2,697 Hits in 3.4 sec

Guest editorial: Special issue on data intensive cloud computing

Jinjun Chen, Surya Nepal
2015 Computing  
This special issue is focusing on this new strategic research area to address how to use cloud computing to process big data intensive applications. This special issue has selected five papers.  ...  The fourth paper is related to the emerging new applications on location selection, whereas the fifth paper is related to data security.  ...  Existing techniques rely on human experiences in analyzing and detecting anomalies and intrusions.  ... 
doi:10.1007/s00607-015-0449-6 fatcat:joy4imyl3zagrke6hanaeiaxpi

CWEA: Automated log retrieval for performance analysis of service-oriented scientific workflows

Elias el Khaldi Ahanach, Zhiming Zhao
2019 Zenodo  
In this thesis we aim to tackle this issue by propos- ing a tool that can automatically gather performance information (e.g., CPU, Memory and Network) for a given service-oriented workow.  ...  The proposed tool aims to integrate the dierent information, and provide methods for visual aid and evaluation of the system performance on dierent aspects.  ...  Anomaly detection for scientific workflow applications on networked clouds Here, Gaikwad et al. set up an online mechanism for detecting anomalies while executing scientific workflows on networked clouds  ... 
doi:10.5281/zenodo.3521575 fatcat:2gtpcnitvjhmrczy2w5fuugii4

Linking provenance with system logs: a context aware information integration and exploration framework for analyzing workflow execution

Elias el Khaldi Ahanach, Spiros Koulouzis, Zhiming Zhao
2019 Zenodo  
When executing scientific workflows in a distributed environment, anomalies of the workflow behavior are often caused by a mixture of different issues, e.g., careless design of the workflow logic, buggy  ...  anomalies.  ...  The work presented in [15] proposes an online mechanism for detecting anomalies while executing scientific workflows on networked clouds.  ... 
doi:10.5281/zenodo.3466765 fatcat:fp7irc3umnan3awmxigpteeiee

Detecting anomalous packets in network transfers: investigations using PCA, autoencoder and isolation forest in TCP

Mariam Kiran, Cong Wang, George Papadimitriou, Anirban Mandal, Ewa Deelman
2020 Machine Learning  
Network administrators routinely monitor and analyze network data for diagnosing and alleviating these, making decisions based on their experience.  ...  Large-scale scientific workflows rely heavily on high-performance file transfers. These transfers require strict quality parameters such as guaranteed bandwidth, no packet loss or data duplication.  ...  Acknowledgements This work was funded by DOE contract number #DE-SC0012636M, "Panorama 360: Performance Data Capture and Analysis for End-to-end Scientific Workflows".  ... 
doi:10.1007/s10994-020-05870-y fatcat:g7aznsejqra65cug64rkv7c6ai

Enabling rapid cloud-based analysis of thousands of human genomes via Butler [article]

Sergei Yakneen, Sebastian Waszak, Michael Gertz, Jan O. Korbel
2017 bioRxiv   pre-print
Butler operates equally well on public and academic clouds.  ...  By comprehensively collecting and analysing metrics and logs, performing anomaly detection as well as notification and cluster self-healing, Butler enables large-scale analytical processing of human genomes  ...  Acknowledgements The authors would like to acknowledge the EMBL-EBI Embassy Cloud, The Cancer Genome Collaboratory, Amazon Web Services (AWS), Google Compute Platform, and Microsoft Azure for providing  ... 
doi:10.1101/185736 fatcat:bdki7pxpv5d6hifil3mh7yrbpm

The COLLABS Level-3 Security Package for Secure Digital Supply Networks: Final version

Ricarda Weber, Martin Wimmer, Prabhakaran Kasinathan, COLLABS Contributors
2022 Zenodo  
D2.3 presents various security components supporting a secured digital supply network in collaborative manufacturing environments.  ...  the Anomaly Detection network and/or distributed system (MoE) Based on that a suited for collaborative / decentralised statistical and metadata experts) Aim at high detection rates and low error rates  ...  anomaly detection.  ... 
doi:10.5281/zenodo.6779272 fatcat:of7x46e4e5cmjmgkgahjkecjqe

DDS: A deadlock detection-based scheduling algorithm for workflow computations in HPC systems with storage constraints

Yang Wang, Paul Lu
2013 Parallel Computing  
Whenever deadlock or a performance anomaly is detected, some selected in-progress workflow instances are required to be rollbacked to release storage for other blocked jobs.  ...  instance acting on its own input data.  ...  Another example can be found in cloud-based scientific computing systems where the storage and other resources are typically provided as a service based on a principle of ''pay-as-you-go'' [11] [12] [  ... 
doi:10.1016/j.parco.2013.04.006 fatcat:hbsd5fjr2rcfxkr5e3juhktemq

FamilyGuard: A Security Architecture for Anomaly Detection in Home Networks

Pedro H. A. D. de Melo, Rodrigo Sanches Miani, Pedro Frosi Rosa
2022 Sensors  
An anomaly detection module is also developed by using machine learning through one-class classifiers based on the network flow.  ...  This work proposes the FamilyGuard architecture to add a new layer of security and simplify management of the home environment by detecting network traffic anomalies.  ...  Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s22082895 pmid:35458880 pmcid:PMC9032943 fatcat:ol3qw3z64vhxzcplgwbbnj7to4

Advances in Methods and Techniques for Processing Streaming Big Data in Datacentre Clouds

Rajiv Ranjan, Lizhe Wang, Albert Y. Zomaya, Jie Tao, Prem Prakash Jayaraman, Dimitrios Georgakopoulos
2016 IEEE Transactions on Emerging Topics in Computing  
ACKNOWLEDGEMENT We would like to thank the authors and all the reviewers for their hard work in helping us put together this special issue.  ...  The paper titled ''Non-intrusive anomaly detection with streaming performance metrics and logs for DevOps in public clouds: A Case Study in AWS'' by Sun et. al. address the challenges anomaly detection  ...  In this paper, for tenants and DevOps practitioners in public clouds, the authors propose an anomaly detection approach, which is designed for public cloud users to deal with the case that the impacts  ... 
doi:10.1109/tetc.2016.2524219 fatcat:yhmcyaksovgvblxc6d3ggpf7sm

Application of Deep Learning Approach for the Classification of Buildings' Degradation State in a BIM Methodology

Fernanda Rodrigues, Victoria Cotella, Hugo Rodrigues, Eugénio Rocha, Felipe Freitas, Raquel Matos
2022 Applied Sciences  
The training phase has been executed providing examples of images with the anomalies to be detected.  ...  Currently, there is extensive research focused on automatic strategies for the segmentation and classification of 3D point clouds, which can accelerate the study of a landmark and integrate it with heterogeneous  ...  The semantic understanding process is based on the image collection (image databases) for construction anomalies' detection.  ... 
doi:10.3390/app12157403 fatcat:eucphfcnzja2fajxyueqaboqwm

READ-IoT: Reliable Anomalies and Events Detection Framework for the Internet of Things

Aymen Yahyaoui, Takoua Abdellatif, Sami Yangui, Rabah Attia
2021 IEEE Access  
The applications are often critical (e.g. physical intrusion detection, fire fighting) and latency-sensitive. On the one hand, such applications rely on specific protocols (e.g.  ...  This paper introduces a Reliable Event and Anomaly Detection Framework for the Internet of Things (READ-IoT for short).  ...  Drira, the Head of SARA research team and at LAAS-CNRS, for his support.  ... 
doi:10.1109/access.2021.3056149 fatcat:bshbteukqrdijltlnm3un7326u

Editorial: ACM/Springer Mobile Networks & Applications - Special Issue on Mobile Computing and Software Engineering

Honghao Gao, Yuyu Yin
2019 Journal on spesial topics in mobile networks and applications  
Imrich Chlamtac, for his supportive guidance during the entire process. We also thank you for the support from the National Natural Science Foundation of China (NSFC) under Grant No. 61902236.  ...  Acknowledgements The guest editors are thankful to our reviewers for their effort in reviewing the manuscripts. We also thank the Edit-in-Chief, Dr.  ...  The second article titled A Novel Approach to Scheduling Workflows Upon Cloud Resources with Fluctuating Performance considers that scientific computing processes to be supported by decentralized cloud  ... 
doi:10.1007/s11036-019-01451-z fatcat:ahdxol73nnbxdkuujclt75i3be

Toward Prioritization of Data Flows for Scientific Workflows Using Virtual Software Defined Exchanges

Anirban Mandal, Paul Ruth, Ilya Baldin, Rafael Ferreira Da Silva, Ewa Deelman
2017 2017 IEEE 13th International Conference on e-Science (e-Science)  
In this work, we present an end-to-end framework for autonomic adaptation for scientific workflows on networked cloud systems, which leverages novel network provisioning technologies.  ...  Recent advances in cloud systems, on-demand circuits and software-defined networking have created new opportunities to enable complex, data-intensive scientific applications to run on dynamic networked  ...  Overton, and Erola Pairo-Castineira for their valuable help.  ... 
doi:10.1109/escience.2017.92 dblp:conf/eScience/MandalRBSD17 fatcat:7khyvyfixbhqlg3szcdt2bqaym

Table of Contents

2018 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion)  
Media Data on the Cloud Unsupervised Anomaly Event Detection for Cloud Monitoring Using Online Arima Richard O.  ...  5th International Workshop on Smart City Clouds: Technologies, Systems, and Applications (SCCTSA 2018) Data Coloring for Securing Open-Data in Cloud Computing Environment Mary-Jane Sule (University of  ... 
doi:10.1109/ucc-companion.2018.00004 fatcat:hyhnf3mjorfylo2j7lfr4dlcha

Review on Fault Tolerance Techniques in Cloud Computing

Zeeshan Amin, Harshpreet Singh, Nisha Sethi
2015 International Journal of Computer Applications  
The objective of this paper is to propose an algorithm using Artificial Neural Network for fault detection which will overcome the gaps of previously implemented algorithms and provide a fault tolerant  ...  Various fault detection methods and architectural models have been proposed to increase fault tolerance ability of cloud.  ...  models for facilitating proactive fault tolerance by predicting task failures for International Journal of Computer Applications (0975 -8887) Volume 116 -No. 18, April 2015 scientific workflow applications  ... 
doi:10.5120/20435-2768 fatcat:f6vw5d3rjzdc5dc46phvjiupvq
« Previous Showing results 1 — 15 out of 2,697 results