The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing has emerged as the primary and popular computing paradigm recently. Since cloud users move continuously, sustaining the required quality of service (QoS) in a cost effective manner is very challenging. For maintaining the required QoS for a moving user, the current cloud systems use some of the existing service replication or/and migration strategies. However, those policies become...
Cloud federation is a group of aggregated providers, who are mutually cooperating and collaborating to share their resources in order to improve each other services. It has lured the attention of commercial industries towards itself for its effective utilization of cloud resources. Effective management of the resource is very much required in order to increase the profits of an individual service...
In recent years, crowdsourcing has become essential in a wide range of Web applications. Human factors play a key role in achieving high quality answers in crowdsourcing-based solving tasks. The most major factor is pertained to the uncertainty of workers about the responses that they provide to resolve the task at hand. On the other hand, workers may have diverse levels of expertise and skill. It...
Machine Reassignment is a challenging problem for constraint programming (CP) and mixed integer linear programming (MILP) approaches, especially given the size of data centres. The multi-objective version of the Machine Reassignment Problem is even more challenging and it seems unlikely for CP or MILP to obtain good results in this context. As a result, the first approaches to address this problem...
The requirements in terms of reliability and availability have become crucial in the context of many modern information systems. Therefore, fault-tolerance support in these systems becomes pivotal. Among possible techniques used to increase fault-tolerance are checkpointing and message logging. Both, checkpoint and message log, are commonly said to be saved in a stable storage, which is an abstraction...
This paper focuses on designing an online feedback management system that collects data in the form of suggestions, ratings and comments, and applies machine learning capabilities to automatically extract relevant summaries of the suggestions posted in this automated suggestion system. We have analyzed two key requirements, anonymous feedback and credible feedback, to gain insight on the submitted...
The more information systems become complex, the more difficult it is to operate dependably. In this paper, we propose a method for reviewing operation manuals of information systems based on assurance case to verify the dependability of information systems. We show a preliminary result on applying the method to the operation manual for the supercomputer of Nagoya University.
The collection of learner events within a server-client architecture occurs either at server, client or both complementarily. Such collection may be incomplete due to various factors, particularly for client-based monitoring, where learners can disable, delete or even modify their event logs due to privacy policies. The quality and accuracy of any analysis based on such data collections depends critically...
The modern Web architecture basically follows the Representational State Transfer (REST) style. This style offers the architectural properties necessary to implement the Internet-scale Web. However, most authentication and delegation technologies that rely on session state actually deviate from the REST style. It must be noted, however, that the diversity of these technologies is imperative for the...
Rapid development of innovative location-centric applications promoted through widespread proliferation of wireless technology and availability of small handheld devices have brought about a new era in pervasive computing. Besides, they are constantly challenged by individual privacy protection necessities as the location information are stored and exchanged among entities and service providers. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.