Dynamic Service and Data Migration in the Clouds
|
|
- Alannah Sherilyn Barber
- 8 years ago
- Views:
Transcription
1 rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty Abstract Cloud computg s a emergg computato paradgm. To support successful cloud computg, servce oreted archtecture (SOA) should play a major role. Due to the ature of wdely dstrbuted servce provders clouds, the servce performace could be mpacted whe the etwork traffc s cogested. Ths ca be a major barrer for tasks wth real-tme requremets. I clouds, ths problem ca be solved by mgratg servces to dfferet platforms such that the commucato cost ca be mmzed. I ths paper, we cosder the problem of servce selecto ad mgrato clouds. We develop a framework to facltate servce mgrato ad desg a cost model ad the decso algorthm to determe the tradeoffs o servce selecto ad mgrato. 1 Itroducto Cloud computg s a emergg computato paradgm wth the goal of freeg up users from the maagemet of hardware, software, ad data resources ad shftg these burdes to cloud servce provders [1]. Cloud computg has draw the atteto of major dustral compaes, scetfc commutes, as well as ed user groups. The Clouds provde a large pool of resources, cludg hgh power computg platforms, commo devces, storages, data ceters, ad software servces. It also provdes maagemet to these resources such that users ca access them ubqutously ad wthout currg performace problems. At the same tme, servce oreted archtecture (SOA) has bee a popular framework may applcato domas. The eablg techologes SOA allow servces to be dscovered, composed, ad executed [2][3][4][5]. Based o these techologes, servces ca be rapdly composed ad the composte servce ca be deployed to acheve the desred goal. To support successful cloud computg, SOA should play a major role wth ever creasg mportace. All the hardware, software, ad data resources ca be wrapped as servces clouds. Whe a ed-user wshes to accomplsh a certa task, a composto servce ca be employed to dscover the eeded resources ad compose them to provde the desred fuctoalty ad qualty to the ed-user. Curretly, may Web servces have bee deployed by dfferet orgazatos that are wdely dstrbuted over the Iteret. These are mostly software servces rug o fxed hardware resources. Whe composg multple I-Lg Ye ad Bhava Thurasgham Departmet of Computer Scece Uversty of Texas at Dallas {lye, bhava.thurasgham}@utdallas.edu servces for a system, t s lkely that some selected software servces are hosted at wdely dstrbuted stes. Ths brgs potetal performace problems. Sedg a servce request alog wth a large quatty of put data across the wde area etwork ca be costly. It creases the etwork traffc ad rases the potetal of uexpected delays due to etwork cogestos. Ths ca be a major barrer for applcatos that have real-tme requremets. For example, a commader may dyamcally assemble a commad ad cotrol applcato that volves a large umber of web servces, such ay data servces based o cotuous put from the remote sesors, mage processg servces, formato fuso servces, etc. to assst her/hs decso makg. Commucato amog two data processg servces may volve a large amout of data ad may result delays due to etwork cogestos. Such delays ca affect the tmeless of the decso ad cause costly cosequeces. I SOA research, there have bee some works cosderg the commucato overhead servce composto. I [5], servce selecto based o the goal of mmzg commucato cost has bee cosdered. However, f there are a lmted umber of servces to choose from, t may be dffcult to sgfcatly reduce the commucato latecy. I cloud evromet, ths problem ca be solved by cosderg servce mgrato. Oe of major advaces cloud evromet s that computg hardware resources ad ther maagemet utltes are all provded as servces. The wdely dstrbuted computg resources ca be used to host mgrated servces to potetally mmze the commucato cost. However, ot all servces ca be mgrated. Servces based o hardware resources are less flexble ad caot be mgrated (ot the cyber world). Whe the servces volve commo hardware devces, the devces, eve though o-mgratable, are lkely to be all over the place. Thus, t s possble to select oe that ca result mmzed commucato cost. Whe a servce volves specalzed hardware, the t caot be mgrated. Servces ca potetally be mgrated, but the mgrato costs ad gas have to be evaluated to esure et performace gas. I ths paper, we cosder the problem of servce selecto ad mgrato a cloud. We develop a framework to facltate servce mgrato ad desg a cost model ad the decso algorthm to determe the tradeoffs o servce selecto ad mgrato. The mportat ssues addressed ths paper clude: /09 $ IEEE DOI /COMPSAC Authorzed lcesed use lmted to: Uv of Texas at Dallas. Dowloaded o Aprl 16,2010 at 17:27:12 UTC from IEEE Xplore. Restrctos apply.
2 (1) It s ecessary to cosder the frastructure support the cloud to acheve servce mgrato. The computato resources (computer platforms) the cloud eed to be able to support executo of dyamcally mgrated servces. We develop a vrtual mache evromet ad correspodg frastructure to provde such support. (2) It s also essetal to have a strog decso support to help determe whether to mgrate some servces ad where to place them. The cosderato volves the servce mgrato cost, cosstecy mateace cost, ad the commucato cost gas due to mgrato. We develop a cost model to correctly capture these costs ad help determe the tradeoffs servce selecto ad mgrato clouds. The, we use a geetc algorthm to search the decso space ad make servce selecto ad mgrato decsos based o the cost tradeoffs. The rest of the paper s orgazed as follows: the overvew of the cloud model s dscussed Secto 2. It presets all ettes the cloud model. I Secto 3, we dscuss workflow for servce composto. Secto 4 presets servce selecto ad mgrato decso process, cludg costrats o the selecto of cocrete servces ad computg platforms. Secto 5 summarzes the paper. 2 Cloud Model for Supportg Servce Mgrato We cosder the cloud evromet cosstg of geeral computg platforms ad servces. The servces ca be software ad data ad some other o-mgratable servces. The geeral computg platform () s also a servce. It s specfcally categorzed the system due to ts potetal provdg the evromet for hostg software ad data servces. Let G = {g 1 N} deote the set of N s the system. Also, let S = {s for all } deote the set of servces besdes the s. s ca be a software, data, or o-mgratable servce. G ad S are dyamc sets that ca chage over tme. We assume that each servce has a resdet (R) ad we use R(s ) to refer to the resdet platform for servce s. Each the cloud uses the Vrtual Mache (VM) techology to provde a uform executo platform so varous servces ca be mgrated dyamcally ad executed at ay s. Vrtual mache ot oly provdes desred executo platforms for varous servces, but also acheves a certa degree of securty/protecto. It prevets the servces rug o a from attackg the or terferg other web servces rug o the same. To support servce mgrato, t s also ecessary to provde some maagemet servces, cludg the servce mgrato decso (SMD) servces, the servce mgrato maagemet (SMM) servces, ad the certfcate authorty (CA) servces. To dfferetate, we call the regular web servces the applcato servces ad these servces the frastructure servces. The SMD servces provde algorthms for makg mgrato decso for applcato servces. It matas eeded formato such as the s ad other cloud resources characterstcs, overlay etwork topology, servce access patters, etc. ad uses them for decso makg. The SMM servces mata formato of all servces, cludg ther mgrated ad replcated copes to help wth dscovery of ear-by servces to facltate servce composto. It ca be vewed as a exteso of the UDDI regstry, but provdes more advaced fuctoaltes. Executg mgrated servces o platforms may pose securty rsks to the platform as well as to the servces. Thus, t s ecessary to have proper frastructure supports for mutual authetcato ad access cotrol amog s ad servces. We use dstrbuted CA servces to acheve ths goal. CA SMD SMM Applcato Servces Servces ot Cloud hosted by s Other o-platform based physcal servces, such as prtg servces, robotc servces, t Iteret Fgure 1. Servce based cloud evromet. Fgure 1 llustrates the servce based cloud evromet. I the cloud, applcato servces ad frastructure servces are hosted by s. Cloud may corporate other physcal devces wrapped as servces. Clets teract wth the cloud to compose servces for ther tasks whle the frastructure servces workg trasparetly to dscover ad select the most sutable servces ad replcate the mgratable oes f eeded to mmze the commucato cost ad satsfy real tme costrats. Clet ca be ed users, eterprse customers, or software applcatos. 2.1 DHT Based Dstrbuted SMM Servces I covetoal SOA evromet, formato regardg servces, cludg ther ames, terfaces, sematcs, propertes, etc., are mataed by UDDI (Uversal Descrpto Dscovery ad Itegrato). However, UDDI lacks the dstrbuted cocept ad does ot cosder multple servce replcas. Thus, t s ot sutable cloud evromet. We desg a dstrbuted SMM frastructure usg a dstrbuted hash table (DHT). SMM servces are hosted by selected s o strategc locatos to facltate fast accesses. These SMM servces form a P2PSMM rg (as show by the dotted lks Fgure 1). The P2PSMM rg s based o the oe-hop routg cocept [6] where each SMM keeps the full routg table. Sce s o the clouds are geerally relable ad wdely dstrbuted, the routg table chage frequecy s low. Thus, the routg table mateace cost s ot a major 135 Authorzed lcesed use lmted to: Uv of Texas at Dallas. Dowloaded o Aprl 16,2010 at 17:27:12 UTC from IEEE Xplore. Restrctos apply.
3 cocer. New SMM servces may be created ad exstg oes may be removed based o ther access patters. Multple hash fuctos are used for fault tolerace ad mproved access performace. Each SMM matas a GSP table ad a servce table. The GSP table cotas all the GSPs ad ther correspodg formato. The servce table s a partal table, oly cotas the servces that are hashed to the SMM based o the P2PSMMrg frastructure. The ames of the applcato servce are used as the prmary key the P2PSMM rg. However, clet search requests are geerally based o keywords. Sce keywords space ca be huge, we use the Hlbert Space Fllg Curve (HSFC) [7] techque to dex the keywords. Each servce s assocated wth a set of keywords. The keywords form a multdmesoal keyword space where servces are pots the space ad the keywords are the coordates. The HSFC algorthm coverts the multdmesoal keyword space to oe dmesoal dex space, a HSFC dex. The HSFC dex s the mapped to the P2PSMM rg to facltate effcet search. I the SMM servce table, each etry for a servce s smlar to the etry the UDDI regstry. However, more formato s eeded o SMM to support servce mgrato ad replcato. Each servce etry SMM matas the formato of all replcas as well as ther hostg s. Oe of the s s marked as the R for the servce. For each servce, the SMM matas servce ame, servce defto, servce type, servce sze, average request ad respose message szes, ad servce replca formato. Servce type specfes whether the servce s mgratable. For each servce replca, SMM matas ts replca type, hostg, guarateed servce latecy, etc. Replca type s used to dcate a master etry or a replca etry. The master etry s the oe hosted by the R. We assume that a servce replca has a lmted lfetme. A TTL (Tme To Lve) feld s defed for each servce replca. Whe the TTL expres, the servce replca s removed from the hostg ad the etry s deleted from the table. The TTL value for the master etry s set to 0, dcatg that t ever expres. It s also ecessary to mata the commucato costs amog servces. However, t s mpossble to mata such costs for all pars of servces, thus each servce stace matas the commucato costs to other servces that t frequetly teracts wth. Fgure 2 shows the formato mataed the servce table. I the table, a etry correspods to a. It matas the IP address, ts resource statstcs, avalablty, ad potetal accoutg formato. Also, the logtude ad lattude coordates for each s mataed. It ca be used to calculate the geographcal dstace betwee s ad estmate the commucato cost betwee servces they host whe the commucato cost betwee the servces s ot avalable. Fgure 3 shows the formato mataed the table. Etry Felds Servce Name Servce Type Servce Defto Servce Sze Message Sze Servce Replca Iformato Etry Felds Name Resource Statstcs Physcal Locato Avalablty Servce Charge Replca Type TTL(Tme To Lve) Hostg Servce Latecy Commucato Cost Meag The ame of the servce. The type s defed accordg to access patter of the servce. For o-mgratable servce, type=0; for mgratable servce, type =1. WSDL defto of the servce. The sze of the servce(code or data) It stores the average request/respose message szes of the servce vocato. The message sze formato s stored the callee s servce etry. If the callee s a data servce, the update message sze s also stored. It dcates t s a master etry (the oe regstered by the R) or replca etry. TTL defes the vald perod of a servce replca. After the durato of TTL, the etry wll be deleted from the regstry. For master etry, ttl=0. The hostg the servce. The bouded average servce tme o the hostg. It stores the commucato latecy betwee some frequetly teractg servce pars. Fgure 2. Servce table etry descrpto. Meag IP address ad doma ame of the. Resource usage formato (CPU, memory, dsk, etwork, VM) of the. The logtude ad lattude coordates for the. The rato of the expected value of the uptme of the to the aggregate of the expected values of up ad dow tme of the. Servce charge for usg the. Fgure 3. table etry descrpto. 2.2 CA Servces ad Securty Protocols Securty s a crtcal ssue the cloud evromet, especally whe cosderg servce mgrato. A malcous servce may try to compromse the or try to perform a DoS attack by cosumg all the resources of the. Also, oe servce from a may explot the securty loopholes of aother ad compromse the prvacy ad/or tegrty of other servces from other s. O the other had, a may try to compromse the servces t hosts. Some of the securty problems ca be resolved usg VM techology o. However, may of the securty ssues stll rema. Thus, t s ecessary to buld a authetcato framework to cotrol the accesses betwee s ad 136 Authorzed lcesed use lmted to: Uv of Texas at Dallas. Dowloaded o Aprl 16,2010 at 17:27:12 UTC from IEEE Xplore. Restrctos apply.
4 servces. We use dstrbuted certfcate authortes (CAs) to provde mutual authetcatos. For a servce s, we cosder ts resdece R(s) as the ower. Whe the SMD servce decdes to mgrate a servce s to a g, t forms R(s) ad g to perform mutual authetcato. R(s) ad g sed ther certfcates to each other ad cotact ther CAs to valdate the certfcates. Durg the authetcato process, R(s) verfes the detty ad trust of g ad the prvleges for s to use g s resources are egotated. Whe the mgrato decso s cofrmed, both R(s) ad g form SMD to cotue wth the mgrato process. 2.3 Vrtual Mache Evromet o s We use VM techologes [8] to support servce hostg ad servce executo o s. VM techologes support the setup of dfferet operatg systems o the same hardware wth each VM beg solated from each other. Thus, the desred executo evromets for specfc servces ca be easly set up statcally or dyamcally ad dfferet servces rug o the same are well protected from each other. The popular VM systems, VMware ad Xe, also allow vrtual maches beg created wthout excessve overhead. Sce Xe s a ope source software ad ts commads (xm) ca easly create, pause, ad shutdow VMs, we use Xe for realzg the VM evromet o s. Fgure 4 shows the basc desg of the VM evromet o s. A ca host multple VMs ad each VM ca host oe applcato or frastructure servce. To support servce mgrato ad secure servce executo, each VM also rus a set of maagemet compoets, cludg Mgrato Maager, Securty Maager, ad Resource Motor. Whe the SMD decdes a servce should mgrate, t forms the Mgrato Maager to wrap the servce ad trasfer t from a source to a destato. Servce mgrato mght pose securty rsks. Securty Maager teracts wth CAs ad performs servce valdato, authetcato, ad authorzato. Also the Securty Maager respods to authetcato requests ssued by servces from other VMs. Sce VM solates multple executo evromets ad supports the ablty to ru multple software stacks wth dfferet securty levels, we use VM to eforce fe-graed access cotrol to servces ad local resources. Servce Mgrato does ot always geerate performace ga. Mgrato decso eeds to cosder the resource usages of VMs, such as CPU, memory, ad dsk usages of VMs. The Resource Motor s used to motor the resource usages of the VM real tme. It perodcally reports the resource usage formato to the SMM to facltate mgrato decso makg. Applcato/Ifrastructure Servce Maagemet Compoets Resource Maager Mgrato Maager Fgure 4. evromet usg VM. 3 Workflow Model for Servce Composto Workflow s a commo model for web servce composto. We cosder that a workflow s composed of a seres of abstract servces ad these abstract servces ca be grouded to cocrete servces [9]. OWL-S (Web Otology Laguage for Servces) provdes flow cotrol costructs to specfy varous servce compostos a workflow, cludg Sequece, Choce, If-The-Else, Iterate, etc. e 12 Securty Maager VM-2 (rug Wdows) 30% as 3 50% as 1 as 2 as 4 Applcato/Ifrastructure Servce Maagemet Compoets Resource Maager Mgrato Maager Securty Maager VM-2 (rug Lux) Fgure 5. A workflow example. Let W deote a workflow, where W = (AS, E), AS s the set of abstract servces W, ad E s the set of drected ad labeled edges W. AS = {as 1,,,, as w }, where W s the umber of the abstract servces W. The edge represets the vocato depedecy betwee two abstract servces. The vocato probablty property s assocated wth each edge. Let pr(e j ) deote the vocato probablty for to voke as j whe s executed. If as j s a data servce, the vocato probablty wth read operato, rpr(e j ), ad the vocato probablty wth update operato, upr(e j ), propertes are also assocated wth the edge. We have pr(e j ) = rpr(e j ) + upr(e j ), where as j s a data servce. Fgure 5 shows a example workflow. We ca see that the workflow starts from as 1. It flows to as 2 wth two braches. The flow goes to as 3 ad as 4 wth 30% ad 50% probablty, respectvely. Note that the flow may stop at as 2 wth a 20% probablty. Each abstract servce ca be grouded by a set of cocrete servces. Let CS( ) = {s,j 1 j N S } deote the set of caddate cocrete servces for a abstract servce, where N S s the umber of cocrete servces for. SMD cotacts SMM to obta CS( ) for all W. Whe there are multple replcas of the same cocrete servce, the oly oe of them s selected ad placed CS( ) (we select the oe hosted by R). Our goal s to select the approprate cocrete servces for groudg the abstract servces a workflow so that the totoal servce lateces ad commucato costs betwee servces ca be mmzed ad the real-tme costrats for as Authorzed lcesed use lmted to: Uv of Texas at Dallas. Dowloaded o Aprl 16,2010 at 17:27:12 UTC from IEEE Xplore. Restrctos apply.
5 the workflow ca be satsfed. Also, whe approprate, some mgratable cocrete servces ca be mgrated to approprate s to further reduce the commucato cost. 4 SMD Servce ad Decso Process SMD servces are resposble for makg servce selecto ad mgrato decsos. It takes a workflow W ad the correspodg real-tme requremets from a clet put. Based o W, SMD frst teracts wth SMM to detfy the cocrete servces for each abstract servce. The, SMD selects cocrete servces to groud the abstract servces ad determes whether to mgrate or replcate the cocrete servces o selected s. Let cp deote a cofgurato soluto to the servce selecto ad mgrato decso problem. Let sel( ) deote the dex of the cocrete servce CS( ) that s selected for groudg cp, where 1 sel( ) N S. Also, let loc(sel( deote the dex of the that hosts the cocrete servce, where 1 loc(sel( N. I other words, a cofgurato soluto cp, W s grouded to cocrete servce ) ad ) s selected to be hosted o. I the geetc algorthm, the cofgurato soluto cp ca be mapped to a dvdual drectly as show Fgure 6. sel(as 1 ) loc(sel(as 1 sel(as 2 ) loc(sel(as 2 Fgure 6. A dvdual represetg a cofgurato soluto. We use the geetc algorthm to search for the optmal cofgurato soluto,.e., to determe the best settgs of sel( ), 1 sel( ) N S, ad loc(sel(, 1 loc(sel( N. I the followg subsectos, we defe the costrats ad the ftess fucto for the geetc algorthm. 4.1 Costrats o the Selecto of Cocrete Servces ad s For each, f t s o-mgratable, the has to be R( ) ). If t s mgratable, the ether a exstg or a ew ca be choose to host ). Due to the real-tme requremets, t s ecessary to have admsso cotrols by both the s ad the servces. For a gve cofgurato soluto cp, t s ecessary to check whether the cofgurato would volate the admsso costrats. The admsso costrat verfcato procedure s show Fgure 7. The algorthm takes ) ad puts. It frst vokes search_smm fucto to look up the servce table o SMM. If servce ) s already o, the search_smm fucto returs the average servce tme guarateed by gloc sel( (. Next, SMM checks whether ca admt W. If so, the sg s retured. Otherwse, the algorthm returs 0. If servce ) s ot o, the ) eeds to mgrate to. So, the algorthm checks f the has eough resources to create a ew VM. If yes, the computes ad returs the guarateed average servce tme for ) o. Otherwse, the algorthm returs 0. Note that whe the retur value s 0, t meas the admsso costrats are volated ad the cofgurato soluto should be rejected from the populato. If the cofgurato soluto s vald (postve retur value), the the retured value s the guarateed servce respose latecy, whch s used the ftess value computato. Iput: W, ), Beg sg = search_smm( ), ) If sg 0 the If ca admt W the Retur sg; Else Retur 0; Else (eed to create a ew servce stace) If has suffcet resources to create a ew VM the Retur servce_latecy( ), ) Else Retur 0; Edf Ed Fgure 7. Admsso costrat verfcato procedure. 4.2 Ftess Fucto The ftess of a soluto cp, ft(cp), s defed by (1)T(cp), the total respose lateces of the selected cocrete servces ) executg o the selected ; (2)C(cp), the total commucato costs betwee the cocrete servces ) o ; (3)M(cp), the mgrato cost for all ), ) s ot o yet ad eeds to be mgrated. (4)U(cp), the cosstecy mateace cost for all ), f ) s a data servce ad eeds to be mgrated. We have ft(cp) = T(cp) + C(cp) + M(cp) + U(cp). 138 Authorzed lcesed use lmted to: Uv of Texas at Dallas. Dowloaded o Aprl 16,2010 at 17:27:12 UTC from IEEE Xplore. Restrctos apply.
6 The servce tme of ) o s obtaed the admsso costrats verfcato step. We add the servce tmes of all selected cocrete servces o the selected s together to obta T(cp). Let k(g m,g ) deote the estmated commucato latecy betwee s g m ad g. I the SMM, the commucato lateces betwee some frequetly teractg servce pars are stored. If the commucato latecy betwee some servce par s ot avalable, the we ca use the logtude ad lattude coordates stored the table to estmate the commucato latecy betwee the servces. I [9], expermet studes have bee coducted to derve the correlato betwee geographcal dstace ad commucato latecy ad the estmato fucto s k(g m,g )= *d(g m,g ) 0.735, where d(g m,g ) s the geographcal dstace betwee g m ad g. Let psz be the packet sze. If sm, sel( ) vokes s, sel( ) (whch ca be determed by traversg W), the SMD checks wth the SMM to obta the average request message sze, msq( s, sel( ) ), ad the average respose message sze, msr( s, sel( ) ). Note that the message szes are stored the callee s servce etry. SMD also checks the workflow W to get the access frequecy formato, pr(em ). The commucato cost betwee the cocrete servces sm, sel( ad s, sel( s pr ( em ) ( msq( s, sel( as / psz + msr( s, sel( as / psz ) k( g ( (, g ( ( ) loc sel as loc sel m as C(cp) s obtaed by addg the commucato costs of all teractg servce pars together. Now we compute M(cp). Let M( ) ) be the mgrato cost for ). If already hosts ), the M( ) ) = 0. Otherwse, SMD checks wth the SMM to obta the sze of servce ), sze( as. We have M ( as = sze( s, sel ( as ) / psz k( g ( (, R( s, ( as ) loc sel as sel M(cp) s obtaed by addg the mgrato costs of all servces together. For a data servce, t s ecessary to mata cosstecy amog all ts replcas. Here, we cosder a smplfed model ad assume that the resdece (R) for the data servce s the prmary copy of the data. We oly cosder the cost for propagatg the updates from a replca to the prmary copy. If software servce sm, sel( ) vokes data servce s, sel( ) ad updates ts data, the the updates o s, sel( ) eed to be propagated to R( s, sel( ) ). Let U( s, sel( ) ) be the cosstecy mateace cost for s, sel( ). If s, sel( ) s already hosted by R( s, sel( ) ), the U( s, sel( ) ) = 0. Otherwse, SMD checks wth the SMM to obta the average sze of the update messages, msu( s, sel( as. Also the access frequecy pr(e m ) ad the update rato upr(e m ) (the percetage of the requests beg the update requests) ca be obtaed from the workflow W. we have U( s, sel( as = ( pr( em) upr( em msu( s, sel( as / psz k( g ( (, R( s, ( as ) loc sel as sel m, e W m U(cp) ca be obtaed by addg the cosstecy mateace costs of all data servces together. 5 Cocluso We have dscussed the problem of servce selecto ad mgrato a cloud. We have developed a framework to facltate servce mgrato ad desged a cost aalyss model to determe the tradeoffs o servce selecto ad mgrato. The geetc algorthm s used to fd the optmal or ear-optmal servce mgrato decsos. 6 Refereces [1] Bra Hayes, Cloud computg, Commucatos of the ACM, Volume 51, Issue 7, July [2] C. Atkso, P. Bosta, O. Hummel ad D. Stoll. A Practcal Approach to Web Servce Dscovery ad Retreval. I ICWS2007, [3] B. Beatallah, M. Hacd, A. Leger, C. Rey ad F. Touma. O automatg Web servces dscovery. I VLDB joural, V. 14, [4] I-Lg Ye, Tog Gao, Hu Ma, A geetc algorthm based QoS aalyss tool for recofgurable servce oreted systems, Advaces Mache Learg Applcato Software Egeerg, edted by Du Zhag ad Jeff Tsa, IDEA Group Publshg, 2006, pp [5] Lagzhao Zeg, Boualem Beatallah, Ae H.H. Ngu, Marlo Dumas, Jayat Kalagaam, ad Hery Chag, QoS-Aware Mddleware for Web Servces Composto, IEEE Trasactos o Software Egeerg, Vol. 30, No.5, May [6] A. Gupta, B. Lskov, R. Rodrgues, Oe hop lookups for peer-to-peer overlays, HOTOS'03: Proceedgs of the 9th coferece o Hot Topcs Operatg Systems, 2003, Hawa, USA. [7] C. Schmdt, M. Parashar, A Peer-to-Peer Approach to Web Servce Dscovery, World Wde Web, Volume 7, Issue 2, Jue [8] A. Rbere, "Usg vrtualzato to mprove durablty ad portablty of dustral applcatos", the 6th IEEE Iteratoal Coferece o Idustral Iformatcs, July 2008, Daejeo, Korea. [9] T. Gao, H. Moussa, I. Ye, F. Basta, J. Jeg, Servce Composto for Real-Tme Assurace, COMPSAC Authorzed lcesed use lmted to: Uv of Texas at Dallas. Dowloaded o Aprl 16,2010 at 17:27:12 UTC from IEEE Xplore. Restrctos apply.
The impact of service-oriented architecture on the scheduling algorithm in cloud computing
Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg
More informationGreen Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
More informationEfficient Traceback of DoS Attacks using Small Worlds in MANET
Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble
More informationA Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
More informationRESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS
Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL
More informationAPPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
More informationIDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,
More informationModels for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information
JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,
More informationMaintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
More informationProjection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
More informationAN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC
Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM
More informationDynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center
200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College
More informationApplications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
More informationA Security-Oriented Task Scheduler for Heterogeneous Distributed Systems
A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems Tao Xe 1 ad Xao Q 2 1 Departmet of Computer Scece, Sa Dego State Uversty, Sa Dego, CA 92182, USA xe@cs.sdsu.edu 2 Departmet of Computer
More informationCyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
More informationOptimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks
Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z
More informationLoad Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks
0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg
More information6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
More informationA DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS
L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece
More informationSecurity Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
More informationIntegrating Production Scheduling and Maintenance: Practical Implications
Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk
More informationReport 52 Fixed Maturity EUR Industrial Bond Funds
Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:
More informationModeling of Router-based Request Redirection for Content Distribution Network
Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak
More informationAutomated Event Registration System in Corporation
teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee
More informationAgent-based modeling and simulation of multiproject
Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es
More informationApplication of Grey Relational Analysis in Computer Communication
Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author
More informationVIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN
Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE
More informationA Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time
Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral
More informationTowards Network-Aware Composition of Big Data Services in the Cloud
(IJACSA) Iteratoal Joural of Advaced Computer Scece ad Applcatos, Towards Network-Aware Composto of Bg Data Servces the Cloud Umar SHEHU Departmet of Computer Scece ad Techology Uversty of Bedfordshre
More informationOptimization Model in Human Resource Management for Job Allocation in ICT Project
Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research
More informationAnySee: Peer-to-Peer Live Streaming
ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu
More informationProactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework
World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos
More informationUsing Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network
Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College
More informationAn Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author
More informationOptimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
More informationA New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
More informationResearch on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment
Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,
More informationNetwork dimensioning for elastic traffic based on flow-level QoS
Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto
More informationResearch on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow
325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of
More informationSuspicious Transaction Detection for Anti-Money Laundering
Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg
More informationA Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments
1574 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 A Novel Resource Prcg Mechasm based o Mult-Player Gamg Model Cloud Evromets Tea Zhag, Peg Xao School of Computer ad Commucato, Hua Isttute of Egeerg,
More informationImpact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *
Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty
More informationECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil
ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable
More informationDynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software
J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao
More informationWeb Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm
JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com
More informationA particle swarm optimization to vehicle routing problem with fuzzy demands
A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato
More informationOptimal replacement and overhaul decisions with imperfect maintenance and warranty contracts
Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl
More informationBanking (Early Repayment of Housing Loans) Order, 5762 2002 1
akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of
More informationHow To Balance Load On A Weght-Based Metadata Server Cluster
WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c
More informationThe Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk
The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet
More informationA particle Swarm Optimization-based Framework for Agile Software Effort Estimation
The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah
More informationLow-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks
Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.
More informationStatistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology
I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50
More informationImpact of Interference on the GPRS Multislot Link Level Performance
Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8
More informationAlgorithm Optimization of Resources Scheduling Based on Cloud Computing
JOURNAL OF MULTIMEDIA, VOL. 9, NO. 7, JULY 014 977 Algorm Optmzato of Resources Schedulg Based o Cloud Computg Zhogl Lu, Hagu Zhou, Sha Fu, ad Chaoqu Lu Departmet of Iformato Maagemet, Hua Uversty of Face
More informationNumerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
More informationA Single Machine Scheduling with Periodic Maintenance
A Sgle Mache Schedulg wth Perodc Mateace Fracsco Ágel-Bello Ada Álvarez 2 Joaquí Pacheco 3 Irs Martíez Ceter for Qualty ad Maufacturg, Tecológco de Moterrey, Eugeo Garza Sada 250, 64849 Moterrey, NL, Meco
More informationAverage Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
More informationLocation Analysis Regarding Disaster Management Bases via GIS Case study: Tehran Municipality (No.6)
Urba - Regoal Studes ad Research Joural 3 rd Year No.10 - Autum 2011 Locato Aalyss Regardg Dsaster Maagemet Bases va GIS Case study: Tehra Mucpalty (No.6) M. Shoja Aragh. S. Tavallae. P. Zaea Receved:
More informationThe Digital Signature Scheme MQQ-SIG
The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese
More informationStudy on prediction of network security situation based on fuzzy neutral network
Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork
More informationDiscrete-Event Simulation of Network Systems Using Distributed Object Computing
Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809
More informationProceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.
Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON
More informationPreprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.
Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E
More informationCapacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy
SCHOOL OF OPERATIONS RESEARCH AND INDUSTRIAL ENGINEERING COLLEGE OF ENGINEERING CORNELL UNIVERSITY ITHACA, NY 4853-380 TECHNICAL REPORT Jue 200 Capactated Producto Plag ad Ivetory Cotrol whe Demad s Upredctable
More informationRQM: A new rate-based active queue management algorithm
: A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew
More informationROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM
28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara
More informationCredibility Premium Calculation in Motor Third-Party Liability Insurance
Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53
More informationOptimizing Software Effort Estimation Models Using Firefly Algorithm
Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly
More informationLoad Balancing Control for Parallel Systems
Proc IEEE Med Symposum o New drectos Cotrol ad Automato, Chaa (Grèce),994, pp66-73 Load Balacg Cotrol for Parallel Systems Jea-Claude Heet LAAS-CNRS, 7 aveue du Coloel Roche, 3077 Toulouse, Frace E-mal
More informationSoftware Reliability Index Reasonable Allocation Based on UML
Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author
More informationCompressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring
Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,
More information1. The Time Value of Money
Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg
More informationMobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing
Moble Agets Telecommucatos Networks A Smulatve Approach to Load Balacg Steffe Lpperts Departmet of Computer Scece (4), Uversty of Techology Aache Aache, 52056, Germay Ad Brgt Kreller Corporate Techology
More informationAbraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract
Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected
More informationHow To Make A Supply Chain System Work
Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr
More informationAn Effectiveness of Integrated Portfolio in Bancassurance
A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the
More informationFractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK
Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag
More informationResource Management Model of Data Storage Systems Oriented on Cloud Computing
Resorce Maagemet Model of Data Storage Systems Oreted o Clod Comptg Elea Kaa, Yry Korolev Sat Petersbrg Electrotechcal Uversty "LETI" (ETU), Sat Petersbrg, Rssa {leaaa, yryg}@gmalcom Abstract Ths artcle
More informationClassic Problems at a Glance using the TVM Solver
C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the
More informationAn IG-RS-SVM classifier for analyzing reviews of E-commerce product
Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha
More informationChapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are
More informationADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
More informationTESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION
TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs
More informationT = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :
Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of
More informationA PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING
West Ida Joural of Egeerg Vol. 30, No. 2, (Jauary 2008) Techcal aper (Sharma & Bahadoorsgh) 57-63 A RACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISATCHING C. Sharma & S. Bahadoorsgh
More informationANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data
ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there
More informationOnline Appendix: Measured Aggregate Gains from International Trade
Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,
More informationChapter Eight. f : R R
Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,
More informationSettlement Prediction by Spatial-temporal Random Process
Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha
More informationSecure PHR Access Control Scheme in Cloud Computing
Iteratoal Joural of Iformato ad Electrocs Egeerg, Vol 3, No 3, May 23 ecure PHR Access Cotrol cheme Cloud Computg Cha-Hu Lu, Tzer-Log Che, Ha-Yu L, Fog-Q L, Chh-Mg Lu, E-Pg Wu, Yu-Fag Chug, ad Tzer-hyog
More informationThe Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev
The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has
More informationThe Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal
Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag
More informationPerformance Attribution. Methodology Overview
erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace
More informationAn Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques
Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs
More informationA Framework of Business Intelligence-driven Data Mining for e-business
A Framework of Busess Itellgece-drve Data Mg for e-busess Yag Hag, Smo Fog Dept. of Computer ad Iformato Scece Uversty of Macau Macau SAR ma76562@umac.mo, ccfog@umac.mo Abstract Ths paper proposes a data
More informationIP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm
Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1
More informationThe analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0
Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may
More informationFast, Secure Encryption for Indexing in a Column-Oriented DBMS
Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that
More informationCommercial Pension Insurance Program Design and Estimated of Tax Incentives---- Based on Analysis of Enterprise Annuity Tax Incentives
Iteratoal Joural of Busess ad Socal Scece Vol 5, No ; October 204 Commercal Peso Isurace Program Desg ad Estmated of Tax Icetves---- Based o Aalyss of Eterprse Auty Tax Icetves Huag Xue, Lu Yatg School
More information