18 results on '"Alva Couch"'
Search Results
2. MEtaData Format for Open Reef Data (MEDFORD)
- Author
-
Polina Shpilker, John Freeman, Hailey McKelvie, Jill Ashey, Jay-Miguel Fonticella, Hollie Putnam, Jane Greenberg, Lenore Cowen, Alva Couch, and Noah M. Daniels
- Published
- 2022
3. MEDFORD: A human- and machine-readable metadata markup language
- Author
-
Polina Shpilker, John Freeman, Hailey McKelvie, Jill Ashey, Jay-Miguel Fonticella, Hollie Putnam, Jane Greenberg, Lenore Cowen, Alva Couch, and Noah M Daniels
- Subjects
Metadata ,Computational Biology ,Humans ,Reproducibility of Results ,General Agricultural and Biological Sciences ,Software ,General Biochemistry, Genetics and Molecular Biology ,Language ,Information Systems - Abstract
Reproducibility of research is essential for science. However, in the way modern computational biology research is done, it is easy to lose track of small, but extremely critical, details. Key details, such as the specific version of a software used or iteration of a genome can easily be lost in the shuffle or perhaps not noted at all. Much work is being done on the database and storage side of things, ensuring that there exists a space-to-store experiment-specific details, but current mechanisms for recording details are cumbersome for scientists to use. We propose a new metadata description language, named MEtaData Format for Open Reef Data (MEDFORD), in which scientists can record all details relevant to their research. Being human-readable, easily editable and templatable, MEDFORD serves as a collection point for all notes that a researcher could find relevant to their research, be it for internal use or for future replication. MEDFORD has been applied to coral research, documenting research from RNA-seq analyses to photo collections.
- Published
- 2022
4. Managing the Dynamics of Networks and Services : 5th International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2011, Nancy, France, June 13-17, 2011, Proceedings
- Author
-
Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, Isabelle Chrisment, Alva Couch, Rémi Badonnel, and Martin Waldburger
- Subjects
- Computer networks--Management--Congresses, Computer networks--Scalability--Congresses, Computer security--Congresses
- Abstract
This book constitutes the refereed proceedings of the 5th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2011, held in Nancy, France, in June 2011. The 11 revised full papers presented together 11 papers of the AIMS PhD workshops were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on security management, autonomic network and service management (PhD workshop), policy management, P2P and aggregation schemes, and monitoring and security (PhD workshop).
- Published
- 2011
5. Draft Specifications for the CUAHSI Water Data Center
- Author
-
Alva Couch
- Subjects
Engineering ,Database ,business.industry ,Data center ,business ,computer.software_genre ,computer - Published
- 2012
6. HydroShare: An online collaborative environment for the sharing of hydrologic data and models
- Author
-
David Tarboton, Ray Idaszak, Daniel P Ames, Jeffery Horsburgh, Jon Goodall, Larry Band, Venkatesh Merwade, Jeff Heard, Carol Song, Alva Couch, David Valentine, Richard Hooper, Jennifer Arrigo, David Maidment, Tim Whiteaker, Alex Bedig, Laura Christopherson, Pabitra Dash, Tian Gan, Tony Castronova, Karl Gustafson, Stephen Jackson, Cuyler Frisby, Stephanie Mills, Brian Miles, Stephanie Reeder, Yaping Xiao, Lan Zhao, David Tarboton, Ray Idaszak, Daniel P Ames, Jeffery Horsburgh, Jon Goodall, Larry Band, Venkatesh Merwade, Jeff Heard, Carol Song, Alva Couch, David Valentine, Richard Hooper, Jennifer Arrigo, David Maidment, Tim Whiteaker, Alex Bedig, Laura Christopherson, Pabitra Dash, Tian Gan, Tony Castronova, Karl Gustafson, Stephen Jackson, Cuyler Frisby, Stephanie Mills, Brian Miles, Stephanie Reeder, Yaping Xiao, and Lan Zhao
- Published
- 2014
- Full Text
- View/download PDF
7. Decision Engine for SIP Based Dynamic Call Routing
- Author
-
Sajjad Ali Musthaq, Annie Gravey, Christophe Lohr, Télécom Bretagne, Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, TC 6, Département informatique ( INFO ), Université européenne de Bretagne ( UEB ) -Télécom Bretagne-Institut Mines-Télécom [Paris], Lab-STICC_TB_CID_IHSEV, Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (UMR 3192) ( Lab-STICC ), Université européenne de Bretagne ( UEB ) -Université de Bretagne Sud ( UBS ) -Université de Brest ( UBO ) -Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques ( IBNM ), Université de Brest ( UBO ) -Institut Mines-Télécom [Paris]-Centre National de la Recherche Scientifique ( CNRS ) -Université européenne de Bretagne ( UEB ) -Université de Bretagne Sud ( UBS ) -Université de Brest ( UBO ) -Télécom Bretagne-Institut Brestois du Numérique et des Mathématiques ( IBNM ), Université de Brest ( UBO ) -Institut Mines-Télécom [Paris]-Centre National de la Recherche Scientifique ( CNRS ), Département informatique (INFO), Université européenne de Bretagne - European University of Brittany (UEB)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT), Laboratoire des sciences et techniques de l'information, de la communication et de la connaissance (UMR 3192) (Lab-STICC), Université européenne de Bretagne - European University of Brittany (UEB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS)-Université européenne de Bretagne - European University of Brittany (UEB)-Université de Bretagne Sud (UBS)-Université de Brest (UBO)-Institut Brestois du Numérique et des Mathématiques (IBNM), Université de Brest (UBO)-Télécom Bretagne-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), and Télécom Bretagne, Bibliothèque
- Subjects
Decision support system ,Computer science ,computer.internet_protocol ,[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Grey Relation Analysis (GRA) ,Call Dropping Probability ,02 engineering and technology ,Multiple-criteria decision making ,Grey relation analysis ,Outsourcing ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Decision Engine ,Multihoming ,0202 electrical engineering, electronic engineering, information engineering ,Multi-Criteria Decision Making (MCDM) ,[INFO]Computer Science [cs] ,Session Initiation Protocol ,[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,business.industry ,Quality of service ,020206 networking & telecommunications ,Provisioning ,TOPSIS ,Multiple-criteria decision analysis ,Throughput ,020201 artificial intelligence & image processing ,business ,computer ,Computer network - Abstract
Part 3: Policy Management; International audience; Enterprises nowadays are subscribing access to several Internet Service Providers (ISPs) for reliability, redundancy and better revenues underlying the service extension, while providing good Quality of Service (QoS). In this paper, a dynamic decision-making framework is presented for Session Initiation Protocol (SIP) based voice/video call routing in multihomed network. The decision engine takes multiple criteria into account while computing the routing decision (attributes from context of the request, platform’s latest conditional parameters, business objectives of the company, etc.). Two Multi-Criteria Decision Making (MCDM) methods, namely Grey Relational Analysis (GRA) and an extended version of Technique for Order Preference by Similarity to Ideal Solution (TOPSIS) are used for decision calculation in outsourcing and provisioning enforcement modes respectively. The proposed solution gives higher throughput and lower call dropping probability while fulfilling the desired goals, taking into account the multiple attributes for choosing the best alternative.
- Published
- 2011
8. Towards Self-Adaptive Monitoring Framework for Integrated Management
- Author
-
Thierry Desprats, Audrey Moui, Service IntEgration and netwoRk Administration (IRIT-SIERA), Institut de recherche en informatique de Toulouse (IRIT), Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées-Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse - Jean Jaurès (UT2J)-Université Toulouse III - Paul Sabatier (UT3), Université Fédérale Toulouse Midi-Pyrénées-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique (Toulouse) (Toulouse INP), Université Fédérale Toulouse Midi-Pyrénées-Université Toulouse 1 Capitole (UT1), Université Fédérale Toulouse Midi-Pyrénées, Université Toulouse III - Paul Sabatier (UT3), Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, and TC 6
- Subjects
Process management ,Knowledge management ,Computer science ,business.industry ,media_common.quotation_subject ,Complex system ,020206 networking & telecommunications ,020207 software engineering ,Self adaptive ,Context (language use) ,02 engineering and technology ,Work in process ,Adaptability ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,Dimension (data warehouse) ,business ,Autonomy ,Integrated management ,media_common - Abstract
Part 6: PhD Workshop: Monitoring and Security; International audience; Integrated management copes with management of heterogeneous and complex systems in a multi-level dimension (network, systems, services). In this context, monitoring activity has to be concerned with efficiency and autonomy. This paper presents work in progress to define a framework for self-adaptive monitoring relying on the characterization of governability, adaptability and configurability.
- Published
- 2011
9. Intrusion Detection in Open Peer-to-Peer Multi-Agent Systems
- Author
-
Shahriar Bijani, David Robertson, University of Edinburgh, Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, and TC 6
- Subjects
Electronic Institutions ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Dynamics (music) ,Computer science ,Security ,Services computing ,[INFO]Computer Science [cs] ,Light Weight Coordination Calculus (LCC) ,P2P networks ,Data science ,Confidentiality ,Multi-agent Systems - Abstract
Part 6: PhD Workshop: Monitoring and Security; International audience; One way to build large-scale autonomous systems is to develop open peer-to-peer architectures in which peers are not pre-engineered to work together and in which peers themselves determine the social norms that govern collective behaviour. A major practical limitation to such systems is security because the very openness of such systems negates most traditional security solutions. We propose a programme of research that addresses this problem by devising ways of attack detection and damage limitation that take advantage of social norms described by electronic institutions. We have analysed security issues of open peer-to-peer multi-agent systems and focused on probing attacks against confidentiality. We have proposed a framework and adapted an inference system, which shows the possibility of private information disclosure by an adversary. We shall suggest effective countermeasures in such systems and propose attack response techniques to limit possible damages.
- Published
- 2011
10. Econometric Feedback for Runtime Risk Management in VoIP Architectures
- Author
-
Olivier Festor, Oussema Dabbebi, Rémi Badonnel, Management of dynamic networks and services (MADYNES), INRIA Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS), Laboratoire Commun Alcatel Lucent INRIA, Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, TC 6, and Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique de Lorraine (INPL)-Université Nancy 2-Université Henri Poincaré - Nancy 1 (UHP)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Institut National Polytechnique de Lorraine (INPL)-Université Nancy 2-Université Henri Poincaré - Nancy 1 (UHP)
- Subjects
Service (systems architecture) ,Computer science ,computer.internet_protocol ,media_common.quotation_subject ,02 engineering and technology ,security ,risk management ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0202 electrical engineering, electronic engineering, information engineering ,Econometrics ,Quality (business) ,[INFO]Computer Science [cs] ,Risk management ,media_common ,Session Initiation Protocol ,Voice over IP ,business.industry ,020206 networking & telecommunications ,voice over IP ,network management ,Variety (cybernetics) ,Network management ,Software deployment ,020201 artificial intelligence & image processing ,business ,computer - Abstract
Part 1: Security Management; International audience; VoIP infrastructures are exposed to a large variety of security attacks, but the deployment of security safeguards may deteriorate their performance. Risk management provides new perspectives for addressing this issue. Risk models permit to reduce these attacks while maintaining the quality of such a critical service. These models often suffer from their complexity due to the high number of parameters to be configured. We therefore propose in this paper a self-configuration strategy for support- ing runtime risk management in VoIP architectures. This strategy aims at automatically adapting these parameters based on an econometric feedback mechanism. We mathematically describe this self-configuration strategy, show how it can be integrated into our runtime risk model. We then evaluate its deployment based on a proof-of-concept prototype, and quantify its performance through an extensive set of simulation results.
- Published
- 2011
11. Autonomous Platform for Life-Critical Decision Support in the ICU
- Author
-
Filip De Turck, Kristof Steurbaut, Universiteit Gent = Ghent University [Belgium] (UGENT), Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, TC 6, Chrisment, Isabelle, Couch, Alva, Badonnel, Rémi, and Waldburger, Martin
- Subjects
Decision support system ,services ,Process management ,Computer science ,Computer security ,computer.software_genre ,Dependability ,law.invention ,03 medical and health sciences ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0302 clinical medicine ,Software ,law ,Robustness (computer science) ,Medicine and Health Sciences ,[INFO]Computer Science [cs] ,030212 general & internal medicine ,business.industry ,030503 health policy & services ,Information technology ,Usability ,Intensive care unit ,3. Good health ,ICU ,IBCN ,0305 other medical science ,business ,computer - Abstract
Part 2: PhD Workshop: Autonomic Network and Service Management; International audience; The Intensive Care Unit is a complex, data-intensive and critical environment in which the adoption of Information Technology is growing. As physicians become more dependent on the computing technology to support decisions, raise real-time alerts and notifications of patient-specific conditions, this software has strong dependability requirements. The dependability challenges are expressed in terms of availability, reliability, performance, usability and maintenance of the system. Our research focuses on the design and development of a generic autonomous ICU service platform. COSARA is a computer-based platform for infection surveillance and antibiotic management in ICU. During its design, development and evaluation, we identified both technological and human factors that affect robustness. We presented the identified research questions that will be addressed in detail during PhD research.
- Published
- 2011
12. Using Diffusive Load Balancing to Improve Performance of Peer-to-Peer Systems for Hosting Services
- Author
-
Ying Qiao, Gregor von Bochmann, University of Ottawa [Ottawa], Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, and TC 6
- Subjects
peer-to-peer systems ,Computer science ,business.industry ,Distributed computing ,distributed resource management ,Overlay network ,020206 networking & telecommunications ,02 engineering and technology ,Internet hosting service ,Load balancing (computing) ,Peer-to-peer ,computer.software_genre ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Network Load Balancing Services ,Homogeneous ,0202 electrical engineering, electronic engineering, information engineering ,diffusive load balancing ,020201 artificial intelligence & image processing ,[INFO]Computer Science [cs] ,business ,computer ,Load balancing ,Computer network - Abstract
Part 5: P2P and Aggregation Schemes; International audience; This paper presents a diffusive load balancing algorithm for peer-to-peer systems. The algorithm reduces the differences of the available capacities of the nodes in the system using service migrations between nodes in order to obtain similar performance for all nodes. We propose algorithms for handling homogeneous services, i.e., services with equal resource requirements, and for heterogeneous services, i.e., services with diverse resource requirements. We have investigated the effect of load balancing in a simulated peer-to-peer system with a skip-list overlay network. Our simulation results indicate that in case that the churn (nodes joining or leaving) is negligible, a system that hosts services with small resource requirements can maintain equal performance for all nodes with a small variance. In case that churn is high, a system that hosts homogeneous services with large resource requirements can maintain equal node performance within a reasonable variance requiring only few service migrations.
- Published
- 2011
13. Impact of Dynamics on Situated and Global Aggregation Schemes
- Author
-
Grégory Bonnet, Rafik Makhloufi, Guillaume Doyen, Dominique Gaïti, Environnement de Réseaux Autonomes (ERA), Institut Charles Delaunay (ICD), Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS)-Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS), Equipe MAD - Laboratoire GREYC - UMR6072, Groupe de Recherche en Informatique, Image et Instrumentation de Caen (GREYC), Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU)-Normandie Université (NU)-Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU), Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, TC 6, Université de Caen Normandie (UNICAEN), Normandie Université (NU)-Normandie Université (NU)-École Nationale Supérieure d'Ingénieurs de Caen (ENSICAEN), Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)-Université de Caen Normandie (UNICAEN), and Normandie Université (NU)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
agregation protocols ,Computer science ,Scale (chemistry) ,Distributed computing ,020206 networking & telecommunications ,Context (language use) ,0102 computer and information sciences ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation ,[INFO.INFO-AI]Computer Science [cs]/Artificial Intelligence [cs.AI] ,Management information systems ,Work (electrical) ,010201 computation theory & mathematics ,Order (exchange) ,[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA] ,autonomic networking ,Situated ,experimentations ,0202 electrical engineering, electronic engineering, information engineering ,Autonomic networking ,Data mining ,Decision-making ,computer - Abstract
Part 5: P2P and Aggregation Schemes; International audience; Recently, numerous management approaches have emerged in order to manage networks and services in a decentralized and autonomous way. Some of them propose to minimize their cost by using a situated view when collecting aggregates for the decision making process, while others propose to improve their accuracy by using a more conventional approach which is global view. So far, little attention is given to the evaluation of situated view while many studies propose to evaluate global approaches. As a consequence, there is no work in the literature that compares the performance of situated and global aggregation schemes. Being able to choose the suitable approach for a given context is still a real challenge. Mastering it will ensure the e fficiency of the autonomous management system. In this paper, we present a comparative study of situated and global schemes deployed over large scale and dynamic networks. We consider two factors: network and information dynamics. We implement typical aggregation schemes from each category and then we compare them according to the accuracy of the estimated aggregates and the e ciency of the decision making process.
- Published
- 2011
14. Using of Time Characteristics in Data Flow for Traffic Classification
- Author
-
Pavel Piskac, Jiri Novotny, Masaryk University [Brno] (MUNI), Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, and TC 6
- Subjects
Network packet ,Computer science ,time characteristics ,Real-time computing ,Behavioral pattern ,020206 networking & telecommunications ,Deep packet inspection ,02 engineering and technology ,pattern ,protocol detection ,020202 computer hardware & architecture ,Data flow diagram ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Traffic classification ,flow ,0202 electrical engineering, electronic engineering, information engineering ,[INFO]Computer Science [cs] ,State (computer science) ,Protocol (object-oriented programming) ,IPFIX ,Statistic - Abstract
Part 6: PhD Workshop: Monitoring and Security; International audience; This paper describes a protocol detection using statistic information about a flow extended by packet sizes and time characteristics, which consist of packet inter-arrival times. The most common way of network traffic classification is a deep packet inspection (DPI). Our approach deals with the DPI disadvantage in power consumption using aggregated IPFIX data instead of looking into packet content. According to our previous experiments, we have found that applications have their own behavioral pattern, which can be used for the applications detection. With a respect to current state of development, we mainly present the idea, the results which we have achieved so far and of our future work.
- Published
- 2011
15. Towards Vulnerability Prevention in Autonomic Networks and Systems
- Author
-
Martín Barrère, Olivier Festor, Rémi Badonnel, Management of dynamic networks and services (MADYNES), INRIA Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS)-Université Henri Poincaré - Nancy 1 (UHP)-Université Nancy 2-Institut National Polytechnique de Lorraine (INPL)-Centre National de la Recherche Scientifique (CNRS), Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, TC 6, and European Project: 257513,EC:FP7:ICT,FP7-ICT-2009-5,UNIVERSELF(2010)
- Subjects
Vulnerability Management ,Standardization ,Computer science ,Distributed computing ,Vulnerability ,020207 software engineering ,Context (language use) ,02 engineering and technology ,Vulnerability management ,Computer security ,computer.software_genre ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Management plane ,Safe Configuration ,0202 electrical engineering, electronic engineering, information engineering ,Security ,[INFO]Computer Science [cs] ,Architecture ,Set (psychology) ,computer - Abstract
Part 2: PhD Workshop: Autonomic Network and Service Management; International audience; The autonomic paradigm has been introduced in order to cope with the growing complexity of management. In that context, autonomic networks and systems are in charge of their own configuration. However, the changes that are operated by these environments may generate vulnerable configurations. In the meantime, a strong standardization effort has been done for specifying the description of configuration vulnerabilities. We propose in this paper an approach for integrating these descriptions into the management plane of autonomic systems in order to ensure safe configurations. We describe the underlying architecture and a set of preliminary results based on the Cfengine configuration tool.
- Published
- 2011
16. An SLA Support System for Cloud Computing
- Author
-
Guilherme Sperb Machado, Burkhard Stiller, Department of Informatics [Zürich], Universität Zürich [Zürich] = University of Zurich (UZH), Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, and TC 6
- Subjects
Computer science ,business.industry ,Distributed computing ,Service level objective ,020302 automobile design & engineering ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Service-level agreement ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,0203 mechanical engineering ,Order (exchange) ,Virtual machine ,0202 electrical engineering, electronic engineering, information engineering ,Support system ,[INFO]Computer Science [cs] ,Performance indicator ,Specific performance ,business ,computer - Abstract
Part 2: PhD Workshop: Autonomic Network and Service Management; International audience; Nowadays, even with the existence of many Cloud Providers (CP) in the market, it is still impossible to see CPs who guarantee, or at least offer, an SLA specification to Cloud Users (CU) interests: not just offering percentage of availability, but also guaranteeing specific performance parameters for a certain Cloud application. Due to (1) the huge size of CPs’ IT infrastructures and (2) the high complexity with multiple inter-dependencies of resources (physical or virtual), the estimation of specific SLA parameters to compose Service Level Objectives (SLOs) with trustful Key Performance Indicators (KPIs) tends to be inaccurate. This paper proposes the initial design and preliminary approach for an SLA Support System for CC (SLACC) in order to estimate in a formalized methodology - based on available CC infrastructure parameters - what CPs will be able to offer/accept as SLOs or KPIs and, as a consequence, which increasing levels of SLA specificity for their customers can be reached.
- Published
- 2011
17. Autonomous service composition in symbiotic networks
- Author
-
Tim De Pauw, Filip De Turck, Veerle Ongenae, Chrisment, Isabelle, Couch, Alva, Badonnel, Rémi, Waldburger, Martin, University College Ghent, Universiteit Gent = Ghent University [Belgium] (UGENT), Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, and TC 6
- Subjects
Technology and Engineering ,Computer science ,Wireless network ,business.industry ,Distributed computing ,020206 networking & telecommunications ,Provisioning ,02 engineering and technology ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Scalability ,Body area network ,0202 electrical engineering, electronic engineering, information engineering ,Dependability ,[INFO]Computer Science [cs] ,Use case ,Software architecture ,business ,Wireless sensor network ,Computer network - Abstract
Part 2: PhD Workshop: Autonomic Network and Service Management; International audience; To cope with the ever-growing number of wired and wireless networks, we introduce the notion of so-called symbiotic networks. These networks seamlessly operate across layers and over network boundaries, resulting in improved scalability, dependability, and energy efficiency. This particular Ph.D. research focuses on software services operating in such symbiotic networks. When two or more networks merge, the services provided on them may be combined into a service composition that is much more than the sum of its parts. Driven by two distinct use cases, we aim to enable fully autonomous service composition and resource provisioning. For the first use case, an in-building over-the-top service platform, we describe a software architecture and a set of generic resource provisioning algorithms. The second use case, which focuses on wireless body area networks, will allow us to expand our research domain into highly dynamic symbiotic network environments, where services appear and disappear more frequently.
- Published
- 2011
18. Policy-Based Pricing for Heterogeneous Wireless Access Networks
- Author
-
Joan Serrat, J.L. Melus, Mariela Borba, Matias Richart, Juan Saavedra, Javier Baliosian, University of the Republic of Uruguay, Universitat Politècnica de Catalunya [Barcelona] (UPC), Isabelle Chrisment, Alva Couch, Rémi Badonnel, Martin Waldburger, TC 6, Universitat Politècnica de Catalunya. Departament de Teoria del Senyal i Comunicacions, Universitat Politècnica de Catalunya. Departament d'Enginyeria Telemàtica, and Universitat Politècnica de Catalunya. MAPS - Management, Pricing and Services in Next Generation Networks
- Subjects
Access network ,Computer science ,Quality of service ,media_common.quotation_subject ,Reliability (computer networking) ,020206 networking & telecommunications ,020207 software engineering ,Context (language use) ,02 engineering and technology ,Business model ,Service provider ,Computer security ,computer.software_genre ,Wireless communication systems ,Telecomunicació de banda ampla, Sistemes de ,Enginyeria de la telecomunicació::Telemàtica i xarxes d'ordinadors::Xarxes d'àrea local [Àrees temàtiques de la UPC] ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Comunicació sense fil, Sistemes de ,0202 electrical engineering, electronic engineering, information engineering ,Cellular network ,[INFO]Computer Science [cs] ,Quality (business) ,Local area networks (Computer networks) ,computer ,media_common - Abstract
Part 3: Policy Management; International audience; Our cities are already covered by a myriad of diverse wireless access networks. The most ubiquitous access networks are the well organized homogeneous and centralized operator-based cellular networks that sustain their business model on a captive client basis. However, a new billing paradigm is rising, where a client can choose to connect to the provider that best comply with his/her current requirements and context. Inside this paradigm, this paper presents a distributed, rule-based pricing strategy aimed to improve the quality of service and to increase the global income of a service provider. The performance and reliability of the rule-based decisions is supported by a Finite State Transducers-based inference machine specially designed to manage networking systems. We show, with simulations, that, using our strategy, the operators can make the new billing paradigm profitable while the clients benefit from the economic advantages of competition and of the quality given by a pricing-based network balance mechanism.
- Published
- 2011
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.