Cluster Computing

http://link.springer.com/journal/10586

List of Papers (Total 34)

A distributed IDS architecture model for Smart Home systems

The common use of smart devices encourages potential attackers to violate privacy. Sometimes taking control of one device allows the attacker to obtain secret data (such as password for home WiFi network) or tools to carry out DoS attack, and this, despite the limited resources of such devices. One of the solutions for gaining users’ confidence is to assign responsibility for ...

Secure provable data possession scheme with replication support in the cloud using Tweaks

Cloud computing is an emerging model in which computing facilities are provided as a service and accessed using Internet hence organizations prefer data outsourcing to the cloud servers. Currently, organizations produce a large amount of data and expect increased availability, scalability and security. When data is migrated to cloud, security and availability of the data must be ...

The robust analysis of supply chain based on uncertainty computation: insight from open innovation

In this study, the effects of open innovation practices on enterprise value were discussed based on the supply chain perspective. A nonlinear programming mode was constructed considering the uncertainty of open innovation effect. On this basis, the prototype was analyzed using a robust optimization approach with comprehensive considerations to the infeasible probability of ...

Parallelism-based approaches in computational biology: a view from diverse case studies

Computational biology allows and encourages the application of many different parallelism-based approaches. This special issue brings together high-quality state-of-the-art contributions about parallelism-based approaches in computational biology, from different points of view or perspectives, that is, from diverse case studies. The special issue collects considerably extended and ...

A performance comparison of data and memory allocation strategies for sequence aligners on NUMA architectures

Over the last several years, many sequence alignment tools have appeared and become popular for the fast evolution of next generation sequencing technologies. Obviously, researchers that use such tools are interested in getting maximum performance when they execute them in modern infrastructures. Today’s NUMA (Non-uniform memory access) architectures present major challenges in ...

An architecture for the autonomic curation of crowdsourced knowledge

Human knowledge curators are intrinsically better than their digital counterparts at providing relevant answers to queries. That is mainly due to the fact that an experienced biological brain will account for relevant community expertise as well as exploit the underlying connections between knowledge pieces when offering suggestions pertinent to a specific question, whereas most ...

Collecting large training dataset of actual facial images from facebook for developing a weighted bagging gender classifier

Many of previous gender classifiers have a common problem of low accuracy in classifying actual facial images taken in real environments since they were learned in restricted environments. Therefore, this study proposes to swiftly collect uncontrolled actual facial images from Facebook to construct training dataset and proposes a weighted bagging gender classifier which utilizes a ...

OnlineElastMan: self-trained proactive elasticity manager for cloud-based storage services

The pay-as-you-go pricing model and the illusion of unlimited resources in the Cloud initiate the idea to provision services elastically. Elastic provisioning of services allocates/de-allocates resources dynamically in response to the changes of the workload. It minimizes the service provisioning cost while maintaining the desired service level objectives (SLOs). Model-predictive ...

Energy-aware auto-scaling algorithms for Cassandra virtual data centers

Apache Cassandra is an highly scalable and available NoSql datastore, largely used by enterprises of each size and for application areas that range from entertainment to big data analytics. Managed Cassandra service providers are emerging to hide the complexity of the installation, fine tuning and operation of Cassandra virtual data centers (VDCs). This paper address the problem of ...

Optimized combinatorial clustering for stochastic processes

As a new data processing era like Big Data, Cloud Computing, and Internet of Things approaches, the amount of data being collected in databases far exceeds the ability to reduce and analyze these data without the use of automated analysis techniques, data mining. As the importance of data mining has grown, one of the critical issues to emerge is how to scale data mining techniques ...

Energy aware scheduling model and online heuristics for stencil codes on heterogeneous computing architectures

Performance of high-end supercomputers will reach the exascale through the advent of core counts in billions. However, in the upcoming exascale computing era it is important not only to focus on the performance, but also on scalability of fine-grained parallel applications, data locality and energy aware scheduling within the parallel code. In fact, parallel applications need to ...

Automated and dynamic abstraction of MPI application performance

Developing an efficient parallel application is not an easy task, and achieving a good performance requires a thorough understanding of the program’s behavior. Careful performance analysis and optimization are crucial. To help developers or users of these applications to analyze the program’s behavior, it is necessary to provide them with an abstraction of the application ...

OptiSpot: minimizing application deployment cost using spot cloud resources

The spot instance model is a virtual machine pricing scheme in which some resources of cloud providers are offered to the highest bidder. This leads to the formation of a spot price, whose fluctuations can determine customers to be overbid by other users and lose the virtual machine they rented. In this paper we propose OptiSpot, a heuristic to automate application deployment ...

DI-MMAP—a scalable memory-map runtime for out-of-core data-intensive applications

We present DI-MMAP, a high-performance runtime that memory-maps large external data sets into an application’s address space and shows significantly better performance than the Linux mmap system call. Our implementation is particularly effective when used with high performance locally attached Flash arrays on highly concurrent, latency-tolerant data-intensive HPC applications. We ...

Technological-level evaluation using patent statistics: model and application in mobile communications

Information and communication technology (ICT) has been a driving force of development for knowledge-based economies. In particular, as competition in mobile communications technological innovation among nations becomes more intense, there are growing demands for improved evaluation, judgment, and prediction of mobile communications technological capability in order to improve ...

Hierarchical genetic-based grid scheduling with energy optimization

An optimization of power and energy consumptions is the important concern for a design of modern-day and future computing and communication systems. Various techniques and high performance technologies have been investigated and developed for an efficient management of such systems. All these technologies should be able to provide good performance and to cope under an increased ...

Enabling greener DSL access networks by their stabilization with artificial noise and SNR margin

Low-power modes (LPM) are a standardized means in asymmetric digital subscriber lines (ADSL) 2 for reducing the power consumption at the central office. However, the activation of LPMs is hampered by the operators’ concern for instability introduced by frequent transmit power changes. The injection of artificial noise (AN) has been proposed as a standard-compliant stabilization ...