2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises最新文献

筛选
英文 中文
Performance and Portability of the SciBy Virtual Machine SciBy虚拟机的性能和可移植性
Rasmus Andersen, B. Vinter
{"title":"Performance and Portability of the SciBy Virtual Machine","authors":"Rasmus Andersen, B. Vinter","doi":"10.1109/WETICE.2010.47","DOIUrl":"https://doi.org/10.1109/WETICE.2010.47","url":null,"abstract":"The Scientific Bytecode Virtual Machine is a virtual machine designed specifically for performance, security, and portability of scientific applications deployed in a Grid environment. The performance overhead normally incurred by virtual machines is mitigated using native optimized scientific libraries, security is obtained by sandboxing techniques. Lastly, by executing platform-independent bytecodes, the machine is highly portable. To evaluate the machine, we demonstrate several use-case scenarios from some of the intended application domains. Further, we show the ease of porting the machine and distributing its jobs to a variety of predominant architectures and compare the results with native execution.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Virtualization to Prepare Your Data Center for "Real-Time Assurance of Business Continuity" 使用虚拟化为“业务连续性的实时保证”做好数据中心准备
Rao V. Mikkilineni, Gopal Kankanhalli
{"title":"Using Virtualization to Prepare Your Data Center for \"Real-Time Assurance of Business Continuity\"","authors":"Rao V. Mikkilineni, Gopal Kankanhalli","doi":"10.1109/WETICE.2010.18","DOIUrl":"https://doi.org/10.1109/WETICE.2010.18","url":null,"abstract":"This paper describes our experience using the dynamic resource reallocation capabilities offered by virtualization technologies, in implementing: 1. Automation of end-to-end failover of mission critical virtualized application, a SAN network and EMC Clarion based storage to a remote site and 2. On-demand and scheduled assurance of failover and measurement of RPO and RTO (The Recovery Point Objective (RPO) is the point in time to which you must recover data as dictated by business needs. Recovery Time Objective (RTO) is the period of time after an outage in which the application and its data must be restored to a predetermined state defined by RPO.) By creating an application to spindle resource utilization profile through various management systems, and utilizing a combination of server, network- and storage-virtualization technologies, application specific RTO and RPO objectives (defined based on workload profiles and business priorities) are met in a technology agnostic and multi-vendor environment.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124615599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards the Next Generation of Ambient Intelligent Environments 迈向下一代环境智能环境
A. Kameas
{"title":"Towards the Next Generation of Ambient Intelligent Environments","authors":"A. Kameas","doi":"10.1109/WETICE.2010.58","DOIUrl":"https://doi.org/10.1109/WETICE.2010.58","url":null,"abstract":"Next Generation Ambient Intelligent Environments (NGAIEs) will offer intelligent and trustworthy services (although probably not for free), will be populated with Ambient Ecologies of smart objects, and will support the Activity Spheres of their multiple occupants. Ubiquitous computing applications will be composed from heterogeneous services offered by objects connected via the web and NGAIEs. These applications will inherently exhibit increasingly intelligent behavior, perceive the operational environment and adapt to it, provide optimized resource usage and support consistent functionality and human-centric operation. This paper tracks the disappearance of computers and the advent of Ambient Intelligence.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133974357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Creating Next Generation Cloud Computing Operation Support Services by Social OSS: Contribution with Telecom NGN Experience 利用社交OSS打造下一代云计算运营支持服务:贡献电信NGN经验
Miyuki Sato
{"title":"Creating Next Generation Cloud Computing Operation Support Services by Social OSS: Contribution with Telecom NGN Experience","authors":"Miyuki Sato","doi":"10.1109/WETICE.2010.19","DOIUrl":"https://doi.org/10.1109/WETICE.2010.19","url":null,"abstract":"Currently, Cloud network operators and service providers are managing server, network and storage resources by various management systems to manage hardware, applications, traffic, and resources monitoring including bandwidth, storage capacity, and throughput utilization. However, these systems are not coordinated with accounting, security and configuration systems to provide end-to-end service management. Various players are emerging to provide remote computing and storage resources over the cloud network. Telecommunications grade operation systems will be the key to realize end-to-end service management, and resource management to assure application quality of service. In this paper we present how the operation service methodology using Social Cloud OSS will support end-to-end service management and resource (computing, network and storage) management over the cloud network. Fujitsu’s Social Cloud OSS will provide integrated operation services by supporting group to group communication, and Enterprise to Enterprise (E2E) application transactions. Social Cloud OSS is designed to support social collaboration, and e-commerce applications using the cloud on a massive scale and lower Total Cost of Ownership than the current approaches with disparate management systems.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131159093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enterprise Usability of Cloud Computing Environments: Issues and Challenges 云计算环境的企业可用性:问题与挑战
P. Goyal
{"title":"Enterprise Usability of Cloud Computing Environments: Issues and Challenges","authors":"P. Goyal","doi":"10.1109/WETICE.2010.15","DOIUrl":"https://doi.org/10.1109/WETICE.2010.15","url":null,"abstract":"Cloud Computing Environments enable business agility and enterprises to exploit/respond quickly to changes in the marketplace, competition, technology and operational environment. For enterprises, CCE present a number of issues and challenges. Some of these include the inability to take advantage of the dynamic resource elasticity of CCE, issues of data fragmentation and duplication, the challenge of migrating transactional systems to a CCE, or the challenge of utilizing SaaS applications in conjunction with the other enterprise applications, say, to implement end-to-end process integration. Enterprises, also, have extended partnerships and aim to extend integration of participating systems. This paper presents some of these challenges and mechanisms to alleviate some of these challenges of operating and managing a hybrid CCE. The paper also presents mechanisms for robust network interconnectivity and partitioning mechanisms to co-isolate cooperating systems.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"507 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122210319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
From Integrated Architecture to Integrated Executable Architecture 从集成体系结构到集成可执行体系结构
Philipp Helle, Pascal Levier
{"title":"From Integrated Architecture to Integrated Executable Architecture","authors":"Philipp Helle, Pascal Levier","doi":"10.1109/WETICE.2010.29","DOIUrl":"https://doi.org/10.1109/WETICE.2010.29","url":null,"abstract":"In this paper, we present a solution for the integration of architecture modelling tools and simulation tools. This will allow the use of executable architectures during the conceptual analysis and design phases in order to address system complexity at an early stage of the development. The proposed concept of integrated executable architecture enables a dynamic combination of the formerly separated and static areas of business processes, system design and resource modelling. It provides time-based, dynamic visualisation of system behaviour by combining business process simulation, system simulation and synthetic environments. This allows an early understanding of emergent behaviour, time-dependent behaviour and performance estimation of the architecture.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Hybrid Architecture for Pervasive Computing Supported Collaborative Work Application and Simulation 普适计算支持协同工作应用与仿真的混合体系结构
K. Hamadache, L. Lancieri
{"title":"Hybrid Architecture for Pervasive Computing Supported Collaborative Work Application and Simulation","authors":"K. Hamadache, L. Lancieri","doi":"10.1109/WETICE.2010.28","DOIUrl":"https://doi.org/10.1109/WETICE.2010.28","url":null,"abstract":"In this paper we present an hybrid architecture for a computer supported collaborative work in pervasive computing environment simulator. This architecture supports pure simulation mode where all agents are simulated, real deployment where it seamlessly integrates pervasive computing to the computer supported collaborative work and finally an hybrid mode where real devices can interact with simulated ones. This specific architecture provides an original framework to develop and evaluate complex behaviours in pervasive computing environments by allowing scenario to be played in a semi-simulated way and avoid some of the constraints and difficulties of real conditions testing. In addition to theses obvious advantages it also provides a reliable base to capture and analyse real devices behaviour in pervasive computing environments.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114068594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Reduction in Very Large Spatio-Temporal Datasets 超大时空数据集中的数据约简
Michael Whelan, Nhien-An Le-Khac, Mohand Tahar Kechadi
{"title":"Data Reduction in Very Large Spatio-Temporal Datasets","authors":"Michael Whelan, Nhien-An Le-Khac, Mohand Tahar Kechadi","doi":"10.1109/WETICE.2010.23","DOIUrl":"https://doi.org/10.1109/WETICE.2010.23","url":null,"abstract":"Today, huge amounts of data are being collected with spatial and temporal components from sources such as metrological, satellite imagery etc.. Efficient visualisation as well as discovery of useful knowledge from these datasets is therefore very challenging and becoming a massive economic need. Data Mining has emerged as the technology to discover hidden knowledge from very large size of data. Furthermore, data mining techniques could be applied to decrease the large size of raw data by retrieving its useful knowledge as representatives. As a consequence, instead of dealing with a large size of raw data, we can use these representatives to visualise or to analyse without losing important information. This paper presents a data reduction technique based on clustering to help analyse very large spatio-temporal data. We also present and discuss preliminary results of this approach.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124981523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Towards Inferring Ratings from User Behavior in BitTorrent Communities 从BitTorrent社区的用户行为推断评级
Róbert Ormándi, István Hegedüs, Kornel Csernai, Márk Jelasity
{"title":"Towards Inferring Ratings from User Behavior in BitTorrent Communities","authors":"Róbert Ormándi, István Hegedüs, Kornel Csernai, Márk Jelasity","doi":"10.1109/WETICE.2010.41","DOIUrl":"https://doi.org/10.1109/WETICE.2010.41","url":null,"abstract":"Peer-to-peer file-sharing has been increasingly popular in the last decade. In most cases file-sharing communities provide only minimal functionality, such as search and download. Extra features such as recommendation are difficult to implement because users are typically unwilling to provide sufficient rating information for the items they download. For this reason, it would be desirable to utilize user behavior to infer implicit ratings. For example, if a user deletes a file after downloading it, we could infer that the rating is low, or if the user is seeding the file for a long time, the rating is high. In this paper we demonstrate that it is indeed possible to infer implicit ratings from user behavior. We work with a large trace of Filelist.org, a BitTorrent-based private community, and demonstrate that we can identify a binary like/dislike distinction over the set of files users are downloading, using dynamic features of swarm membership. The resulting database containing the inferred ratings will be published online publicly and it can be used as a benchmark for P2P recommender systems.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123612066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On the Behaviour of Ancient Masonry Structures Subjected to Static Loads: Case Studies 古代砌体结构在静荷载作用下的行为:案例研究
M. Basili, A. Sinopoli
{"title":"On the Behaviour of Ancient Masonry Structures Subjected to Static Loads: Case Studies","authors":"M. Basili, A. Sinopoli","doi":"10.1109/WETICE.2010.34","DOIUrl":"https://doi.org/10.1109/WETICE.2010.34","url":null,"abstract":"The paper deals with the mechanical behaviour of ancient masonry constructions subjected to static vertical loads. The cases considered concern structures designed to cover a given span. Masonry is modelled as a no-tension orthotropic. Three cases are analysed. The purpose of the study is to recognise for each case the bearing structure. As a consequence of the modelling the masonry is divided into macro-elements separated by possible fracture lines which define the starting of probable regions where damage can be localised.","PeriodicalId":426248,"journal":{"name":"2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129656417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信