Filters








88,090 Hits in 6.2 sec

Developing an Efficient Pattern Discovery Method for CPU Utilizations of Computers

Zhuoer Gu, Ligang He, Cheng Chang, Jianhua Sun, Hao Chen, Chenlin Huang
2016 International journal of parallel programming  
In this paper, we propose an efficient motif discovery framework for CPU host load. The framework is elaborately designed to take into account the important properties in host load data.  ...  Mining repeated patterns (often called motifs) in CPU utilization of computers (also called CPU host load) is of fundamental importance.  ...  creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a  ... 
doi:10.1007/s10766-016-0439-0 fatcat:zshqpms3ejdwvbhiwt7x5vywma

Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing [article]

Rajiv Ranjan, Liang Zhao, Xiaomin Wu, Anna Liu
2009 arXiv   pre-print
load-balancing; (iii) a classification of the existing peer-to-peer network management model with focus on extending the DHTs for indexing and managing complex provisioning information; and (iv) the design  ...  self-managing service discovery and load-balancing in Cloud computing environments.  ...  The spatial extent of a discovery query in different attribute dimension is controlled by the characteristic of the application services VM, hosting node, and workload patterns.  ... 
arXiv:0912.1905v1 fatcat:3iwe7sganngtje47nhyelkw2me

Emulating Opportunistic Networks with KauNet Triggers

Tanguy Pérennou, Anna Brunstrom, Tomas Hall, Johan Garcia, Per Hurtig
2011 EURASIP Journal on Wireless Communications and Networking  
classical DTN data-mule scenario.  ...  Opportunistic networks present a demanding environment for network emulation as the traditional emulation setup, where application/transport endpoints only send and receive packets from the network following  ...  Acknowledgments The authors wish to thank Andreas Midestad for his work on the implementation of triggers.  ... 
doi:10.1155/2011/347107 fatcat:thmz5gywbvcifedz4uxxfmig44

Peer-to-Peer Cloud Provisioning: Service Discovery and Load-Balancing [chapter]

Rajiv Ranjan, Liang Zhao, Xiaomin Wu, Anna Liu, Andres Quiroz, Manish Parashar
2010 Computer Communications and Networks  
load-balancing; (iii) a classification of the existing peer-to-peer network management model with focus on extending the DHTs for indexing and managing complex provisioning information; and (iv) the design  ...  Clouds have evolved as the next-generation platform that facilitates creation of wide-area on-demand renting of computing or storage services for hosting application services that experience highly variable  ...  GoGrid Cloud Hosting offers developers F5 Load Balancers [18] for distributing application service traffic across servers, as long as IPs and specific ports of these servers are attached.  ... 
doi:10.1007/978-1-84996-241-4_12 dblp:series/ccn/RanjanZWLQP10 fatcat:qb4zvollsjdx3acx7pys5bz2am

A Service Discovery Solution for Edge Choreography-Based Distributed Embedded Systems

Sara Blanc, José-Luis Bayo-Montón, Senén Palanca-Barrio, Néstor X. Arreaga-Alvarado
2021 Sensors  
This paper presents a solution to support service discovery for edge choreography based distributed embedded systems.  ...  The discovery mechanism is implemented as a broker service and supports regular expressions (Regex) in message scope to discern both publishing patterns offered by data providers and client services necessities  ...  Acknowledgments: The choreography engine was developed and supported by the SABIEN research group of the Universitat Politècnica de València (http://www.sabien.upv.es/en/).  ... 
doi:10.3390/s21020672 pmid:33478175 pmcid:PMC7835934 fatcat:mpwil7w4ubfudanjctl2q5uqvq

Trends in Middleware for Mobile Ad Hoc Networks

Salem Hadim, Jameela Al-Jaroodi, Nader Mohamed
2006 Journal of Communications  
Current researchers moved towards using middleware to provide solutions to these issues and simplify application development for MANETs.  ...  In this paper we cover the latest trends and developments in middleware for MANETs and survey these approaches to identify their qualities and limitations.  ...  ACKNOWLEDGMENT The authors wish to thank the editors of the Journal of Communications (JCM) for their invitation to contribute with this paper.  ... 
doi:10.4304/jcm.1.4.11-21 fatcat:phdhpwhnkvdgbij3gen5jgpbre

Supporting mobile multimedia applications in MAPGrid

Yun Huang, Nalini Venkatasubramanian
2007 Proceedings of the 2007 international conference on Wireless communications and mobile computing - IWCMC '07  
Especially, we focus on how to adapt to dynamic changes of user mobility patterns.  ...  We show that the MAPGrid system provides an infrastructure support for enabling and effectively enhancing mobile applications.  ...  The underlying implementation of MAPGrid subsumes a multithreading model for multitasking the various models for resource discovery and data placement services, which scales well in performance.  ... 
doi:10.1145/1280940.1280978 dblp:conf/iwcmc/HuangV07 fatcat:qozi7neh7bfbplfjkqcctzu2q4

Performance Evaluation of Extended Aodv Using Different Scenarios

Rajesh Shrivastava, Rashween Kaur Saluja
2012 International Journal of Smart Sensor and Adhoc Network.  
For this reason, constructing simulation models closer to the real circumstances is very significant.  ...  For this purpose we need gateways which act as bridges between these two different protocol architectures. The gateway discovery in hybrid network is considered as a critical and challenging task.  ...  As buffering is needed for the data packets which are destined for a particular target node and for which the route discovery process is currently going on, the protocols have a send buffer of 64 packets  ... 
doi:10.47893/ijssan.2012.1074 fatcat:frvx4rr3ojarbdm2sybgy6hgaq

Performance Evaluation of Mobility Speed over MANET Routing Protocols

Yasser Kamal Hassan, Mohamed Hashim Abd El-Aziz, Ahmed Safwat Abd El-Radi
2010 International Journal of Network Security  
Ad-hoc networking is a concept in computer communications. Each node participating in the network acts both as host and a router and must therefore is willing to forward packets for other nodes.  ...  Research in this area is mostly simulation based; Random waypoint is the commonly used mobility model in these simulations. Random waypoint is a simple model that may be applicable to some scenarios.  ...  It then initiates route discovery for a new route if needed. 5 Simulation Model and Evaluation Metrics The Mobility Model A mobility model [6] should attempt to mimic the movements of real Mobile Networks  ... 
dblp:journals/ijnsec/HassanEE10 fatcat:3r6zmdqx3ncn3br3gbczi6oi3q

Implementation and performance analysis of the gateway discovery approaches in the integrated MANET-Internet scenario

Koushik Majumder, Sudhabindu Ray, Subir Kumar Sarkar
2011 2011 IEEE 3rd International Conference on Communication Software and Networks  
Due to the scarcity of network resources in MANET, the efficient discovery of the gateway becomes is a key issue in the design and development of future hybrid networks.  ...  Keywords-Mobile ad hoc network, Internet, gateway discovery approaches, performance study, packet delivery fraction, average end-to-end delay, normalized routing load I.  ...  One of the two hosts in the wired domain is chosen randomly as the required destination for each data session. Each host is connected to the gateway through a router.  ... 
doi:10.1109/iccsn.2011.6014965 fatcat:hgmgisdshfe2vbqkldkj4zwwpy

A Conceptual Model for Grid-Adaptivity of HPC Applications and Its Logical Implementation Using Components Technology [chapter]

A. Machì, S. Lombardo
2004 Lecture Notes in Computer Science  
They present a hierarchical model for a component-based grid-software infrastructure in which the resource administrator and the resource coordinator roles are assigned to grid middleware and the quality-service  ...  Roles interactions through interfaces are described for a component based infrastructure implementation.  ...  The approach constitutes a novel enterprise model for the grid.  ... 
doi:10.1007/978-3-540-24688-6_16 fatcat:at5yvh2qvzhwbmlurhrbg3zu2e

Threat Intelligence Computing

Xiaokui Shu, Frederico Araujo, Douglas L. Schales, Marc Ph. Stoecklin, Jiyong Jang, Heqing Huang, Josyula R. Rao
2018 Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security - CCS '18  
To facilitate threat hunting tasks, this paper introduces threat intelligence computing as a new methodology that models threat discovery as a graph computation problem.  ...  It enables efficient programming for solving threat discovery problems, equipping threat hunters with a suite of potent new tools for agile codifications of threat hypotheses, automated evidence mining  ...  Yan Chen for collaborative detection and analytics. The authors thank all monitoring teams in the DARPA program for providing provenance data on a wide variety of systems.  ... 
doi:10.1145/3243734.3243829 dblp:conf/ccs/ShuASSJHR18 fatcat:koae4rb6xbc4licneanbcfwysm

A Systematic Study of Micro Service Architecture Evolution and their Deployment Patterns

Chaitanya K.
2018 International Journal of Computer Applications  
This research paper illustrates (1) the journey of architectural design patterns from SOA to MSA, by citing the related work and the reasons for evolution. (2) various deployment models available for MSA  ...  A micro service can be deployed to run on a virtual machine (VM) or on a container which itself runs on a VM. The VM can be in the data center or in the public cloud.  ...  Cloud services like AWS ECS provide a lot of out of the box features needed for load balancing, service discovery, auto scaling, health monitoring etc. which are very difficult to custom build in the data  ... 
doi:10.5120/ijca2018918153 fatcat:2vo7sgdllzapxj3xqlmiyol2hm

A Perspective on Immune Cell Metabolic Models for Hostbased Therapeutic Discovery against COVID-19

Paulchamy Chellapandi
2021 Journal of Clinical & Anatomic Pathology  
Such metabolic models could be used for a better understanding of its pathophysiology and host-based antiviral development.  ...  The rate of its positive cases increases daily due to the unavailability of approved antivirals and a lack of knowledge of its pathophysiology in host-based antiviral discovery.  ...  Acknowledgement The author would like to thank the Science and Engineering Research Board, Department of Science and Technology (MSC/2020/000438), New Delhi, India, for financial support.  ... 
doi:10.47275/2332-4864-111 fatcat:v5xwxisrlbd57ekhlykmzqek44

Data Management and the Efficacy of Big Data: An Overview

Rainer A. Sommer
2019 The International Journal of Business & Management  
Much of this data may never get used, but it is kept in the data lake for possible future analysis.  ...  This model would allow customer and suppliers to take advantage of the efficiencies created within the host organization to achieve an aggregate competitive advantage 2 .  ...  Discovery Analytics (DA) Conversely, unstructured untrusted data sitting in a data lake can't necessarily be extracted, transformed, and loaded (ETL) into a relational table format.  ... 
doi:10.24940/theijbm/2019/v7/i3/bm1903-014 fatcat:sbgon3nqgrgvzcsompng7eds7q
« Previous Showing results 1 — 15 out of 88,090 results