The current Internet did not define any inherent management constructs and mechanisms; such concepts were added after networking standards and architectures were constructed. This also influenced network management fo...
详细信息
The current Internet did not define any inherent management constructs and mechanisms; such concepts were added after networking standards and architectures were constructed. This also influenced network management for other types of networks. This paper is the first in a series that explores concepts for a new autonomic approach to network management that can be used for current and next generation networks as well as for the Future Internet.
Next generation networks, as well as the future Internet, aim to provide context-sensitive business services that adapt to changing user needs, business goals, and environmental conditions. This paper describes the co...
详细信息
Next generation networks, as well as the future Internet, aim to provide context-sensitive business services that adapt to changing user needs, business goals, and environmental conditions. This paper describes the composition of an autonomic element, as a fundamental part of an autonomic architecture, which uses information models and semantics to link the business services with the services provided by the underlying network devices. This linkage is inherently context-aware, and allows context changes to determine the impact of changes in the network towards business services and vice versa. The described autonomic element is a programmable toolbox supporting the clean-slate approach as well as evolutionary approaches for the future Internet.
In this paper we consider the importance of explicit knowledge management, taking into account the growth of global softwareengineering and the importance of corporate knowledge. We conclude by suggesting specific ar...
详细信息
In this paper we consider the importance of explicit knowledge management, taking into account the growth of global softwareengineering and the importance of corporate knowledge. We conclude by suggesting specific areas of research which should be considered important for the implementation of knowledge management within global softwareengineering environments.
The massive, simultaneous redesign of all degrees in European Higher Education Area presents daunting chalLênges but also offers unprecedented opportunities. All degrees must be simultaneously redesigned;synergie...
详细信息
ISBN:
(纸本)9789898111821
The massive, simultaneous redesign of all degrees in European Higher Education Area presents daunting chalLênges but also offers unprecedented opportunities. All degrees must be simultaneously redesigned;synergies among them can be effectively exploited, thus encouraging the re-utilization oriented approaches discussed in this paper (LCMS, standards like LOM, Dublin Corem QTI, IMS, SCORM, etc.). On the other hand, shifting the unit of academic measurement to student hours (through the ECTS) facilitates the seamLêss combination of face-to-face, distance and bLênded Lêarning in academic degrees.
Modeling parasitic parameters of Through-Silicon-Via (TSV) structures is essential in exploring electrical characteristics such as delay and signal integrity (SI) of circuits and interconnections in three-dimensional ...
详细信息
Modeling parasitic parameters of Through-Silicon-Via (TSV) structures is essential in exploring electrical characteristics such as delay and signal integrity (SI) of circuits and interconnections in three-dimensional (3-D) integrated circuits (ICs). This paper presents a complete set of self-consistent equations including self and coupling terms for resistance, capacitance and inductance of various TSV structures. Further, a reduced-order electrical circuit model is proposed for isolated TSVs as well as bundled structures for delay and SI analysis, and extracted TSV parasitics are employed in Spectre simulations for performance evaluations. Critical issues in the performance modeling for design space exploration of 3-D ICs such as cross-talk induced switching pattern dependent delay variation and cross-talk on noise are discussed. The error in these metrics when using the proposed models as compared to a field solver is contained to a few percentage points.
Feature modeling is an essential activity for modeling and managing the variability of a software product line. On the other hand, aspect-oriented programming provides effective means for modularizing feature implemen...
详细信息
Feature modeling is an essential activity for modeling and managing the variability of a software product line. On the other hand, aspect-oriented programming provides effective means for modularizing feature implementation. Although current AOP tools (e.g., AJDT) provide a mechanism for switching aspect modules on and off to configure a product, this becomes infeasible in the context of large-scale product lines with thousands of variations. In this paper, we describe how feature modeling can be integrated with aspect-oriented programming to perform automated product derivation efficiently and effectively in the context of large-scale product lines.
Trust-based solutions provide some form of payment to peers to encourage good behavior. The problem with trust management systems is that they require prior knowledge to work. In other words, peers are vulnerable to a...
详细信息
Trust-based solutions provide some form of payment to peers to encourage good behavior. The problem with trust management systems is that they require prior knowledge to work. In other words, peers are vulnerable to attack if they do not have knowledge or correct knowledge of other peers in a trust management system. Therefore, considering only trust is inadequate when a decision is made to identify the best set of peers to utilize. In order to solve the problem, we propose a distributed decision-making mechanism for wireless P2P networks based on game theory and relevant trust mechanisms in which we incorporate the element of trust and risk into a single mode. The main idea of our mechanism is to use utility function to express the relationship between benefits and costs of peers, and then make the decision based on expected utility as well as risk attitude in a fully distributed fashion. The unique feature of our mechanism is that it not only helps a peer to select its partners, but also mitigates vulnerabilities in trust-based mechanisms. Through analysis and experiments, we believe our approach is useful for peers to make the decision regarding who to interact with. In addition, it is also a good starting point for exploring tradeoffs among risk, trust and utility.
Cloud computing aims to power the next generation data centers and enables application service providers to lease data center capabilities for deploying applications depending on user QoS (Quality of Service) requirem...
详细信息
Cloud computing aims to power the next generation data centers and enables application service providers to lease data center capabilities for deploying applications depending on user QoS (Quality of Service) requirements. Cloud applications have different composition, configuration, and deployment requirements. Quantifying the performance of resource allocation policies and application scheduling algorithms at finer details in Cloud computing environments for different application and service models under varying load, energy performance (power consumption, heat dissipation), and system size is a challenging problem to tackle. To simplify this process, in this paper we propose CloudSim: an extensible simulation toolkit that enables modelling and simulation of Cloud computing environments. The CloudSim toolkit supports modelling and creation of one or more virtual machines (VMs) on a simulated node of a Data Center, jobs, and their mapping to suitable VMs. It also allows simulation of multiple Data Centers to enable a study on federation and associated policies for migration of VMs for reliability and automatic scaling of applications.
暂无评论