There have been many efforts on scheduling mechanisms for parallel jobs in clusters . FCFS is the basic but popularly used batch scheduling algorithm. Backfilling , which was developed as the EASY for IBM SP1, is a technique that allows short/small jobs to use idle nodes while the job at the head of the queue […]
Aggressive Migration Supported BackFilling (AMBF)
The cloud computing paradigm promises a cost-effective solution for running business applications through the use of virtualization technologies, highly scalable distributed computing, and data management techniques as well as a pay-as-you-go pricing model. In recent years, it also offers high-performance computing capacity for applications to solve complex problems. Improving resource utilization is essential for achieving […]
Cloud computing provides an economical and efficient solution for sharing group Resource
To achieve secure data sharing for dynamic groups in the cloud, we expect to combine the group signature and dynamic broadcast encryption techniques. Specially, the group signature scheme enables users to anonymously use the cloud resources, and the dynamic broadcast encryption technique allows data owners to securely share their data files with others including new […]
Seed block and finally stored the Exored file onto the remote server
National Institute of Standard and Technology defines as a model for enabling convenient, on-demand network access to a share pool of configurable computing service (for exnetworks, servers, storage, applications and services) that can be provisioned rapidly and released with minimal management effort or services provider . Today, Cloud Computing is itself a gigantic technology which […]
Complete price differentiation under Complete information
Pricing is important for the design, operation, and management of communication networks. Pricing has been used with two different meanings in the area of communication networks. One is the “optimization-oriented” pricing for network resource allocation: it is made popular by Kelly’s seminal work on network congestion control. The Transmission Control Protocol (TCP) has been successfully […]
Privacy preserving profile matching and Secure communication
Most previous private matching work are based on the secure multi-party computation (SMC). There are two mainstreams of approaches to solve the private profile-based friending problem. The first category is based on private set intersection (PSI) and private cardinality of set intersection (PCSI). Early work in this category mainly address the private set operation problem […]
Privacy Enhanced Participatory Sensing Infrastructure
The outbreak of Wireless Sensor Networks (WSNs) and predicted the widespread installation of sensors, in infrastructures, buildings, woods, rivers, or even the atmosphere. This has triggered a lot of interest in many different WSN topics, including identifying and addressing security issues, such as data integrity, node capture, secure routing, etc. On the contrary, privacy has […]
Trace Based Analysis On Mobile Social Networks (MSNETS)
The context of intermittently connected networks, DTNs, Pocket Switched Networks (PSNs), and Opportunistic Networks, a number of routing schemes have been proposed for data forwarding and content dissemination. These routing schemes exploit the fact that end-toend paths do exist over time in intermittently connected networks, which depend on a store-carry-and-forward pattern. Most recent work focuses […]
Social Privacy Perspectives Emphasizing the Narratives
The problems that arise in OSNs, and proposed a diverse range of “privacy solutions”. These include software tools and design principles to address OSN privacy issues. Each of these solutions is developed with a specific type of user, use, and privacy problem in mind. This has had some positive effects: we now have a broad […]
Multiple-input-multiple-output (MIMO) wireless systems
Increasing demand for high-speed wireless networks has motivated the development of wireless ad-hoc networks. In order to fully exploit the technological development in radio hardware and integrated circuits, which allow for implementation of more complicated communication schemes, the fundamental performance limits of wireless networks should be reevaluated. In this context, the distinct characteristics of wireless […]
- « Previous Page
- 1
- …
- 5
- 6
- 7
- 8
- Next Page »