154 research outputs found
SLA-driven dynamic cloud resource management
As the size and complexity of Cloud systems increase, the manual management of these solutions becomes
a challenging issue as more personnel, resources and expertise are needed. Service Level Agreement (SLA)-
aware autonomic cloud solutions enable managing large scale infrastructure management meanwhile
supporting multiple dynamic requirement from users. This paper contributes to these topics by the
introduction of Cloudcompaas, a SLA-aware PaaS Cloud platform that manages the complete resource
lifecycle. This platform features an extension of the SLA specification WS-Agreement, tailored to the
specific needs of Cloud Computing. In particular, Cloudcompaas enables Cloud providers with a generic
SLA model to deal with higher-level metrics, closer to end-user perception, and with flexible composition
of the requirements of multiple actors in the computational scene. Moreover, Cloudcompaas provides
a framework for general Cloud computing applications that could be dynamically adapted to correct the
QoS violations by using the elasticity features of Cloud infrastructures. The effectiveness of this solution is
demonstrated in this paper through a simulation that considers several realistic workload profiles, where
Cloudcompaas achieves minimum cost and maximum efficiency, under highly heterogeneous utilization
patterns.
© 2013 Elsevier B.V. All rights reserved.This work has been developed under the support of the program Formacion de Personal Investigador de Caracter Predoctoral grant number BFPI/2009/103, from the Conselleria d'Educacio of the Generalitat Valenciana. Also, the authors wish to thank the financial support received from The Spanish Ministry of Education and Science to develop the project 'CodeCloud', with reference TIN2010-17804.GarcĂa GarcĂa, A.; Blanquer Espert, I.; HernĂĄndez GarcĂa, V. (2014). SLA-driven dynamic cloud resource management. Future Generation Computer Systems. 31:1-11. https://doi.org/10.1016/j.future.2013.10.005S1113
Proceedings of the 1993 Conference on Intelligent Computer-Aided Training and Virtual Environment Technology
The volume 2 proceedings from the 1993 Conference on Intelligent Computer-Aided Training and Virtual Environment Technology are presented. Topics discussed include intelligent computer assisted training (ICAT) systems architectures, ICAT educational and medical applications, virtual environment (VE) training and assessment, human factors engineering and VE, ICAT theory and natural language processing, ICAT military applications, VE engineering applications, ICAT knowledge acquisition processes and applications, and ICAT aerospace applications
Conception Assistée des Logiciels Sécurisés pour les SystÚmes Embarqués
A vast majority of distributed embedded systems is concerned by security risks. The fact that applications may result poorly protected is partially due to methodological lacks in the engineering development process. More specifically, methodologies targeting formal verification may lack support to certain phases of the development process. Particularly, system modeling frameworks may be complex-to-use or not address security at all. Along with that, testing is not usually addressed by verification methodologies since formal verification and testing are considered as exclusive stages. Nevertheless, we believe that platform testing can be applied to ensure that properties formally verified in a model are truly endowed to the real system. Our contribution is made in the scope of a model-driven based methodology that, in particular, targets secure-by-design embedded systems. The methodology is an iterative process that pursues coverage of several engineering development phases and that relies upon existing security analysis techniques. Still in evolution, the methodology is mainly defined via a high level SysML profile named Avatar. The contribution specifically consists on extending Avatar so as to model security concerns and in formally defining a model transformation towards a verification framework. This contribution allows to conduct proofs on authenticity and confidentiality. We illustrate how a cryptographic protocol is partially secured by applying several methodology stages. In addition, it is described how Security Testing was conducted on an embedded prototype platform within the scope of an automotive project.Une vaste majoritĂ© de systĂšmes embarquĂ©s distribuĂ©s sont concernĂ©s par des risques de sĂ©curitĂ©. Le fait que les applications peuvent ĂȘtre mal protĂ©gĂ©es est partiellement Ă cause des manques mĂ©thodologiques dans le processus dâingĂ©nierie de dĂ©veloppement. ParticuliĂšrement, les mĂ©thodologies qui ciblent la vĂ©rification formelle peuvent manquer de support pour certaines Ă©tapes du processus de dĂ©veloppement SW. Notamment, les cadres de modĂ©lisation peuvent ĂȘtre complexes Ă utiliser ou ne pas adresser la sĂ©curitĂ© du tout. Avec cela, lâĂ©tape de tests nâest pas normalement abordĂ©e par les mĂ©thodologies de vĂ©rification formelle. NĂ©anmoins, nous croyons que faire des tests sur la plateforme peut aider Ă assurer que les propriĂ©tĂ©s vĂ©rifiĂ©es dans le modĂšle sont vĂ©ritablement prĂ©servĂ©es par le systĂšme embarquĂ©. Notre contribution est faite dans le cadre dâune mĂ©thodologie nommĂ©e Avatar qui est basĂ©e sur les modĂšles et vise la sĂ©curitĂ© dĂšs la conception du systĂšme. La mĂ©thodologie est un processus itĂ©ratif qui poursuit la couverture de plusieurs Ă©tapes du dĂ©veloppement SW et qui sâappuie sur plusieurs techniques dâanalyse de sĂ©curitĂ©. La mĂ©thodologie compte avec un cadre de modĂ©lisation SysML. Notre contribution consiste notamment Ă Ă©tendre le cadre de modĂ©lisation Avatar afin dâaborder les aspects de sĂ©curitĂ© et aussi Ă dĂ©finir une transformation du modĂšle Avatar vers un cadre de vĂ©rification formel. Cette contribution permet dâeffectuer preuves dâauthenticitĂ© et confidentialitĂ©. Nous montrons comment un protocole cryptographique est partiellement sĂ©curisĂ©. Aussi, il est dĂ©crit comment les tests de sĂ©curitĂ© ont Ă©tĂ© menĂ©s sur un prototype dans le cadre dâun projet vĂ©hiculaire
VyuĆŸitĂ tenchnologie GRID pĆi zpracovĂĄnĂ medicĂnskĂ© informace
PrĂĄce se soustĆedĂ na vybranĂ© oblasti biomedicĂnskĂ©ho vĂœzkumu, kterĂ© mohou profitovat ze souÄasnĂœch vĂœpoÄetnĂch infrastruktur vybudovanĂœch ve vÄdeckĂ© komunitÄ v evropskĂ©m a svÄtovĂ©m prostoru. Teorie vĂœpoÄtu, paralelismu a distribuovanĂ©ho poÄĂtĂĄnĂ je struÄnÄ uvedena s ohledem na poÄĂtĂĄnĂ v gridech a cloudech. PrĂĄce se zabĂœvĂĄ oblastĂ vĂœmÄny medicĂnskĂœch snĂmkĆŻ a pĆedstavuje propojenĂ GridovĂ©ho PACS systĂ©mu s existujĂcĂmi distribuovanĂœmi systĂ©my pro sdĂlenĂ DICOM snĂmkĆŻ. PrĂĄce se dĂĄl zamÄĆuje na studium vÄdy tĂœkajĂcĂ se lidskĂ©ho hlasu. PrĂĄce pĆedstavuje vzdĂĄlenĂœ zpĆŻsob pĆĂstupu k aplikaci pro analĂœzu hlasu v reĂĄlnĂ©m Äase pomocĂ Ășpravy protokolĆŻ pro vzdĂĄlenou plochu a pro pĆenos zvukovĂœch nahrĂĄvek. Tento dĂlÄĂ vĂœsledek ukazuje moĆŸnost vyuĆŸitĂ stĂĄvajĂcĂch aplikacĂ na dĂĄlku specialisty na hlas. Oblast lidskĂ© fyziologie a patofyziologie byla studovĂĄna pomocĂ pĆĂstupu tzv. systĂ©movĂ© biologie. PrĂĄce pĆispĂvĂĄ v oblasti metodologie modelovĂĄnĂ lidskĂ© fyziologie pro tvorbu komplexnĂch modelĆŻ zaloĆŸenĂœch na akauzĂĄlnĂm a objektovÄ orientovanĂ©m modelovacĂm pĆĂstupu. Metody pro studium parametrĆŻ byly pĆedstaveny pomocĂ technologie poÄĂtĂĄnĂ v gridech a v cloudech. PrĂĄce ukazuje, ĆŸe proces identifikaci parametrĆŻ stĆednÄ komplexnĂch modelĆŻ kardiovasculĂĄrnĂho systĂ©mu a komplexnĂho modelu lidskĂ© fyziologie lze vĂœznamnÄ zrychlit...This thesis focuses on selected areas of biomedical research in order to benefit from current computational infrastructures established in scientific community in european and global area. The theory of computation, parallelism and distributed computing, with focus on grid computing and cloud computing, is briefly introduced. Exchange of medical images was studied and a seamless integration of grid-based PACS system was established with the current distributed system in order to share DICOM medical images. Voice science was studied and access to real-time voice analysis application via remote desktop technology was introduced using customized protocol to transfer sound recording. This brings a possibility to access current legacy application remotely by voice specialists. The systems biology approach within domain of human physiology and pathophysiology was studied. Modeling methodology of human physiology was improved in order to build complex models based on acausal and object-oriented modeling techniques. Methods for conducting a parameter study (especially parameter estimation and parameter sweep) were introduced using grid computing and cloud computing technology. The identification of parameters gain substantial speedup by utilizing cloud computing deployment when performed on medium complex models of...nezaĆazenĂ_neaktivnĂFirst Faculty of Medicine1. lĂ©kaĆskĂĄ fakult
Research and Technology Report. Goddard Space Flight Center
This issue of Goddard Space Flight Center's annual report highlights the importance of mission operations and data systems covering mission planning and operations; TDRSS, positioning systems, and orbit determination; ground system and networks, hardware and software; data processing and analysis; and World Wide Web use. The report also includes flight projects, space sciences, Earth system science, and engineering and materials
Research & Technology Report Goddard Space Flight Center
The main theme of this edition of the annual Research and Technology Report is Mission Operations and Data Systems. Shifting from centralized to distributed mission operations, and from human interactive operations to highly automated operations is reported. The following aspects are addressed: Mission planning and operations; TDRSS, Positioning Systems, and orbit determination; hardware and software associated with Ground System and Networks; data processing and analysis; and World Wide Web. Flight projects are described along with the achievements in space sciences and earth sciences. Spacecraft subsystems, cryogenic developments, and new tools and capabilities are also discussed
- âŠ