Results 31 to 40 of about 1,492 (104)

Mitigating Interference between Scientific Applications in OS‐Level Virtualized Environments

open access: yesScientific Programming, Volume 2018, Issue 1, 2018., 2018
Recent research and production environments are deploying more container technologies for the execution of HPC applications and for reproducing scientific workflows or computing environments. Research works, however, have not accounted for performance interference when executing corunning applications in containers though the absence of an efficient ...
Theodora Adufu   +2 more
wiley   +1 more source

Automated Modeling of Real-Time Anomaly Detection using Non-Parametric Statistical technique for Data Streams in Cloud Environments [PDF]

open access: yesJournal of Communications Software and Systems, 2019
The main objective of online anomaly detection is to identify abnormal/unusual behavior such as network intrusions, malware infections, over utilized system resources due to design defects etc from real time data stream.
Smrithy G S, Ramadoss Balakrishnan
doaj  

Survey of Scientific Programming Techniques for the Management of Data‐Intensive Engineering Environments

open access: yesScientific Programming, Volume 2018, Issue 1, 2018., 2018
The present paper introduces and reviews existing technology and research works in the field of scientific programming methods and techniques in data‐intensive engineering environments. More specifically, this survey aims to collect those relevant approaches that have faced the challenge of delivering more advanced and intelligent methods taking ...
Jose María Álvarez-Rodríguez   +3 more
wiley   +1 more source

Security, Performance and Energy Trade-offs of Hardware-assisted Memory Protection Mechanisms

open access: yes, 2019
The deployment of large-scale distributed systems, e.g., publish-subscribe platforms, that operate over sensitive data using the infrastructure of public cloud providers, is nowadays heavily hindered by the surging lack of trust toward the cloud ...
Felber, Pascal   +6 more
core   +1 more source

An Architecture for Anonymous Mobile Coupons in a Large Network

open access: yesJournal of Computer Networks and Communications, Volume 2016, Issue 1, 2016., 2016
A mobile coupon (m‐coupon) can be presented with a smartphone for obtaining a financial discount when purchasing a product or a service. M‐coupons are a powerful marketing tool that has enjoyed a huge growth and diffusion, involving tens of millions of people each year. We propose an architecture which may enable significant improvements over current m‐
Alberto Bartoli   +2 more
wiley   +1 more source

FogStore: Toward a Distributed Data Store for Fog Computing

open access: yes, 2017
Stateful applications and virtualized network functions (VNFs) can benefit from state externalization to increase their reliability, scalability, and inter-operability.
Gupta, Harshit   +3 more
core   +1 more source

SSD-SMR Write Cache Strategy for Optimizing Long-Tail Latency Based on Q-Learning [PDF]

open access: yesJisuanji gongcheng
With the continuous increase in the scale of global data, the effective and inexpensive improvement of data access performance is an important challenge faced by storage systems.
LIU Jian, ZHANG Buhao, FANG Kuangchi, LIU Xuanfeng, SUN Guodao, LIANG Ronghua, LIANG Haoran
doaj   +1 more source

DKVF: A Framework for Rapid Prototyping and Evaluating Distributed Key-value Stores

open access: yes, 2018
We present our framework DKVF that enables one to quickly prototype and evaluate new protocols for key-value stores and compare them with existing protocols based on selected benchmarks.
Kulkarni, Sandeep, Roohitavaf, Mohammad
core   +1 more source

Fairly Decentralizing a Hybrid Concurrency Control Protocol for Real‐Time Database Systems

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 4-5, 28 February 2025.
ABSTRACT Concurrency control protocols play a vital role in ensuring the correctness of databases when transactions are processed in parallel. Plor is a non‐real‐time concurrency control protocol based on the 2‐phase locking protocol. Plor utilizes the Wound‐Wait scheme, a timestamp‐based scheme for deadlock prevention, as it provides lower tail ...
Tung Nguyen, Hideyuki Kawashima
wiley   +1 more source

DStore: A Holistic Key-Value Store Exploring Near-Data Processing and On-Demand Scheduling for Compaction Optimization

open access: yesIEEE Access, 2018
Log-structured merge tree (LSM-tree)-based key-value stores are widely deployed in largescale storage systems. The underlying reason is that the traditional relational databases cannot reach the high performance required by big-data applications. As high-
Hui Sun   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy