By Topic
Skip to Results

Search Results

You searched for: cloud computing
19,670 Results returned
Skip to Results
  • Save this Search
  • Download Citations Disabled
  • Save To Project
  • Email
  • Print
  • Export Results
  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Time-Shift Current Balance Technique in Four-Phase Voltage Regulator Module with 90% Efficiency for Cloud Computing

    Yi-Ping Su ; Wei-Chung Chen ; Yu-Ping Huang ; Chun-Yen Chen ; Chia-Lung Ni ; Ke-Horng Chen
    Power Electronics, IEEE Transactions on

    Volume: 30 , Issue: 3
    DOI: 10.1109/TPEL.2014.2321177
    Publication Year: 2015 , Page(s): 1521 - 1534

    IEEE Journals & Magazines

    Four power stages for voltage regulator module (VRM) are adopted to provide high current driving capability and low output ripple in cloud computing. Thus, the time-shift current balance (TSCB) technique is proposed to achieve high performance power supply for servers. In addition, the power request, which includes the number of active phases and voltage identification, is acknowledged by servers for high driving capability during high throughput and high efficiency during standby mode. Furthermore, to equally distribute the current in each phase, the proposed TSCB technique in either voltage-mode or peak current-mode control improves the current balance performance and solves the stability problem. In the scale-down clouding computing prototype, the efficiency can be kept higher than 90% over a wide load current range of 2 A. In addition, the performance and operating frequency of the servers in stable operation are not limited by the VRM with the TSCB technique. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Cloud Radio-Multistatic Radar: Joint Optimization of Code Vector and Backhaul Quantization

    Khalili, S. ; Simeone, O. ; Haimovich, A.M.
    Signal Processing Letters, IEEE

    Volume: 22 , Issue: 4
    DOI: 10.1109/LSP.2014.2363939
    Publication Year: 2015 , Page(s): 494 - 498

    IEEE Journals & Magazines

    A multistatic radar set-up is considered in which distributed receive antennas are connected to a Fusion Center (FC) via limited-capacity backhaul links. Similar to cloud radio access networks in communications, the receive antennas quantize the received baseband signal before transmitting it to the FC. The problem of maximizing the detection performance at the FC jointly over the code vector used by the transmitting antenna and over the statistics of the noise introduced by backhaul quantization is investigated. Specifically, adopting the information-theoretic criterion of the Bhattacharyya distance to evaluate the detection performance at the FC and information-theoretic measures of the quantization rate, the problem at hand is addressed via a Block Coordinate Descent (BCD) method coupled with Majorization-Minimization (MM). Numerical results demonstrate the advantages of the proposed joint optimization approach over more conventional solutions that perform separate optimization. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A case study on IVR applications' provisioning as cloud computing services

    Belqasmi, F. ; Azar, C. ; Glitho, R. ; Soualhia, M. ; Kara, N.
    Network, IEEE

    Volume: 28 , Issue: 1
    DOI: 10.1109/MNET.2014.6724104
    Publication Year: 2014 , Page(s): 33 - 41

    IEEE Journals & Magazines

    Interactive Voice Response (IVR) applications (e.g. automated attendant, automated survey) have become ubiquitous. However, very few, if any, IVR applications are provisioned today as cloud computing services despite all the potential benefits. Cloud computing is an emerging multi-faceted paradigm, whose main facets are Infrastructure as a Service-IaaS, Platform as a Service-PaaS, and Software as a Service-SaaS. This paper proposes a case study on IVR applications' provisioning as cloud computing services. It identifies the IVR substrates (e.g. key detector, voice recorder and dialog manager) on which the IVR applications rely and proposes at the IaaS level an IVR substrate virtualization infrastructure. Substrates' virtualization enables a more efficient resource usage, a key benefit inherent to cloud computing. The article also proposes at the PaaS level an accompanying platform to develop and manage the IVR applications which use the identified virtualized substrates. A few typical IVR applications are also developed and managed to illustrate the SaaS facet of cloud computing. The implementation is described, along with the prototype and the performance measurements. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Automating Cloud Services Life Cycle through Semantic Technologies

    Joshi, K.P. ; Yesha, Y. ; Finin, T.
    Services Computing, IEEE Transactions on

    Volume: 7 , Issue: 1
    DOI: 10.1109/TSC.2012.41
    Publication Year: 2014 , Page(s): 109 - 122

    IEEE Journals & Magazines

    Managing virtualized services efficiently over the cloud is an open challenge. Traditional models of software development are not appropriate for the cloud computing domain, where software (and other) services are acquired on demand. In this paper, we describe a new integrated methodology for the life cycle of IT services delivered on the cloud and demonstrate how it can be used to represent and reason about services and service requirements and so automate service acquisition and consumption from the cloud. We have divided the IT service life cycle into five phases of requirements, discovery, negotiation, composition, and consumption. We detail each phase and describe the ontologies that we have developed to represent the concepts and relationships for each phase. To show how this life cycle can automate the usage of cloud services, we describe a cloud storage prototype that we have developed. This methodology complements previous work on ontologies for service descriptions in that it is focused on supporting negotiation for the particulars of a service and going beyond simple matchmaking. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A Taxonomy for SLA-Based Monitoring of Cloud Security

    Petcu, D.
    Computer Software and Applications Conference (COMPSAC), 2014 IEEE 38th Annual

    DOI: 10.1109/COMPSAC.2014.50
    Publication Year: 2014 , Page(s): 640 - 641

    IEEE Conference Publications

    A fast analysis of the state-of-the-art can show that SLA-based Cloud security monitoring services are not yet available. SLA-based Cloud monitoring services are oriented towards performance monitoring, while the current Cloud security monitoring is not SLA-based. In order to design and implement such a service a first step is the identification of the basic requirements. The taxonomies available for the fields of Cloud computing, monitoring, security and SLAs are expected to be used. This short note proposes a visual taxonomy intended to serve the design of an SLA-based Cloud security monitoring. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A Taxonomic Perspective on Certification Schemes: Development of a Taxonomy for Cloud Service Certification Criteria

    Schneider, S. ; Lansing, J. ; Fangjian Gao ; Sunyaev, A.
    System Sciences (HICSS), 2014 47th Hawaii International Conference on

    DOI: 10.1109/HICSS.2014.614
    Publication Year: 2014 , Page(s): 4998 - 5007

    IEEE Conference Publications

    Numerous cloud service certifications (CSCs) are emerging in practice. However, in their striving to establish the market standard, CSC initiatives proceed independently, resulting in a disparate collection of CSCs that are predominantly proprietary, based on various standards, and differ in terms of scope, audit process, and underlying certification schemes. Although literature suggests that a certification's design influences its effectiveness, research on CSC design is lacking and there are no commonly agreed structural characteristics of CSCs. Informed by data from 13 expert interviews and 7 cloud computing standards, this paper delineates and structures CSC knowledge by developing a taxonomy for criteria to be assessed in a CSC. The taxonomy consists of 6 dimensions with 28 subordinate characteristics and classifies 328 criteria, thereby building foundations for future research to systematically develop and investigate the efficacy of CSC designs as well as providing a knowledge base for certifiers, cloud providers, and users. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Technological challenges in health care

    Tummala, R.L. ; Chagantipati, M.
    World Automation Congress (WAC), 2014

    DOI: 10.1109/WAC.2014.6935751
    Publication Year: 2014 , Page(s): 169 - 172

    IEEE Conference Publications

    Increasing demands on health care is caused by aging population and passing of legislation such as affordable health care act. It is a well known fact that large number of baby boomers is reaching retirement in the very near future. Many people will be entering nursing homes, retirement homes or prefer to stay home. This along with Affordable health care act creates a huge demand for providing efficient and timely health care for this population. The colleges will not be producing medical doctors, nurses and other professionals fast enough to meet this growing demand. With the increasing availability of sensors, computation and wireless networks, some of these challenges can be met economically and efficiently. The purpose of this paper is to address the issues involved and provide some solutions in meeting these future challenges. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design

    Shropshire, J.
    System Sciences (HICSS), 2014 47th Hawaii International Conference on

    DOI: 10.1109/HICSS.2014.615
    Publication Year: 2014 , Page(s): 5008 - 5017

    IEEE Conference Publications

    This research focuses on hyper visor security from holistic perspective. It centers on hyper visor architecture - the organization of the various subsystems which collectively compromise a virtualization platform. It holds that the path to a secure hyper visor begins with a big-picture focus on architecture. Unfortunately, little research has been conducted with this perspective. This study investigates the impact of monolithic and micro kernel hyper visor architectures on the size and scope of the attack surface. Six architectural features are compared: management API, monitoring interface, hyper calls, interrupts, networking, and I/O. These subsystems are core hyper visor components which could be used as attack vectors. Specific examples and three leading hyper visor platforms are referenced (ESXi for monolithic architecture; Xen and Hyper-V for micro architecture). The results describe the relative strengths and vulnerabilities of both types of architectures. It is concluded that neither design is more secure, since both incorporate security tradeoffs in core processes. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A Secure Cloud Manager for the X1.V1 Platform

    Marzini, E. ; Mori, P. ; Di Bona, S. ; Guerri, D. ; Lettere, M. ; Ricci, L.
    Computer-Based Medical Systems (CBMS), 2014 IEEE 27th International Symposium on

    DOI: 10.1109/CBMS.2014.125
    Publication Year: 2014 , Page(s): 533 - 536

    IEEE Conference Publications

    The increasing number and complexity of e-health services provided to citizens push healthcare organizations to adopt powerful computing systems to deal with the resulting workload. The adoption of the Cloud to host such services is a promising solution to address the increasing demand for computational power and also to deal with expected or unexpected computational peaks. This paper proposes a framework that allows the execution on the Cloud of the X1.V1 platform, which is a commercial product that supports a number of e-health services as well as the interoperability among different healthcare environments. This framework is meant to enable an easy and quick management of the Cloud resources allocated to the X1.V1 platform, in order to enhance the platform performances and optimize resources utilization. The design of the framework takes into account security aspects as well, because unauthorized accesses could lead to serious inefficiencies of the e-health services. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A real-time implementation of CoMP transmission based on cloud-RAN infrastructure

    Bobo Cheng ; Xiang Mi ; Xibin Xu ; Zhan Xu ; Xiangxiang Xu ; Ming Zhao
    Wireless Communications and Mobile Computing Conference (IWCMC), 2014 International

    DOI: 10.1109/IWCMC.2014.6906497
    Publication Year: 2014 , Page(s): 1033 - 1038

    IEEE Conference Publications

    Cloud-RAN is an entirely new wireless radio access paradigm based on GPP(General Purpose Processor) platform. It integrates the ideas of centralized processing, collaborative radio and real-time cloud infrastructure. CoMP (Coordinated Multiple Points) is a key technique in LTE-Advanced. But it is really a challenge to implement real-time CoMP transmission on GPP platform because many factors can affect the performance of soft CoMP base stations. In this paper, We implemented a real-time CoMP architecture on GPP platform by optimizing soft base stations design and data exchange categories. This architecture is fully compatible with TD-LTE R8/R9. The test results show that it can ensure real-time processing and provide stable downlink CoMP transmission for TD-LTE R8/R9 users. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    NCCloud: A Network-Coding-Based Storage System in a Cloud-of-Clouds

    Chen, H.C.H. ; Yuchong Hu ; Lee, P.P.C. ; Yang Tang
    Computers, IEEE Transactions on

    Volume: 63 , Issue: 1
    DOI: 10.1109/TC.2013.167
    Publication Year: 2014 , Page(s): 31 - 44
    Cited by:  Papers (1)

    IEEE Journals & Magazines

    To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud vendors. However, if a cloud suffers from a permanent failure and loses all its data, we need to repair the lost data with the help of the other surviving clouds to preserve data redundancy. We present a proxy-based storage system for fault-tolerant multiple-cloud storage called NCCloud, which achieves cost-effective repair for a permanent single-cloud failure. NCCloud is built on top of a network-coding-based storage scheme called the functional minimum-storage regenerating (FMSR) codes, which maintain the same fault tolerance and data redundancy as in traditional erasure codes (e.g., RAID-6), but use less repair traffic and, hence, incur less monetary cost due to data transfer. One key design feature of our FMSR codes is that we relax the encoding requirement of storage nodes during repair, while preserving the benefits of network coding in repair. We implement a proof-of-concept prototype of NCCloud and deploy it atop both local and commercial clouds. We validate that FMSR codes provide significant monetary cost savings in repair over RAID-6 codes, while having comparable response time performance in normal cloud storage operations such as upload/download. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    On the Knowledge Soundness of a Cooperative Provable Data Possession Scheme in Multicloud Storage

    Huaqun Wang ; Yuqing Zhang
    Parallel and Distributed Systems, IEEE Transactions on

    Volume: 25 , Issue: 1
    DOI: 10.1109/TPDS.2013.16
    Publication Year: 2014 , Page(s): 264 - 267

    IEEE Journals & Magazines

    Provable data possession (PDP) is a probabilistic proof technique for cloud service providers (CSPs) to prove the clients' data integrity without downloading the whole data. In 2012, Zhu et al. proposed the construction of an efficient PDP scheme for multicloud storage. They studied the existence of multiple CSPs to cooperatively store and maintain the clients' data. Then, based on homomorphic verifiable response and hash index hierarchy, they presented a cooperative PDP (CPDP) scheme from the bilinear pairings. They claimed that their scheme satisfied the security property of knowledge soundness. It is regretful that this comment shows that any malicious CSP or the malicious organizer (O) can generate the valid response which can pass the verification even if they have deleted all the stored data, i.e., Zhu et al.'s CPDP scheme cannot satisfy the property of knowledge soundness. Then, we discuss the origin and severity of the security flaws. It implies that the attacker can get the pay without storing the clients' data. It is important to clarify the scientific fact to design more secure and practical CPDP scheme in Zhu et al.'s system architecture and security model. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Research and standards: Leading the evolution of telecom network architectures

    Taleb, T. ; Ksentini, A. ; Reznik, A. ; Metsch, T.
    Wireless Communications, IEEE

    Volume: 21 , Issue: 3
    DOI: 10.1109/MWC.2014.6845043
    Publication Year: 2014 , Page(s): 10 - 11

    IEEE Journals & Magazines

    The emergence of new communication paradigms, such as cloud computing, the Internet of Things, the mobile traffic explosion, and the expectation of ubiquitous connectivity, is driving what is perhaps the most significant transformation of the architecture of mobile and wireless network systems yet. Simply put, telecom network architectures need to evolve to support an exponentially more complex and diverse set of applications. Not surprisingly, this challenge has been attracting ever increasing attention from researchers in both academia and industry, including telecom standards experts. As enablers of global systems interoperability, standards are at the heart of success of the communications industry. Since standardization is inherently a social enterprise, it is the perfect environment for promoting technologies that underpin an increasingly social world. Moreover, telecommunications-oriented standards development organizations such as the IEEE, Internet Engineering Task Force (IETF), Third Generation Partnership Project (3GPP), and others have a decades-long track record as drivers of real technological change across the industry. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Aerial object tracking from an airborne platform

    Nussberger, A. ; Grabner, H. ; Van Gool, L.
    Unmanned Aircraft Systems (ICUAS), 2014 International Conference on

    DOI: 10.1109/ICUAS.2014.6842386
    Publication Year: 2014 , Page(s): 1284 - 1293

    IEEE Conference Publications

    The integration of drones into the civil airspace is still an unresolved problem. In this paper we present an experimental Sense and Avoid system integrated into an aircraft to detect and track other aerial objects with electro-optical sensors. The system is based on a custom aircraft nose-pod with two integrated cameras and several additional sensors. First test flights were successfully completed where data from artificial collision scenarios executed by two aircraft were recorded. We give an overview of the recorded dataset and show the challenges to be faced with processing videos from a mobile airborne platform in a mountainous area. The proposed tracking framework is based on measurements from multiple detectors fused onto a virtual sphere centered at the aircraft position. To reduce false tracks from ground clutter, clouds or dirt on the lens, a hierarchical multi-layer filter pipeline is applied. The aerial object tracking framework is evaluated on various scenarios from our challenging dataset. We show that aerial objects are successfully detected and tracked at large distances, even in front of terrain. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Research on abandoned and removed objects detection based on embedded system

    Bin Hu ; Yiyue Li ; Zizhang Chen ; Gang Xiong ; FengHua Zhu
    Intelligent Transportation Systems (ITSC), 2014 IEEE 17th International Conference on

    DOI: 10.1109/ITSC.2014.6958166
    Publication Year: 2014 , Page(s): 2968 - 2971

    IEEE Conference Publications

    This paper presents a real-time detection algorithm which detects abandoned objects in embedded Intelligent Video Surveillance (IVS) System. This algorithm uses two different Gaussian mixture models (GMM) with different learning rates to extract the foreground in order to detect the abandoned objects and output alarms. Experimental results show the algorithm is robust and well-performed in different circumstances. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Game Theoretic Dynamic Spectrum Access in Cloud-Based Cognitive Radio Networks

    Rawat, D.B. ; Shetty, S. ; Raza, K.
    Cloud Engineering (IC2E), 2014 IEEE International Conference on

    DOI: 10.1109/IC2E.2014.16
    Publication Year: 2014 , Page(s): 586 - 591

    IEEE Conference Publications

    Radio Frequency (RF) resource allocation in a Cognitive Radio Network (CRN) is considerably constrained by its limited power, memory and computational capacity. With the emergence of cloud computing platforms, CRN has the potential to mitigate these constraints by leveraging the vast storage and computational capacity. In this paper, we proposed a game theoretic approach for resource allocation in cloud-base cognitive radio network. The proposed algorithm leverages the geolocation of secondary users and idle licensed bands to facilitate dynamic spectrum access to secondary users. Furthermore, the active secondary users adapt their transmit power using game theoretic approach in distributed manner based on the network condition in terms of estimated average packet error rate while satisfying the Quality-of-Service (QoS) in terms of signal-to-interference-plus-noise ratio. To control greedy secondary users in distributed power control game, we introduce a manager through a Stackelberg power adaptation game. Simulation results are presented to demonstrate the performance of the proposed radio resource management algorithm. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    On the Evaluation of VM Provisioning Time in Cloud Platforms for Mission-Critical Infrastructures

    Carrozza, G. ; Battaglia, L. ; Manetti, V. ; Marotta, A. ; Canonico, R. ; Avallone, S.
    Cluster, Cloud and Grid Computing (CCGrid), 2014 14th IEEE/ACM International Symposium on

    DOI: 10.1109/CCGrid.2014.94
    Publication Year: 2014 , Page(s): 802 - 810

    IEEE Conference Publications

    Cloud Computing has risen a great interest over the last years as it represents an enabling technology for flexible and ubiquitous access over the network to a set of shared computing resources. This work comes from an industrial experience aiming at exploiting the cloud potential for virtualizing complex infrastructures such as an entire Air Traffic Center (ATC), a clear example of complex SoS (System of Systems). The use of virtualization is convenient because industry can leverage in-house test-beds to perform distributed testing campaigns in pre-operational phases or to design new automatic fail-over mechanisms for fully distributed systems. In order to realize such mitigation and recovery techniques in the ATC field, indeed, a cloud platform is required to guarantee a low VM provisioning time with the objective of minimizing the service disruption. In this perspective, after having introduced the principal concepts and factors of the provisioning time, we propose a deep analysis and comparison for two different Infrastructure-as-a-Service (IaaS) platforms, namely Open Stack and Open Nebula (using KVM as hypervisor), that were selected through a preliminary scouting phase. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Stackelberg Game for Bandwidth Allocation in Cloud-Based Wireless Live-Streaming Social Networks

    Guofang Nan ; Zhifei Mao ; Mei Yu ; Minqiang Li ; Honggang Wang ; Yan Zhang
    Systems Journal, IEEE

    Volume: 8 , Issue: 1
    DOI: 10.1109/JSYST.2013.2253420
    Publication Year: 2014 , Page(s): 256 - 267

    IEEE Journals & Magazines

    Multimedia social networks have been introduced as a new technology to enrich people's lives through enhanced multimedia distribution. On the other hand, a media cloud system can perform multimedia processing and storage, and provide heterogeneous multimedia services. However, the challenges still remain for end users (e.g., mobile devices and PCs) to receive multimedia streaming from the cloud system with satisfied quality-of-service (QoS). To address these challenges, an efficient multimedia distribution approach taking advantage of live-streaming social networks is innovated in this paper to deliver the media services from the cloud to both desktop and wireless end users. Our approach allows bandwidth limited mobile users to acquire live multimedia streaming from desktop users, directly based on their social relationships rather than from the cloud. When a number of mobile users compete for limited bandwidth access with the desktop users, a bandwidth allocation problem must be solved to meet all users' QoS requirements in the live-streaming social network. We formulate the problem as a two-stage Stackelberg game, in which both desktop users and mobile users target at maximizing their utilities. In our study, a noncooperative game is used to model the competition among the desktop users in terms of shared bandwidth and price in the first stage of the game. The second stage of the game models the behavior of a mobile user selecting the desktop users by an evolutionary game. In addition, a case study is conducted following the general Stackelberg game formulation, where the existence of a unique Nash equilibrium is proved. Based on our game modeling, we design protocols for both desktop and mobile users and evaluate them with numerical examples. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Cloud-based parallel suffix array construction based on MPI

    Abdelhadi, A. ; Kandil, A.H. ; Abouelhoda, M.
    Biomedical Engineering (MECBME), 2014 Middle East Conference on

    DOI: 10.1109/MECBME.2014.6783271
    Publication Year: 2014 , Page(s): 334 - 337

    IEEE Conference Publications

    Massive amount of genomics data are being produced nowadays by Next Generation Sequencing machines. The suffix array is currently the best choice for indexing genomics data, because of its efficiency and large number of applications. In this paper, we address the problem of constructing the suffix array on computer cluster in the cloud. We present a solution that automates the establishment of a computer cluster in a cloud and automatically constructs the suffix array in a distributed fashion over the cluster nodes. This has the advantage of encapsulating all set-up details and execution of the algorithm. The distributed nature of the algorithm we use overcomes the problem that arises when the user wishes, due to cost issues, to use low memory machines in the cloud. Our experiments show that our implementation scales well with the increasing number of processors. The cloud cost is affordable and it provides a cost effective solution. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Cloud services optimization problem on energy utility resource allocation

    Ming-hai Jiao ; Ping Yan ; Chen Li ; Qiang Wang ; Yan-jing Wei
    Control and Decision Conference (2014 CCDC), The 26th Chinese

    DOI: 10.1109/CCDC.2014.6852543
    Publication Year: 2014 , Page(s): 2244 - 2249

    IEEE Conference Publications

    In this paper, the cloud services optimization problem considering energy consumption cost is discussed. The queue model is presented for customer request service on data center. Since the server energy utility is based on the CPU core frequency, the novel trade-off optimization model between services revenue and energy loss cost is proposed in the paper, including allocating the dynamic CPU frequency of server. The HPSO algorithm is proposed for solving the mixed integer programming model. Then novel particle encoding substituting discrete variables and continuous variables efficiently improves solution quality. Finally, the dynamic penalty function method is discussed to convert the constraint optimization problem to non-constraint optimization problem. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Performance Models for CPU-GPU Data Transfers

    Van Werkhoven, B. ; Maassen, J. ; Seinstra, F.J. ; Bal, H.E.
    Cluster, Cloud and Grid Computing (CCGrid), 2014 14th IEEE/ACM International Symposium on

    DOI: 10.1109/CCGrid.2014.16
    Publication Year: 2014 , Page(s): 11 - 20

    IEEE Conference Publications

    Many GPU applications perform data transfers to and from GPU memory at regular intervals. For example because the data does not fit into GPU memory or because of internode communication at the end of each time step. Overlapping GPU computation with CPU-GPU communication can reduce the costs of moving data. Several different techniques exist for transferring data to and from GPU memory and for overlapping those transfers with GPU computation. It is currently not known when to apply which method. Implementing and benchmarking each method is often a large programming effort and not feasible. To solve these issues and to provide insight in the performance of GPU applications, we propose an analytical performance model that includes PCIe transfers and overlapping computation and communication. Our evaluation shows that the performance models are capable of correctly classifying the relative performance of the different implementations. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Servitization in a construction machinery industry by using M2M and cloud computing systems

    Vanzulli, B. ; Kosaka, M. ; Matsuda, F.
    Service Systems and Service Management (ICSSSM), 2014 11th International Conference on

    DOI: 10.1109/ICSSSM.2014.6943398
    Publication Year: 2014 , Page(s): 1 - 6

    IEEE Conference Publications

    Servitization is a new competitive strategy for companies to create differentiation advantages in a growing number of industries on a global scale. Also, applications of information technology such as machine-to-machine (M2M) are emerging as one of the major enablers for manufacturers to transform their business models. This M2M is utilized in the servitization of manufacturing companies such as healthcare, vehicular telematics, utilities (smart grid), and maintenance (e.g., elevators and construction machines). However, there are still several issues such as improvements to investments and returns and expansion of applications. Utilization of cloud computing can provide suitable solutions because it can change the relationship with customers and co-create personalized value. This study investigates the Global e-Services of Hitachi Construction Machine Co. as a successful case, which is utilizing the Trade Winds on eXtranet-21 (TWX-21) cloud computing services of Hitachi Ltd. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Dynamic clouds of people and things

    Cochrane, P.
    Transparent Optical Networks (ICTON), 2014 16th International Conference on

    DOI: 10.1109/ICTON.2014.6876263
    Publication Year: 2014 , Page(s): 1 - 4

    IEEE Conference Publications

    The internet will not scale to support > 7 Bn people and > 50 Bn things on line, but the Cloud will, and it is neither singular nor static. Clouds are entirely dynamic and multi-modal with; public, private, personal, open, closed, government and commercial clouds that are fixed, mobile, long and short lived, permanent and transitory. In addition the new degrees of freedom Clouds afford makes them inherently more secure and resilient than any network medium we have created before. But, not all clouds are equal, and neither is all data, or indeed networks! The era of IT Departments providing centralised networking and security is drawing to a rapid close in the same way that sitting in front of a PC in an office all day is becoming unworkable. So, it is time to rethink what has to change in order to adapt to rapidly growing BYOD (Bring Your Own Device) and BMOB (Be My Own Boss) cultures. At the same time, ecological, social, commercial and technology demands are pushing toward more and smaller devices, the tagging and tracking of everything with the object of using less material and energy. This all demands more wireless operating over shorter range delivering greater bandwidths and new modes of mobile networking demanding more optical fibre and lower energy demands. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Resource Provisioning with QoS in Cloud Storage

    Wei-Chih Huang ; Chuan-Ming Liu ; Chuan-Chi Lai
    Big Data (BigData Congress), 2014 IEEE International Congress on

    DOI: 10.1109/BigData.Congress.2014.94
    Publication Year: 2014 , Page(s): 616 - 620

    IEEE Conference Publications

    With the rapid development of cloud computing, cloud services and human life has been closely together. In recent years, cloud services are widely used by everyone. With network technology advanced, network accessing for data transmission become more and more important and using the applications through cloud computing has become a new trend. Before embracing cloud computing, there are some issues on allocating the resources of cloud computing needed to be solved since the resources which used by cloud computing system are very limited. Therefore, the resource allocations in the cloud computing should provide dynamic resource provisioning, allow users to access the resources efficiently and guarantee quality of service (QoS). In this paper, we use Gluster file system (GlusterFS) to dynamically allocate storages and build a cloud storage service integration platform. In experiments, the results show that our proposed method is superior to the traditional types of distributed storages that consider a single document file allocation. We try to adjust GlusterFS storage method, consider the configuration of disk capacity and different ways of saving files, thus allocating resource more effectively and increase the performance of the cloud storage system. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Subspace synchronization: A network-coding approach to object reconciliation

    Skachek, V. ; Rabbat, M.G.
    Information Theory (ISIT), 2014 IEEE International Symposium on

    DOI: 10.1109/ISIT.2014.6875244
    Publication Year: 2014 , Page(s): 2301 - 2305

    IEEE Conference Publications

    Assume that two users possess two different subspaces of an ambient linear space. We show that the problem of synchronization of such vector spaces can be easily solved by an efficient algorithm. By building on this observation, we propose an algorithm for synchronization of two collections of binary files of length n each, stored in the cloud in a distributed manner. By further employing techniques akin to network coding, we propose a more efficient file synchronization algorithm that has communication complexity O(d · n) bits and computational complexity O(k2 · n) operations, where k is the total number of files and d is the number of files that differ. The algorithm successfully reconciles two sets of files in 3 communication rounds with high probability. View full abstract»

Skip to Results

SEARCH HISTORY

Search History is available using your personal IEEE account.