The document is focused on comparative analysis of monitoring systems for data networks and their subsequent application to the data network with smaller range. In the text, the author describes methodology of compari...
详细信息
ISBN:
(纸本)9781479938254
The document is focused on comparative analysis of monitoring systems for data networks and their subsequent application to the data network with smaller range. In the text, the author describes methodology of comparison of monitoring systems and a description of their implementation and testing. In the introduction the document deals with the theory of design patterns for deployment of monitoring systems.
In this paper, we introduce our efforts on an application of semantic web technologies to phenotyping algorithms in Electronic Health Records (EHR) data for the purpose of facilitating the reasoning and inferring proc...
详细信息
In this paper, we introduce our efforts on an application of semantic web technologies to phenotyping algorithms in Electronic Health Records (EHR) data for the purpose of facilitating the reasoning and inferring processes of some patients groups in an intelligent manner.
Large scale online social networks(OSN) are usually based on distributed storage systems. The data of users are distributed on multiple storage and computing nodes toprovide concurrency and redundancy. How tostore and...
详细信息
Large scale online social networks(OSN) are usually based on distributed storage systems. The data of users are distributed on multiple storage and computing nodes toprovide concurrency and redundancy. How tostore and access user data efficiently in OSN system with limited storage has practical significance. This paper proposes a dynamic partitioning and replication algorithm, which partitions and replicates user data periodically in line with the frequency of user interaction, in order toimprove local access ratioand reduce system communication load. Through experiment on a real-world dataset, this paper testifies that compared with random partitioning and replication, the proposed algorithm could improve local access ratiogreatly, and finally reduce access latency.
The applications of the mobile devices are increasingly being improved. They include computation-intensive tasks, such as video and audio processing. However, the mobile devices have limited resources, which may make ...
详细信息
The applications of the mobile devices are increasingly being improved. They include computation-intensive tasks, such as video and audio processing. However, the mobile devices have limited resources, which may make it difficult to finish these tasks in time. Computation offloading can be used to boost the capabilities of these resource-constrained devices, where the computation-intensive tasks are moved to a powerful remote processing unit. This paper considers the computation offloading problem for sporadic real-time tasks. The total bandwidth server (TBS) is adopted on the remote processing unit (the server side) for resource reservation. On the client side, a dynamic programming algorithm is proposed to determine the offloading decision of the tasks such that their schedule is feasible (i.e., all the tasks meet their deadlines). The algorithm is evaluated using a case study of surveillance system and synthesized benchmarks.
Genomic research involves a considerable amount of intensive computational and data management challenges including varying demand for computing resources, large data staging, management of complex workflows, and mana...
详细信息
ISBN:
(纸本)9781479956678
Genomic research involves a considerable amount of intensive computational and data management challenges including varying demand for computing resources, large data staging, management of complex workflows, and managing data and metadata across thousands of experiments and datasets. To address these challenges, researchers are typically forced to acquire and maintain experienced IT staff and informatics infrastructure. Increasingly researchers have explored cloud technologies, yet these lack key capabilities for data and workflow management. We introduce work to address these issues through use of federated cloud infrastructure coupled with data and workflow management technology. We present preliminary work toward the integration of three major technologies: ExoGENI, integrated Rule Oriented Data System (iRODS), and Pegasus/HTCondor, to develop a software infrastructure that better supports data-and workflow-centric genomic analysis.
NoSQL data stores see considerable attention today in big data, cloud hosted environments because of their fault tolerance, distribution and high availability. Shared NoSQL data stores are preferred for their ability ...
详细信息
NoSQL data stores see considerable attention today in big data, cloud hosted environments because of their fault tolerance, distribution and high availability. Shared NoSQL data stores are preferred for their ability to serve multiple tenants simultaneously which can improve resource utilization and lower management costs. Fair share in this setting can be a problem in that NoSQL data stores can be weak in preventing interference between tenants. We propose a methodology for multi-tenant fair share in a NoSQL store, in particular Cassandra. The approach uses an extended version of the deficit round robin algorithm to schedule tenant requests, and has local weight adjustment and slow tenant handling to improve the system throughput. Empirical results show that our approach is able to provide fair share for multi-tenancy.
The latest version of ZigBee offers improvement over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist as the enhanced protocol still has many security weaknesse...
详细信息
The latest version of ZigBee offers improvement over many aspects like low power consumption, flexibility and inexpensive deployment. However problems persist as the enhanced protocol still has many security weaknesses. In this presentation we highlight relevant security concerns related to the latest ZigBee security features, then we propose countermeasure mechanisms to address some of these weaknesses. We also propose a new approach suitable for ZigBee enabled wireless sensor networks. The proposed solution improves security and decreases considerably the likelihood of successful attacks. Lastly we discuss the security and performance related to the proposed scheme.
This paper proposes a new framework for rule induction methods based on incremental sampling scheme and rule layers constrained by inequalities of accuracy and coverage. Incremental sampling scheme shows that the numb...
详细信息
This paper proposes a new framework for rule induction methods based on incremental sampling scheme and rule layers constrained by inequalities of accuracy and coverage. Incremental sampling scheme shows that the number of patterns of updates of accuracy and coverage is four, which give two important inequalities of accuracy and coverage for induction of probabilistic rules. By using these two inequalities, the proposed method classifies a set of formulae into four layers: the rule layer, subrule layer (in and out) and the non-rule layer. Using these layers, updates of probabilistic rules are equivalent to their movement between layers. The proposed method was evaluated on datasets regarding headaches and meningitis, and the results show that the proposed method outperforms the conventional methods.
Optimizing sophisticated PDE-based filtering methods, such as the Anisotropic Nonlinear Diffusion (AND), to GPUs is complicated and time consuming. In this work, we expressed AND as iterative multiple 3D-stencils, whe...
详细信息
Optimizing sophisticated PDE-based filtering methods, such as the Anisotropic Nonlinear Diffusion (AND), to GPUs is complicated and time consuming. In this work, we expressed AND as iterative multiple 3D-stencils, where each 3D-stencil is implemented into one kernel, and then we analyzed all possible kernel fusions on the GPU. We experimentally found that fusing dependent stencils with similar concurrency and lower on-chip pressure makes the optimal combination run 1, 52× faster than the next better one.
Workflow is one of vital facilities in virtual laboratory for complex scientific computation. However, where to deploy a workflow service in a virtual laboratory is a challenging software architectural decision to mak...
详细信息
Workflow is one of vital facilities in virtual laboratory for complex scientific computation. However, where to deploy a workflow service in a virtual laboratory is a challenging software architectural decision to make with tradeoff of requirements and resources. This paper presents an architectural evaluation for deploying a scientific workflow service in a collaborative environment. We evaluate three deployment options by comparing them against common scientific virtual laboratory requirements. While this case study is for a particular collaboration platform and application domain, the evaluation method, process and conclusion can be useful and reused in other service deployment decision making.
暂无评论