The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new concolic execution-based smart fuzzer for detecting heap-based buffer overflow in the executable codes. The proposed fuzzer executes the target program with concrete input data and calculates the constraints of the executed path symbolically. The path constraints are used to generate test data that traverse new execution paths in the target program. For each executed path,...
TeSCA is an assessment tool to measure the utilization of ICT for Indonesia' higher education institutions (HEI) using the “ZEN Framework” that will measure the various components. As an e-readiness assessment tool, the output of the measurement is index / rank that represent institutions' capabilities to utilize ICT for their academic operation. The question arise when we want to use TESCA as self-assessment...
Robot with different personality have different behavior patterns, and personality will improve the emotional intelligence of robot, while it provide more possibilities for robots cooperative work. A personalized multi robot pursuit task allocation algorithm is proposed, in which personalitys regulatory role is made full use in the process of robot pursuit task allocation. Using emotional cooperation...
Modern computing systems are dealing with a diverse set of complex and dynamic workloads in the presence of varying job arrival rates. This diversity is raising the need for the development of sophisticated run-time mechanisms that efficiently manage system's resources. In addition, moving towards kilo-core processor architectures, centralized resource management approaches will most probably form...
We introduce a model of evolutionary game dynamics for partition games - general class of resource allocation games. Our focus is on a computer modelling of the repeated partition games where the pure payoff matrix strategies are the actors of the population. At each instant, actor from one concurrent population is randomly matched with actor from other population, and they play a strategic form game...
Several programs demand large memory allocation to execute their tasks. Normally, the demands are based on intentions of program designers, users, and system administrators. Sometimes, however, faulty programs or malicious programs demand large memory without the intentions. These unexpected large memory demands may cause system instability. Generally, operating systems have resource limitation mechanisms...
Multi-NoC (multiple network-on-chip) has demonstrated its advantages in power gating for reducing leakage power. This work presents Chameleon, a novel heterogeneous Multi-NoC design. Chameleon employs a fine-grained power gating algorithm which exploits power saving opportunities at different levels of granularity simultaneously. Integrated with a performance-aware traffic allocation policy, Chameleon...
We review strategies for applying statistical inference to system design and management. In design, inferred models act as surrogates for expensive simulators and enable qualitatively new studies. In management, inferred models predict outcomes from allocation and scheduling decisions, and identify conditions that make performance stragglers more likely.
With the rapid development of the cloud computing and big data, many data center network are growing more large scale, and the number of servers is increasing at an exponential rate. In this paper, VCG (Vickrey-Clarke-Groves) mechanism was introduced into replica placement. Mapping from replica placement model to VCG mechanism was established and suitable payment function was designed. Data storage...
To reduce network energy consumption without losing system performance is a key technique in 5th generation wireless communication systems. The on-off control in multi base stations scenario is proved a mixed dynamic integer programming problem and is hard to be solved. In this work, we provide a novel energy aware dynamic on-off control method in multi-base station scenario to tackle this problem...
The last decade witnesses a dramatic advance of cloud computing research and techniques. One of the key faced challenges in this field is how to reduce the massive amount of energy consumption in cloud computing data centers. To address this issue, many power-aware virtual machine (VM) allocation and consolidation approaches are proposed to reduce energy consumption efficiently. However, most of those...
Due to the widespread use of cloud services, the need for proper and dynamic distribution will redouble the resources. One of the most complex problems in cloud environments is resource allocation such that on one hand the resource provider should obtain maximum utilization and on the other hand users want to lease best resources based on his time and budget constraints. Many studies which presented...
The following paper investigates the secondary sum rate of MIMO two-way cognitive relay networks with multiple relays using amplify and forward (AF) strategy. The capacity of the system can be maximize by using optimum power allocation (OPA) algorithm in place of equal power allocation(EPA) among all nodes, while assuming that all node having fully channel state information (CSI). It has been considered...
Cloud computing is a popular design pattern for the large and distributed data centers. In the distributed environment, load balancing of the nodes and task scheduling is the main concern for the designers. This article presents a Flexible load sharing algorithm (FLS) which introduce the third function. The third function makes partition the system in to domain. This function is helpful for the selection...
The focal point of this paper is the so-called Kelly Criterion, a prescription for optimal resource allocation among a set of gambles which are repeated over time. The criterion calls for maximization of the expected value of the logarithmic growth of wealth. While significant literature exists providing the rationale for such an optimization, this paper concentrates on the limitations of the Kelly-based...
Cloud computing has been established as a novel approach for computing where virtualized resources are available on demand. This permits the user to concentrate on the functional area and frees her/him from the burden of setting up data centers, hardware, software, network and licensing etc. Cloud computing helps in cost saving, easy accessibility, security, and 24×7 availability of resources to the...
Scheduling of tasks in distributed environment requires decision making approach for fair utilization and allocation of computing resources. In this paper, a scheduling model based on analytic hierarchy process (AHP) is discussed. The user tasks are compared using pair-wise comparison matrix and the machines are allocated on the basis of task priority. The paper also discusses an inconsistency identification...
The solution of multidomain/multiphysics problems is a computationally and memory demanding process, especially for large-scale differential equations. In this paper, we propose a cloud application that provides users a solution environment for multiphysics/multidomain problems utilizing cloud technologies that manage pre-existing hardware, network, operating system and applications. Particularly,...
We consider a problem of scheduling independent preemptable jobs on parallel identical machines with the schedule length criterion. The processing rate of a job at a given moment depends on the temporal amount of power allocated to this job. Available power and energy are treated as a doubly-constrained resource, thus the problem is to find the schedule with the minimal length which respects the given...
Ad-hoc networks are promising complements for the infrastructure based network under disastrous scenarios. However, due to the heterogeneous surrounding environment of each user, the channel availability of each user may be quite different. Cognitive radio emerges as a promising technology to enable two users to communicate under different channel availability, by opportunistically accessing available...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.