The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To improve the quality of software system, there is a need to eliminate or reduce the rework. Software reuse is one of the solution proposed for it. Software reuse involves reuse of existing software modules, also called reusable software components, while creating new software systems. In the context of software reuse, it is important to evaluate the performance of reusable software components as...
Much work has been done to improve the performance of video streaming over mobile data networks. The widespread adoption of HTTP/TCP for video streaming further complicates the problem as TCP's own dynamics add even more fluctuations to the already unpredictable network bandwidth. Not surprisingly, none of the existing video bit-rate selection algorithms can achieve consistent or predictable streaming...
Dynamic resource scaling is a key property of cloud computing. Users can acquire or release required capacity for their applications on-the-fly. The most widely used and practical approach for dynamic scaling based on predefined policies (rules). For example, IaaS providers such as RightScale asks application owners to manually set the scaling rules. This task assumes, that the user has an expertise...
Monitoring is vital in IT environments, because it helps administrators to keep a close eye on their infrastructure and services. With the emerging of the Cloud Computing (CC), things become more critical. Indeed, CC aims to provide unlimited ΓΓ resources as pay-per-use services and due to its distributed and elastic nature, monitoring solutions need to be also distributed, scalable, high performance...
Hybrid Wireless Mesh Networks provide improved connectivity and reliability over traditional wireless networks. However due to rapidly changing traffic patterns, such networks are more likely to experience congestion which leads to data loss. Inability to differentiate between congested links and select best possible paths dynamically can be very expensive in a rapidly changing network topology. This...
The concept of communication and information exchange has been revolutionized after the growth of computers. Development in computers' world, especially the Internet has made network performance a burning issue. Now we are in the scenario in which everyone is leading to the best performance. Now the things get changed when the UMTS (Universal Mobile Telecommunication System) comes into existence....
Keystroke Dynamics can be used to strengthen the user-name/password authentication system because it will not only consider the value of the password, but also how the password was typed. Keystroke Dynamics systems so far only accept passwords that are typed completely correct, i.e. without any corrections during the typing. The reason for this is that corrections during the typing result in missing...
Energy consumption optimization of HPC applications inherently requires measurements for reference and comparison. However, most of today's systems lack the necessary hardware support for power or energy measurements. Furthermore, in-band data availability is preferred for specific optimization techniques such as auto-tuning. For this reason, we present in-band energy consumption models for the IBM...
Online social networks have become a key communication medium for millions of Internet users. Building on this success a new class of social applications have emerged that use online social networks as a platform to access an established community of users. While some social applications act as a forum for users to interact, an emerging class of participatory social applications creates value by using...
Distributed computing system is considered as a fundamental architecture to extend resources such as computation speed, storage capacity, and network bandwidth, which are limited for a single processor. Emerging big data processing techniques like Hadoop take advantages of distributed servers to accomplish scalable parallel computations. Large-scale processing jobs can run on different servers or...
In the present era, Mobile Cloud Computing (MCC) is an emerging cloud service-model following the trend to extend the cloud to the edge of social networks in mobile environment, services offered are dynamic and scalable in nature. It includes numerous mobile devices of different configuration and sizes which are closely associated with users. Social Networking has become very popular during the past...
Performance modeling of embedded systems is used to explore the system-level design-space and compare a wide range of possible solutions with respect to their performance gain. Calibration and validation of the developed performance models help ensure that the performance predictions of these models are accurate. This paper presents formal definitions of the errors associated with the calibration...
How to map IP cores onto NoC architectures is a significant issue (application mapping) in multi-core system design. Many mapping algorithms which aim at optimizing cost metrics(e.g. energy consumption) in the mapping procedure are proposed. Some of those algorithms consider satisfying performance metrics (e.g. latency) constraints. This paper analyses the mechanism leading to performance decreases...
We proposed a method for precisely monitoring the impact of WiFi networks on Zigbee networks. We utilized the characteristic of Zigbee that when working in lower transmit power, the interference will be reflected on the packet payload as corrupted bytes. Comparing with network analyzer, our system is easy to deploy and able to yield reasonable result. Comparing with collecting the metadata from the...
Recent research results in cloud community found that cloud users increasingly force providers to shift from fixed bundle instance types(e.g. Amazon instances) to flexible bundles and shrinked billing cycles. This means that cloud applications can dynamically provision the used amount of resources in a more fine-grained fashion. This observation calls for approaches which are able to automatically...
In this work, we address problem determination in virtualized clouds. We show that high dynamism, resource sharing, frequent reconfiguration, high propensity to faults and automated management introduce significant new challenges towards fault diagnosis in clouds. Towards this, we propose CloudPD, a fault management framework for clouds. CloudPD leverages (i) a canonical representation of the operating...
Fowler and Beck defined 22 Code Bad Smells. These smells are useful indicators of code that may need to be refactored. A range of tools have been developed that measure smells in Java code. We aim to compare the results of using two smell measurement tools (DECOR which is embedded in the Ptidej tool and Stench Blossom) on the same Java code (ArgoUML). This comparison identifies the code each tool...
Performance problems pose a significant risk to software vendors. If left undetected, they can lead to lost customers, increased operational costs, and damaged reputation. Despite all efforts, software engineers cannot fully prevent performance problems being introduced into an application. Detecting and resolving such problems as early as possible with minimal effort is still an open challenge in...
Effectiveness and quality are fundamental characteristics for the development of a product. In order to support them, one needs to ensure that an application optimization level is at its best. The most widely used metric for evaluating an application performance is the CPI (Cycles Per Instruction), i.e., the number of clock cycles that takes place when an instruction is executed. We have developed...
The coarse-grained reconfigurable architecture (CGRA) is a promising platform that provides both high performance and high power-efficiency. The compute-intensive portions of an application (e.g. loops) are often mapped onto CGRA for acceleration. To optimize the mapping of loop nests to CGRA, this paper makes two contributions: i) Establishing a precise CGRA performance model and formulating the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.