Cloud computing is becoming popular. A number of works have been carried out on cloud computing , including performance analysis, market-oriented cloud computing, management tool, workload balance, dynamic selection, etc. Quality-of-service has been widely employed for presenting the nonfunctional characteristics of the software systems and services . QoS of cloud services can be measured from […]
Migration Decision Support System
The increasing domination of Cloud computing solutions in the software market means that existing applications may need to migrate to this environment, in order to reap the benefits of reduced infrastructural costs and dynamic access to computational resources. While applications have already started being developed specifically for the Cloud (forming Cloud-native applications), existing systems must […]
Limitation on Possible Duplicate Relaying
A simple and provably secure encryption allowing encrypted data to be efficiently and additively aggregated. Only a modular addition is needed for cipher-text aggregation. Scheme security is based on the in distinguish ability property of a pseudorandom function (PRF), a standard cryptographic primitive. It was proved that aggregation based on this can efficiently compute statistical […]
POSITION-BASED OPPORTUNISTIC ROUTING
Wireless sensor networks (WSNs) and MOBILE ad hoc networks (MANETs) are used increasingly in many applications like wild habitat monitoring, forest fire detection, and military surveillance. After deployment in the field sensor nodes organize themselves into a multihop network, the base station being the central control point. Usually sensor nodes are greatly hampered by due […]
A sybil defense Mechanism that leverages the network topologies
Distributed systems are vulnerable to sybil attacks , in which an adversary creates many bogus identities, called Sybil identities, and compromises the running of the system or pollutes the system with fake information. The sybil identities can “suppress” the honest identities in a variety of tasks, including online content ranking, DHT routing, file sharing, reputation […]
Supporting real attribute values with small precisions
we have been witnessing much interest in uncertain data management in many application areas such as data cleaning , sensor networks , information extraction , etc. Much research effort has been devoted to several aspects of uncertain data management, including data modeling , skyline queries, top-k queries, nearest neighbor search , spatial queries , XML […]
Dynamic Programming Algorithm for Attributelevel Model
Aggregate (or aggr for short) queries, in particular SUM queries, are crucial for many applications that need to deal with uncertain data . Let us give two motivating examples from the medical and environmental domains. Effect of the number of uncertain tuples using the synthetic data, the response time of the three algorithms vs. the […]
Topological Conditions For Stabilization Versus Information Transmission
With recent revolutions in sensor and actuator technologies, availability of powerful but inexpensive embedded computing and introduction of new multi-hop wireless network standards for industrial automation, control over wireless networks is becoming a disruptive technology. Traditional wired interconnections between the plant sensors, controllers and actuators can be replaced by wireless multi-hop mesh networks, yielding cost […]
Improving resource utilization For data centers that run parallel jobs
There have been many efforts on scheduling mechanisms for parallel jobs in clusters . FCFS is the basic but popularly used batch scheduling algorithm. Backfilling , which was developed as the EASY for IBM SP1, is a technique that allows short/small jobs to use idle nodes while the job at the head of the queue […]
Aggressive Migration Supported BackFilling (AMBF)
The cloud computing paradigm promises a cost-effective solution for running business applications through the use of virtualization technologies, highly scalable distributed computing, and data management techniques as well as a pay-as-you-go pricing model. In recent years, it also offers high-performance computing capacity for applications to solve complex problems. Improving resource utilization is essential for achieving […]
- 1
- 2
- 3
- 4
- Next Page »