Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 19, Issue 2June 2016
Publisher:
  • Kluwer Academic Publishers
  • 101 Philip Drive Assinippi Park Norwell, MA
  • United States
ISSN:1386-7857
Reflects downloads up to 05 Mar 2025Bibliometrics
article
Kani: a QoS-aware hypervisor-level scheduler for cloud computing environments

Cloud computing environments (CCEs) are expected to deliver their services with qualities in service level agreements. On the other hand, they typically employ virtualization technology to consolidate multiple workloads on the same physical machine, ...

article
PGTrust: a decentralized free-riding prevention model for DG systems

Desktop grids (DG) offer large amounts of computing power coming from internet-based volunteer networks. They suffer from the free-riding phenomenon. It may be possible for users to free ride, consuming resources donated by others but not donating any ...

article
Operational cost-aware resource provisioning for continuous write applications in cloud-of-clouds

The emergence of cloud computing has made it become an attractive solution for large-scale data processing and storage applications. Cloud infrastructures provide users a remote access to powerful computing capacity, large storage space and high network ...

article
Power-aware Bag-of-Tasks scheduling on heterogeneous platforms

Energy preservation is very important nowadays. A large number of applications in science, engineering, astronomy and business analytics are classified as Bag-of-Tasks (BoT) applications. A BoT is a collection of independent tasks that do not ...

article
A simple and efficient approach for reducing TCP timeouts due to lack of duplicate acknowledgments in data center networks

The problem of TCP incast in data centers attracts a lot of attention in our research community. TCP incast is a catastrophic throughput collapse that occurs when multiple senders transmitting TCP data simultaneously to a single aggregator. Based on ...

article
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing

Hidden persistent malware in guest virtual machine instances are among the most common internal threats in cloud computing, affecting the security of both cloud customers and providers. With the growing sophistication of modern malware, traditional ...

article
LPC$$_\mathrm{FreqSchd}$$FreqSchd: A local power controller using the frequency scheduling approach for virtualized servers

For more than a decade, the power consumption of data centers has been addressed from different perspectives. Many solutions have been proposed to reduce (or optimize) this power consumption, such as controlling the operation of the servers in data ...

article
Energy aware scheduling of deadline-constrained tasks in cloud computing

Energy efficiency is the predominant issue which troubles the modern ICT industry. The ever-increasing ICT innovations and services have exponentially added to the energy demands and this proliferated the urgency of fostering the awareness for ...

article
RETRACTED ARTICLE: The model for improving big data sub-image retrieval performance using scalable vocabulary tree based on predictive clustering

Scalable vocabulary tree (SVT) is a data compression structure which gains scalable visual vocabularies from hierarchical k-means clustering of local image features. Due to both high robustness in data retrieval and great potentials to process huge data,...

article
A replicas placement approach of component services for service-based cloud application

Placement of component service replicas for service-based application (SBA) in cloud environments has become increasingly important. A SBA is usually communication topology-aware, and component service replicas possess stronger data dependency than data ...

article
Big forensic data reduction: digital forensic images and electronic evidence

An issue that continues to impact digital forensics is the increasing volume of data and the growing number of devices. One proposed method to deal with the problem of "big digital forensic data": the volume, variety, and velocity of digital forensic ...

article
Ultra-short-term wind speed prediction based on multi-scale predictability analysis

Accurate prediction of ultra-short-term wind speed is important in many applications. Because of the different patterns of wind speed, researchers have indicated that a multi-scale prediction method based on wavelet algorithms could improve forecasting. ...

article
Research on spatial and temporal characteristics of drought based on GIS using Remote Sensing Big Data

Drought is a stochastic natural hazard that is caused by intense and persistent shortage of precipitation. Spatial and temporal patterns of drought have been analyzed by several methods, ranging from satellite images to historical records; however, ...

article
Two game-based solution concepts for a two-agent scheduling problem

In the current research papers on multi-agent (multi-person) scheduling, a person's objective function is always considered as a cost function on scheduling, whereas a cooperative profit function is defined to serve as his objective one in this paper. ...

article
Research on a cluster system for binary data frames of wireless sensor network

As the development of network became more complex, protocol reverse engineering has attracted increasing attention and widely applied in intrusion detection, vulnerability discovery, and electronic countermeasures. To separate the obtained binary data ...

article
Link the remote sensing big data to the image features via wavelet transformation

With the development of remote sensing technologies, especially the improvement of spatial, time and spectrum resolution, the volume of remote sensing data is bigger. Meanwhile, the remote sensing textures of the same ground object present different ...

article
Secure outsourcing of modular exponentiations in cloud and cluster computing

Cloud computing and cluster computing are user-centric computing services. The shared software and hardware resources and information can be provided to the computers and other equipments according to the demands of users. A majority of services are ...

article
CogTime_RMF: regularized matrix factorization with drifting cognition degree for collaborative filtering

Due to the exponential growth of information, recommender systems have been a widely exploited technique to solve the problem of information overload effectively. Collaborative filtering (CF) is the most successful and extensively employed ...

article
A fast approach to identify trending articles in hot topics from XML based big bibliographic datasets

Nowadays XML based big bibliographic datasets are common in different domains which provide meta data about articles published in that domain. They have well defined tags which give details of the year, title, authors, abstract, keywords, the type of ...

article
Scheduling data analytics work with performance guarantees: queuing and machine learning models in synergy

In today's scaled out systems, co-scheduling data analytics work with high priority user workloads is common as it utilizes better the vast hardware availability. User workloads are dominated by periodic patterns, with alternating periods of high and ...

article
Towards operator-less data centers through data-driven, predictive, proactive autonomics

Continued reliance on human operators for managing data centers is a major impediment for them from ever reaching extreme dimensions. Large computer systems in general, and data centers in particular, will ultimately be managed using predictive ...

article
Idempotent distributed counters using a forgetful bloom filter

Distributed key-value stores power the backend of high-performance web services and cloud computing applications. Key-value stores such as Cassandra rely heavily on counters to track occurrences of various kinds of events. However, modern ...

article
OptiSpot: minimizing application deployment cost using spot cloud resources

The spot instance model is a virtual machine pricing scheme in which some resources of cloud providers are offered to the highest bidder. This leads to the formation of a spot price, whose fluctuations can determine customers to be overbid by other ...

article
The integrated management method of heterogeneous WIPS sensors

As the wireless network environment has been developed rapidly and significantly, the number of cyber threats on wireless infrastructure have been increasing. Wireless intrusion prevention system (WIPS) is getting more attention as a technology to ...

article
An evaluation-committee recommendation system for national R&D projects using social network analysis

Korean National Science & Technology Information Service (NTIS) provides a service of evaluating national R&D projects and providing such evaluated national R&D projects along with their participating researcher information. It also provides a service ...

article
Evaluation of image reconstruction according to changing physical parameter

This study is to determine an optimum kernel, which objectively compares and analyzes the image according to physical parameters such as FBP, which is widely used in abdominal CT, as well as SAFIRE, which was developed recently. CT images were acquired ...

article
Photo quality enhancement by relocating subjects

Photo quality enhancement by photographic evaluation is a challenging problem in photography. In this paper, a new photo quality enhancement algorithm for photographic recomposition based on subject relocation is presented. Most related research focuses ...

article
Implementation of smartphone-based color temperature and wavelength control LED lighting system

This study proposes a smartphone-based LED lighting system to maximize efficiency by easily measuring the characteristics of artificial light currently offered, and automatically adjusting color temperature and wavelength according to an occupant's ...

article
Life style improvement mobile service for high risk chronic disease based on PHR platform

As IT convergence technique develops, medical technology and apparatus are being modernized opening the era that we can obtain variable information easily anywhere, anytime thanks to wireless communication developed, further. These social changes ...

article
A method of unsupervised machine learning based on self-organizing map for BCI

Brain computer interface (BCI) is a technology that controls computers or machines using the thoughts or intentions of a person. EEG signal measured from the human scalp is reflected with thoughts and intentions of a person, and when using the signal ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.