The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Provisioning of high I/O capabilities for high-end HPC architectures is generally considered a challenge. A good understanding of the characteristics of the utilisation of modern I/O systems can help address the increasing performance gap between I/O and computation. In this paper we present results from an analysis of server-side performance counters that had been collected for multiple years on...
In this paper we introduce a novel, dense, system-on-chip many-core Lenovo NeXtScale System® server based on the Cavium THUNDERX® ARMv8 processor that was designed for performance, energy efficiency and programmability. THUNDERX processor was designed to scale up to 96 cores in a cache coherent, shared memory architecture. Furthermore, this hardware system has a power interface board (PIB) that measures...
Typosquatting becomes a speculative and serious phenomenon for both Internet users and brand owners of popular websites. Typosquatters register similar domain names of popular websites to profit from displaying advertisements, redirecting traffic to third-party pages, deploying phishing sites, or serving malware. Thus, much work have been done on measuring typosquatting in distribution, monetization...
Eye tracking metrics may provide unobtrusive measures of cognitive states such as workload and fatigue and can serve as useful inputs into future human computer interface technologies. To further explore the usefulness of eye tracking for the estimation of cognitive state, the current experiment evaluated saccade, fixation, and pupil-based measures to identify which metrics reliably indexed cognitive...
Autonomous platforms are confronted by a diversity of challenges in unstructured environments, which make monitoring performance a non-trivial task. Some of these environments are so complex that they preclude persistent, nearby operator oversight. This absence of oversight motivates the need for an online monitoring system, specifically for robots operating in difficult environments. We develop a...
This paper presents new metrics to evaluate the reliability monitoring rules of a large-scale big data service. Our target service uses manually-tuned, service-level reliability monitoring rules. Using the measurement data, we identify two key technical challenges in operating our target monitoring system. In order to improve the operational efficiency, we characterize how those rules were manually...
Ensuring the correct presentation and execution of web sites is a major concern for system developers and administrators. Unfortunately, only end users can determine which resources are available and working properly. For example, some internal or external addresses might be unavailable or unreachable for specific clients, while seemingly available resources, like JavaScript, might run with errors...
The maturity of hardware virtualization has motivated Communication Service Providers (CSPs) to apply thisparadigm to network services. Virtual Network Functions (VNFs)result from this trend and raise new dependability challengesrelated to network softwarisation that are still not thoroughlyexplored. This paper describes a new approach to detect ServiceLevel Agreements (SLAs) violations and preliminary...
In this paper, we present EMaaS, for Event Management as a Service, a multi-tenant cloud service to outsource the management of monitoring events in the cloud. Furthermore, we provide a secure multi-party computation (SMC) protocol for complex monitoring event processing. The protocol is integrated to EMaaS and uses some properties of encryption schemes. Finally, we evaluate the protocol security,...
Wireless communications and mobile web in the domain of mobile commerce (mcommerce) are growing and gaining significant momentum throughout the internet. Researchers all over the world are actively studying the standardization to understand the factors that affects the acceptance of upcoming innovations and development in mcommerce. The digitalization and its advancements have ensured that, until...
Monitoring of infrastructural resources against a huge number of virtual machines in clouds is a challenging task to system administrators. System management tools are used to collect and provide the utilization of a variety of performance counters of each virtual machine. Such dispersed views cannot reveal the actual performance behavior of virtual machines. To this purpose, a monitoring framework...
The recent emerging concept in the networking world is known as SDN (Software-Defined Network). SDN architecture introduced the new methods of network management and configuration. It makes underlying networking devices as simply just packet forwarding units and leaving the control logic on centralized software program to dictate the entire network behavior. In logically centralized SDN architecture...
When Business support systems (BSS) suffer poor performance, the system administrator has to spot the problem of BSS as soon as possible. The monitoring system is a great help to quickly gain insight of the system from all sides. By the monitoring system, the administrator can evaluate various metrics on the different fields in one single arranged page and understands the whole picture of current...
Allocating resources to virtualized network functions and services to meet service level agreements is a challenging task for NFV management and orchestration systems. This becomes even more challenging when agile development methodologies, like DevOps, are applied. In such scenarios, management and orchestration systems are continuously facing new versions of functions and services which makes it...
Cloud logs offer unprecedented opportunities to understand user behaviors in cloud applications and advance practices in engineering, user experience, and business. Currently, different stakeholders with relevant role-based questions use different tools for log analysis, but they share the goal of improving the same application and need to share log analyses to make decisions about application improvements...
nowadays, change is an important aspect of the world. Complexity and change in requirements and environments bring us to Autonomic Systems as a solution. Like any other kind of software system, better implementation of a system needs a proper evaluation method for system implementation. To evaluate a Self-Adaptive system, appropriate quality factors are needed for evaluation. This research tries to...
MOOCs (Massive Open Online Courses) have changed the approach to education forever. With all the benefits that they brought they also revealed a lot of problems in the brick-and-mortar universities. It turned out that the courses in the latter were often outdated, irrelevant or simply not as good as the online ones. MOOCs set up the natural competition between the educational institutions. Thus there...
Continuous Delivery is an agile software development practice in which developers frequently integrate changes into the main development line and produce releases of their software. An automated Continuous Integration infrastructure builds and tests these changes. Claimed advantages of CD include early discovery of (integration) errors, reduced cycle time, and better adoption of coding standards and...
Cyber culture of the smart university creates the social significance of technological leadership. Internet and cyberspace change all the processes of life of each person. It is necessary to create a new market-oriented model of scientific and educational processes within the Smart Cyber University (SCU). The concept integrates the achievements of classical universities, technological cyber culture,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.