Today's hardware has computing power allowing to conduct virtual simulation. However, even the most powerful machine may not be sufficient in case of using models characterized by high precision and resolution. Sw...
详细信息
Today's hardware has computing power allowing to conduct virtual simulation. However, even the most powerful machine may not be sufficient in case of using models characterized by high precision and resolution. Switching into constructive simulation causes the loss of details in the simulation. Nonetheless, it is possible to use the distributed virtual simulation in the cloud-computing environment. The aim of this paper is to propose a model that enables the scaling of the virtual simulation. The aspects on which the ability to disperse calculations depends were presented. A commercial SpatialOS solution was presented and performance tests were carried out. The use of distributed virtual simulation allows the use of more extensive and detailed simulation models using thin clients. In addition, the presented model of the simulation cloud can be the basis of the "Simulation-as-a-Service" cloud computing product.
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Sp...
详细信息
ISBN:
(纸本)0769515886
The proliferation of smart gadgets, appliances, mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into "Active Information Spaces" augmented with intelligence and enhanced with services. This new exciting computing paradigm promises to revolutionize the way we interact with computers, services, and the surrounding physical spaces, yielding higher productivity and more seamless interaction between users andcomputing services. However, the deployment of this computing paradigm in real-life is hindered by poor security, particularly, the lack of proper authentication and access Control techniques and privacy presenting protocols. We propose an authentication framework that addresses this problem through the use of different wearable and embedded devices. These devices authenticate entities with varied levels of confidence, in a transparent, convenient, and private manner, allowing the framework to blend nicely into ubiquitous computing environments.
Load balancing is essential for improving the performance of a distributedcomputing system. In this paper, we study a price-based static load balancing scheme for single-class job distributedsystems where the comput...
详细信息
With the evolution of cloud computing, internet of things and the application of new approaches from communication and information technologies in industrial production, possibilities for a networked production of dif...
详细信息
ISBN:
(纸本)9781538611227
With the evolution of cloud computing, internet of things and the application of new approaches from communication and information technologies in industrial production, possibilities for a networked production of different production technologies arise. Established approaches use manufacturing execution systems as local production coordination systems at workshop level without considering cross-site production or the integration of different stakeholders along the value chain of production. This paper presents an architectural concept, referred to as the ProducTron, for the digital integration of different manufacturing and common engineering modules for flexible distributed networked production as a possible basis for an Internet of Production.
With the advent of DNA computing, some traditional scientific disciplines present new developing orientations. One of them is DNA-based cryptography, a new developing interdisciplinary area which combines cryptography...
详细信息
ISBN:
(纸本)9781509044573
With the advent of DNA computing, some traditional scientific disciplines present new developing orientations. One of them is DNA-based cryptography, a new developing interdisciplinary area which combines cryptography, mathematical modeling, biochemistry and molecular biology. There are some questions worth study that how to implement the arithmetic operations used in cryptosystem based on DNA computing. This paper proposes a DNA computing model to show how to calculate inversion over finite field GF(2(n)) with DNA self-assembly. 4567 types of computation tiles with 7 different functions assemble into the seed configuration with inputs to figure out the solution. The assembly time complexity is Theta(n(2)) and the space complexity is Theta(n(4)).
Social media resources such as Twitter provide global services for citizens to express opinions on people, products, events or even themselves. Often this data captures the mood (sentiment) of the tweeter. Accurate an...
详细信息
ISBN:
(纸本)9781509044573
Social media resources such as Twitter provide global services for citizens to express opinions on people, products, events or even themselves. Often this data captures the mood (sentiment) of the tweeter. Accurate and timely extraction of sentiment from such big data can be used for many population-wide business and research scenarios. Whilst a range of sentiment analysis approaches has been taken, little systematic comparison of these approaches has been undertaken. The motivation of this paper is to investigate various sentiment analysis approaches and evaluate their accuracy and performance for Twitter-based sentiment analysis on major Cloud facilities across Australia. We consider especially the impact of training data on performance and accuracy of sentiment analysis. To support this, we present a Cloud-based architecture and its realization through an elastic, distributed, data processing system used for harvesting, analyzing and storing large-scale Twitter data sets.
Many middleware platforms use computational reflection to support adaptive functionality. Most approaches intertwine the activity of observing behavior (introspection) with the activity of changing behavior (intercess...
详细信息
ISBN:
(纸本)0769515886
Many middleware platforms use computational reflection to support adaptive functionality. Most approaches intertwine the activity of observing behavior (introspection) with the activity of changing behavior (intercession). This paper explores the use of language constructs to separate these parts of reflective functionality. This separation and "packaging" of reflective primitives is in tended to facilitate the design of correct and consistent adaptive middleware. A prototype language, called Adaptive Java, is described in which this functionality is realized through extensions to the Java programming language. A case study is described in which "metamorphic" socket components are created from regular socket classes and used to realize adaptive behavior on wireless network connections.
Container-based architectures are widely used for cloud computing and can have an important role in the implementation of fog computing infrastructures. However, there are some crucial dependability aspects that must ...
详细信息
ISBN:
(纸本)9781728157306
Container-based architectures are widely used for cloud computing and can have an important role in the implementation of fog computing infrastructures. However, there are some crucial dependability aspects that must be addressed to make containerization suitable for critical fog applications, e.g., in automation and robotics. This paper discusses challenges in applying containerization at the fog layer, and focuses on one of those challenges: provision of fault-tolerant permanent storage. The paper also presents a container-based fog architecture utilizing so-called storage containers, which combine built-in fault-tolerance mechanisms of containers with a distributed consensus protocol to achieve data consistency.
distributed fog and edge applications communicate over unreliable networks and are subject to high communication delays. This makes using existing distributed coordination technologies from cloud applications infeasib...
详细信息
ISBN:
(纸本)9781665499569
distributed fog and edge applications communicate over unreliable networks and are subject to high communication delays. This makes using existing distributed coordination technologies from cloud applications infeasible, as they are built on the assumption of a highly reliable, low-latency datacenter network to achieve strict consistency with low overheads. To help implement configuration and state management for fog platforms and applications, we propose a novel decentralized approach that lets systems specify coordination strategies and membership for different sets of coordination data.
Cloud computing enables users to access different resources conveniently based on the "pay-as-you-go" model. However, the unit cost of this on-demand manner are usually higher than the reserved ones. Realloc...
详细信息
ISBN:
(纸本)9781509044573
Cloud computing enables users to access different resources conveniently based on the "pay-as-you-go" model. However, the unit cost of this on-demand manner are usually higher than the reserved ones. Reallocating some high-usage on-demand instances to reserved instances can save considerable costs when renting resources from the cloud. It is a big challenge to determine the appropriate amount of reserved and on-demand instances in terms of users' requirements. In this paper, we consider deadline constrained workflow scheduling problems to minimize total renting costs with both reserved and on-demand instances. An integer programming model is constructed for the problem under study. A Precedence Tree based Heuristic (PTH) is developed which includes a dynamic initial schedule construction methods. Based on the initial schedule, an improvement procedure is presented. The proposed methods are compared with existing algorithms for the related makespan based workflow scheduling problem. Experimental and statistical results demonstrate the effectiveness and efficiency of the proposed algorithm.
暂无评论