Results 31 to 40 of about 1,492 (104)
Mitigating Interference between Scientific Applications in OS‐Level Virtualized Environments
Recent research and production environments are deploying more container technologies for the execution of HPC applications and for reproducing scientific workflows or computing environments. Research works, however, have not accounted for performance interference when executing corunning applications in containers though the absence of an efficient ...
Theodora Adufu +2 more
wiley +1 more source
Automated Modeling of Real-Time Anomaly Detection using Non-Parametric Statistical technique for Data Streams in Cloud Environments [PDF]
The main objective of online anomaly detection is to identify abnormal/unusual behavior such as network intrusions, malware infections, over utilized system resources due to design defects etc from real time data stream.
Smrithy G S, Ramadoss Balakrishnan
doaj
The present paper introduces and reviews existing technology and research works in the field of scientific programming methods and techniques in data‐intensive engineering environments. More specifically, this survey aims to collect those relevant approaches that have faced the challenge of delivering more advanced and intelligent methods taking ...
Jose María Álvarez-Rodríguez +3 more
wiley +1 more source
Security, Performance and Energy Trade-offs of Hardware-assisted Memory Protection Mechanisms
The deployment of large-scale distributed systems, e.g., publish-subscribe platforms, that operate over sensitive data using the infrastructure of public cloud providers, is nowadays heavily hindered by the surging lack of trust toward the cloud ...
Felber, Pascal +6 more
core +1 more source
An Architecture for Anonymous Mobile Coupons in a Large Network
A mobile coupon (m‐coupon) can be presented with a smartphone for obtaining a financial discount when purchasing a product or a service. M‐coupons are a powerful marketing tool that has enjoyed a huge growth and diffusion, involving tens of millions of people each year. We propose an architecture which may enable significant improvements over current m‐
Alberto Bartoli +2 more
wiley +1 more source
FogStore: Toward a Distributed Data Store for Fog Computing
Stateful applications and virtualized network functions (VNFs) can benefit from state externalization to increase their reliability, scalability, and inter-operability.
Gupta, Harshit +3 more
core +1 more source
SSD-SMR Write Cache Strategy for Optimizing Long-Tail Latency Based on Q-Learning [PDF]
With the continuous increase in the scale of global data, the effective and inexpensive improvement of data access performance is an important challenge faced by storage systems.
LIU Jian, ZHANG Buhao, FANG Kuangchi, LIU Xuanfeng, SUN Guodao, LIANG Ronghua, LIANG Haoran
doaj +1 more source
DKVF: A Framework for Rapid Prototyping and Evaluating Distributed Key-value Stores
We present our framework DKVF that enables one to quickly prototype and evaluate new protocols for key-value stores and compare them with existing protocols based on selected benchmarks.
Kulkarni, Sandeep, Roohitavaf, Mohammad
core +1 more source
Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real‐Time Database Systems
ABSTRACT Concurrency control protocols play a vital role in ensuring the correctness of databases when transactions are processed in parallel. Plor is a non‐real‐time concurrency control protocol based on the 2‐phase locking protocol. Plor utilizes the Wound‐Wait scheme, a timestamp‐based scheme for deadlock prevention, as it provides lower tail ...
Tung Nguyen, Hideyuki Kawashima
wiley +1 more source
Log-structured merge tree (LSM-tree)-based key-value stores are widely deployed in largescale storage systems. The underlying reason is that the traditional relational databases cannot reach the high performance required by big-data applications. As high-
Hui Sun +4 more
doaj +1 more source

