Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,270 Hits in 4.1 sec

Monitoring and Proactive Management of QoS Levels in Pervasive Applications [article]

Georgios Boulougaris, Kostas Kolomvatsos
2022 arXiv   pre-print
We propose that nodes continuously monitor QoS levels and systematically evaluate the probability of violating them to proactively decide some tasks to be offloaded to peer nodes or Cloud.  ...  Nonetheless, the limited computational capabilities of EC nodes and the expectation of ensuring high levels of QoS during tasks execution impose strict requirements for innovative management approaches  ...  In this paper, we focus on the latter module and support it with an advanced mechanism for the efficient management of the incoming tasks of pervasive applications.  ... 
arXiv:2206.05478v1 fatcat:6pnmypqn6jevlnu6qmhuno2uyy

Principles of Pervasive Cloud Monitoring [chapter]

Gokce Gorbil, David Garcia Perez, Eduardo Huedo Cuesta
2014 Information Sciences and Systems 2014  
In this paper, we review the principles of pervasive cloud monitoring, and discuss the requirements of a pervasive monitoring solution needed to support proactive and autonomous management of cloud resources  ...  Accurate and fine-grained monitoring of dynamic and heterogeneous cloud resources is essential to the overall operation of the cloud.  ...  Acknowledgements The work presented in this paper was partially supported by the EU FP7 research project PANACEA (Proactive Autonomous Management of Cloud Resources) under grant agreement no. 610764.  ... 
doi:10.1007/978-3-319-09465-6_13 dblp:conf/iscis/GorbilGC14 fatcat:ahdcdml4hbc3xlqnklaqbjsepm

QoS middleware support for pervasive computing applications

B. Shirazi, M. Kumar, B.Y. Sung
2004 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the  
In this paper we will describe our proposed QoS algorithms and techniques for synergistic integration of middleware services into pervasive computing applications.  ...  with each other and with high level applications on a just-in-time basis.  ...  Acknowledgement: The material presented in this paper is based on work supported by the National Science Foundation under Grant No. 0129682. References  ... 
doi:10.1109/hicss.2004.1265694 dblp:conf/hicss/ShiraziKS04 fatcat:efp242vb4bdepmusf66gt3fj5q

PICO: A middleware framework for pervasive computing

M. Kumar, B.A. Shirazi, S.K. Das, B.Y. Sung, D. Levine, M. Singhal
2003 IEEE pervasive computing  
Service-provisioning communities allow a high degree of transparency between users and applications on one hand and the infrastructure on the other.  ...  has identified four new areas of research-effective use of smart spaces, invisibility, localized scalability, and masking uneven conditioning. 3 In PICO, mobile and static delegents representing camileuns  ...  Peshock, Alice Marcee, and Michael Chwialkowski of the UT Southwestern Medical Center in Dallas have been helpful in giving us valuable inputs about the telemedicine issues.  ... 
doi:10.1109/mprv.2003.1228529 fatcat:j2gd4d7tlbdhnj34mlxdbitnsm

Framework Design of Pervasive Computing System for Inter Space Interactions between Private and Public Smart Spaces

Shin-Young Lim, Lawrence Chung, Sumi Helal, Hen-I Yang
2009 International Journal of Fuzzy Logic and Intelligent Systems  
Users might be living in a non-pervasive computing environment because this manual operation is inappropriate to its generic features of proactive and intelligent services of pervasive computing.  ...  In the realm of pervasive computing, we can have different types of smart spaces, offering proactive and intelligent services, which are islands of smart spaces independent from each other.  ...  A flexible and adaptive mechanism need to be in place to guarantee certain level of QoS.  ... 
doi:10.5391/ijfis.2009.9.3.198 fatcat:7qa2u5ddfzeafats3uj66w4eha

Mobility Across Multiple Technologies -the Daidalos Approach

Piotr PACYNA, Janusz GOZDECKI, Krzysztof LOZIAK, Andrzej JAJSZCZYK
2006 Interdisciplinary Information Sciences  
It supports both mobile-and network-initiated handovers, managed in a technology-independent way.  ...  The architecture implements an approach to heterogeneity management in which supporting functions are distributed among the end-devices and the network infrastructure.  ...  The authors wish to thank the partners of the Daidalos Consortium, in particular partners of WP2 and WP3 for their collaborative work.  ... 
doi:10.4036/iis.2006.127 fatcat:aph3sh2iwzhrrouxblwklyhubu

Model-based dynamic QoS-driven service composition

Antinisca Di Marco, Antonino Sabetta
2010 Proceedings of the 2nd International Workshop on the Quality of Service-Oriented Software Systems - QUASOSS '10  
Smart exploits rich service descriptions (in particular concerning QoS characterizations) to automate the negotiation of Service Level Agreements (SLA) and to realize SLA-driven automated service reconfiguration  ...  This can be done by exploiting sophisticated means to reason about Quality of Service (QoS) and to drive service construction in a dynamic and automated fashion.  ...  In order to ensure QoS in the face of changes, Smart combines automated SLA negotiation, proactive reconfiguration of service compositions based on monitoring and model-based reasoning, and dedicate online  ... 
doi:10.1145/1858263.1858270 fatcat:sbtif6aomzajpnyoah3mkf7yni

Two Approaches to Handling Proactivity in Pervasive Systems [chapter]

Elizabeth Papadopoulou, Yussuf Abu Shaaban, Sarah Gallacher, Nick Taylor, M. Howard Williams
2010 Communications in Computer and Information Science  
The aim of this paper is to present some aspects of how proactivity is handled in the approaches used in two different pervasive systems.  ...  A key objective of a pervasive system is to reduce the user's administrative overheads and assist the user by acting proactively on his/her behalf.  ...  Apart from funding these two projects, the European Commission has no responsibility for the content of this paper.  ... 
doi:10.1007/978-3-642-12035-0_8 fatcat:pbku6jwdwbedlmurnbdpndkgaa

MINA: A reflective middleware for managing dynamic multinetwork environments

Zhijing Qin, Luca Iannario, Carlo Giannelli, Paolo Bellavista, Grit Denker, Nalini Venkatasubramanian
2014 2014 IEEE Network Operations and Management Symposium (NOMS)  
In this paper, we propose MINA (Multinetwork INformation Architecture), a reflective (self-observing and adapting) middleware approach to realize and manage dynamic and heterogeneous multi-networks in  ...  networks and proactively planning and deploying additional network resources.  ...  QoS-Based MultiFlow Rerouting: Application flows may have various QoS needs and network infrastructure may change.  ... 
doi:10.1109/noms.2014.6838332 dblp:conf/noms/QinIGBDV14 fatcat:dqltotogljevbpyjvzo2m22uxa

A middleware approach for high level overlay network

Mary Metilda J
2012 IOSR Journal of Computer Engineering  
In network management middle wares are required to enhance reliability and efficiency of distributed systems.  ...  The proposed approach uses swarm-intelligence networks at the monitoring level to provide self-organization, adaptability, scalability and reactivity features.  ...  Low-level network management is not sufficient to ensure reliable and persistent connectivity of pervasive devices, making it difficult to meet user specified Quality of Service (QoS).  ... 
doi:10.9790/0661-0363638 fatcat:gz3nm5re2fejrcrf44fmbnu2gm

Bio-inspired monitoring of pervasive environments

Apostolos Malatras, Fei Peng, Beat Hirsbrunner
2011 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)  
High-level policy-based management operations driven by monitored context information enable a further level of runtime adaptation and optimization, subject to the overall application requirements.  ...  that lead to more manageable topologies and optimize resource monitoring by scaling down the degree of complexity.  ...  , allowing thus for the proactive and failsafe adaptation of the P2P network monitoring protocol.  ... 
doi:10.1109/percomw.2011.5766908 dblp:conf/percom/MalatrasPH11 fatcat:5pdepginpzex3l2ffurefpk4ou

Client based Proactive Handoff in Heterogeneous Network

Santosh KumarShukla, Girish Sharma, Pooja Dubey
2014 International Journal of Computer Applications  
In the present scenario various wired and wireless networks are contributing in information access for different users.  ...  But as we are moving towards next generation, the communication is targeting for integration of these wired and wireless networks.  ...  This convergence of wireless networks provides the Mobile Station (MS) with a greater choice of Network Access Technologies (NATs), which offer different levels of Quality of Service (QoS) and radio characteristics  ... 
doi:10.5120/17484-8413 fatcat:uszrxytkpbc3hj25w5cvvxi5zm

Cloud-Enabled Wireless Body Area Network for Pervasive Health Care

Jarubula Priyanka
2016 Asia-pacific Journal of Convergent Research Interchange  
During this article, we tend to study a cloud enabled WBAN design and its applications in pervasive aid systems.  ...  Pervasive aid applications utilizing body detector networks generate a huge quantity of knowledge that require to be managed and hold on for process and future usage.  ...  In particular, we study the practicality and dependability of MCC services. We conjointly counsel some future analysis directions to improve performance and QoS of cloud-enabled WBANs.  ... 
doi:10.21742/apjcri.2016.09.06 fatcat:k6erzqvwjvfddpcyxy5iuxedni

Balancing transparency, efficiency and security in pervasive systems [article]

Mark Wenstrom, Eloisa Bentivegna, Ali Hurson (Pennsylvania State University)
2008 arXiv   pre-print
The discussion will be closed by an overview of the solutions proposed by current pervasive computing efforts, both in the area of generic platforms and for dedicated applications such as pervasive education  ...  As the feasibility of ubiquitous computing and its real potential for mass applications are still a matter of controversy, this chapter will look into the underlying issues of resource management and authentication  ...  First, we will describe techniques for resource management in a pervasive environment, considering a realistic assumption that the proactive issuing of tasks may overwhelm the available resources and may  ... 
arXiv:0801.3102v1 fatcat:6yi3sozlxjgvxjys7imhkomrn4

Energy-Efficiency and Sustainability in New Generation Cloud Computing: A Vision and Directions for Integrated Management of Data Centre Resources and Workloads [article]

Rajkumar Buyya, Shashikant Ilager, Patricia Arroba
2023 arXiv   pre-print
In this paper, we identify the dimensions and key issues of integrated resource management and our envisioned approaches to address them.  ...  In addition, a significant part of the energy consumed is transformed into heat which leads to operational problems, including a reduction in system reliability and the life expectancy of devices, and  ...  This work is partially supported by the University of Melbourne and the HiPEAC6 Network, supported by the European Union's Horizon 2020 research and innovation programme.  ... 
arXiv:2303.10572v2 fatcat:jnzfdnwijjhabjn2z5bar63c6a
« Previous Showing results 1 — 15 out of 1,270 results