The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy efficiency is an area of growing importance in datacenters. While the energy proportionality wall poses a challenge to further improve the dynamic power range of servers, heterogeneous systems offer a new opportunity to achieve higher energy efficiency by improving the match between application workload demands on the large heterogeneous system configuration space. This paper proposes a model-driven...
Signaling related attacks, such as the signaling storms, threaten the stability of mobile networks and are a frequent cause of multiple service degradations and even several network outages. This paper proposes a performance evaluation approach to the problem using techniques from probability theory, in general Markov Chains and queueing networks. It proposes a model of a mobile network under signaling...
Recent computer systems research has proposed using redundant requests to reduce latency. The idea is to replicate a request so that it joins the queue at multiple servers. The request is considered complete as soon as any one copy of the request completes. Redundancy is beneficial because it allows us to overcome server-side variability – the fact that the server we choose might be temporarily slow...
Energy consumption of today's datacenters is a constant concern from the standpoints of monetary and environmental costs. We model a datacenter as a queueing system, where each server can be switched on or off, with the time to switch a server on being nonnegligible. Previously derived structural properties of the optimal policy allow us to intelligently select policies to analyse further. Using the...
Consistency is one of the key challenges in replicated distributed systems (DSs). Data centric and client centric are two main categories of consistency models. Monotonic read (MR) is one of the client centric consistency models that guarantees consistency from view point of a single client in terms of access to replicated data store. This consistency model guarantees that when a process reads a value...
Content Delivery Network (CDN) services largely affect the delivery quality perceived by users. While those services were initially offered by independent entities, some large ISP now develop their own CDN activities to control costs and delivery quality. But this new activity is also a new source of revenues for those vertically integrated ISP-CDNs, which can sell those services to content providers...
Services of different types are provided to paying customers on servers hired from a cloud. Different virtual machines can share a server, subject to one or more resource constraints. Incoming jobs whose resource requirements cannot be satisfied are lost. The objective is to maximize the long-term average profit per unit time. A single-server model is analyzed exactly and the results provide approximations...
Recent studies show that the wireless technology could resolve the oversubscription issue in wireless data center networks (WDCNs). However, these works only focus on transmitting traffic flows at the top-of-rack (ToR) switch. In this paper, we propose a deadline-aware rate control scheme (DRCS) that detects the network congestion situation by considering the flow size, deadline, and the number of...
Modern machineries are becoming complex cyber-physical systems with increasingly intelligent support for process automation. For the dependability and performance, a combination of measures for fault avoidance, robust architecture, and runtime anomaly handling is necessary. These in turn call for a formalization of knowledge across different system lifecycle stages and a provision of novel methods...
Transports of secondary cosmic-ray neutrons and muons in a building and a stacked server are simulated by Particle and Heavy Ion Transport code System (PHITS) with considering distributions of energy and zenith-angle of secondary cosmic-rays by PHITS based analytical radiation model in the atmosphere (PARMA) model. The calculated neutron fluxes are in surprisingly good agreement with measured data...
The codes for analysis and design of subway station circulation facilities neglect the important factors such as passenger flow randomness, state-dependent service time of circulation facilities, and passengers blocking when demand exceeds capacity. This paper proposes a new Discrete-Event Simulation (DES) method using Phase-Type distribution to analyze the performance of circulation facilities of...
In this paper, we present a combined experimental and analytical investigation of the impact of security compliance on a three-tier web application hosted on a virtualized platform. We used two-group experimental design for our experiments, and analyzed the impact of security using the ANCOVA model. The results of experiments suggest that security measures have significant impact on system performance...
In this paper, we focus on the problem of analyzing the operating performance of insurance companies, and this problem is crucial for modern financial industry development. Index system for evaluating operating performance of insurance companies is made up of four parts: 1) Profitability, 2) Solvency, 3) Capital adequacy and 4) Management ability. Main idea of this paper is to introduce DEA model...
A major challenge in cyber-threat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. It is one of the most important technical and policy challenges in cybersecurity. The lack of ground truth for an individual responsible for an attack has limited previous studies. In this paper, we take a first step towards overcoming this limitation...
Queueing theory is the study of prediction and evaluation of the system performance. It has been studied and used since long time. It mainly studies the waiting line or queues. A queueing system can be described as customers arriving for service, waiting for service if it is not immediate, and if having waited for service, leaving the system after being served. Queueing theory was developed to provide...
In this work, routing strategies of an arriving request to a server in a prioritized limited multi-server processor-sharing (PS) system are studied in order to optimize a given performance criterion. In this system, an arriving request enters the dispatcher, which routes this request to each server according to a predetermined strategy. In the prioritized limited PS server, a high-priority request...
This Paper proposes Web application-oriented active threat awareness model and analyzes the threat features of Web application, which is used for threat intelligence analysis, association analysis and data-driven anomaly detection. So in this paper, we mainly study the threat feature design and selection problem in the web application, which will be used for threat awareness system to improve the...
Data exchange is a critical issue within the multi-disciplinary engineering process of cyber physical production systems (CPPS). AutomationML (AML) is an emerging standard in the this field to represent and exchange artifacts between heterogeneous engineering tools used in mechanical, electrical, and software engineering domains. However, the interoperability of different exchange standards may be...
This paper presents the use of the Business Intelligence process and some of its technologies to perform monitoring and meta-monitoring actions on sensed data and physical components that compose an environmental monitoring platform. These actions are mainly related to the capture of data that are the input to carry out the support of the decision-making process in the regulation and control of environmental...
Cloud computing environments provide storage capacity, processing power, and other computational resources in a flexible way, enabling fast adaptation to highly dynamic workloads. Multimedia services, such as video streaming, are examples of applications that can use cloud computing to leverage their provisioning capacity. This way, it is possible to offer a large variety of multimedia content in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.