The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Shared computing environments such as Cloud, HPC and Grid Computing present a challenge for scheduling systems as they seek to balance incoming requests with available resources, maintain high utilization, be fair among users, and cope with environmental dynamicity. In this paper, we will introduce the FUD theorem. The FUD theorem is based on the premise that a scheduler's desire to optimize the three...
Hypervisor-based virtualization rapidly becomes a commodity, and it turns valuable in many scenarios such as resource optimization, uptime maximization, and consolidation. Container-based application virtualization is an appropriate solution to develop a light weighted partitioning by providing application isolation with less overhead. Undoubtedly, container based virtualization delivers a lightweight...
Fuzzing is attractive for finding vulnerabilities in binary programs. However, when the application's input space is huge, fuzzing cannot deal with it well. For discovering vulnerabilities more effective, researchers came up concolic testing, and there are much researches on it recently. A common limitation of concolic systems designed to create inputs is that they often concentrate on path-coverage...
One of the challenges faced by data-intensive computing is the problem of stragglers, which can significantly increase the job completion time. Various proactive and reactive straggler mitigation techniques have been developed to address the problem. The straggler identification scheme is a crucial part of the straggler mitigation techniques, as only when stragglers are detected not only correctly...
Denial of service (DOS) attacks are a serious threat to network security. These attacks are often sourced from virtual machines in the cloud, rather than from the attacker's own machine, to achieve anonymity and higher network bandwidth. Past research focused on analyzing traffic on the destination (victim's) side with predefined thresholds. These approaches have significant disadvantages. They are...
With the introduction of Web 2.0, there has been an extreme increase in the popularity of social bookmarking systems and folksonomies. In this paper, our motive is to develop a recommender system that is based on user assigned tags and content present on web pages. Although the tag recommendations in social tagging systems can be very accurate and personalized, there exists an issue of risk to the...
We present direct performance measurements for four popular scientific simulations on the Knights Landing (KNL) platform. Performance numbers for Broadwell processors are provided for contrast. The applications (NAMD, LAMMPS, GROMACS and CP2K) were selected from among the ten most used in the QCT developer cloud as well as best representative of workloads used by many users and, given their diversity,...
Virtual Reality (VR) research is accelerating the development of inexpensive real-time Brain Computer Interface (BCI). Hardware improvements that increase the capability of Virtual Reality displays and Brain Computer wearable sensors have made possible several new software frameworks for developers to use and create applications combining BCI and VR. It also enables multiple sensory pathways for communications...
Cloud computing is a type of Internet-based service computing that provides computing, storage and networking services to multiple users. With the increase of data size, computing capacity runs out quickly in cloud computing services. To fill the shortage of computation capacity, we propose to adopt variable precision by implementing unum (universal number), which is a number format different from...
Internet of Things (IoT) serves not only as an essential part of the new generation information technology but as an important development stage in the information era. IoT devices such as unmanned aerial vehicles, robots and wearable equipments have been widely used in recent years. For most organizations' inner networks, innumerable dynamic connections with Internet accessible IoT devices occur...
Supercomputers are widely applied in various domains, which have advantage of high processing capability and mass storage. With growing supercomputing users, the system security receives comprehensive attentions, and becomes more and more important. In this paper, according to the characteristics of supercomputing environment, we perform an in-depth analysis of existing security problems in the process...
In today's software and systems environments, security frameworks and models are evolving exponentially. Many traditional host-based frameworks are currently available to detect cyber threats in Linux environment. But there have been many challenges in detecting rootkits that modify the Linux Operating System (OS) kernel to avoid detection. These limitations have lead us to design a virtualization...
While assuming the role of Chief Security Officer, Network Security Designer, and Network Security Administrator, the intention of this research was to identify principle elements related to network security and provide an overview of potential threats, vulnerabilities, and countermeasures associated with technology designed to the IEEE 802.11 wireless LAN standard. In addition, fundamental security...
Recently, we are attending to the proliferation of Cloud Computing (CC) as the new trending internet-based-Platform. Thanks to the outsourcing paradigm, CC is enabling many services. Software as a Service (SaaS) is one of those cloud-based-services. Indeed, SaaS model allows providers to reduce the cost of maintenance and management by transferring traditional on premise deployment to public Cloud...
SaaS based cloud computing promises to provide dedicated and specialized computational resources on-premise and on a pay-per-use base to cloud consumers. These benefits, however, are traded with data confidentiality concerns: once data is transmitted to a cloud service, cloud consumers loose control over their data and remain in uncertainty about how their data is processed and disseminated inside...
In order to explain the geological structure accurately and quickly, we analyze the gas mixture gathered from the well by Infrared Spectroscopy Fourier Transform Spectrometer instead of gas chromatograph. In the process of the spectrum analysis, the reduction of the spectrum data dimention is very neccessary to perform. In this paper, we propose a feature extraction method is based on waveband selections...
The number of attacks that use sophisticated and complex methods increased lately. The main objective of these attacks is to largely infiltrate the target network and to stay undetected. Therefore, the attackers often use valid credentials and standard administrative tools to hide between legitimate user actions and to hinder detection. Most existing security systems, which use standard signature-based...
As a new computing paradigm, cloud computing has significantly contributed to the rapid development of massive data centers. However, the corresponding energy issue becomes increasingly challenging. In this paper, we focus on the energy saving issue for virtual machine (VM) selections on an overloaded host in a cloud computing environment. We analyze the energy influencing factors during a VM migration,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.