Cloud computing is widely being adopted by many companies because it allows to maximize the utilization of resources. However, the complexity of cloud computing systems with the existence of many cloud providers makes...
详细信息
ISBN:
(纸本)9781479927302
Cloud computing is widely being adopted by many companies because it allows to maximize the utilization of resources. However, the complexity of cloud computing systems with the existence of many cloud providers makes infeasible for the end user the optimal or near-optimal resource provisioning and utilization, especially in presence of uncertainty of very dynamic and unpredictable environment. Hence, adaptive load balancing algorithms are a fundamental part of the research in cloud computing. We formulate the problem and propose an adaptive load balancing algorithm for distributed computer environments. We also discuss the energy efficiency of our solution for the domain of VoIP computations on federated clouds.
Cloud computing gets its standard all over the world due to the necessity for delivering IT services, in excess with internet. It consist of pooled computing resources like network, applications, servers consist of pa...
详细信息
ISBN:
(纸本)9781479968961
Cloud computing gets its standard all over the world due to the necessity for delivering IT services, in excess with internet. It consist of pooled computing resources like network, applications, servers consist of parallel and distributed system based on the SLA. It has been perceived from the past decade that in a cloud environment task scheduling became concerned issue. In this paper our aim is to get better optimized results for which we do mapping of tasks to resources maintaining fairness using the PSO scheduling algorithm. The platform used for the experiment is CloudSim via which we attain more efficiency.
With the development of internet, the amount of information on the network increases, and the content security issues on the network become more prominent. Through the study of web information filtering technology and...
详细信息
ISBN:
(纸本)9781479947195
With the development of internet, the amount of information on the network increases, and the content security issues on the network become more prominent. Through the study of web information filtering technology and a variety of implementation methods, combining with UCL (uniform content locator) that is a new innovative technology concept, we discuss and design a new webpage filtering scheme, and propose a UCL-based trusted computing model of webpage content, which is using UCL technology to realize intelligent information filtering based on semantics. Based on the UCL semantic vector and Chinese corpus design, the model uses a reliability evaluation algorithm of webpage information content to realize reliability computing based on semantics. Furthermore, the model combines with the integrity detection and the source authentication of information, thus forming a collaborative content filtering mechanism which is of high efficiency and can satisfy the filtering accuracy rate. Finally, we present the prototype system. Studies have shown that due to less text content in UCL, the model is very suitable for fast processing and filtering of mass data, and has certain references and use values for network content security monitoring and information service mechanisms.
distributed video coding (DVC) is a recent paradigm of video coding, based on distributed source coding and side information (SI) generated at the Decoder. Most of the DVC schemes are using complex channel codes such ...
详细信息
ISBN:
(纸本)9781479982134
distributed video coding (DVC) is a recent paradigm of video coding, based on distributed source coding and side information (SI) generated at the Decoder. Most of the DVC schemes are using complex channel codes such as LDPC or Turbo codes, which are increasing the decoder complexity and delay. Many searches have been done to simplfy the coding schemes, one of them was done by replacing the channel coding by a simple source coding. In this paper, we taken one of those DVC schemes which is based on block classification at the decoder combined with a new residual computing method based on modular arithmetic in conjunction with simple entropy coding. And, we propose to improve its performance by using a mode decision at the encoder side in addition to a parametric change in the residual computing method, with keeping the simplicity of source coding.
The emergence of mobile internet indirectly spreads the malware more rapidly. The potential effects of malware propagation on mobile users and service providers would not be compromised. Malware residing in the intern...
详细信息
ISBN:
(纸本)9781479970025
The emergence of mobile internet indirectly spreads the malware more rapidly. The potential effects of malware propagation on mobile users and service providers would not be compromised. Malware residing in the internet can now use mobile devices and networks to propagate. To counter the challenge of mobile malware, we need to adopt more robust security enforcement mechanism. Our research problem is to deploy an efficient preventing system to help infected nodes to recover from further infection. Our system design uses cloud environment rather than the mobile devices, therefore co-location of multiple virtual machines and sharing the same resources increase the speed of analysis and allowing the application of multiple detection techniques simultaneously with the consideration of the heterogeneity of mobile devices and malware to prevent the malware propagation under the real world mobile system. The proposed system takes exact replicas of the phones in virtual environment. Application provisioning, maintenance, high availability and disaster recovery are inherent in the virtual environment. Our work considers the case of cross-OS malware.
Recently, the sizes of XML documents have rapidly been increasing. distributed XML is a novel form of XML document, in which an XML document is partitioned into fragments and managed separately in plural sites. Distri...
详细信息
ISBN:
(纸本)9781479942336
Recently, the sizes of XML documents have rapidly been increasing. distributed XML is a novel form of XML document, in which an XML document is partitioned into fragments and managed separately in plural sites. distributed XML documents can often be managed more easily than a single large document, due to geographical and/or administrative factors. In this paper, we propose a method for performing XSLT transformation efficiently for distributed XML documents. We assume that the expressive power of XSLT is restricted to an extended version of unranked top-down tree transducer. Our basic strategy is to transform all the XML fragments in parallel. We implemented our method in Ruby and made evaluation experiments. This result suggests that our method is more efficient than a centralized approach.
The design of naming and routing scheme is an important research area for scalable future internet infrastructure. Currently, existing naming and routing schemes such as hierarchical or flat structure have some indivi...
详细信息
ISBN:
(纸本)9781479947195
The design of naming and routing scheme is an important research area for scalable future internet infrastructure. Currently, existing naming and routing schemes such as hierarchical or flat structure have some individual drawbacks, which limit the development of future internet greatly. In this paper, we make an in-depth study of existing naming and routing schemes for future internet, and propose a naming scheme named HFA, which is built by a hybrid Hierarchical-Flat-Attributes structure. Based on this design, an efficient routing scheme using Trie and Hash Table is further proposed as the corresponding routing method. Experimental results show that the HFA has a good flexibility and superior performance with respective to purely hierarchical-based and flat-based naming scheme using our routing method in terms of routing aggregation, lookup time and memory consumption.
Cloud computing in recent years has seen enhanced growth and extensive support by the research community and industry. The advent of cloud computing realized the concept of commodity computing, in which infrastructure...
详细信息
ISBN:
(纸本)9781479927302
Cloud computing in recent years has seen enhanced growth and extensive support by the research community and industry. The advent of cloud computing realized the concept of commodity computing, in which infrastructure (resources) can be allocated on demand giving the illusion of infinite resource availability. The state-of-art Carrier and ISP infrastructure technology is composed of tightly coupled software services with the underlying customized hardware architecture. The fast growth of cloud computing as a vastly consolidated and stabilized technology is appealing to Carrier Providers in order to reduce Carrier deployment costs and enable a future of Carrier Clouds with easily accessible virtual carriers. For such migration to happen software services need to be generalized, to decouple hardware and software, and prepared to move into the Cloud. The network backbone is centrally managed and only provides network connectivity. We believe this presents an opportunity. The edges of such networks and the core are interconnected with high performance links. If services could be deployed in these edges they would benefit from enhanced locality to the user. In this position paper we propose a distributed cloud architecture (precisely a structured multi-cloud federated infrastructure), with minimal impact on existing infrastructure, as a first step to incorporate the Cloud into the network infrastructure of such providers, enabling and enhancing novel and existing applications.
Cloud computing infrastructures will likely be a key component of future internet architectures, owing to the many advantages of server and network virtualization, especially considering the emerging Network Function ...
详细信息
ISBN:
(纸本)9781479927302
Cloud computing infrastructures will likely be a key component of future internet architectures, owing to the many advantages of server and network virtualization, especially considering the emerging Network Function Virtualization and Software Defined Networking technologies. The cloud infrastructure will then determine the performance of the networking environment. In this paper, such issue is investigated with reference to OpenStack, a widely adopted cloud infrastructure management platform. In particular, the paper provides an insight on how OpenStack deals with multi-tenant network virtualization and evaluates the performance of its main network components by measuring packet throughput in an experimental test-bed.
internet of Things (IoT) is playing a more and more important role in modern agriculture development. However, problems of efficient storing and reasoning those massive heterogeneous sensor data collected from variety...
详细信息
暂无评论