Filters








8,608 Hits in 4.9 sec

Connectivity graph reconstruction for networking cloud infrastructures

Pernelle Mensah, Samuel Dubus, Wael Kanoun, Christine Morin, Guillaume Piolle, Eric Totel
2017 2017 IEEE 16th International Symposium on Network Computing and Applications (NCA)  
Moreover, they are not suitable for cloud infrastructures due to either their intrusiveness or lack of connectivity discovery.  ...  Cloud providers have an incomplete view of their hosted virtual infrastructures managed by a Cloud Management System (CMS) and a Software Defined Network (SDN) controller.  ...  Context We consider a cloud infrastructure in which we adopt the standpoint of the cloud provider. Networking is handled by an SDN controller for dynamic network configuration.  ... 
doi:10.1109/nca.2017.8171337 dblp:conf/nca/MensahDKMPT17 fatcat:ibjweocp6jcyllotu7h6nkz4ka

Detection of Network Intrusion and Countermeasure Selection in Cloud Systems

Mr .Madhusudan S, Mr .Srikanth S.P
2014 IOSR Journal of Computer Engineering  
It built an attack graph analytical model which is used for identify the intruders possible way of exploit vulnerability.  ...  Mainly vulnerability arises in infrastructure as a service (laas) cloud where the infrastructure shared by millions of users.  ...  The network flow and topology change information will be automatically sent to the controller and then delivered to attack analyzer to reconstruct attack graphs.  VM Profiling: It is acting as a database  ... 
doi:10.9790/0661-162108488 fatcat:x2n74zutfneexlj66m7fx7ge2e

REIN: Flexible Mesh Generation from Point Clouds

Rangel Daroya, Rowel Atienza, Rhandley Cajote
2020 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW)  
3D reconstruction from sparse point clouds is a challenging problem. Existing methods interpolate from point clouds to produce meshes, but the performance decreases with the number of points.  ...  To address this, we propose an algorithm that looks at the global structure while reconstructing the surface one vertex at a time.  ...  Acknowledgements We thank Joel Casimiro and Aldrin Michael Nilles for their support in creating the figures and the supplementary video of this work.  ... 
doi:10.1109/cvprw50498.2020.00184 dblp:conf/cvpr/DaroyaAC20 fatcat:ydukgw5yf5dbraexp4fcurnpua

Mantus: Putting Aspects To Work For Flexible Multi-Cloud Deployment

Alex Palesandro, Marc Lacoste, Nadia Bennani, Chirine Ghedira Guegan, Denis Bourge
2017 Zenodo  
The Infrastructure as Code (IaC) paradigm is emerging as key enabler for IaaS multi-clouds, to develop and manage infrastructure configurations.  ...  Cloud provider barriers still stand.  ...  all ports which have links connected to networks connected to routers connected to Internet; and (2) avoid interfaces already having a floating IP.  ... 
doi:10.5281/zenodo.835729 fatcat:lvxpnbhldraifdd2datemzsyxu

AUTOMATIC EXTRACTION AND TOPOLOGY RECONSTRUCTION OF URBAN VIADUCTS FROM LIDAR DATA

Y. Wang, X. Hu
2015 The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences  
Urban viaducts are important infrastructures for the transportation system of a city.  ...  Finally, a topological graph of the viaducts network is produced. The full-automatic method can potentially benefit the application of urban navigation and city model reconstruction.  ...  ACKNOWLEDGEMENTS Thanks school of remote sensing and information engineering of wuhan university for providing the airborne LiDAR point cloud data for our experiment.  ... 
doi:10.5194/isprsarchives-xl-3-w3-131-2015 fatcat:zvrjaj7ekfea3lrc75dgflgsvu

A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

Suleman Khan, Muhammad Shiraz, Ainuddin Wahid Abdul Wahab, Abdullah Gani, Qi Han, Zulkanain Bin Abdul Rahman
2014 The Scientific World Journal  
The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks.  ...  The paper concludes by discussing research challenges for progressive network forensics in MCC.  ...  Connects two or more cloud systems for cloud collaboration [68] Public cloud networking makes availability of network applications to users via internet [71] .  ... 
doi:10.1155/2014/547062 pmid:25097880 pmcid:PMC4109117 fatcat:jpxfykm4mfba5ehjgydvyirzte

A Survey on Regenerating Codes for Distributed Cloud Storage

Sophia S, Dr. Sharvani G S
2015 International Journal of Engineering Research and  
Cloud computing is a large group of interconnected remote system via the internet. Cloud computing provide services like data storage, software and infrastructure.  ...  Main objective is to minimize the repair traffic, since the users will be charge for the outbound data from cloud.  ...  Each vertex in graph is represented as source and a storage node in graph. These two vertices are connected by edge with weight corresponds to the amount of data stored in the storage node.  ... 
doi:10.17577/ijertv4is060014 fatcat:g6knyey3jbf6hl4t673xqj5wmm

SDN-Based Private Interconnection

Shlomi Dolev, Shimrit Tzur David
2014 2014 IEEE 13th International Symposium on Network Computing and Applications  
Our research focuses on achieving that privacy on top of SDN-based network. This privacy is achieved without the need to use keys.  ...  In order to reconstruct the data, the destination needs to have at least k shares out of the n shares that were sent by the sender.  ...  CloudBridge is a technology presented by Citrix [1] , it connects across third-party public cloud and private networks, offers a platform for cloud-enabling third-party applications.  ... 
doi:10.1109/nca.2014.26 dblp:conf/nca/DolevD14 fatcat:2a4ealnriffg7gihbnpx2sgbie

How to 0wn the NAS in Your Spare Time

Sanghyun Hong, Michael Davinroy, Yigitcan Kaya, Dana Dachman-Soled, Tudor Dumitras
2020 International Conference on Learning Representations  
However, it is challenging to reconstruct novel architectures and pipelines without knowing the computational graph (e.g., the layers, branches or skip connections), the architectural parameters (e.g.,  ...  We demonstrate experimentally that we can reconstruct MalConv, a novel data pre-processing pipeline for malware detection, and ProxylessNAS-CPU, a novel network architecture for the ImageNet classification  ...  ACKNOWLEDGMENTS We thank the anonymous reviewers for their valuable feedback.  ... 
dblp:conf/iclr/HongDKDD20 fatcat:h2zc54r56zhx7emdg2waideyha

How to 0wn NAS in Your Spare Time [article]

Sanghyun Hong, Michael Davinroy, Yiğitcan Kaya, Dana Dachman-Soled, Tudor Dumitraş
2021 arXiv   pre-print
However, it is challenging to reconstruct novel architectures and pipelines without knowing the computational graph (e.g., the layers, branches or skip connections), the architectural parameters (e.g.,  ...  We demonstrate experimentally that we can reconstruct MalConv, a novel data pre-processing pipeline for malware detection, and ProxylessNAS- CPU, a novel network architecture for the ImageNet classification  ...  However, applying them requires infrastructure-wide changes from cloud providers.  ... 
arXiv:2002.06776v2 fatcat:3x52uzpvurf4zgm2ztbhmnr2ty

Scalable Monitoring and Optimization Techniques for Megascale Data Centers

Markos P. Anastasopoulos, Anna Tzanakaki, Dimitra Simeonidou
2016 Journal of Lightwave Technology  
The authors would like to thank the anonymous reviewers for their constructive comments.  ...  Each container with connectivity graph Con can be decomposed into a set of subgraphs.  ...  Through GF, a mega-DC network graph is decomposed into a small number of simple graphs (factors).  ... 
doi:10.1109/jlt.2016.2522654 fatcat:qkyi2zziejbojpmmrsry2nkvwa

Forensic analysis of IoT ecosystem

Francois Bouchaud, Thomas Vantroys, Gilles Grimaud
2021 2021 8th International Conference on Future Internet of Things and Cloud (FiCloud)  
This article focus on the process of exploiting data from connected devices at a crime scene and on reconstructing the timeline of a criminal event.  ...  Based on discovered data and objects, we reconstruct the chronology of criminal events.  ...  What are the criteria for event reconstruction? How to establish the dependencies between the equipment? Which actors caused an event? What is the data path in the connected infrastructure?  ... 
doi:10.1109/ficloud49777.2021.00024 fatcat:egnvitzymrbbfobedj3e7zvsbq

Edge-preserving self-healing: keeping network backbones densely connected [article]

Atish Das Sarma, Amitabh Trehan
2011 arXiv   pre-print
Maintaining density is a notion motivated by the fact that in certain distributed networks, certain nodes may require and initially have a larger number of inter-connections.  ...  ), be retained in every intermediate graph.  ...  mesh, and ad-hoc computer networks, and infrastructure networks (e.g. airline transportation).  ... 
arXiv:1108.5893v1 fatcat:vl5jqvuwvrbgvlw2feexm24ove

UAV LiDAR Point Cloud Segmentation of A Stack Interchange with Deep Neural Networks [article]

Weikai Tan, Dedong Zhang, Lingfei Ma, Ying Li, Lanying Wang, Jonathan Li
2020 arXiv   pre-print
An end-to-end supervised 3D deep learning framework was proposed to classify the point clouds.  ...  Mobile laser scanning (MLS) systems have been widely used in road infrastructure mapping, but accurate mapping of complicated multi-layer stack interchanges are still challenging.  ...  ACKNOWLEDGMENT The authors would like to thank Livox Technology Ltd. for providing the point cloud dataset.  ... 
arXiv:2010.11106v1 fatcat:zwgrl444y5dd5mzjndwrrwcbau

Mimicking a compute domain orchestrator with the ONOS SDN controller

Gabriele Castellano, Ivano Cerrato, Fulvio Risso, Davide Pezzolla, Antonio Manzalini
2017 2017 IEEE Conference on Network Softwarization (NetSoft)  
With the NFV paradigm, network services are usually instantiated in datacenters (e.g., as VMs), while softwaredefined networks provide just plain connectivity.  ...  in a cloud or in an SDN domain.  ...  Network (SDN) infrastructure in between is only used to provide connectivity.  ... 
doi:10.1109/netsoft.2017.8004253 dblp:conf/netsoft/CastellanoCRPM17 fatcat:muq4brd3rbgato4x3vzsktel2y
« Previous Showing results 1 — 15 out of 8,608 results