154 research outputs found

    SLA-driven dynamic cloud resource management

    Full text link
    As the size and complexity of Cloud systems increase, the manual management of these solutions becomes a challenging issue as more personnel, resources and expertise are needed. Service Level Agreement (SLA)- aware autonomic cloud solutions enable managing large scale infrastructure management meanwhile supporting multiple dynamic requirement from users. This paper contributes to these topics by the introduction of Cloudcompaas, a SLA-aware PaaS Cloud platform that manages the complete resource lifecycle. This platform features an extension of the SLA specification WS-Agreement, tailored to the specific needs of Cloud Computing. In particular, Cloudcompaas enables Cloud providers with a generic SLA model to deal with higher-level metrics, closer to end-user perception, and with flexible composition of the requirements of multiple actors in the computational scene. Moreover, Cloudcompaas provides a framework for general Cloud computing applications that could be dynamically adapted to correct the QoS violations by using the elasticity features of Cloud infrastructures. The effectiveness of this solution is demonstrated in this paper through a simulation that considers several realistic workload profiles, where Cloudcompaas achieves minimum cost and maximum efficiency, under highly heterogeneous utilization patterns. © 2013 Elsevier B.V. All rights reserved.This work has been developed under the support of the program Formacion de Personal Investigador de Caracter Predoctoral grant number BFPI/2009/103, from the Conselleria d'Educacio of the Generalitat Valenciana. Also, the authors wish to thank the financial support received from The Spanish Ministry of Education and Science to develop the project 'CodeCloud', with reference TIN2010-17804.García García, A.; Blanquer Espert, I.; Hernåndez García, V. (2014). SLA-driven dynamic cloud resource management. Future Generation Computer Systems. 31:1-11. https://doi.org/10.1016/j.future.2013.10.005S1113

    Conferentie informatiewetenschap 2003, Technische Universiteit Eindhoven, 20 november 2003 : proceedings

    Get PDF

    Conferentie informatiewetenschap 2003, Technische Universiteit Eindhoven, 20 november 2003 : proceedings

    Get PDF

    Proceedings of the 1993 Conference on Intelligent Computer-Aided Training and Virtual Environment Technology

    Get PDF
    The volume 2 proceedings from the 1993 Conference on Intelligent Computer-Aided Training and Virtual Environment Technology are presented. Topics discussed include intelligent computer assisted training (ICAT) systems architectures, ICAT educational and medical applications, virtual environment (VE) training and assessment, human factors engineering and VE, ICAT theory and natural language processing, ICAT military applications, VE engineering applications, ICAT knowledge acquisition processes and applications, and ICAT aerospace applications

    Conception Assistée des Logiciels Sécurisés pour les SystÚmes Embarqués

    Get PDF
    A vast majority of distributed embedded systems is concerned by security risks. The fact that applications may result poorly protected is partially due to methodological lacks in the engineering development process. More specifically, methodologies targeting formal verification may lack support to certain phases of the development process. Particularly, system modeling frameworks may be complex-to-use or not address security at all. Along with that, testing is not usually addressed by verification methodologies since formal verification and testing are considered as exclusive stages. Nevertheless, we believe that platform testing can be applied to ensure that properties formally verified in a model are truly endowed to the real system. Our contribution is made in the scope of a model-driven based methodology that, in particular, targets secure-by-design embedded systems. The methodology is an iterative process that pursues coverage of several engineering development phases and that relies upon existing security analysis techniques. Still in evolution, the methodology is mainly defined via a high level SysML profile named Avatar. The contribution specifically consists on extending Avatar so as to model security concerns and in formally defining a model transformation towards a verification framework. This contribution allows to conduct proofs on authenticity and confidentiality. We illustrate how a cryptographic protocol is partially secured by applying several methodology stages. In addition, it is described how Security Testing was conducted on an embedded prototype platform within the scope of an automotive project.Une vaste majoritĂ© de systĂšmes embarquĂ©s distribuĂ©s sont concernĂ©s par des risques de sĂ©curitĂ©. Le fait que les applications peuvent ĂȘtre mal protĂ©gĂ©es est partiellement Ă  cause des manques mĂ©thodologiques dans le processus d’ingĂ©nierie de dĂ©veloppement. ParticuliĂšrement, les mĂ©thodologies qui ciblent la vĂ©rification formelle peuvent manquer de support pour certaines Ă©tapes du processus de dĂ©veloppement SW. Notamment, les cadres de modĂ©lisation peuvent ĂȘtre complexes Ă  utiliser ou ne pas adresser la sĂ©curitĂ© du tout. Avec cela, l’étape de tests n’est pas normalement abordĂ©e par les mĂ©thodologies de vĂ©rification formelle. NĂ©anmoins, nous croyons que faire des tests sur la plateforme peut aider Ă  assurer que les propriĂ©tĂ©s vĂ©rifiĂ©es dans le modĂšle sont vĂ©ritablement prĂ©servĂ©es par le systĂšme embarquĂ©. Notre contribution est faite dans le cadre d’une mĂ©thodologie nommĂ©e Avatar qui est basĂ©e sur les modĂšles et vise la sĂ©curitĂ© dĂšs la conception du systĂšme. La mĂ©thodologie est un processus itĂ©ratif qui poursuit la couverture de plusieurs Ă©tapes du dĂ©veloppement SW et qui s’appuie sur plusieurs techniques d’analyse de sĂ©curitĂ©. La mĂ©thodologie compte avec un cadre de modĂ©lisation SysML. Notre contribution consiste notamment Ă  Ă©tendre le cadre de modĂ©lisation Avatar afin d’aborder les aspects de sĂ©curitĂ© et aussi Ă  dĂ©finir une transformation du modĂšle Avatar vers un cadre de vĂ©rification formel. Cette contribution permet d’effectuer preuves d’authenticitĂ© et confidentialitĂ©. Nous montrons comment un protocole cryptographique est partiellement sĂ©curisĂ©. Aussi, il est dĂ©crit comment les tests de sĂ©curitĂ© ont Ă©tĂ© menĂ©s sur un prototype dans le cadre d’un projet vĂ©hiculaire

    VyuĆŸitĂ­ tenchnologie GRID pƙi zpracovĂĄnĂ­ medicĂ­nskĂ© informace

    Get PDF
    PrĂĄce se soustƙedĂ­ na vybranĂ© oblasti biomedicĂ­nskĂ©ho vĂœzkumu, kterĂ© mohou profitovat ze současnĂœch vĂœpočetnĂ­ch infrastruktur vybudovanĂœch ve vědeckĂ© komunitě v evropskĂ©m a světovĂ©m prostoru. Teorie vĂœpočtu, paralelismu a distribuovanĂ©ho počítĂĄnĂ­ je stručně uvedena s ohledem na počítĂĄnĂ­ v gridech a cloudech. PrĂĄce se zabĂœvĂĄ oblastĂ­ vĂœměny medicĂ­nskĂœch snĂ­mkĆŻ a pƙedstavuje propojenĂ­ GridovĂ©ho PACS systĂ©mu s existujĂ­cĂ­mi distribuovanĂœmi systĂ©my pro sdĂ­lenĂ­ DICOM snĂ­mkĆŻ. PrĂĄce se dĂĄl zaměƙuje na studium vědy tĂœkajĂ­cĂ­ se lidskĂ©ho hlasu. PrĂĄce pƙedstavuje vzdĂĄlenĂœ zpĆŻsob pƙístupu k aplikaci pro analĂœzu hlasu v reĂĄlnĂ©m čase pomocĂ­ Ășpravy protokolĆŻ pro vzdĂĄlenou plochu a pro pƙenos zvukovĂœch nahrĂĄvek. Tento dĂ­lčí vĂœsledek ukazuje moĆŸnost vyuĆŸitĂ­ stĂĄvajĂ­cĂ­ch aplikacĂ­ na dĂĄlku specialisty na hlas. Oblast lidskĂ© fyziologie a patofyziologie byla studovĂĄna pomocĂ­ pƙístupu tzv. systĂ©movĂ© biologie. PrĂĄce pƙispĂ­vĂĄ v oblasti metodologie modelovĂĄnĂ­ lidskĂ© fyziologie pro tvorbu komplexnĂ­ch modelĆŻ zaloĆŸenĂœch na akauzĂĄlnĂ­m a objektově orientovanĂ©m modelovacĂ­m pƙístupu. Metody pro studium parametrĆŻ byly pƙedstaveny pomocĂ­ technologie počítĂĄnĂ­ v gridech a v cloudech. PrĂĄce ukazuje, ĆŸe proces identifikaci parametrĆŻ stƙedně komplexnĂ­ch modelĆŻ kardiovasculĂĄrnĂ­ho systĂ©mu a komplexnĂ­ho modelu lidskĂ© fyziologie lze vĂœznamně zrychlit...This thesis focuses on selected areas of biomedical research in order to benefit from current computational infrastructures established in scientific community in european and global area. The theory of computation, parallelism and distributed computing, with focus on grid computing and cloud computing, is briefly introduced. Exchange of medical images was studied and a seamless integration of grid-based PACS system was established with the current distributed system in order to share DICOM medical images. Voice science was studied and access to real-time voice analysis application via remote desktop technology was introduced using customized protocol to transfer sound recording. This brings a possibility to access current legacy application remotely by voice specialists. The systems biology approach within domain of human physiology and pathophysiology was studied. Modeling methodology of human physiology was improved in order to build complex models based on acausal and object-oriented modeling techniques. Methods for conducting a parameter study (especially parameter estimation and parameter sweep) were introduced using grid computing and cloud computing technology. The identification of parameters gain substantial speedup by utilizing cloud computing deployment when performed on medium complex models of...nezaƙazenĂ­_neaktivnĂ­First Faculty of Medicine1. lĂ©kaƙskĂĄ fakult

    Research and Technology Report. Goddard Space Flight Center

    Get PDF
    This issue of Goddard Space Flight Center's annual report highlights the importance of mission operations and data systems covering mission planning and operations; TDRSS, positioning systems, and orbit determination; ground system and networks, hardware and software; data processing and analysis; and World Wide Web use. The report also includes flight projects, space sciences, Earth system science, and engineering and materials

    Research & Technology Report Goddard Space Flight Center

    Get PDF
    The main theme of this edition of the annual Research and Technology Report is Mission Operations and Data Systems. Shifting from centralized to distributed mission operations, and from human interactive operations to highly automated operations is reported. The following aspects are addressed: Mission planning and operations; TDRSS, Positioning Systems, and orbit determination; hardware and software associated with Ground System and Networks; data processing and analysis; and World Wide Web. Flight projects are described along with the achievements in space sciences and earth sciences. Spacecraft subsystems, cryogenic developments, and new tools and capabilities are also discussed
    • 

    corecore