There have been many efforts on scheduling mechanisms for parallel jobs in clusters . FCFS is the basic but popularly used batch scheduling algorithm. Backfilling , which was developed as the EASY for IBM SP1, is a technique that allows short/small jobs to use idle nodes while the job at the head of the queue […]
Aggressive Migration Supported BackFilling (AMBF)
The cloud computing paradigm promises a cost-effective solution for running business applications through the use of virtualization technologies, highly scalable distributed computing, and data management techniques as well as a pay-as-you-go pricing model. In recent years, it also offers high-performance computing capacity for applications to solve complex problems. Improving resource utilization is essential for achieving […]
ONLINE LEARNING FOR PERSONALIZED RECOMMENDATION
Content optimization is defined as the problem of selecting content items to present to a user who is intent on browsing for information. There are many variants of the problem, depending on the application and the different settings where the solution is used, such as articles published on portal websites, news personalization, recommendation of dynamically […]
Outsourced image Recovery service from compressed sensing with privacy assurance
A recent data sensing and reconstruction framework well-known for its simplicity of unifying the traditional sampling and compression for data acquisition. To leverage compressed sensing to compress the storage of correlated image datasets. The idea is to store the compressed image samples instead of the whole image, either in compressed or uncompressed format, on storage […]
Seed block and finally stored the Exored file onto the remote server
National Institute of Standard and Technology defines as a model for enabling convenient, on-demand network access to a share pool of configurable computing service (for exnetworks, servers, storage, applications and services) that can be provisioned rapidly and released with minimal management effort or services provider . Today, Cloud Computing is itself a gigantic technology which […]
Complete price differentiation under Complete information
Pricing is important for the design, operation, and management of communication networks. Pricing has been used with two different meanings in the area of communication networks. One is the “optimization-oriented” pricing for network resource allocation: it is made popular by Kelly’s seminal work on network congestion control. The Transmission Control Protocol (TCP) has been successfully […]
A Hybrid of Surface Patterns Parsing and Classification
Their representation, abstraction, execution, monitoring, and model-checking. In general, our approach does not address the challenges these studies pursue but would support such studies by helping identify the relevant events and temporal constraints. A contract monitoring facility. Their approach involves the Business Contract Language (BCL) as a way to represent and monitor contracts. Their focus […]
Learning with attributes as label embedding
The image classification problem: given an image, we wish to annotate it with one (or multiple) class label(s) describing its visual content. Image classification is a prediction task where the goal is to learn from labeled data a function : The maps an input x in the space of images to an output in the […]
Trace Based Analysis On Mobile Social Networks (MSNETS)
The context of intermittently connected networks, DTNs, Pocket Switched Networks (PSNs), and Opportunistic Networks, a number of routing schemes have been proposed for data forwarding and content dissemination. These routing schemes exploit the fact that end-toend paths do exist over time in intermittently connected networks, which depend on a store-carry-and-forward pattern. Most recent work focuses […]
Local Versus Integrated Interface Schemas
Web information extraction and annotation has been an active research area in recent years. Many systems rely on human users to mark the desired information on sample pages and label the marked data at the same time, and then the system can induce a series of rules (wrapper) to extract the same set of information […]