The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses energy efficient VNF placement and chaining over NFV enabled infrastructures. VNF placement and chaining are formulated as a decision tree search to overcome this NP-Hard problem complexity. The proposed approach is an extension of the Monte Carlo Tree Search(MCTS) method to achieve energy savings using physical resourceconsolidation and sharing VNFs between multiple tenants....
Proposes an approach to assessing the state of plant species (based on an example of assessing the state of large-leaved linden) in urban environment on the basis of fuzzy information from a group of experts. Formalization of the expert information is carried out on the basis of complete orthogonal semantic spaces. The proposed approach allows to avoid mistakes in the assessment of a single expert...
Cloud computing has become pervasive nowadays. Additionally, cloud computing customers increasingly demand the use of accelerators such as CUDA GPUs. This has motivated that Amazon, for example, provides virtual machine instances comprising up to 16 NVIDIA GPUs. However, the use of GPUs in cloud computing deployments is not exempt from important concerns. In order to overcome many of these concerns,...
Virtual Private Networks (VPN) are an established technology that provides users a way to achieve secure communication over an insecure communication channel, such as the public Internet. It has been widely accepted due to its flexibility and availability on many platforms. It is often used as an alternative to expensive leased lines. In traditional setups, VPN endpoints are set up in hardware appliances,...
Prior load balancing solutions for chaining virtualized network functions cause significant control and data plane overheads and demand special requirements on network hardware. In this study, we present the design, implementation, and evaluation of Hash-based Traffic Steering on Softswitches (HATS), a load balancing mechanism that aims at mitigating such drawbacks. The method exploits flow hashing...
This paper describes the Robotarium — a remotely accessible, multi-robot research facility. The impetus behind the Robotarium is that multi-robot testbeds constitute an integral and essential part of the multi-robot research cycle, yet they are expensive, complex, and time-consuming to develop, operate, and maintain. These resource constraints, in turn, limit access for large groups of researchers...
With the emergence of network function virtualization, data center start to deploy a variety of network function boxes (NFBs) in both physical and virtual form factors in order to combines inherent efficiency offered by physical NFBs with the agility and flexibility of virtual ones. However, existing schemes are limited to exclusively consider physical or virtual NFBs, which may reduce the performance...
Live Virtual Machine (VM) migration offers a couple of benefits to cloud providers and users, but it is limited within a data center. With the development of cloud computing and the cooperation between data centers, live VM migration is also desired across data centers. Based on a detailed analysis of VM deployment models and the nature of VM image data, we design and implement a new migration framework...
After more than 20 years of development, Internet of things has a IoT of applications in the actual scene, which greatly facilitates people's work and life. As people paying more and more attention to environmental quality, the application of Internet of Things in indoor environment monitoring and control has become an important branch. In this paper we present a set of lightweight intelligent solutions...
South African industry today need to utilise the available technology across disciplines to compete globally. One of the latest trends in the system integration field is to use virtual commissioning. Virtual commissioning allow the developer to validate the complete operation of new systems before anything materialise in the physical environment. It does not only allow operation verification but also...
Hardware-Assisted Flow Integrity extension (HAFIX) was proposed as a defense against code-reuse attacks that exploit backward edges (returns). HAFIX provides finegrained protection by confining return addresses to only target call sites in functions active on the call stack. We study whether the backward-edge policy in HAFIX is sufficient to prevent code-reuse exploits on real-world programs. In this...
Parking in modern world is always a subject of concern and isn't a task to be ignored as it was in old days. With modernization and introduction of digital devices, machines have taken a very important and irreplaceable role in human life. Parking nowadays is also done with the help of much advanced and sophisticated systems. The problem with most of these system is that they need a very high capital...
In the past few years, cloud computing has become one remarkable growing paradigm for offering services through the Internet on many levels. The increasing number of users requires resource provisioning strategy. Virtual machine (VM) placement is one of the keys to assure cloud consolidation and reduce power wastage. To resolve this problem, different approaches were proposed for VM placement strategies...
Graphics-as-a-service (GaaS) is gaining popularity in cloud computing community. There is an emerging trend of running GaaS workload using virtualized GPU in current data center deployment. This paper provides a detailed characterization of GaaS workload under virtualized GPU NUMA environment, and found that: (1) GaaS workloads exhibit different behavior with GPGPU workloads by having more frequent...
The common in use for remote control tasks achieved via specific mobile (e.g. Android or iOS) and this control done only by radio remote control systems, infrared (IR) devices, etc.and limited in the edges of office/house, but not remote control automated for electric/ electronic devices from anywhere (outside of office/house). This paper proposed an Internet of Things (IoT) home automated system...
This paper presents a novel Age-related Macular Degeneration (AMD) Big Data platform for future pharmaceutical applications. This platform is a network collecting AMD data from a large number of AMD patients in a central unit for data analytical purposes. Each network node is connected to a headset with graphical interface system for measuring the progression of AMD. Herein we discuss the proposed...
The Catapult project has brought the power and performance of FPGA-based reconfigurable computing to Microsoft’s hyperscale datacenters, accelerating major production cloud applications such as Bing web search and Microsoft Azure, and enabling a new generation of machine learning and artificial intelligence applications. Catapult is now deployed in nearly every new server across the more than a million...
Oracle's Real Application Cluster (RAC) allows multiple database instances to run on different server nodes in a cluster against a shared set of data files. A critical aspect of an Oracle RAC system is that of instance recovery. When a node suffers from a hardware failure, or a database instance suffers from a software failure, instance recovery is performed by a surviving instance to ensure that...
In the quest for energy efficiency of Information and Communication Technology, so far research has mostly focused on the role of hardware. However, as hardware technology becomes more sophisticated, the role of software becomes crucial. Recently, the impact of software on energy consumption has been acknowledged as significant by researchers in software engineering. In spite of that, measuring the...
Virtualization supplies a straightforward approach to high availability through iterative replications of virtual machine (VM) checkpoints that encapsulate the protected services. Unfortunately, traditional VM replication solutions suffer from deficiencies in either response latency or state recovery consistency, which constrains the adoption of VM replication in production. In this paper, we extend...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.