The European Conference on Case-Based Reasoning (CBR) in 2008 marked IS years of international and European CBR conferences where almost seven hundred research papers were published. In this report we review the resea...
详细信息
The automatic allocation of enterprise workload to resources can be enhanced by being able to make 'whatif' response time predictions, whilst different allocations are being considered. It is important to quan...
详细信息
The automatic allocation of enterprise workload to resources can be enhanced by being able to make `what-if' response time predictions, whilst different allocations are being considered. It is important to quantit...
详细信息
ISBN:
(纸本)9781424465330
The automatic allocation of enterprise workload to resources can be enhanced by being able to make `what-if' response time predictions, whilst different allocations are being considered. It is important to quantitatively compare the effectiveness of different prediction techniques for use in cloud infrastructures. To help make the comparison of relevance to a wide range of possible cloud environments it is useful to consider the following. 1.) urgent cloud customers such as the emergency services that can demand cloud resources at short notice (e.g. for our FireGrid emergency response software). 2.) dynamic enterprise systems, that must rapidly adapt to frequent changes in workload, system configuration and/or available cloud servers. 3.) The use of the predictions in a coordinated manner by both the cloud infrastructure and cloud customer management systems. 4.) A broad range of criteria for evaluating each technique. However, there have been no previous comparisons meeting these requirements. This paper, meeting the above requirements, quantitatively compares the layered queuing and (¿HYDRA¿) historical techniques - including our initial thoughts on how they could be combined. Supporting results and experiments include the following: i.) defining, investigating and hence providing guidelines on the use of a historical and layered queuing model; ii.) using these guidelines showing that both techniques can make low overhead and typically over 70% accurate predictions, for new server architectures for which only a small number of benchmarks have been run; and iii.) defining and investigating tuning a prediction-based cloud workload and resource management algorithm.
Existing file-based communication with spacecraft has tended to be an ad-hoc affair using bespoke protocols and operational procedures. Recent developments in space communication protocols promise to move this to a mo...
详细信息
Several experiments have provided evidence that ego-centric distances are perceived as compressed in immersive virtual environments relative to the real world. The principal factors responsible for this phenomenon hav...
详细信息
We present a software system that enables path-traced rendering of complex scenes. The system consists of two primary components: an application layer that implements the basic rendering algorithm, and an out-of-core ...
详细信息
3D displays are coming phenomenon of the nearest future and it is expected that 3D displays will be widely available soon. There are currently some 3D displays available and also some notebooks with 3D display as Shar...
详细信息
3D displays are coming phenomenon of the nearest future and it is expected that 3D displays will be widely available soon. There are currently some 3D displays available and also some notebooks with 3D display as Sharp AL3D. The viewing position is quite restricted spatially in the case of 3D displays and also the (visual information for the left eye is taken by the right eye and vice versa) causes some severe problems in 3D image perception. This paper addresses several issues concerning 3D perception based on stereo-images. Another issues related to 3D stereo video perception, like discontinuities between frames etc. are not described here.
Modern smart buildings utilize sensor networks for facilities management applications such as energy monitoring. However as buildings become progressively more embedded with sensor networks, the challenge of managing ...
详细信息
A group key agreement (GKA) protocol allows a set of users to establish a common secret via open networks. Observing that a major goal of GKAs for most applications is to establish a confiDential channel among group m...
详细信息
暂无评论