Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud Scheduling System, the main purpose of which is to execute jobs optimally, i...
详细信息
Reliability, efficiency (in term of time consumption) and effectiveness in resources utilization are the desired quality attributes of Cloud Scheduling System, the main purpose of which is to execute jobs optimally, i.e. with minimum average waiting, turnaround and response time. Replication provides improved availability, decreased bandwidth use, increased fault tolerance, and improved scalability. To speed up access, file can be replicated so a user can access a nearby replica. In this paper, we propose architecture to convert Globally One Cloud to Locally Many Clouds. By combining replication and scheduling, this architecture will improve efficiency, accessibility and reliability. In the case of failure of one sub cloud or one cloud service, clients can start using another cloud under "failover" techniques. As a result, no one cloud service will go down.
Activity recognition focuses on inferring current user activities by leveraging sensory data available on today's sensor rich environment. Supervised learning has been applied pervasively for activity recognition....
详细信息
Unified Modelling Language (UML) has been conferred as the de facto standard in modeling by majority in the software system development community. Among the various types of diagrams that exist under the umbrella of U...
详细信息
Unified Modelling Language (UML) has been conferred as the de facto standard in modeling by majority in the software system development community. Among the various types of diagrams that exist under the umbrella of UML is Sequence Diagram. Sequence Diagrams are capable of modeling interactional behaviours as well as dynamic happenings in a system, and as such are generally used in the modeling of complex softwaresystems. However in this paper, Sequence Diagrams are used in the modeling of the IEEE 802.11 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. The Sequence Diagram representing this protocol will then be used for formal, mathematical analysis by first transforming the Sequence Diagram through the MDA model transformation tool called SD2PN, and performing analysis such as liveness analysis, boundedness analysis and reach ability analysis of the resulting Petri Net.
Dynamic system management may involve interaction between independent decision-making components which can lead to conflicts. Policy-based Managers Coordination (PobMC) was proposed as an adaptive framework that may h...
详细信息
ISBN:
(纸本)9781467308946
Dynamic system management may involve interaction between independent decision-making components which can lead to conflicts. Policy-based Managers Coordination (PobMC) was proposed as an adaptive framework that may handle such conflicts. In PobMC, policies are used to adapt the system behavior, coordinate managers' tasks and allow us to decouple the adaptation concerns from the application code. Thus, it is required to ensure whether the governing policies are enforced correctly. In this paper we check and evaluate the dynamic conflict avoidance algorithm proposed in our previous works. Policy combination algorithms (PACs) concepts are used in the analysis and the evaluation to avoid policy conflicts and to reach a unique decision.
Threshold concepts can be used to both organize disciplinary knowledge and explain why students have difficulties at certain points in the curriculum. Threshold concepts transform a student's view of the disciplin...
详细信息
ISBN:
(纸本)9781450316040
Threshold concepts can be used to both organize disciplinary knowledge and explain why students have difficulties at certain points in the curriculum. Threshold concepts transform a student's view of the discipline;before being learned, they can block a student's progress. In this paper, we propose that in computing, skills, in addition to concepts, can sometimes be thresholds. Some students report finding skills more difficult than concepts. We discuss some computing skills that may be thresholds and compare threshold skills and threshold concepts. Copyright 2012 ACM.
We report preliminary results from an ongoing investigation of how computing professionals perceive and value selfdirected learning, based on a qualitative analysis of interviews with ten computing professionals. The ...
详细信息
ISBN:
(纸本)9781450317955
We report preliminary results from an ongoing investigation of how computing professionals perceive and value selfdirected learning, based on a qualitative analysis of interviews with ten computing professionals. The professionals expect that future colleagues will have a well-developed ability to learn on their own. They indicate that professionals use a range of resources, strategies, and collaborators to help them learn. They find their work-related self-directed learning enjoyable, expressing a sense of confidence and pride;yet they often also find it to be a stressful never-ending process. Copyright 2012 ACM.
Decision Support systems (DSS) are computer programs that aid users in a problem solving or decision-making environment. DSS contains decision making information and other related data that may be of interest to unscr...
详细信息
In this paper, we describe and analyze the architecture of the proposed Debug Event Distribution Interconnect (EDI). The EDI transmits debug events, which are 1-bit signals, between debug entities in different areas o...
详细信息
In this paper, we describe and analyze the architecture of the proposed Debug Event Distribution Interconnect (EDI). The EDI transmits debug events, which are 1-bit signals, between debug entities in different areas of the Network-on-Chip based Multi-Processor System-on-Chip. The EDI replicates the NoC topology with an EDI node instantiated for each underlying NoC data module. Contention in the EDI node is handled by replicating the EDI in layers. The EDI generation is automatic, and uses as input the cross-triggering patterns that are not required to follow the communication patterns in the NoC. The generation and routing tool is also presented in this paper. The EDI is evaluated with four different implementations varying complexity and handling of contention. The area of a single EDI Layer is around 0.9% of the area occupied by the tested NoCs, using the lower area implementation. These results show that the proposed implementation of the EDI incurs low cost on the overall system.
Data replication is one of the mechanisms in data grid architecture since it improves data access and reliability. Therefore, the storage, availability, and consistency are important issues to be addressed in order to...
详细信息
In this study, a system of discrete optical pulse generation via a series of microring resonator (MRR) is presented. Chaotic signals can be generated by an optical soliton or a Gaussian pulse within a MRR system. Larg...
详细信息
In this study, a system of discrete optical pulse generation via a series of microring resonator (MRR) is presented. Chaotic signals can be generated by an optical soliton or a Gaussian pulse within a MRR system. Large bandwidth signals of optical soliton are generated by input pulse propagating within the MRRs, which can be used to form continuous wavelength or frequency with large tunable channel capacity. Therefore, distinguished discrete wavelength or frequency pulses can be generated by using localized spatial pulses via a networks communication system. Selected discrete pulses are more suitable to generate high-secured quantum codes because of the large free spectral range (FSR). Quantum codes can be generated by using a polarization control unit and a beam splitter, incorporating to the MRRs. In this work, frequency band of 10.7 MHz and 16 MHz and wavelengths of 206.9 nm, 1448 nm, 2169 nm and 2489 nm are localized and obtained which can be used for quantum codes generation applicable for secured networks communication.
暂无评论