There have been many efforts on scheduling mechanisms for parallel jobs in clusters . FCFS is the basic but popularly used batch scheduling algorithm. Backfilling , which was developed as the EASY for IBM SP1, is a technique that allows short/small jobs to use idle nodes while the job at the head of the queue […]
Aggressive Migration Supported BackFilling (AMBF)
The cloud computing paradigm promises a cost-effective solution for running business applications through the use of virtualization technologies, highly scalable distributed computing, and data management techniques as well as a pay-as-you-go pricing model. In recent years, it also offers high-performance computing capacity for applications to solve complex problems. Improving resource utilization is essential for achieving […]
Outsourced image Recovery service from compressed sensing with privacy assurance
A recent data sensing and reconstruction framework well-known for its simplicity of unifying the traditional sampling and compression for data acquisition. To leverage compressed sensing to compress the storage of correlated image datasets. The idea is to store the compressed image samples instead of the whole image, either in compressed or uncompressed format, on storage […]
Seed block and finally stored the Exored file onto the remote server
National Institute of Standard and Technology defines as a model for enabling convenient, on-demand network access to a share pool of configurable computing service (for exnetworks, servers, storage, applications and services) that can be provisioned rapidly and released with minimal management effort or services provider . Today, Cloud Computing is itself a gigantic technology which […]
Web-based social network to model residential electric energy Consumption
This paper introduced a new approach to social science modeling in which the participants themselves are motivated to uncover the correlates of some human behavior outcome, such as homeowner electricity usage or body mass index. In both cases participants successfully uncovered at least one statistically significant predictor of the outcome variable. For the body mass […]
Privacy preserving profile matching and Secure communication
Most previous private matching work are based on the secure multi-party computation (SMC). There are two mainstreams of approaches to solve the private profile-based friending problem. The first category is based on private set intersection (PSI) and private cardinality of set intersection (PCSI). Early work in this category mainly address the private set operation problem […]
Online Anomaly Detection For Practical Scenario
Outlier detection methods have been proposed for Practical Scenario. These existing approaches can be divided into three categories: distribution (statistical), distance and density-based methods. Statistical approaches assume that the data follows some standard or predetermined distributions, and this type of approach aims to find the outliers which deviate form such distributions. Most distribution models are […]
A Hybrid of Surface Patterns Parsing and Classification
Their representation, abstraction, execution, monitoring, and model-checking. In general, our approach does not address the challenges these studies pursue but would support such studies by helping identify the relevant events and temporal constraints. A contract monitoring facility. Their approach involves the Business Contract Language (BCL) as a way to represent and monitor contracts. Their focus […]