The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to the statistics, there is low resource utilization and high energy consumption in traditional servers. To reduce the cost, more and more companies begin to build virtual servers. Sever virtualization implements the mapping from virtual resources to physical resources and deal with resource contention among all VMs. Because of complexity of virtualized server systems, it is necessary to...
Extended finite state machines (EFSM) models are currently widely utilized to model embedded and control systems. Thus, there are recent upsurge studies to generate test data from EFSM models (EFSM-based testing). Applying metaheuristic search-based techniques (MHSBT) for automating the process of test case generation from EFSM models has become a proliferated field of interest during the last decade...
Software testing is an essential activity in software development process that has been widely used as a means of achieving software reliability and quality. Software practitioners rely on test coverage to decide whether software under test has achieved an acceptable level of reliability and can be released. The researchers in the field of software testing focus on defining meaningful test coverage...
Traditional workload labels such as "archival" and "HPC" are poorly understood and inconsistently applied. As usage of systems has evolved, the language to describe this usage has stagnated. To better understand how workload type translates into system design requirements, we use a combination of longitudinal analysis and statistical feature extraction to categorize workload traces...
Studying ad hoc routing protocols goes through three fundamental steps, namely: simulation, performance analysis and finally results interpretation. Undoubtedly, NS2 is widely used in ad hoc networks simulation. However, the analysis of generated simulation trace-files often requires the use of different software tools and programing languages. This makes the post simulation phase difficult and inefficient...
Online media provides opportunities for marketers through which they can deliver effective brand messages to a wide range of audiences at scale. Advertising technology platforms enable advertisers to reach their target audience by delivering ad impressions to online users in real time. In order to identify the best marketing message for a user and to purchase impressions at the right price, we rely...
Cloud Computing provides various types of services to the users, such as IaaS, PaaS, and SaaS. In IaaS cloud service, virtualization is one of the major services which helps the user to request for multiple services with the lowest price. The different resource utilization is caused by various mappings between virtual machines (VMs) and physical machines (PMs). Today for cloud service provider the...
The Erdos-Renyi model-based random network graphs are characteristic of having a low clustering coefficient (a measure of the probability for a link to exist between any two neighbors of a node) and low variation in node degrees, and hence do not match closely to graphs abstracting real-world networks. Our hypothesis is that the clustering coefficient of the nodes could increase if preference is given...
In this paper we apply survivability and software rejuvenation modeling to evaluate alternative software architectures. We analyze failure history in two large industrial projects and propose a unified failure model to be used for the assessment of system survivability at the software architecture phase. Our goal is to assess the mean time to repair a system, conditioned that it starts from a failure...
Organizations tend to virtualize their business on the cloud due to information globalization. From business process complexity perspective, one of the technologies which most significantly support this automation is Workflow Management Systems. They support definition, synchronization and execution of business process activities. Having a tool to measure the quality of these systems on the cloud...
Based on the state of the art of process mining, we can conclude that quality characteristics (failure rate metrics or loops) are poorly represented or absent in most predictive models that can be found in the literature. The main goal of this present research work is to analyze how to learn prediction model defining failure as response variable. A model of this type can be used for active real-time-controlling...
The high cost of mixed-signal circuit testing has sparked a lot of interest for developing alternative low-cost techniques. Although it is rather straightforward to evaluate an alternative test technique in terms of test cost reduction, proving the equivalence between an alternative and the standard test technique in terms of test metrics, before actually deploying the alternative test technique in...
This paper presents a framework for building mechanisms for automatic analysis of introductory programming exercises. This framework consists of a structure that provides the combination of different types of analysis mechanisms, providing the configuration of various families of analyzers. One of these analyzers is based on a tree inclusion mechanism that verifies whether a particular structure (i...
In this paper, we describe an emergent tool called DAWN (short for "Distributed Analytics, Workflows and Numeric") which is a model for simulating, analyzing and optimizing system architectures for executing arbitrary data processing pipelines. As an example, we will apply DAWN to the investigation of a real-life Big Data use case in climate science: the evaluation of simulated rainfall...
Preventing viruses from spreading in networks is a hot topic. Existing works designed immune strategies for static networks, which become invalid for temporal networks due to their dynamic characteristics and community structure. In this paper, taking into consideration of the evolutionary communities, we propose an evolutionary virus immune strategy for temporal networks. First, we define a new metric,...
We introduce a novel evaluation methodology to establish psychometrically validated measures to objectively evaluate socially capable robots. Our methodology involves first creating a digital computer generated face model designed to replicate the facial expression space of the robot with the highest accuracy, and second, using this model to render test sequences, which are in turn analyzed with independent...
An algorithm for predicting the quality of video received by a client from a shared server is presented. A statistical model for this client-server system, in the presence of other clients, is proposed. Our contribution is that we explicitly account for the interfering clients, namely the load. Once the load on the system is understood, accurate client-server predictions are possible with an accuracy...
Recent developments in the field of parallel and distributed computing have led to a proliferation in solving large and computationally intensive mathematical, science, or engineering problems, which consist of several parallelizable parts and several non-parallelizable (sequential) parts. However, such computational environments are often prone to unpredictable variations due to problem, algorithm,...
In this paper, the outage statistics are studied for non-isotropic Beckmann fading channel model. Non-isotropic scattering generally results in an asymmetrical Doppler power spectral density (PSD). In this context, an expression for the outage probability (OP) (or equivalently the cumulative distribution function (CDF)) of the fading envelope is first derived. Then, the probability density function...
This paper analyzes how order batching policies impact on the bullwhip effect over a multi-echelon distribution supply chain facing cyclic demand. As a demand cycle is repeated over the time planning horizon, a wrapping around operator is considered and based on this a single cycle is required to represent the real problem. The problem consists on determining the optimal reordering plan, which minimizes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.