The prevailing traffic models based on Markov processes have a short-term dependence and, as applied to computer networks, led to an underestimation of the load. Fractal properties of network traffic looks the same wi...
详细信息
The prevailing traffic models based on Markov processes have a short-term dependence and, as applied to computer networks, led to an underestimation of the load. Fractal properties of network traffic looks the same wi...
详细信息
ISBN:
(数字)9781728161303
ISBN:
(纸本)9781728161310
The prevailing traffic models based on Markov processes have a short-term dependence and, as applied to computer networks, led to an underestimation of the load. Fractal properties of network traffic looks the same with a sufficiently large scale of the time axis, exhibits a long-term dependence, and are more preferable for solving the computer security tasks. The paper presents a method for detecting network traffic anomalies based on the assertion that traffic is a fractal. It is assumed that network traffic is a self-similar structure and is modeled by a fractal Brownian motion. Fractal analysis and mathematical statistics were used as tools in the development of this method. Experimental testing showed a rather high accuracy of the method and its ability to detect network traffic anomalies caused by DoS attacks.
Energy consumption is a primary concern for datacenter (DC) management. Its cost represents a significant part of the total cost of ownership (about 80% [2]) and it is estimated that in 2020, US DCs will spend about $...
详细信息
ISBN:
(纸本)9781450358460
Energy consumption is a primary concern for datacenter (DC) management. Its cost represents a significant part of the total cost of ownership (about 80% [2]) and it is estimated that in 2020, US DCs will spend about $13 billion on energy bills [3]. A majority of DCs implements the Infrastructure as a Service (IaaS) model where customers buy (from providers) VMs with a set of reserved resources. The VMs host general purpose applications (e.g. web services), as well as High Performance Computing applications. In such IaaS DCs, virtualization is a fundamental technology which allows optimizing the infrastructure by colocating several VMs on the same physical server. Such colocation can be achieved at deployment time by starting as many VMs as possible on each physical machine, or at runtime by dynamically migrating VMs on a reduced set of physical machines, thus implementing a consolidation strategy [4]. Ideally, consolidation should lead to highly loaded servers. Although consolidation may increase server utilization by about 5-10%, it is difficult to actually observe server loads greater than 50% for even the most adapted workloads [5–7]. The main reason is that VM collocation is memory bound, as memory saturates much faster than the CPU. This situation was accentuated over the last several years, as we have seen emerging new applications with growing memory demands, while physical platforms had an opposite tendency;they provide more CPU capacity than physical memory. This mismatch is referred to as the memory capacity wall [8]. However, the existing consolidation systems [9, 10] take the CPU as a pivot, i.e. the central element of the consolidation. The memory is considered constant (i.e. the initially booked value) all over the VM’s lifetime. Nevertheless, we consider that the memory should be the consolidation pivot since it is the limiting resource. In order to reduce the memory pressure, the consolidation should consider the memory actually consumed (i.e. the VM
Energy consumption is a primary concern for datacenters' management. Numerous datacenters are relying on virtualization, as it provides flexible resource management means such as virtual machine (VM) checkpoint/re...
详细信息
Complex networks from scopes like Sociology or Biology are exist in many e-Science data sets. Mostly we need to computational algorithms for dealing with networks. For Example, detecting characteristic patterns, netwo...
详细信息
A combination of the LZ78 method with a new scheme of model contexting is introduced. In the proposed scheme the hashing function is also used. This approach speeds up the searching process and has an improvement over...
详细信息
A combination of the LZ78 method with a new scheme of model contexting is introduced. In the proposed scheme the hashing function is also used. This approach speeds up the searching process and has an improvement over model contexting.
Interpolation techniques are widely used in many applications of signal processing. This paper is devoted to synthesizing and efficiently implementing a class of generalized spline-interpolators. A new parametric clas...
详细信息
Interpolation techniques are widely used in many applications of signal processing. This paper is devoted to synthesizing and efficiently implementing a class of generalized spline-interpolators. A new parametric class of generalized B-splines is introduced. It contains as special cases B-splines and alternative B-splines. In the most general case, the proposed spline functions can be represented as a linear combination of the weighted and shifted classic B-splines of different orders. The applicability of the resulting splines to discrete-time interpolation is investigated and compared to classical splines. Furthermore, the implementation of the discrete-time interpolation with the aid of efficient digital filter structures is considered in detail.
This book constitutes the proceedings of the Third International Conference on Interactive Collaborative Robotics, ICR 2018, held in Leipzig, Germany, in September 2018, as a satellite event of the 20th ...
详细信息
ISBN:
(数字)9783319995823
ISBN:
(纸本)9783319995816
This book constitutes the proceedings of the Third International Conference on Interactive Collaborative Robotics, ICR 2018, held in Leipzig, Germany, in September 2018, as a satellite event of the 20th International Conference on Speech and Computer, SPECOM 2018.;The 30 papers presented in this volume were carefully reviewed and selected from 51 submissions. The papers presents challenges of human-robot interaction, robot control and behavior in social robotics and collaborative robotics, as well as applied robotic and cyberphysical systems.
暂无评论