{"title":"Performance and Portability of the SciBy Virtual Machine","authors":"Rasmus Andersen, B. Vinter","doi":"10.1109/WETICE.2010.47","DOIUrl":"https://doi.org/10.1109/WETICE.2010.47","url":null,"abstract":"The Scientific Bytecode Virtual Machine is a virtual machine designed specifically for performance, security, and portability of scientific applications deployed in a Grid environment. The performance overhead normally incurred by virtual machines is mitigated using native optimized scientific libraries, security is obtained by sandboxing techniques. Lastly, by executing platform-independent bytecodes, the machine is highly portable. To evaluate the machine, we demonstrate several use-case scenarios from some of the intended application domains. Further, we show the ease of porting the machine and distributing its jobs to a variety of predominant architectures and compare the results with native execution.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Virtualization to Prepare Your Data Center for \"Real-Time Assurance of Business Continuity\"","authors":"Rao V. Mikkilineni, Gopal Kankanhalli","doi":"10.1109/WETICE.2010.18","DOIUrl":"https://doi.org/10.1109/WETICE.2010.18","url":null,"abstract":"This paper describes our experience using the dynamic resource reallocation capabilities offered by virtualization technologies, in implementing: 1. Automation of end-to-end failover of mission critical virtualized application, a SAN network and EMC Clarion based storage to a remote site and 2. On-demand and scheduled assurance of failover and measurement of RPO and RTO (The Recovery Point Objective (RPO) is the point in time to which you must recover data as dictated by business needs. Recovery Time Objective (RTO) is the period of time after an outage in which the application and its data must be restored to a predetermined state defined by RPO.) By creating an application to spindle resource utilization profile through various management systems, and utilizing a combination of server, network- and storage-virtualization technologies, application specific RTO and RPO objectives (defined based on workload profiles and business priorities) are met in a technology agnostic and multi-vendor environment.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124615599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards the Next Generation of Ambient Intelligent Environments","authors":"A. Kameas","doi":"10.1109/WETICE.2010.58","DOIUrl":"https://doi.org/10.1109/WETICE.2010.58","url":null,"abstract":"Next Generation Ambient Intelligent Environments (NGAIEs) will offer intelligent and trustworthy services (although probably not for free), will be populated with Ambient Ecologies of smart objects, and will support the Activity Spheres of their multiple occupants. Ubiquitous computing applications will be composed from heterogeneous services offered by objects connected via the web and NGAIEs. These applications will inherently exhibit increasingly intelligent behavior, perceive the operational environment and adapt to it, provide optimized resource usage and support consistent functionality and human-centric operation. This paper tracks the disappearance of computers and the advent of Ambient Intelligence.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Creating Next Generation Cloud Computing Operation Support Services by Social OSS: Contribution with Telecom NGN Experience","authors":"Miyuki Sato","doi":"10.1109/WETICE.2010.19","DOIUrl":"https://doi.org/10.1109/WETICE.2010.19","url":null,"abstract":"Currently, Cloud network operators and service providers are managing server, network and storage resources by various management systems to manage hardware, applications, traffic, and resources monitoring including bandwidth, storage capacity, and throughput utilization. However, these systems are not coordinated with accounting, security and configuration systems to provide end-to-end service management. Various players are emerging to provide remote computing and storage resources over the cloud network. Telecommunications grade operation systems will be the key to realize end-to-end service management, and resource management to assure application quality of service. In this paper we present how the operation service methodology using Social Cloud OSS will support end-to-end service management and resource (computing, network and storage) management over the cloud network. Fujitsu’s Social Cloud OSS will provide integrated operation services by supporting group to group communication, and Enterprise to Enterprise (E2E) application transactions. Social Cloud OSS is designed to support social collaboration, and e-commerce applications using the cloud on a massive scale and lower Total Cost of Ownership than the current approaches with disparate management systems.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131159093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enterprise Usability of Cloud Computing Environments: Issues and Challenges","authors":"P. Goyal","doi":"10.1109/WETICE.2010.15","DOIUrl":"https://doi.org/10.1109/WETICE.2010.15","url":null,"abstract":"Cloud Computing Environments enable business agility and enterprises to exploit/respond quickly to changes in the marketplace, competition, technology and operational environment. For enterprises, CCE present a number of issues and challenges. Some of these include the inability to take advantage of the dynamic resource elasticity of CCE, issues of data fragmentation and duplication, the challenge of migrating transactional systems to a CCE, or the challenge of utilizing SaaS applications in conjunction with the other enterprise applications, say, to implement end-to-end process integration. Enterprises, also, have extended partnerships and aim to extend integration of participating systems. This paper presents some of these challenges and mechanisms to alleviate some of these challenges of operating and managing a hybrid CCE. The paper also presents mechanisms for robust network interconnectivity and partitioning mechanisms to co-isolate cooperating systems.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"507 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122210319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Integrated Architecture to Integrated Executable Architecture","authors":"Philipp Helle, Pascal Levier","doi":"10.1109/WETICE.2010.29","DOIUrl":"https://doi.org/10.1109/WETICE.2010.29","url":null,"abstract":"In this paper, we present a solution for the integration of architecture modelling tools and simulation tools. This will allow the use of executable architectures during the conceptual analysis and design phases in order to address system complexity at an early stage of the development. The proposed concept of integrated executable architecture enables a dynamic combination of the formerly separated and static areas of business processes, system design and resource modelling. It provides time-based, dynamic visualisation of system behaviour by combining business process simulation, system simulation and synthetic environments. This allows an early understanding of emergent behaviour, time-dependent behaviour and performance estimation of the architecture.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Architecture for Pervasive Computing Supported Collaborative Work Application and Simulation","authors":"K. Hamadache, L. Lancieri","doi":"10.1109/WETICE.2010.28","DOIUrl":"https://doi.org/10.1109/WETICE.2010.28","url":null,"abstract":"In this paper we present an hybrid architecture for a computer supported collaborative work in pervasive computing environment simulator. This architecture supports pure simulation mode where all agents are simulated, real deployment where it seamlessly integrates pervasive computing to the computer supported collaborative work and finally an hybrid mode where real devices can interact with simulated ones. This specific architecture provides an original framework to develop and evaluate complex behaviours in pervasive computing environments by allowing scenario to be played in a semi-simulated way and avoid some of the constraints and difficulties of real conditions testing. In addition to theses obvious advantages it also provides a reliable base to capture and analyse real devices behaviour in pervasive computing environments.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114068594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Michael Whelan, Nhien-An Le-Khac, Mohand Tahar Kechadi
{"title":"Data Reduction in Very Large Spatio-Temporal Datasets","authors":"Michael Whelan, Nhien-An Le-Khac, Mohand Tahar Kechadi","doi":"10.1109/WETICE.2010.23","DOIUrl":"https://doi.org/10.1109/WETICE.2010.23","url":null,"abstract":"Today, huge amounts of data are being collected with spatial and temporal components from sources such as metrological, satellite imagery etc.. Efficient visualisation as well as discovery of useful knowledge from these datasets is therefore very challenging and becoming a massive economic need. Data Mining has emerged as the technology to discover hidden knowledge from very large size of data. Furthermore, data mining techniques could be applied to decrease the large size of raw data by retrieving its useful knowledge as representatives. As a consequence, instead of dealing with a large size of raw data, we can use these representatives to visualise or to analyse without losing important information. This paper presents a data reduction technique based on clustering to help analyse very large spatio-temporal data. We also present and discuss preliminary results of this approach.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124981523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Róbert Ormándi, István Hegedüs, Kornel Csernai, Márk Jelasity
{"title":"Towards Inferring Ratings from User Behavior in BitTorrent Communities","authors":"Róbert Ormándi, István Hegedüs, Kornel Csernai, Márk Jelasity","doi":"10.1109/WETICE.2010.41","DOIUrl":"https://doi.org/10.1109/WETICE.2010.41","url":null,"abstract":"Peer-to-peer file-sharing has been increasingly popular in the last decade. In most cases file-sharing communities provide only minimal functionality, such as search and download. Extra features such as recommendation are difficult to implement because users are typically unwilling to provide sufficient rating information for the items they download. For this reason, it would be desirable to utilize user behavior to infer implicit ratings. For example, if a user deletes a file after downloading it, we could infer that the rating is low, or if the user is seeding the file for a long time, the rating is high. In this paper we demonstrate that it is indeed possible to infer implicit ratings from user behavior. We work with a large trace of Filelist.org, a BitTorrent-based private community, and demonstrate that we can identify a binary like/dislike distinction over the set of files users are downloading, using dynamic features of swarm membership. The resulting database containing the inferred ratings will be published online publicly and it can be used as a benchmark for P2P recommender systems.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Behaviour of Ancient Masonry Structures Subjected to Static Loads: Case Studies","authors":"M. Basili, A. Sinopoli","doi":"10.1109/WETICE.2010.34","DOIUrl":"https://doi.org/10.1109/WETICE.2010.34","url":null,"abstract":"The paper deals with the mechanical behaviour of ancient masonry constructions subjected to static vertical loads. The cases considered concern structures designed to cover a given span. Masonry is modelled as a no-tension orthotropic. Three cases are analysed. The purpose of the study is to recognise for each case the bearing structure. As a consequence of the modelling the masonry is divided into macro-elements separated by possible fracture lines which define the starting of probable regions where damage can be localised.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129656417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}