A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Guest editorial: Special issue on data intensive cloud computing
2015
Computing
This special issue is focusing on this new strategic research area to address how to use cloud computing to process big data intensive applications. This special issue has selected five papers. ...
The fourth paper is related to the emerging new applications on location selection, whereas the fifth paper is related to data security. ...
Existing techniques rely on human experiences in analyzing and detecting anomalies and intrusions. ...
doi:10.1007/s00607-015-0449-6
fatcat:joy4imyl3zagrke6hanaeiaxpi
CWEA: Automated log retrieval for performance analysis of service-oriented scientific workflows
2019
Zenodo
In this thesis we aim to tackle this issue by propos- ing a tool that can automatically gather performance information (e.g., CPU, Memory and Network) for a given service-oriented workow. ...
The proposed tool aims to integrate the dierent information, and provide methods for visual aid and evaluation of the system performance on dierent aspects. ...
Anomaly detection for scientific workflow applications on networked clouds Here, Gaikwad et al. set up an online mechanism for detecting anomalies while executing scientific workflows on networked clouds ...
doi:10.5281/zenodo.3521575
fatcat:2gtpcnitvjhmrczy2w5fuugii4
Linking provenance with system logs: a context aware information integration and exploration framework for analyzing workflow execution
2019
Zenodo
When executing scientific workflows in a distributed environment, anomalies of the workflow behavior are often caused by a mixture of different issues, e.g., careless design of the workflow logic, buggy ...
anomalies. ...
The work presented in [15] proposes an online mechanism for detecting anomalies while executing scientific workflows on networked clouds. ...
doi:10.5281/zenodo.3466765
fatcat:fp7irc3umnan3awmxigpteeiee
Detecting anomalous packets in network transfers: investigations using PCA, autoencoder and isolation forest in TCP
2020
Machine Learning
Network administrators routinely monitor and analyze network data for diagnosing and alleviating these, making decisions based on their experience. ...
Large-scale scientific workflows rely heavily on high-performance file transfers. These transfers require strict quality parameters such as guaranteed bandwidth, no packet loss or data duplication. ...
Acknowledgements This work was funded by DOE contract number #DE-SC0012636M, "Panorama 360: Performance Data Capture and Analysis for End-to-end Scientific Workflows". ...
doi:10.1007/s10994-020-05870-y
fatcat:g7aznsejqra65cug64rkv7c6ai
Enabling rapid cloud-based analysis of thousands of human genomes via Butler
[article]
2017
bioRxiv
pre-print
Butler operates equally well on public and academic clouds. ...
By comprehensively collecting and analysing metrics and logs, performing anomaly detection as well as notification and cluster self-healing, Butler enables large-scale analytical processing of human genomes ...
Acknowledgements The authors would like to acknowledge the EMBL-EBI Embassy Cloud, The Cancer Genome Collaboratory, Amazon Web Services (AWS), Google Compute Platform, and Microsoft Azure for providing ...
doi:10.1101/185736
fatcat:bdki7pxpv5d6hifil3mh7yrbpm
The COLLABS Level-3 Security Package for Secure Digital Supply Networks: Final version
2022
Zenodo
D2.3 presents various security components supporting a secured digital supply network in collaborative manufacturing environments. ...
the Anomaly Detection network and/or distributed system (MoE) Based on that a suited for collaborative / decentralised statistical and metadata experts) Aim at high detection rates and low error rates ...
anomaly detection. ...
doi:10.5281/zenodo.6779272
fatcat:of7x46e4e5cmjmgkgahjkecjqe
DDS: A deadlock detection-based scheduling algorithm for workflow computations in HPC systems with storage constraints
2013
Parallel Computing
Whenever deadlock or a performance anomaly is detected, some selected in-progress workflow instances are required to be rollbacked to release storage for other blocked jobs. ...
instance acting on its own input data. ...
Another example can be found in cloud-based scientific computing systems where the storage and other resources are typically provided as a service based on a principle of ''pay-as-you-go'' [11] [12] [ ...
doi:10.1016/j.parco.2013.04.006
fatcat:hbsd5fjr2rcfxkr5e3juhktemq
FamilyGuard: A Security Architecture for Anomaly Detection in Home Networks
2022
Sensors
An anomaly detection module is also developed by using machine learning through one-class classifiers based on the network flow. ...
This work proposes the FamilyGuard architecture to add a new layer of security and simplify management of the home environment by detecting network traffic anomalies. ...
Institutional Review Board Statement: Not applicable. Informed Consent Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/s22082895
pmid:35458880
pmcid:PMC9032943
fatcat:ol3qw3z64vhxzcplgwbbnj7to4
Advances in Methods and Techniques for Processing Streaming Big Data in Datacentre Clouds
2016
IEEE Transactions on Emerging Topics in Computing
ACKNOWLEDGEMENT We would like to thank the authors and all the reviewers for their hard work in helping us put together this special issue. ...
The paper titled ''Non-intrusive anomaly detection with streaming performance metrics and logs for DevOps in public clouds: A Case Study in AWS'' by Sun et. al. address the challenges anomaly detection ...
In this paper, for tenants and DevOps practitioners in public clouds, the authors propose an anomaly detection approach, which is designed for public cloud users to deal with the case that the impacts ...
doi:10.1109/tetc.2016.2524219
fatcat:yhmcyaksovgvblxc6d3ggpf7sm
Application of Deep Learning Approach for the Classification of Buildings' Degradation State in a BIM Methodology
2022
Applied Sciences
The training phase has been executed providing examples of images with the anomalies to be detected. ...
Currently, there is extensive research focused on automatic strategies for the segmentation and classification of 3D point clouds, which can accelerate the study of a landmark and integrate it with heterogeneous ...
The semantic understanding process is based on the image collection (image databases) for construction anomalies' detection. ...
doi:10.3390/app12157403
fatcat:eucphfcnzja2fajxyueqaboqwm
READ-IoT: Reliable Anomalies and Events Detection Framework for the Internet of Things
2021
IEEE Access
The applications are often critical (e.g. physical intrusion detection, fire fighting) and latency-sensitive. On the one hand, such applications rely on specific protocols (e.g. ...
This paper introduces a Reliable Event and Anomaly Detection Framework for the Internet of Things (READ-IoT for short). ...
Drira, the Head of SARA research team and at LAAS-CNRS, for his support. ...
doi:10.1109/access.2021.3056149
fatcat:bshbteukqrdijltlnm3un7326u
Editorial: ACM/Springer Mobile Networks & Applications - Special Issue on Mobile Computing and Software Engineering
2019
Journal on spesial topics in mobile networks and applications
Imrich Chlamtac, for his supportive guidance during the entire process. We also thank you for the support from the National Natural Science Foundation of China (NSFC) under Grant No. 61902236. ...
Acknowledgements The guest editors are thankful to our reviewers for their effort in reviewing the manuscripts. We also thank the Edit-in-Chief, Dr. ...
The second article titled A Novel Approach to Scheduling Workflows Upon Cloud Resources with Fluctuating Performance considers that scientific computing processes to be supported by decentralized cloud ...
doi:10.1007/s11036-019-01451-z
fatcat:ahdxol73nnbxdkuujclt75i3be
Toward Prioritization of Data Flows for Scientific Workflows Using Virtual Software Defined Exchanges
2017
2017 IEEE 13th International Conference on e-Science (e-Science)
In this work, we present an end-to-end framework for autonomic adaptation for scientific workflows on networked cloud systems, which leverages novel network provisioning technologies. ...
Recent advances in cloud systems, on-demand circuits and software-defined networking have created new opportunities to enable complex, data-intensive scientific applications to run on dynamic networked ...
Overton, and Erola Pairo-Castineira for their valuable help. ...
doi:10.1109/escience.2017.92
dblp:conf/eScience/MandalRBSD17
fatcat:7khyvyfixbhqlg3szcdt2bqaym
Table of Contents
2018
2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion)
Media Data on the Cloud Unsupervised Anomaly Event Detection for Cloud Monitoring Using Online Arima Richard O. ...
5th International Workshop on Smart City Clouds: Technologies, Systems, and Applications (SCCTSA 2018) Data Coloring for Securing Open-Data in Cloud Computing Environment Mary-Jane Sule (University of ...
doi:10.1109/ucc-companion.2018.00004
fatcat:hyhnf3mjorfylo2j7lfr4dlcha
Review on Fault Tolerance Techniques in Cloud Computing
2015
International Journal of Computer Applications
The objective of this paper is to propose an algorithm using Artificial Neural Network for fault detection which will overcome the gaps of previously implemented algorithms and provide a fault tolerant ...
Various fault detection methods and architectural models have been proposed to increase fault tolerance ability of cloud. ...
models for facilitating proactive fault tolerance by predicting task failures for International Journal of Computer Applications (0975 -8887) Volume 116 -No. 18, April 2015 scientific workflow applications ...
doi:10.5120/20435-2768
fatcat:f6vw5d3rjzdc5dc46phvjiupvq
« Previous
Showing results 1 — 15 out of 2,697 results