The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Machine learning is an increasingly important form of cognitive computing, making progress in several application areas. Machine learning often involves big data sets and is computationally challenging, requiring efficient use of resources. The use of cloud computing as the platform for machine learning offers advantages of scalability and efficient use of hardware. It may, however, be difficult to...
Resilience test and evaluation is an important technology to evaluate system resilience and verify whether the value of system resilience meets the designated requirements before the system is used. In this study, a resilience test and evaluation process is proposed for given disturbances. The system resilience is defined by the ratio of the integral of the normalized system performance within its...
Wind-flow around a long-span bridge, as a bluff body, will generate an aerodynamic force that interacts with the flow, causing vibration to the bridge deck. This phenomenon can lead to structural fatigue or worst, the bridge collapse. A continuous and comprehensive measurement system is needed for early detection and maintenance reference of a long-span bridge. Another benefit this system is aiming...
Technology scaling trends led to an aggressive increase of SRAM cell sensitivity to process variation. More accurate and non-invasive methodologies must be considered to provide detailed bit-cell characterization focusing on writability margin. This work proposes a new metric using regular read/write operations based on the estimation of the maximum word-line voltage drop during write operations....
Cloud environments are criticized for their volatility in performance aspects, making it extremely difficult for time- critical applications owners to perform the decisive step for migration and owners of SaaS to present performance vs cost tradeoffs to their customers when acting as IaaS customers. The aim of this work is to present an architectural approach based on which a)IaaS providers may enhance...
Recently multi-agent patrolling became more and more crucial in security, monitoring, etc. applications. It can be used, for example, to monitor points of interest in space, such as measurement points or entrances to a guarded area. A good patrolling strategy would ensure frequent visits to all points of interest defined by a user. A variety of centralized and distributed approaches exist already...
Reliable management of modern cloud computing infrastructures is unrealizable without monitoring and analysis of a huge number of system indicators (metrics) as time series data stored in big databases. Efficient storage and processing of collected historical data from all "objects" of those infrastructures are technology challenges for this Big Data application. We propose a data compression...
Many online application services are now provided by cloud-deployed VM clusters. Although economical, VMs in the cloud are prone to interference due to contention for physical resources among colocated users. Worse, this interference is dynamic and unpredictable. Current provider-centric solutions are application-oblivious and are thus not always aware of the user's SLO requirements or application...
Visibility measurement and associated visualization are essential for monitoring the operation of emerging converged software-defined infrastructure (SDI). However, most of existing monitoring tools are not yet ready to cover systematically whole visibility workflow. Thus, in this paper, we present an integrated design for multi-layered visibility workflow, denoted as 'SmartX MultiView Visibility...
The growing demand for flexibility and cost reduction in the telecommunication landscape directs the focus of service development heavily to programmability and softwarization. In the domain of Network Function Virtualization (NFV), one of the goals is to replace dedicated hardware devices (such as switches, routers, firewalls) with software-based network functionalities, showing comparable performance...
Fifth generation mobile communication (5G) networks promise lower latency, higher traffic volume and data rates compared to what we see nowadays. Among all technologies, Network Function Virtualization (NFV) and Software Defined Networking (SDN) techniques over the cloud-enabled radio systems play an important role to enable resource pooling, scalability, layer interworking and spectral efficiency...
Software-Defined Networking (SDN) is an innovative approach to provisioning and delivering QoS (Quality of Service) services, yet it is still devoid of context-differentiating services. In this paper we propose a network application (Autonomic QoS Broker) and a controller module that implements the OpenVSwitch Database Management Protocol (OVSDB). These two components were implemented and validated...
This report proposes a new approach to determination of security complex metric. Such approach allows to obtain a quantitative assess based on network security recorded monitoring. Assessment of separate network host, which could be accessed from other networks, is conducted. Proposed metric considers a possibility of attack propagation within the network.
In order to effectively evaluate the impact on network situation under DDoS attacks, this paper proposes a hierarchical network threat situation assessment method based on D-S evidence theory for DDoS. It is divided into the basic data acquisition layer, the metric indexes extraction layer, the device threat assessment layer and the threat situation assessment layer. Firstly, we calculate indexes...
Traditional industrial systems have been designed to ne intrinsically safe by isolating their monitoring and control network. Considering the possible impact of a security attack, many plants today still choose to use this method to ensure maximum protection. At the same time, a separate trend observed in highly distributed applications like water management systems, is to centralize more local SCADA...
Service oriented systems are highly dynamic systems composed of several web services. One of the most important challenges in service oriented systems is to deliver acceptable quality of service. For this purpose, it is required to monitor quality of service along different activities of service oriented system. Existing research focuses on specific activities but do not take into account all the...
Service Level Agreement (SLA) is gaining more and more interest since the dynamic aspect of the cloud computing can adversely influence the guarantee of the Quality of Service (QoS). Proving an SLA violation is considered to be a complex operation to the cloud consumer. This task gets more and more difficult to the consumers as they use services from multiple providers, each with its own monitoring...
Network softwarization - through the adoption of Software Defined Networking (SDN), Network Functions Virtualization (NFV) and Cloud-Fog computing technologies - is deeply impacting telecom and ICT industries. This transformation, along with numerous advantages, brings also considerable challenges. In this paper, we discuss the main features of monitoring in the afore-mentioned landscape as well as...
Web software systems generally reside in highly volatile environments, their incoming traffic may be subject to sharp fluctuations from reasons that cannot always be captured or predicted. Cloud computing provides a solution to this problem by offering flexible resources, like containers, which can be quickly and easily scaled according to the current workload needs. Automating this process is a key...
Service-oriented architecture (SOA) is an architectural paradigm that advocates composition of loosely-coupled services in order to construct more complex applications. The agility and complexity of modern web services on one hand and the arbitrary interconnections among them on the other hand, make it difficult to maintain a sustainable trustworthiness in long-running SOA-based applications. Moreover,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.