Πλοήγηση ανά Θέμα "Distributed computer systems"
Αποτελέσματα 1-20 από 41
-
Active Replication for Centrally Coordinated Teams of Autonomous Vehicles
(2019)Autonomous vehicles, drones in particular, are used to support a wide range of sensing and actuating missions. While these missions are typically coordinated by a human operator, it is attractive to automate this coordination ... -
Ant colony optimization and data mining: Techniques and trends
(2010)The Ant Colony Optimization (ACO) technique was inspired by the ants' behaviour throughout their exploration for food. The use of this technique has been very successful for several problems. Besides, Data Mining (DM) has ... -
Application development: Fly to the clouds or stay in-house?
(2010)Cloud computing is a recent trend in IT that moves computing and data away from desktop and portable PCs into large data centers, and outsources the "applications" (hardware and software) as services over the Internet. ... -
Black hole search with finite automata scattered in a synchronous torus
(2011)We consider the problem of locating a black hole in synchronous anonymous networks using finite state agents. A black hole is a harmful node in the network that destroys any agent visiting that node without leaving any ... -
Client and server games in peer-to-peer networks
(2009)We consider a content sharing network of noncooperative peers. The strategy set of each peer comprises, (i) client strategies, namely feasible request load splits to servers, and (ii) server strategies, namely scheduling ... -
A cloud-based content replication framework over multi-domain environments
(2014)Cloud service provisioning on top of virtual infrastructures is of major importance in modern ICT, since it is directly correlated to the way business models are designed and revenue is generated from the cloud service ... -
Collaborative agent-based detection of DDoS IoT botnets
(2019)The Internet of Things constitutes the latest paradigm shift in computing. Billions of devices sense the real world and store produced data in the cloud. Existing security models, approaches and solutions are not able to ... -
A communication-aware energy-efficient graph-coloring algorithm for VM placement in clouds
(2018)The problem of virtual machine (VM) consolidation has received a lot of attention over the past years. Most of the proposed techniques tackling the VM consolidation problem focus on energy consumption ignoring the network ... -
A comparison of distributed spatial data management systems for processing distance join queries
(2017)Due to the ubiquitous use of spatial data applications and the large amounts of spatial data that these applications generate, the processing of large-scale distance joins in distributed systems is becoming increasingly ... -
Content placement in heterogeneous end-to-end virtual networks
(2015)One of the distinctive features of the new virtualized ecosystem, is the multi-stakeholder participation in the way cloud services are designed, deployed and offered. In this work, we address the emerging content replication ... -
Continuous replica placement schemes in distributed systems
(2005)The Replica Placement Problem (RPP) aims at creating a set of duplicated data objects across the nodes of a distributed system in order to optimize certain criteria. Typically, RPP formulations fall into two categories: ... -
Coordinated broadcast-based request-reply and group management for tightly-coupled wireless systems
(2016)As the domain of cyber-physical systems continues to grow, an increasing number of tightly-coupled distributed applications will be implemented on top of wireless networking technologies. Some of these applications, including ... -
Dangerous graphs
(2019)Anomalies and faults are inevitable in computer networks, today more than ever before. This is due to the large scale and dynamic nature of the networks used to process big data and to the ever-increasing number of ad-hoc ... -
Distributed resource allocation algorithms for peer-to-peer networks
(2008)In peer-to-peer networks, each peer plays the role of client and server. As server, it receives content requests made by other peers and needs to decide on what basis and to what extent it will satisfy these requests by ... -
Dynamic viewing pattern exploitation in Peer-to-Peer Video-on-Demand
(2011)Unstructured BitTorrent-like Peer-to-Peer networks have been extensively studied as an important enabling technology for Video-on-Demand. While most studies maintain the pull-based nature of unstructured Peer-to-Peer ... -
EasyHarvest: Supporting the deployment and management of sensing applications on smartphones
(2014)In this paper we present a first prototype of the EasyHarvest framework, which aims to simplify the deployment and controlled execution of large-scale sensing applications on smartphones. On the one hand, application owners ... -
The effect of teaching electric circuits switching from real to virtual lab or vice versa - A case study with junior high-school learners
(2015)The present study focuses on real and virtual labs used in unison to teach Physics. Should students be exposed to real experiments first and virtual labs afterwards, or could it be that the reverse is the best educational ... -
Efficient Cloud Provisioning for Video Transcoding: Review, Open Challenges and Future Opportunities
(2018)Video transcoding is the process of encoding an initial video sequence into multiple sequences of different bitrates, resolutions, and video standards, so that it can be viewed on devices of various capabilities and with ... -
Efficient processing of all-k-nearest-neighbor queries in the MapReduce programming framework
(2019)Numerous modern applications, from social networking to astronomy, need efficient answering of queries on spatial data. One such query is the All k Nearest-Neighbor Query, or k Nearest-Neighbor Join, that takes as input ... -
Experimenting with P2P traffic optimization for wireless mesh networks in a federated OMF-PlanetLab environment
(2011)The ultimate success of the Wireless Mesh Network paradigm (WMN) in large scale deployments depends on the ability to test it in real world scenarios. A typical application scenario which is worth to be investigated in ...