Cloud Computing paradigm represents an opportunity for users to reduce costs and increase the efficiency, providing an alternative way of using services and computational resources. It represents both a technology for...
详细信息
Cloud Computing paradigm represents an opportunity for users to reduce costs and increase the efficiency, providing an alternative way of using services and computational resources. It represents both a technology for using computing infrastructures in a more efficient way, as well as a business model for selling computing resources. The possibility of dynamically acquire and use services and resources on the base of an on-demand, self-service, and pay-by-use business model, implies incredible flexibility in terms of management, which is otherwise hard to address. On the other hand, because of this flexibility, cyber attacks represent a serious danger, which can compromise performance and availability of the services provided to Cloud consumers. In this paper, we propose an open-source framework for designing distributed Intrusion Detection System for multiple Cloud vendor infrastructures. The proposed framework provides applicationprogramming Interface and tools to develop multiple probes, which can be dynamically deployed as a distributed architecture. It enables to collect security information at different Cloud architectural levels, which can be used to perform event correlation and diagnosis analysis of intrusion in the Cloud-based systems.
This article presents the challenges and compares the alternatives to interoperate between SIP-based systems and the emerging standards for web real-time communication (WebRTC). We argue for an endpoint- and web-focus...
详细信息
This article presents the challenges and compares the alternatives to interoperate between SIP-based systems and the emerging standards for web real-time communication (WebRTC). We argue for an endpoint- and web-focused architecture, and present both sides of the SIP in JavaScript approach. Until WebRTC has ubiquitous cross-browser availability, we suggest a fall-back strategy for web developer: detect and use HTML5 if available;otherwise, fall back to a browser plugin.
Businesses are increasingly using location analytics-which integrates organizational and geographic data-to help identify trends, develop more accurate predictions, and make better decisions.
Businesses are increasingly using location analytics-which integrates organizational and geographic data-to help identify trends, develop more accurate predictions, and make better decisions.
Location based services (LBS) are considered very relevant lot the users of mobile networks. All local events and facts related to area nearby seem to be more important that others which happen in remote places. Local...
详细信息
ISBN:
(纸本)9781467344715
Location based services (LBS) are considered very relevant lot the users of mobile networks. All local events and facts related to area nearby seem to be more important that others which happen in remote places. Localization data is used in all types of services: weather, traffic, tourist info, etc. One of its most important (and regulated by law) applications is providing persons location in case of emergency. This paper presents results of field tests related to assessment of accuracy of two most commonly used localization methods: Cell-Id and W3C Geo localization. The tests were conducted in the form of test drives along some of the most important roads in Poland. Position of the test vehicle obtained using analyzed methods was logged and compred to localization obtained from the Global Positioning System (GPS). Data collected during test drives was processed and statistical information about localization accuracy was calculated. Results obtained for different methods were compared and conclusions about localization quality are pro ided. The paper also describes test environment and data model which were used during work being reported.
Library migration is the process of replacing a third-party library in favor of a competing one during software maintenance. The process of transforming a software source code to become compliant with a new library is...
详细信息
ISBN:
(纸本)9781479929313
Library migration is the process of replacing a third-party library in favor of a competing one during software maintenance. The process of transforming a software source code to become compliant with a new library is cumbersome and error-prone. Indeed, developers have to understand a new applicationprogramming Interface (API) and search for the right replacements for the functions they use from the old library. As the two libraries are independent, the functions may have totally different structures and names, making the search of mappings very difficult. To assist the developers in this difficult task, we introduce an approach that analyzes source code changes from software projects that already underwent a given library migration to extract mappings between functions. We demonstrate the applicability of our approach on several library migrations performed on the Java open source software projects.
In a Cloud environment, an independent service or model referred to as object storage is used for the management of persistent data. This model provides a virtualized pool of storage resources and can be accessed via ...
详细信息
ISBN:
(纸本)9781479930128
In a Cloud environment, an independent service or model referred to as object storage is used for the management of persistent data. This model provides a virtualized pool of storage resources and can be accessed via applicationprogramming Interface (API) and/or simply a browser. Object storage is used to store the persistent data from various users through put/get methods and it also store the virtual machine images as objects. Cloud storage services are used by enterprises, home users and researchers to store their files that vary in size and formats. With the huge amount of stored data which is mostly unstructured, comes the related issue of finding the exact data relevant to the requirements of a user. In current offerings such as Amazon, Eucalyptus and Google, the contents or objects are defined by a key-value pair. These objects can be listed based on the key, but searching and finding contents with any other parameters (metadata) such as type, size, owner, time stamps etc., is not supported. In this paper we propose a metadata model that address the issue of collecting, adding, and storing metadata associated with objects in Eucalyptus Cloud. Furthermore, the stored metadata is utilized to provide the feature of fast, effective and efficient searching of contents in a Cloud.
Near the dawn of the petascale era, IO libraries had reached a stability in their function and data layout with only incremental changes being incorporated. The shift in technology, particularly the scale of parallel ...
详细信息
ISBN:
(纸本)9781450323789
Near the dawn of the petascale era, IO libraries had reached a stability in their function and data layout with only incremental changes being incorporated. The shift in technology, particularly the scale of parallel file systems and the number of compute processes, prompted revisiting best practices for optimal IO performance. Among other efforts like PLFS, the project that led to ADIOS, the ADaptable IO System, was motivated by both the shift in technology and the historical requirement, for optimal IO performance, to change how simulations performed IO depending on the platform. To solve both issues, the ADIOS team, along with consultation with other leading IO experts, sought to build a new IO platform based on the assumptions inherent in the petascale hardware platforms. This paper helps inform the design of future IO platforms with a discussion of lessons learned as part of the process of designing and building ADIOS.
FPGAs enable NoC architecture experimentation, although to be effective they need to be supported by tools and frameworks for construction of the NoC and effective software programming of the NoC. In this paper, we fo...
详细信息
ISBN:
(纸本)9781479920785
FPGAs enable NoC architecture experimentation, although to be effective they need to be supported by tools and frameworks for construction of the NoC and effective software programming of the NoC. In this paper, we focus upon effective programming of the NoC using Java, complementing previous work which proposes the Blueshell framework for NoC generation for FPGAs. The approach taken is called Network-Chi, providing a number of key extensions to the Chi Java compiler. This includes provision of a networking API within Java giving a mesh based abstraction for network communication, allowing the programmer to send Java objects to other nodes without consideration for the underlying hardware topology or protocols;and a region-based memory management API that enables the definition of transient allocation contexts that discard all objects allocated within them when they reach the end of execution. Results show the approach taken to be efficient and effective.
暂无评论