Results 301-320 of 407.
Bookmark and Share    
Full Text
Peer Reviewed
See detailOptimising Satellite Payload Reconfiguration: An ILP Approach for Minimising Channel Interruptions
Stathakis, Apostolos UL; Danoy, Grégoire UL; Veneziano, Thomas UL et al

in 2nd ESA Workshop on Advanced Flexible Telecom Payloads (2012)

Detailed reference viewed: 173 (18 UL)
Full Text
Peer Reviewed
See detailSimulating Communication Processes in Energy-Efficient Cloud Computing Systems
Kliazovich, Dzmitry UL; Bouvry, Pascal UL; Khan, Samee Ullah

in CLOUDNET (2012)

Cloud computing data centers are becoming increasingly popular for the provisioning of computing resources. The cost and operating expenses of data centers have skyrocketed with the increase in computing ... [more ▼]

Cloud computing data centers are becoming increasingly popular for the provisioning of computing resources. The cost and operating expenses of data centers have skyrocketed with the increase in computing capacity. In this chapter, we survey the main techniques behind enabling energy efficiency in data centers and present simulation environment for energy-aware cloud computing. Along with the workload distribution, the focus is devoted to simulating packet-level communications in realistic setups. Finally, the effectiveness of common power management solutions is assessed and a scheduling methodology that combines energy efficiency and network awareness is presented. [less ▲]

Detailed reference viewed: 182 (1 UL)
Full Text
Peer Reviewed
See detailGreenCloud: a packet-level simulator of energy-aware cloud computing data centers
Kliazovich, Dzmitry UL; Bouvry, Pascal UL; U. Khan, Samee

in Journal of Supercomputing (2012), 62(3), 1263-1283

Cloud computing data centers are becoming increasingly popular for the provisioning of computing resources. The cost and operating expenses of data centers have skyrocketed with the increase in computing ... [more ▼]

Cloud computing data centers are becoming increasingly popular for the provisioning of computing resources. The cost and operating expenses of data centers have skyrocketed with the increase in computing capacity. Several governmental, industrial, and academic surveys indicate that the energy utilized by computing and communication units within a data center contributes to a considerable slice of the data center operational costs. In this paper, we present a simulation environment for energy-aware cloud computing data centers. Along with the workload distribution, the simulator is designed to capture details of the energy consumed by data center components (servers, switches, and links) as well as packet-level communication patterns in realistic setups. The simulation results obtained for two-tier, three-tier, and three-tier high-speed data center architectures demonstrate the effectiveness of the simulator in utilizing power management schema, such as voltage scaling, frequency scaling, and dynamic shutdown that are applied to the computing and networking components. [less ▲]

Detailed reference viewed: 456 (1 UL)
Full Text
Peer Reviewed
See detailSatellite Payload Reconfiguration Optimisation: An ILP Model
Stathakis, Apostolos UL; Danoy, Grégoire UL; Bouvry, Pascal UL et al

in Proceedings of the 4th Asian Conference on Intelligent Information and Database Systems (ACIIDS'12) (2012)

Detailed reference viewed: 198 (18 UL)
Full Text
Peer Reviewed
See detailOptimisation of the enhanced distance based broadcasting protocol for MANETs
Ruiz, Patricia UL; Dorronsoro, Bernabé UL; Valentini, Giorgio et al

in Journal of Supercomputing (2012), 62(3), 1213-1240

Detailed reference viewed: 224 (2 UL)
Full Text
Peer Reviewed
See detailInformation Dissemination in VANETs based upon a Tree Topology
Ruiz, Patricia UL; Dorronsoro, Bernabé UL; Bouvry, Pascal UL et al

in Ad Hoc Networks (2012), 10(1), 111-127

Detailed reference viewed: 348 (1 UL)
Full Text
Peer Reviewed
See detailImpact of Voltage Levels Number for Energy-aware Bi-objective DAG Scheduling for Multi-processors Systems
Guzek, Mateusz UL; Diaz, Cesar UL; Pecero, Johnatan UL et al

in Advances in Information Technology: 5th International Conference, IAIT 2012, Bangkok, Thailand, December 6-7, 2012, Proceedings (2012)

Detailed reference viewed: 181 (11 UL)
Full Text
Peer Reviewed
See detailConvergence Analysis of Evolutionary Algorithms in the Presence of Crash-Faults and Cheaters
Muszynski, Jakub UL; Varrette, Sébastien UL; Bouvry, Pascal UL et al

in Computers and Mathematics with Applications (2012), 64(12), 3805-3819

This paper analyzes the fault-tolerance nature of Evolutionary Algorithms (EAs) when executed in a distributed environment subjected to malicious acts. More precisely, the inherent resilience of EAs ... [more ▼]

This paper analyzes the fault-tolerance nature of Evolutionary Algorithms (EAs) when executed in a distributed environment subjected to malicious acts. More precisely, the inherent resilience of EAs against two types of failures is considered: (1) crash faults, typically due to resource volatility which lead to data loss and part of the computation loss; (2) cheating faults, a far more complex kind of fault that can be modeled as the alteration of output values produced by some or all tasks of the program being executed. This last type of failure is due to the presence of cheaters on the computing platform. Most often in Global Computing (GC) systems such as BOINC, cheaters are attracted by the various incentives provided to stimulate the volunteers to share their computing resources: cheaters typically seek to obtain rewards with little or no contribution to the system. In this paper, the Algorithm-Based Fault Tolerance (ABFT) aspects of EAs against the above types of faults is characterized. Whereas the inherent resilience of EAs has been previously observed in the literature, for the first time, a formal analysis of the impact of the considered faults over the executed EA including a proof of convergence is proposed in this article. By the variety of problems addressed by EAs, this study will hopefully promote their usage in the future developments around distributed computing platform such as Desktop Grids and Volunteer Computing Systems or Cloud systems where the resources cannot be fully trusted. [less ▲]

Detailed reference viewed: 154 (1 UL)
See detailSecurity and Intelligent Information Systems
Klopotek, Mieczyslaw; Leprévost, Franck UL; Marciniak, Malgorzata et al

Book published by Springer (2012)

Detailed reference viewed: 193 (5 UL)
Full Text
Peer Reviewed
See detailValidating a Peer-to-Peer Evolutionary Algorithm
Jimenez Laredo, Juan Luis UL; Bouvry, Pascal UL; Mostaghim, Sanaz et al

in European Conference on the Applications of Evolutionary Computation (2012)

Detailed reference viewed: 188 (5 UL)
Full Text
Peer Reviewed
See detailDesigning a Self-organized Approach for Scheduling Bag-of-Tasks
Jimenez Laredo, Juan Luis UL; Dorronsoro, Bernabé UL; Pecero, Johnatan UL et al

in Designing a Self-organized Approach for Scheduling Bag-of-Tasks (2012)

This paper proposes a decentralized and self-organized agent system for dynamically load-balancing tasks arriving in the form of Bags-of-Tasks (BoTs) in large-scale decentralized systems. The approach is ... [more ▼]

This paper proposes a decentralized and self-organized agent system for dynamically load-balancing tasks arriving in the form of Bags-of-Tasks (BoTs) in large-scale decentralized systems. The approach is inspired by the emergent behavior of the sandpile model; a cellular automaton behaving at the edge of chaos. Depending on the state of the cellular automaton, rather different responses may occur when a new task is assigned to a resource. It may change nothing or generate avalanches that reconfigure the state of the system. The proportion between the abundance of avalanches and their sizes shows a power-law relation, a scale-invariant behavior that does not need to be tuned. That means that large –catastrophic– avalanches are very rare but small ones occur very often. Such a smart and emergent behavior fits well with the idea of non-clairvoyant scheduling, where tasks are load balanced into computing resources trying to maximize the performance but without assuming any knowledge on the tasks features. In order to study the viability of the approach, we have conducted an empirical experimentation which shows that the sandpile is able to find near-optimal schedules by reacting differently to different conditions of workloads and architectures. [less ▲]

Detailed reference viewed: 163 (2 UL)
See detailEVOLVE - A Bridge between Probability, Set Oriented Numerics, and Evolutionary Computation II
Schütze, O.; Coello, C. A. C.; Bouvry, Pascal UL et al

Book published by Springer (2012)

Detailed reference viewed: 161 (1 UL)
Full Text
Peer Reviewed
See detailA Multi-objective GRASP Algorithm for Joint Optimization of Energy Consumption and Schedule Length of Precedence-Constrained Applications
Pecero, Johnatan UL; Bouvry, Pascal UL; Fraire Huacuja, Hector J. et al

in 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing (DASC) (2011, December 14)

We address the problem of scheduling precedence-constrained scientific applications on a heterogeneous distributed processor system with the twin objectives of minimizing simultaneously energy consumption ... [more ▼]

We address the problem of scheduling precedence-constrained scientific applications on a heterogeneous distributed processor system with the twin objectives of minimizing simultaneously energy consumption and schedule length. Previous research efforts on scheduling have focused on the minimization of a quality of service metric based on the completion time of applications (e.g., the schedule length). Recently, many researchers are working on the design of new scheduling algorithms that consider the minimization of energy consumption. We report a new scheduling algorithm accounting for both objectives. The new scheduling algorithm is based on a multi-start randomized adaptive search technique (GRASP framework) that adopts Dynamic Voltage Scaling technique to minimize energy consumption. This technique enables processors to operate in different voltage supply levels at the cost of sacrificing clock frequencies. This multiple voltage implies a trade-off between the quality of the schedules and energy consumption. Therefore, the new proposed approach is designed as a multi-objective algorithm that simultaneously optimize both objectives. Simulation results on a set of real-world applications emphasize the robust performance of the proposed approach. [less ▲]

Detailed reference viewed: 160 (1 UL)
Full Text
Peer Reviewed
See detailA Multi-Objective GRASP for Energy-aware Scheduling
Pecero, Johnatan UL; Pinel, Frédéric UL; Bouvry, Pascal UL et al

in International Congress on Computer Science Research (2011, October 28)

Detailed reference viewed: 99 (2 UL)
Full Text
Peer Reviewed
See detailCertiCloud: a Novel TPM-based Approach to Ensure Cloud IaaS Security
Bertholon, Benoit UL; Varrette, Sébastien UL; Bouvry, Pascal UL

in 4th IEEE Intl. Conf. on Cloud Computing (CLOUD 2011) (2011, July)

The security issues raised by the Cloud paradigm are not always tackled from the user point of view. For instance, considering an Infrastructure-as-a-Service (IaaS) Cloud, it is currently impossible for a ... [more ▼]

The security issues raised by the Cloud paradigm are not always tackled from the user point of view. For instance, considering an Infrastructure-as-a-Service (IaaS) Cloud, it is currently impossible for a user to certify in a reliable and secure way that the environment he deployed (typically a Virtual Machine(VM)) has not been corrupted, whether by malicious acts or not. Yet having this functionality would enhance the confidence on the IaaS provider and therefore attract new customers. This paper fills this need by proposing CERTICLOUD, a novel approach for the protection of IaaS platforms that relies on the concepts developed in the Trusted Computing Group (TCG) together with hardware elements, i.e., Trusted Platform Module (TPM) to offer a secured and reassuring environment. Those aspects are guaranteed by two protocols: TCRR and Verify MyVM. When the first one asserts the integrity of a remote resource and permits to exchange a private symmetric key, the second authorizes the user to detect trustfully and on demand any tampering attempt on its running VM. These protocols being key components in the proposed framework, we take very seriously their analysis against known cryptanalytic attacks. This is testified by their successful validation by AVISPA and Scyther, two reference tools for the automatic verification of security protocols. The CERTICLOUD proposal is then detailed: relying on the above protocols, this platform provides the secure storage of users environments and their safe deployment onto a virtualization framework. While the physical resources are checked by TCRR, the user can execute on demand the Verify MyVM protocol to certify the integrity of its deployed environment. Experimental results operated on a first prototype of CERTICLOUD demonstrate the feasibility and the low overhead of the approach, together with its easy implementation on recent commodity machines. [less ▲]

Detailed reference viewed: 343 (5 UL)
Full Text
Peer Reviewed
See detailA Signature Scheme for Distributed Executions based on Control flow Analysis..
Varrette, Sébastien UL; Bertholon, Benoit UL; Bouvry, Pascal UL

in 19th Intl. conference on Security and Intelligent Information Systems (SIIS 2011) (2011, June)

Detailed reference viewed: 146 (0 UL)
See detailA Model for Energy-efficient Task Mapping on Milliclusters
Pinel, Frédéric UL; Bouvry, Pascal UL

in Proceedings of the Second International Conference on Parallel, Distributed, Grid and Cloud Computing for Engineering (2011)

This paper exposes the mismatch between the classic problem representation in the scheduling problem of independent task mapping and the reality of multi-core proces- sors, operating system driven power ... [more ▼]

This paper exposes the mismatch between the classic problem representation in the scheduling problem of independent task mapping and the reality of multi-core proces- sors, operating system driven power management and time sharing for overlapping I/O with computation. A new, simple, model is proposed to address this gap. The model, along with a scheduling heuristic, are applied to the evaluation of software pipelin- ing in the context of the recent millicomputing initiative. [less ▲]

Detailed reference viewed: 163 (12 UL)