Kani: a QoS-aware hypervisor-level scheduler for cloud computing environments
Cloud computing environments (CCEs) are expected to deliver their services with qualities in service level agreements. On the other hand, they typically employ virtualization technology to consolidate multiple workloads on the same physical machine, ...
PGTrust: a decentralized free-riding prevention model for DG systems
Desktop grids (DG) offer large amounts of computing power coming from internet-based volunteer networks. They suffer from the free-riding phenomenon. It may be possible for users to free ride, consuming resources donated by others but not donating any ...
Operational cost-aware resource provisioning for continuous write applications in cloud-of-clouds
The emergence of cloud computing has made it become an attractive solution for large-scale data processing and storage applications. Cloud infrastructures provide users a remote access to powerful computing capacity, large storage space and high network ...
Power-aware Bag-of-Tasks scheduling on heterogeneous platforms
Energy preservation is very important nowadays. A large number of applications in science, engineering, astronomy and business analytics are classified as Bag-of-Tasks (BoT) applications. A BoT is a collection of independent tasks that do not ...
A simple and efficient approach for reducing TCP timeouts due to lack of duplicate acknowledgments in data center networks
The problem of TCP incast in data centers attracts a lot of attention in our research community. TCP incast is a catastrophic throughput collapse that occurs when multiple senders transmitting TCP data simultaneously to a single aggregator. Based on ...
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing
Hidden persistent malware in guest virtual machine instances are among the most common internal threats in cloud computing, affecting the security of both cloud customers and providers. With the growing sophistication of modern malware, traditional ...
LPC$$_\mathrm{FreqSchd}$$FreqSchd: A local power controller using the frequency scheduling approach for virtualized servers
For more than a decade, the power consumption of data centers has been addressed from different perspectives. Many solutions have been proposed to reduce (or optimize) this power consumption, such as controlling the operation of the servers in data ...
Energy aware scheduling of deadline-constrained tasks in cloud computing
Energy efficiency is the predominant issue which troubles the modern ICT industry. The ever-increasing ICT innovations and services have exponentially added to the energy demands and this proliferated the urgency of fostering the awareness for ...
RETRACTED ARTICLE: The model for improving big data sub-image retrieval performance using scalable vocabulary tree based on predictive clustering
Scalable vocabulary tree (SVT) is a data compression structure which gains scalable visual vocabularies from hierarchical k-means clustering of local image features. Due to both high robustness in data retrieval and great potentials to process huge data,...
A replicas placement approach of component services for service-based cloud application
Placement of component service replicas for service-based application (SBA) in cloud environments has become increasingly important. A SBA is usually communication topology-aware, and component service replicas possess stronger data dependency than data ...
Big forensic data reduction: digital forensic images and electronic evidence
An issue that continues to impact digital forensics is the increasing volume of data and the growing number of devices. One proposed method to deal with the problem of "big digital forensic data": the volume, variety, and velocity of digital forensic ...
Ultra-short-term wind speed prediction based on multi-scale predictability analysis
Accurate prediction of ultra-short-term wind speed is important in many applications. Because of the different patterns of wind speed, researchers have indicated that a multi-scale prediction method based on wavelet algorithms could improve forecasting. ...
Research on spatial and temporal characteristics of drought based on GIS using Remote Sensing Big Data
Drought is a stochastic natural hazard that is caused by intense and persistent shortage of precipitation. Spatial and temporal patterns of drought have been analyzed by several methods, ranging from satellite images to historical records; however, ...
Two game-based solution concepts for a two-agent scheduling problem
In the current research papers on multi-agent (multi-person) scheduling, a person's objective function is always considered as a cost function on scheduling, whereas a cooperative profit function is defined to serve as his objective one in this paper. ...
Research on a cluster system for binary data frames of wireless sensor network
As the development of network became more complex, protocol reverse engineering has attracted increasing attention and widely applied in intrusion detection, vulnerability discovery, and electronic countermeasures. To separate the obtained binary data ...
Link the remote sensing big data to the image features via wavelet transformation
With the development of remote sensing technologies, especially the improvement of spatial, time and spectrum resolution, the volume of remote sensing data is bigger. Meanwhile, the remote sensing textures of the same ground object present different ...
Secure outsourcing of modular exponentiations in cloud and cluster computing
Cloud computing and cluster computing are user-centric computing services. The shared software and hardware resources and information can be provided to the computers and other equipments according to the demands of users. A majority of services are ...
CogTime_RMF: regularized matrix factorization with drifting cognition degree for collaborative filtering
Due to the exponential growth of information, recommender systems have been a widely exploited technique to solve the problem of information overload effectively. Collaborative filtering (CF) is the most successful and extensively employed ...
A fast approach to identify trending articles in hot topics from XML based big bibliographic datasets
Nowadays XML based big bibliographic datasets are common in different domains which provide meta data about articles published in that domain. They have well defined tags which give details of the year, title, authors, abstract, keywords, the type of ...
Scheduling data analytics work with performance guarantees: queuing and machine learning models in synergy
In today's scaled out systems, co-scheduling data analytics work with high priority user workloads is common as it utilizes better the vast hardware availability. User workloads are dominated by periodic patterns, with alternating periods of high and ...
Towards operator-less data centers through data-driven, predictive, proactive autonomics
Continued reliance on human operators for managing data centers is a major impediment for them from ever reaching extreme dimensions. Large computer systems in general, and data centers in particular, will ultimately be managed using predictive ...
Idempotent distributed counters using a forgetful bloom filter
Distributed key-value stores power the backend of high-performance web services and cloud computing applications. Key-value stores such as Cassandra rely heavily on counters to track occurrences of various kinds of events. However, modern ...
OptiSpot: minimizing application deployment cost using spot cloud resources
The spot instance model is a virtual machine pricing scheme in which some resources of cloud providers are offered to the highest bidder. This leads to the formation of a spot price, whose fluctuations can determine customers to be overbid by other ...
The integrated management method of heterogeneous WIPS sensors
As the wireless network environment has been developed rapidly and significantly, the number of cyber threats on wireless infrastructure have been increasing. Wireless intrusion prevention system (WIPS) is getting more attention as a technology to ...
An evaluation-committee recommendation system for national R&D projects using social network analysis
Korean National Science & Technology Information Service (NTIS) provides a service of evaluating national R&D projects and providing such evaluated national R&D projects along with their participating researcher information. It also provides a service ...
Evaluation of image reconstruction according to changing physical parameter
This study is to determine an optimum kernel, which objectively compares and analyzes the image according to physical parameters such as FBP, which is widely used in abdominal CT, as well as SAFIRE, which was developed recently. CT images were acquired ...
Photo quality enhancement by relocating subjects
Photo quality enhancement by photographic evaluation is a challenging problem in photography. In this paper, a new photo quality enhancement algorithm for photographic recomposition based on subject relocation is presented. Most related research focuses ...
Implementation of smartphone-based color temperature and wavelength control LED lighting system
This study proposes a smartphone-based LED lighting system to maximize efficiency by easily measuring the characteristics of artificial light currently offered, and automatically adjusting color temperature and wavelength according to an occupant's ...
Life style improvement mobile service for high risk chronic disease based on PHR platform
As IT convergence technique develops, medical technology and apparatus are being modernized opening the era that we can obtain variable information easily anywhere, anytime thanks to wireless communication developed, further. These social changes ...
A method of unsupervised machine learning based on self-organizing map for BCI
Brain computer interface (BCI) is a technology that controls computers or machines using the thoughts or intentions of a person. EEG signal measured from the human scalp is reflected with thoughts and intentions of a person, and when using the signal ...