Grid computing has emerged as an effective means of facilitating the sharing of distributed heterogeneous resources, enabling collaboration in large scale environments. However, the nature of grid systems coupled with...
详细信息
Grid computing has emerged as an effective means of facilitating the sharing of distributed heterogeneous resources, enabling collaboration in large scale environments. However, the nature of grid systems coupled with the overabundance and fragmentation of information, makes it difficult to monitor resources, services, and computations in order to plan and make decisions. In this paper we present Gridscape II, a customisable portal component that can be used on its own or plugged-in to compliment existing grid portals. Gridscape II manages the gathering of information from arbitrary, heterogeneous and distributed sources and presents them together seamlessly within a single interface. It also leverages the Google Maps API in order to provide a highly interactive user interface. Gridscape II is simple and easy to use, providing a solution to those users who do not wish to invest heavily in developing their own monitoring portal from scratch, and also for those users who want something easy to customise and extend for their specific needs
The advent of service-oriented grid computing has resulted in the need for grid resources such as clusters to enforce user-specific service needs and expectations. Service level agreements (SLAs) define conditions whi...
详细信息
The advent of service-oriented grid computing has resulted in the need for grid resources such as clusters to enforce user-specific service needs and expectations. Service level agreements (SLAs) define conditions which a cluster needs to fulfill for various jobs. An example of SLA requirement is the deadline by which a job has to be completed. In addition, these clusters implement job admission control so that overall service performance does not deteriorate due to accepting exceeding amount of jobs. However, their effectiveness is highly dependent on accurate runtime estimates of jobs. This paper thus examines the adverse impact of inaccurate runtime estimates for deadline constrained job admission control in clusters using the earliest deadline first (EDF) strategy and a deadline-based proportional processor share strategy called Libra. Simulation results show that an enhancement called LibraRisk can manage the risk of inaccurate runtime estimates better than EDF and Libra by considering the risk of deadline delay
Achieving acceptable quality of service in highly dynamic computing environments requires not only adaptation and reconfiguration of individual components of the system, but also collaboration among these components. ...
详细信息
Achieving acceptable quality of service in highly dynamic computing environments requires not only adaptation and reconfiguration of individual components of the system, but also collaboration among these components. To address these issues in adaptive multimedia applications, we propose COCA, a contract-based collaborative adaptation infrastructure. COCA uses contract specifications to describe the relationships among different system components, to generate code that realizes adaptive functionality, and to govern system-wide adaptive behavior during execution. COCA also provides a set of reusable adaptation services that enable legacy components to be integrated into an adaptive system. We demonstrate the use of COCA to construct an adaptive multimedia conferencing system from a collection of existing components that were not originally designed for interoperation.
We present a simple, local protocol, pCover, which provides partial (but high) coverage in sensor networks. Through pCover, we demonstrate that it is feasible to maintain a high coverage (~90%) while significantly inc...
详细信息
We present a simple, local protocol, pCover, which provides partial (but high) coverage in sensor networks. Through pCover, we demonstrate that it is feasible to maintain a high coverage (~90%) while significantly increasing coverage duration when compared with protocols that provide full coverage. In particular, we show that we are able to maintain 94% coverage for a duration that is 2.3-7 times the duration for which existing protocols maintain full coverage. Through simulations, we show that our protocol provides load balancing, i.e., the desired level of coverage is maintained (almost) until the point where all sensors deplete their batteries
Over the last few years, grid technologies have progressed towards a service-oriented paradigm that enables a new way of service provisioning based on utility computing models. Users consume these services based on th...
详细信息
Over the last few years, grid technologies have progressed towards a service-oriented paradigm that enables a new way of service provisioning based on utility computing models. Users consume these services based on their QoS (quality of service) requirements. In such “pay-per-use” grids, workflow execution cost must be considered during scheduling based on users' QoS constraints. In this paper, we propose a budget constraint based scheduling, which minimizes execution time while meeting a specified budget for delivering results. A new type of genetic algorithm is developed to solve the scheduling optimization problem and we test the scheduling algorithm in a simulated grid testbed.
As the Unified Modeling Language (UML) and modeldriven development (MDD) become increasingly common in industry, many developers are faced with the difficult task of understanding how an existing UML model realizes sy...
详细信息
As the Unified Modeling Language (UML) and modeldriven development (MDD) become increasingly common in industry, many developers are faced with the difficult task of understanding how an existing UML model realizes system requirements. Essentially, developers are required to understand the structure and behavior of UML models that they may have not created. Understanding these relationships is non-trivial, because the interactions in the model are not readily apparent. Commonly, the only means to elicit these relationships is visual inspection and guided simulation. This paper describes an alternative approach termed REVU (Requirements Visualization of UML), a process for visualizing functional requirements in terms of behavioral interactions in a UML model. We illustrate the use of this process with the visualization of scenarios for an adaptive light control system.
Evacuation planning plays a significant role in building evacuation. The purpose of this paper is to demonstrate how an evolutionary computation technique in the form of an estimation of distribution algorithm can be ...
详细信息
Evacuation planning plays a significant role in building evacuation. The purpose of this paper is to demonstrate how an evolutionary computation technique in the form of an estimation of distribution algorithm can be used in evacuation planning. This technique is used to evolve the number and location of exits in order to minimize overall evacuation time and reduce the number of casualties and injuries. The algorithm is applied to three day-care layouts, classified as playroom, lunchroom, and classroom settings. The algorithm generates an optimal or near-optimal configuration, and results across several trials can be used to determine the probability that an exit is needed for each possible location. The best exit configurations are presented for each of the three layouts, and a brief analysis is discussed. Although evacuation planning presented in this paper is focused on room layouts, evolutionary computation techniques have the potential to be implemented in large-scale evacuation planning
FlowUML is a logic-based system to validate information flow policies at the requirements specification phase of UML based designs. It uses Horn clauses to specify information flow polices that can be checked against ...
详细信息
An algorithm for time division multiple access (TDMA) is found to be applicable in converting existing distributed algorithms into a model that is consistent with sensor networks. Such a TDMA service needs to be self-...
详细信息
Accuracy of information transmission when a signal must be transmitted through a communication channel is of essential importance in design of communication systems. When system resources are limited, such as transmis...
详细信息
Accuracy of information transmission when a signal must be transmitted through a communication channel is of essential importance in design of communication systems. When system resources are limited, such as transmission bandwidths assigned to a wireless communication channel, appropriate utility of available resources becomes imperative. This paper investigates fundamental relationships between accuracy of information exchange and communication resources, on a platform of wireless communication channels that involve typical system blocks of data compression, quantization, and stochastic wireless channels. The main complexity relationships developed in this paper provide rigorous trade-off between resource consumptions and information processing errors of each block. When these relationships are integrated, an optimization procedure emerges that allows optimal allocation of resources to each system block, such as compression ratio, quantization levels, and transmission speed, to maximize overall information accuracy. Consequently, the overall errors of the transmitted signal will be minimized at the receiver end.
暂无评论