Filters








39 Hits in 4.5 sec

Automatic Stress Testing of Multi-tier Systems by Dynamic Bottleneck Switch Generation [chapter]

Giuliano Casale, Amir Kalbasi, Diwakar Krishnamurthy, Jerry Rolia
2009 Lecture Notes in Computer Science  
A case study using a three-tier TPC-W testbed shows that our method is able to control and predict burstiness for session service demands.  ...  The performance of multi-tier systems is known to be significantly degraded by workloads that place bursty service demands on system resources.  ...  We thank Stephen Dawson for helpful feedback during the preparation of this work.  ... 
doi:10.1007/978-3-642-10445-9_20 fatcat:3uzbo4uodjc4pj646jwzdn7zse

BURN: Enabling Workload Burstiness in Customized Service Benchmarks

Giuliano Casale, Amir Kalbasi, Diwakar Krishnamurthy, Jerry Rolia
2012 IEEE Transactions on Software Engineering  
A case study based on a three-tier application testbed shows that our method is able to control and predict burstiness for session service demands at a fine-grained scale.  ...  Furthermore, experiments demonstrate that for any given request mix our approach can expose latency and throughput degradations not found with non-bursty workloads having the same request mix.  ...  Progressively, as the backlog is flushed response times display a reducing trend.  ... 
doi:10.1109/tse.2011.58 fatcat:oz7677ymwzfb3pfgexgvxddbiy

Internet of Things: An Overview [article]

Farzad Khodadadi, Amir Vahid Dastjerdi, Rajkumar Buyya
2017 arXiv   pre-print
Through this chapter, we aim to highlight researches in topics including proposed architectures, security and privacy, network communication means and protocols, and eventually conclude by providing future  ...  As technology proceeds and the number of smart devices continues to grow substantially, need for ubiquitous context-aware platforms that support interconnected, heterogeneous, and distributed network of  ...  Society level where IoT mainly influences and improves government services by reducing cost and increasing government transparency and accountability, 2) Industry level in which manufacturing, emergency  ... 
arXiv:1703.06409v1 fatcat:cgivogat35cb7n6h3z2onqrmcu

An Empirical Study of Denial of Service Mitigation Techniques

Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Romanov, Avital Yachin
2008 2008 Symposium on Reliable Distributed Systems  
This method is simple and fast. For example, a client may be allowed to send 10 requests every second.  ...  The server processes each request, and dynamically forms a response, while consuming CPU power. Every UDP request or response fits into a single UDP packet.  ... 
doi:10.1109/srds.2008.27 dblp:conf/srds/BadishiHKRY08 fatcat:xmbrjsuelbhjxk6xy3ixwafnge

Big Data Analytics-Enhanced Cloud Computing: Challenges, Architectural Elements, and Future Directions

Rajkumar Buyya, Kotagiri Ramamohanarao, Chris Leckie, Rodrigo N. Calheiros, Amir Vahid Dastjerdi, Steve Versteeg
2015 2015 IEEE 21st International Conference on Parallel and Distributed Systems (ICPADS)  
We discuss diverse applications of Big Data analytics in clouds, open issues for enhancing cloud operations via Big Data analytics, and architecture for anomaly detection and prevention in clouds along  ...  volume, velocity, and variety that are addressed by Big Data approaches.  ...  As our proposed algorithms are based on learning techniques, these methods are likely to improve their quality over the time by observing the performance of the system.  ... 
doi:10.1109/icpads.2015.18 dblp:conf/icpads/BuyyaRLCDV15 fatcat:f2v4adygojdgtkgjqdp6rv5e6i

Frequency spreading equalization in multicarrier massive MIMO

Amir Aminjavaheri, Arman Farhang, Nicola Marchetti, Linda E. Doyle, Behrouz Farhang-Boroujeny
2015 2015 IEEE International Conference on Communication Workshop (ICCW)  
Application of filter bank multicarrier (FBMC) as an effective method for signaling over massive MIMO channels has been recently proposed.  ...  ratio (PAPR); and (iv) reduced latency.  ...  filter and hence reducing the latency that is imposed by the transmit and receive filter banks.  ... 
doi:10.1109/iccw.2015.7247356 dblp:conf/icc/AminjavaheriFMD15 fatcat:clokk5k5jjc5bcblmkxwk2gz5q

Stealth-MITM DoS Attacks on Secure Channels [article]

Amir Herzberg, Haya Shulman
2009 arXiv   pre-print
Our attacks hold also against the suggested proposals for improvements to the anti-replay mechanism of IPsec.  ...  Throughout the paper we denote by RTT (Round Trip Time) the time it takes to transmit a segment from a client into the network and to receive an acknowledgment (ACK) for it in response.  ...  These segments are passed by the gateway to the client (since they are authentic and not a replay), and trigger three duplicate ACKs for i th segment at the receiver.  ... 
arXiv:0910.3511v1 fatcat:mzflhhawrvgjbkktomwwwgym6i

Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges [article]

Muhammad Usama, Junaid Qadir, Aunn Raza, Hunain Arif, Kok-Lim Alvin Yau, Yehia Elkhatib, Amir Hussain, Ala Al-Fuqaha
2017 arXiv   pre-print
Through this paper, we advance the state of knowledge by carefully synthesizing the insights from these survey papers while also providing contemporary coverage of recent advances.  ...  Recently there has been a rising trend of employing unsupervised machine learning using unstructured raw network data to improve network performance and provide services such as traffic engineering, anomaly  ...  Then, [70] highlighted that using K-means and this method for traffic classification can improve accuracy by 10% to achieve an overall 90% accuracy.  ... 
arXiv:1709.06599v1 fatcat:llcg6gxgpjahha6bkhsitglrsm

Super-hot (T > 30 MK) Thermal Plasma in Solar Flares [article]

Amir Caspi
2011 arXiv   pre-print
RHESSI observations show that "super-hot" (>30 MK) plasma temperatures are achieved almost exclusively by intense, GOES X-class flares and appear to be strictly associated with coronal magnetic field strengths  ...  It exists with high density even during the pre-impulsive phase, which is dominated by coronal non-thermal emission with negligible footpoints, suggesting that, rather than the traditional picture of chromospheric  ...  This is compounded by the PSF subtraction method, which tends to overestimate r eff , since For both reasons, V sph > V ell , so the automated method yields larger calculated volumes, as can be seen in  ... 
arXiv:1105.1889v2 fatcat:dbdta2avengrfaco4l6idj2v74

Software-Defined Cloud Computing: Architectural Elements and Open Challenges [article]

Rajkumar Buyya, Rodrigo N. Calheiros, Jungmin Son, Amir Vahid Dastjerdi, Young Yoon
2015 arXiv   pre-print
We refer to Software-Defined Cloud Computing, or simply Software-Defined Clouds (SDC), as an approach for automating the process of optimal cloud configuration by extending virtualization concept to all  ...  In this paper, we present an architecture for SDCs on data centers with emphasis on mobile cloud applications.  ...  For each request, we measure response time to verify whether we can improve the QoS for the priority requests. We consider three different network congestion levels: low, medium and high.  ... 
arXiv:1408.6891v2 fatcat:uao4cbgw4nblhbfjbaaty5kuai

iFogSim: A Toolkit for Modeling and Simulation of Resource Management Techniques in Internet of Things, Edge and Fog Computing Environments [article]

Harshit Gupta, Amir Vahid Dastjerdi, Soumya K. Ghosh, Rajkumar Buyya
2016 arXiv   pre-print
To realize the full potential of Fog and IoT paradigms for real-time analytics, several challenges need to be addressed.  ...  However, there are applications such as health monitoring and emergency response that require low latency, and delay caused by transferring data to the cloud and then back to the application can seriously  ...  It is also partially supported by the ARC Future Fellowship.  ... 
arXiv:1606.02007v1 fatcat:c2tio3bta5gjlowllov2x6gzji

Advances in Meta-Heuristic Optimization Algorithms in Big Data Text Clustering

Laith Abualigah, Amir H. Gandomi, Mohamed Abd Elaziz, Husam Al Hamad, Mahmoud Omari, Mohammad Alshinwan, Ahmad M. Khasawneh
2021 Electronics  
This paper reviews all of the relevant literature on meta-heuristic-based text clustering applications, including many variants, such as basic, modified, hybridized, and multi-objective methods.  ...  These Artificial Intelligence (AI) algorithms are recognized as promising swarm intelligence methods due to their successful ability to solve machine learning problems, especially text clustering problems  ...  big data and text clustering by comparing them analytically.  ... 
doi:10.3390/electronics10020101 fatcat:fb3sopje4fegphs5b6g673ipqa

Unsupervised Machine Learning for Networking: Techniques, Applications and Research Challenges

Muhammad Usama, Junaid Qadir, Aunn Raza, Hunain Arif, Kok-lim Alvin Yau, Yehia Elkhatib, Amir Hussain, Ala Al-Fuqaha
2019 IEEE Access  
In addition, unsupervised learning can unconstrain us from the need for labeled data and manual handcrafted feature engineering, thereby facilitating flexible, general, and automated methods of machine  ...  Recently, there has been a rising trend of employing unsupervised machine learning using unstructured raw network data to improve network performance and provide services, such as traffic engineering,  ...  Then, [78] highlighted that using K-means and this method for traffic classification can improve accuracy by 10% to achieve an overall 90% accuracy.  ... 
doi:10.1109/access.2019.2916648 fatcat:xutxh3neynh4bgcsmugxsclkna

Software-Defined Cloud Computing: Architectural elements and open challenges

Rajkumar Buyya, Rodrigo N. Calheiros, Jungmin Son, Amir Vahid Dastjerdi, Young Yoon
2014 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI)  
We refer to Software-Defined Cloud Computing, or simply Software-Defined Clouds (SDC), as an approach for automating the process of optimal cloud configuration by extending virtualization concept to all  ...  In this paper, we present an architecture for SDCs on data centers with emphasis on mobile cloud applications.  ...  For each request, we measure response time to verify whether we can improve the QoS for the priority requests. We consider three different network congestion levels: low, medium and high.  ... 
doi:10.1109/icacci.2014.6968661 dblp:conf/icacci/BuyyaCSDY14 fatcat:5wdjvped4rb43ihv26id2zb6bi

A network architecture for heterogeneous mobile computing

E.A. Brewer, R.H. Katz, Y. Chawathe, S.D. Gribble, T. Hodes, Giao Nguyen, M. Stemm, T. Henderson, E. Amir, H. Balakrishnan, A. Fox, V.N. Padmanabhan (+1 others)
1998 IEEE personal communications  
such agents for simplicity, ease of fault recovery, and scalability.  ...  The architecture enables seamless roaming in a single logical overlay network composed of many heterogeneous (mostly wireless) physical networks, and provides significantly better TCP performance for these  ...  They also provide breakdowns of the performance numbers and analytical models for each method.  ... 
doi:10.1109/98.729719 fatcat:rfuxdz7w7bhtnhag7dgzcz7keq
« Previous Showing results 1 — 15 out of 39 results