![]() Bouvry, Pascal ![]() ![]() in 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, MFI 2016 (2016, September 19) The development and usage of Unmanned Aerial Vehicles (UAVs) quickly increased in the last decades, mainly for military purposes. This technology is also now of high interest in non-military contexts like ... [more ▼] The development and usage of Unmanned Aerial Vehicles (UAVs) quickly increased in the last decades, mainly for military purposes. This technology is also now of high interest in non-military contexts like logistics, environmental studies and different areas of civil protection. While the technology for operating a single UAV is rather mature, additional efforts are still necessary for using UAVs in fleets (or swarms). The Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques (ASIMUT) project which is supported by the European Defence Agency (EDA) aims at investigating and demonstrating dedicated surveillance services based on fleets of UAVs. The aim is to enhance the situation awareness of an operator and to decrease his workload by providing support for the detection of threats based on multi-sensor multi-source data fusion. The operator is also supported by the combination of information delivered by the heterogeneous swarms of UAVs and by additional information extracted from intelligence databases. As a result, a distributed surveillance system increasing detection, high-level data fusion capabilities and UAV autonomy is proposed. [less ▲] Detailed reference viewed: 270 (19 UL)![]() ; ; et al in Scientific Programming (2016), 14(5706790:1-5706790:14), Voice over Internet Protocol (VoIP) allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible ... [more ▼] Voice over Internet Protocol (VoIP) allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service. [less ▲] Detailed reference viewed: 127 (2 UL)![]() Atashpendar, Arash ![]() ![]() in IEEE International Conference on High Performance Computing Simulation (HPCS) (2016, July) Detailed reference viewed: 309 (50 UL)![]() Ibrahim, Abdallah Ali Zainelabden Abdallah ![]() ![]() ![]() in IEEE 9th International Conference on Cloud Computing (CLOUD), San Francisco, USA (June 2016) (2016, June 27) Cloud computing uses internet data centers to host applications and data storage. Cloud computing resources and services are offered to customers on pay-per-use model while the quality of the offered ... [more ▼] Cloud computing uses internet data centers to host applications and data storage. Cloud computing resources and services are offered to customers on pay-per-use model while the quality of the offered resources and services are defined using service level agreements also known as SLAs. Unfortunately, there is no standard mechanism to verify and assure that services delivered by the cloud provider satisfy the SLA agreement in an automatic way. To fill this gap we propose a framework for SLA assurance, which can be used by both cloud providers and cloud users. The proposed framework assesses performance of cloud applications with and without introducing system and component failures and then helps to resolve or mitigate failures to assure the required quality of cloud applications. The evaluation results obtained through simulations and using testbed experiments demonstrate good agreement with the design objectives. [less ▲] Detailed reference viewed: 214 (19 UL)![]() Emeras, Joseph ![]() ![]() ![]() in Proc. of the 9th IEEE Intl. Conf. on Cloud Computing (CLOUD 2016) (2016, June) Since its advent in the middle of the 2000’s, the Cloud Computing (CC) paradigm is increasingly advertised as THE solution to most IT problems. While High Performance Computing (HPC) centers continuously ... [more ▼] Since its advent in the middle of the 2000’s, the Cloud Computing (CC) paradigm is increasingly advertised as THE solution to most IT problems. While High Performance Computing (HPC) centers continuously evolve to provide more computing power to their users, several voices (most probably commercial ones) emit the wish that CC platforms could also serve HPC needs and eventually replace in-house HPC platforms. If we exclude the pure performance point of view where many previous studies highlight a non-negligible overhead induced by the virtualization layer at the heart of every Cloud middleware when submitted to an High Performance Computing (HPC) workload, the question of the real cost-effectiveness is often left aside with the intuition that, most probably, the instances offered by the Cloud providers are competitive from a cost point of view. In this article, we wanted to assert (or infirm) this intuition by evaluating the Total Cost of Ownership (TCO) of the in- house HPC facility we operate since 2007 within the University of Luxembourg (UL), and compare it with the investment that would have been required to run the same platform (and the same workload) over a competitive Cloud IaaS offer. Our approach to address this price comparison is two-fold. First we propose a theoretical price - performance model based on the study of the actual Cloud instances proposed by one of the major Cloud IaaS actors: Amazon Elastic Compute Cloud (EC2). Then, based on our own cluster TCO and taking into account all the Operating Expense (OPEX), we propose a hourly price comparison between our in-house cluster and the equivalent EC2 instances. The results obtained advocate in general for the acquisition of an in-house HPC facility, which balance the common intuition in favor of Cloud Computing (CC) platforms, would they be provided by the reference Cloud provider worldwide. [less ▲] Detailed reference viewed: 390 (19 UL)![]() Ibrahim, Abdallah Ali Zainelabden Abdallah ![]() ![]() ![]() in Butterfield, Evan; Kellenberger, Patrick (Eds.) Proceedings of 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing CCGrid 2016 (2016, May 19) Cloud services providers deliver cloud services to cloud customers on pay-per-use model while the quality of the provided services are defined using service level agreements also known as SLAs ... [more ▼] Cloud services providers deliver cloud services to cloud customers on pay-per-use model while the quality of the provided services are defined using service level agreements also known as SLAs. Unfortunately, there is no standard mechanism which exists to verify and assure that delivered services satisfy the signed SLA agreement in an automatic way. There is no guarantee in terms of quality. Those applications have many performance metrics. In this doctoral thesis, we propose a framework for SLA assurance, which can be used by both cloud providers and cloud users. Inside the proposed framework, we will define the performance metrics for the different applications. We will assess the applications performance in different testing environment to assure good services quality as mentioned in SLA. The proposed framework will be evaluated through simulations and using testbed experiments. After testing the applications performance by measuring the performance metrics, we will review the time correlations between those metrics. [less ▲] Detailed reference viewed: 210 (42 UL)![]() Fiandrino, Claudio ![]() ![]() ![]() in IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia, 2016 (2016, May) Mobile cloud applications have become extremely popular in the last years. Location-based services, navigation, online gaming and social networking are a representative set of “always on” cloud ... [more ▼] Mobile cloud applications have become extremely popular in the last years. Location-based services, navigation, online gaming and social networking are a representative set of “always on” cloud applications in which the same or partially overlapping content is delivered to multiple users. Network coding is a well matching solution to improve content delivery. In this paper we propose the vNC-CELL technique, which uses network coding to combine information flows carrying the same or overlapping content that has to be delivered to co-located users. vNC-CELL executes coding functionalities in a mobile cloud through virtualization as these operations are computationally intensive if performed locally at the base station. Performance evaluation obtained from NS-3 simulations confirms vNC-CELL ability to improve network throughput and reduce download times for the users. [less ▲] Detailed reference viewed: 262 (21 UL)![]() Kieffer, Emmanuel ![]() ![]() ![]() Scientific Conference (2016, April) Detailed reference viewed: 171 (28 UL)![]() ; ; Pecero, Johnatan ![]() in International Journal of Applied Mathematics and Computer Science (2016), 26 Internet shopping has been one of the most common online activities, carried out by millions of users every day. As the number of available offers grows, the difficulty in getting the best one among all ... [more ▼] Internet shopping has been one of the most common online activities, carried out by millions of users every day. As the number of available offers grows, the difficulty in getting the best one among all the shops increases as well. In this paper we propose an integer linear programming (ILP) model and two heuristic solutions, the MinMin algorithm and the cellular processing algorithm, to tackle the Internet shopping optimization problem with delivery costs. The obtained results improve those achieved by the state-of-the-art heuristics, and for small real case scenarios ILP delivers exact solutions in a reasonable amount of time. [less ▲] Detailed reference viewed: 142 (5 UL)![]() ; ; et al in Journal of Grid Computing (2016), 14 This paper focuses on a bi-objective experimental evaluation of online scheduling in the Infrastructure as a Service model of Cloud computing regarding income and power consumption objectives. In this ... [more ▼] This paper focuses on a bi-objective experimental evaluation of online scheduling in the Infrastructure as a Service model of Cloud computing regarding income and power consumption objectives. In this model, customers have the choice between different service levels. Each service level is associated with a price per unit of job execution time, and a slack factor that determines the maximal time span to deliver the requested amount of computing resources. The system, via the scheduling algorithms, is responsible to guarantee the corresponding quality of service for all accepted jobs. Since we do not consider any optimistic scheduling approach, a job cannot be accepted if its service guarantee will not be observed assuming that all accepted jobs receive the requested resources. In this article, we analyze several scheduling algorithms with different cloud configurations and workloads, considering the maximization of the provider income and minimization of the total power consumption of a schedule. We distinguish algorithms depending on the type and amount of information they require: knowledge free, energy-aware, and speed-aware. First, to provide effective guidance in choosing a good strategy, we present a joint analysis of two conflicting goals based on the degradation in performance. The study addresses the behavior of each strategy under each metric. We assess the performance of different scheduling algorithms by determining a set of nondominated solutions that approximate the Pareto optimal set. We use a set coverage metric to compare the scheduling algorithms in terms of Pareto dominance. [less ▲] Detailed reference viewed: 126 (4 UL)![]() Muszynski, Jakub ![]() ![]() ![]() in Proc. of the 19th European Event on Bio-Inspired Computation, EvoCOMNET 2016 (2016, March) Newscast is aPeer-to-Peer, nature-inspired gossip-based data exchange protocol used for information dissemination and membership management in large-scale, agent-based distributed systems. The model ... [more ▼] Newscast is aPeer-to-Peer, nature-inspired gossip-based data exchange protocol used for information dissemination and membership management in large-scale, agent-based distributed systems. The model follows a probabilistic scheme able to keep a self-organised, small-world equilibrium featuring a complex, spatially structured and dynamically changing environment. Newscast gained popularity since the early 2000s thanks to its inherent resilience to node volatility as the protocol exhibits strong self-healing properties. However, the original design proved to be surprisingly fragile in a byzantine environment subjected to cheating faults. Indeed, a set of recent studies emphasized the hard-wired vulnerabilities of the protocol, leading to an efficient implementation of a malicious client, where a few naive cheaters are able to break the network connectivity in a very short time. Extending these previous works, we propose in this paper a modification of the seminal protocol with embedded counter-measures, improving the resilience of the scheme against malicious acts without significantly affecting the original Newscast’s proper- ties nor its inherent performance. Concrete experiments were performed to support these claims, using a framework implementing all the solutions discussed in this work. [less ▲] Detailed reference viewed: 188 (1 UL)![]() ; ; Bouvry, Pascal ![]() in Simulation (2016), 92 In this paper, we propose a distributed algorithm based on a generalization of the Cellular Automata concept called Graph Cellular Automata (GCA) to solve the Maximum Lifetime Coverage Problem (MLCP) in ... [more ▼] In this paper, we propose a distributed algorithm based on a generalization of the Cellular Automata concept called Graph Cellular Automata (GCA) to solve the Maximum Lifetime Coverage Problem (MLCP) in wireless sensor networks (WSNs). In GCA, we adapt life-like state transition functions inspired by Conway’s Game of Life in order to solve the problem. The goal of this paper is to study the quality of state transition functions for an objective provided by the MLCP in WSNs. The proposed algorithm possesses all the advantages of a localized algorithm, i.e., using only some knowledge about neighbors, a WSN is able to self-organize in such a way as to prolong its lifetime, at the same time preserving the required coverage ratio of the target field. Our experimental results show that certain rules are better solvers of the given problem than others. The paper also presents the results of an experimental study of the proposed algorithm and comparison with a centralized Genetic Algorithm. [less ▲] Detailed reference viewed: 75 (2 UL)![]() Nielsen, Sune Steinbjorn ![]() ![]() ![]() in Proceedings of the Genetic and Evolutionary Computation Conference 2016 (2016) Detailed reference viewed: 218 (33 UL)![]() Zotkiewicz, Mateusz ![]() ![]() ![]() in IEEE Transactions on Parallel and Distributed Systems (2016) Detailed reference viewed: 274 (7 UL)![]() Kieffer, Emmanuel ![]() ![]() ![]() in Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion (2016) Detailed reference viewed: 241 (25 UL)![]() Atten, Christophe ![]() ![]() in 19th European Conference on Applications of Evolutionary Computation (EvoApplications) (2016) Detailed reference viewed: 301 (42 UL)![]() Kieffer, Emmanuel ![]() ![]() ![]() in Hybrid mobility model with pheromones for UAV detection task (2016) Detailed reference viewed: 246 (34 UL)![]() Kliazovich, Dzmitry ![]() in Journal of Grid Computing (2016), 14(1), 23-39 This paper addresses performance issues of resource allocation in cloud computing. We review requirements of different cloud applications and identify the need of considering communication processes ... [more ▼] This paper addresses performance issues of resource allocation in cloud computing. We review requirements of different cloud applications and identify the need of considering communication processes explicitly and equally to the computing tasks. Following this observation, we propose a new communication-aware model of cloud computing applications, called CA-DAG. This model is based on Directed Acyclic Graphs that in addition to computing vertices include separate vertices to represent communications. Such a representation allows making separate resource allocation decisions: assigning processors to handle computing jobs, and network resources for information transmissions. The proposed CA-DAG model creates space for optimization of a number of existing solutions to resource allocation and for developing novel scheduling schemes of improved efficiency. [less ▲] Detailed reference viewed: 266 (3 UL)![]() Wagle, Shyam Sharan ![]() ![]() ![]() in IEEE (Ed.) 2016 IEEE 9th International Conference on Cloud Computing (2016) Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to ... [more ▼] Cloud service providers (CSPs) offer different Ser- vice Level Agreements (SLAs) to the cloud users. Cloud Service Brokers (CSBs) provide multiple sets of alternatives to the cloud users according to users requirements. Generally, a CSB considers the service commitments of CSPs rather than the actual quality of CSPs services. To overcome this issue, the broker should verify the service performances while recommending cloud services to the cloud users, using all available data. In this paper, we compare our two approaches to do so: a min-max-min decomposition based on Intuitionistic Fuzzy Logic (IFL) and a Performance Heat Map technique, to evaluate the performance of commercially available cloud providers. While the IFL technique provides simple, total order of the evaluated CSPs, Performance Heat Map provides transparent and explanatory, yet consistent evaluation of service performance of commercially available CSPs. The identified drawbacks of the IFL technique are: 1) It does not return the accurate performance evaluation over multiple decision alternatives due to highly influenced by critical feedback of the evaluators; 2) Overall ranking of the CSPs is not as expected according to the performance measurement. As a result, we recommend to use performance Heat Map for this problem. [less ▲] Detailed reference viewed: 208 (19 UL)![]() Rosalie, Martin ![]() ![]() ![]() in Proceedings of the 2Nd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications for Civilian Use (2016) The development and usage of Unmanned Aerial Vehicles (UAVs) quickly increased in the last decades, mainly for military purposes. Nowadays, this type of technology is used in non-military contexts mainly ... [more ▼] The development and usage of Unmanned Aerial Vehicles (UAVs) quickly increased in the last decades, mainly for military purposes. Nowadays, this type of technology is used in non-military contexts mainly for civil and environment protection: search & rescue teams, fire fighters, police officers, environmental scientific studies, etc. Although the technology for operating a single UAV is now mature, additional efforts are still necessary for using UAVs in fleets (or swarms). This position paper presents the ASIMUT project (Aid to SItuation Management based on MUltimodal, MUltiUAVs, MUltilevel acquisition Techniques). The challenges of this project consist of handling several fleets of UAVs (swarms) including communication, networking and positioning aspects. This motivates the development of novel multilevel cooperation algorithms which is an area that has not been widely explored, especially when autonomy is an additional challenge. Moreover, we will provide techniques to optimize communications for multilevel swarms. Finally, we will develop distributed and localized mobility management algorithms that will cope with conflicting objectives such as connectivity maintenance and geographical area coverage. [less ▲] Detailed reference viewed: 255 (38 UL) |
||