8,550,308 research outputs found
Optimal Control of Applications for Hybrid Cloud Services
Development of cloud computing enables to move Big Data in the hybrid cloud
services. This requires research of all processing systems and data structures
for provide QoS. Due to the fact that there are many bottlenecks requires
monitoring and control system when performing a query. The models and
optimization criteria for the design of systems in a hybrid cloud
infrastructures are created. In this article suggested approaches and the
results of this build.Comment: 4 pages, Proc. conf. (not published). arXiv admin note: text overlap
with arXiv:1402.146
Task Scheduling on the Cloud with Hard Constraints
Scheduling Bag-of-Tasks (BoT) applications on the cloud can be more
challenging than grid and cluster environ- ments. This is because a user may
have a budgetary constraint or a deadline for executing the BoT application in
order to keep the overall execution costs low. The research in this paper is
motivated to investigate task scheduling on the cloud, given two hard
constraints based on a user-defined budget and a deadline. A heuristic
algorithm is proposed and implemented to satisfy the hard constraints for
executing the BoT application in a cost effective manner. The proposed
algorithm is evaluated using four scenarios that are based on the trade-off
between performance and the cost of using different cloud resource types. The
experimental evaluation confirms the feasibility of the algorithm in satisfying
the constraints. The key observation is that multiple resource types can be a
better alternative to using a single type of resource.Comment: Visionary Track of the IEEE 11th World Congress on Services (IEEE
SERVICES 2015
Constructing secure service compositions with patterns
In service based applications, it is often necessary to construct compositions of services in order to provide required functionality in cases where this is not possible through the use of a single service. Whilst creating service compositions, it is necessary to ensure not only that the functionality required of the composition is achieved but also that certain security properties are preserved. In this paper, we describe an approach to constructing secure service compositions. Our approach is based on the use of composition patterns and rules that determine the security properties that should be preserved by the individual services that constitute a composition in order to ensure that security properties of the overall composition are also satisfied. Our approach extends a framework developed to support the runtime service discovery
InShopnito: an advanced yet privacy-friendly mobile shopping application
Mobile Shopping Applications (MSAs) are rapidly gaining popularity. They enhance the shopping experience, by offering customized recommendations or incorporating customer loyalty programs. Although MSAs are quite effective at attracting new customers and binding existing ones to a retailer's services, existing MSAs have several shortcomings. The data collection practices involved in MSAs and the lack of transparency thereof are important concerns for many customers. This paper presents inShopnito, a privacy-preserving mobile shopping application. All transactions made in inShopnito are unlinkable and anonymous. However, the system still offers the expected features from a modern MSA. Customers can take part in loyalty programs and earn or spend loyalty points and electronic vouchers. Furthermore, the MSA can suggest personalized recommendations even though the retailer cannot construct rich customer profiles. These profiles are managed on the smartphone and can be partially disclosed in order to get better, customized recommendations. Finally, we present an implementation called inShopnito, of which the security and performance is analyzed. In doing so, we show that it is possible to have a privacy-preserving MSA without having to sacrifice practicality
Integrated learning programme 2016-2017 : term 2
This Integrated Learning Programme (ILP) guidebook provides details about ILP courses offered during 2016-2017 second term in Lingnan University, Hong Kong.https://commons.ln.edu.hk/ilp_guidebook/1028/thumbnail.jp
“Hamlyn Trust Scholarships” for community legal education and training
Report on a project by the Legal Services Agency (LSA), Scotland’s National Law Centre awarded a grant from the Hamlyn Trust to support the agency’s work in providing “community legal education” throughout Scotland. Published as part of a special report on the Hamlyn Trust's 50th anniversary awards in Amicus Curiae - Journal of the Institute of Advanced Legal Studies and its Society for Advanced Legal Studies. The Journal is produced by the Society for Advanced Legal Studies at the Institute of Advanced Legal Studies, University of London
Serving Limited English Proficient Clients
When serving walk-ins, the goal is to provide the same services, information and referrals as we would provide to the English-speaking public. This is true whether the walk-in ultimately turns out to be eligible for our services or not. When in doubt, ask yourself what services, information or referrals you would provide to an English speaking person in the same situation. Then make sure the Limited English Proficient person gets that same service, information or referrals
- …
