cloud environments only consider the overall profit increase and ignore the profit of each participant individually or the difference between the rich...
An improved cloud resource revenue optimization models are proposed, which include the benefits of service providers and users negotiate SLA agreement. And the models define the constraint mechanism for describing service quality problems such as service response time and customer satisfaction. We design the comprehensive response indicator and use this indicator to quantify the rationality of the...
In this paper, we propose a resource allocation algorithm for secure communications in OFDMA relay networks. In our model, a base station wants to securely communicate with a set of users using a set of decode and forward (DF) relay stations (RS) while at the same time, a set of malicious users are eavesdropping the link between the BS and the relays. Our problem is to maximize the total secrecy rate...
We consider a practical makespan minimization problem that arises in a multiprocessor computer system where some processors may be shut down during computation to save an amount of shared power. The system consists of m processors driven by a common power source. The processors are modeled as a set of identical parallel machines. Moreover, we consider a set of n independent, nonpreemptive jobs which...
The resource allocation is an essential aspect of Data Center performance. The strategy between dynamic and dedicated resource allocation have objectives in performance and reliability. The performance consists of workload, usage, and processing performance. The study works in workload performance test in dynamic resource allocation. The research present the correlation between load handling memory...
As the rate of information growth intensifies, so has the study of cloud resource management because cloud computing can generate powerful online resource convergence. This paper presents a new cloud computing resource allocation model based on combinatorial double auction mechanism (CDA-CCRA) for more effective resource utilization. The CDA-CCRA model can simultaneously satisfy the requirements of...
The necessity of making a system robust to the uncertainties of the different measures taken from the computing infrastructure is one of the Grid Computing research challenges. In particular, taking relevant information to tasks scheduling from a set of heterogeneous sources and dynamic behavior has been the focus of a significant number of studies. Considering this background, this paper aims to...
This paper focuses on the coordination of a population of thermostatically controlled loads (TCLs) with unknown parameters to achieve group objectives. The problem involves designing the device bidding and market clearing strategies to motivate self-interested users to realize efficient energy allocation subject to a peak energy constraint. This coordination problem is formulated as a mechanism design...
This two-part paper considers the coordination of a population of thermostatically controlled loads (TCLs) with unknown parameters to achieve group objectives. The problem involves designing the bidding and market clearing strategy to motivate self-interested users to realize efficient energy allocation subject to a peak energy constraint. The companion paper (Part I) formulates the problem and proposes...
Software-Defined Networking (SDN) has great potentials in changing the fragile and complex enterprise networks. One operational challenge to SDN deployment is the settlement of legacy switches. A hybrid SDN consisting of both SDN and legacy switches may be a tradeoff. Nevertheless most of the current SDN control planes can not handle legacy switches. To overcome this problem, we present HybridFlow,...
Computational clouds have evolved to go beyond cost-effective on-demand hosting of IT resources and elasticity. The added features now include the ability to offer entire IT systems as a service that can quickly adapt to changing business environments. The new trend introduces challenges in datacenter resource management, including scalability, system-orientation, and optimization supporting both...
This paper aims to design a Hadoop system and evaluates the performance of a task allocation scheme. The task allocation scheme splits each job into tasks using an appropriate splitting ratio, and assigns tasks to slave servers based on server processing performance and network resource availability. We experimentally evaluate the performance of the scale out of the task allocation scheme with five...
In this paper, the region of SINRs vector for a given user on its assigned sub-carriers (SCs) which corresponds to a given target-rate, is characterized. In doing so, given the user's data rate, the boundary of region of the SINRs vector corresponding to data rate for the user on its assigned SCs is obtained. We show that for a given preference of the user, the point laid on that boundary corresponds...
The work presented in this paper deals with the issue of massive demands for higher capacity. For that matter, we investigate the spectrum resource management in outdoor mmWave cell for the uplink of cellular and D2D communications. Indeed, we provide a first insight how to optimize the system performance in terms of achievable throughput while realizing a compromise between the large number of admitted...
A great challenge faced by many organizations refers to translating their large computing infrastructure into an effective tool to support their productive chain. In this paper, we introduce a modular single point of access middleware approach focused on integrating distributed and heterogeneous computing resources, coined as Dédalo. Since its design, which follows a software product line (SPL) paradigm,...
Deploying cache has been generally adopted by Internet service providers (ISPs) to mitigate P2P traffic in recent years. Most traditional caching algorithms are designed for locality-unaware P2P networks, which mainly consider the requested frequency of contents as the principle of caching policies. However, in more prevalent locality-aware conditions with biased neighbor-selection policies, the existing...
Two-tier networks consisting of macrocell and femtocells are provided as a solution to increase capacity and improve indoor coverage of cellular networks. In two-tier networks, when the spectrum is shared by macrocell and all of femtocells, the cross-tier and co-tier interference should be taken into account. In this paper, we investigate the power control problem of minimizing the aggregate transmit...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.