Dresden University of Technology

Displaying 1-40 of 93 results

  • White Papers // May 2014

    Latency-Aware Elastic Scaling for Distributed Data Stream Processing Systems

    Elastic scaling allows a data stream processing system to react to a dynamically changing query or event workload by automatically scaling in or out. Thereby, both unpredictable load peaks as well as underload situations can be handled. However, each scaling decision comes with a latency penalty due to the required...

    Provided By Dresden University of Technology

  • White Papers // Apr 2014

    PowerCass: Energy Efficient, Consistent Hashing Based Storage for Micro Clouds Based Infrastructure

    Consistent hash based storage systems are used in many real world applications for which energy is one of the main cost factors. However, these systems are typically designed and deployed without any mechanisms to save energy at times of low demand. The authors present an energy conserving implementation of a...

    Provided By Dresden University of Technology

  • White Papers // Apr 2014

    Lightweight Automatic Resource Scaling for Multi-Tier Web Applications

    Dynamic resource scaling is a key property of cloud computing. Users can acquire or release required capacity for their applications on-the-fly. The most widely used and practical approach for dynamic scaling based on predefined policies (rules). For example, IaaS providers such as RightScale ask application owners to manually set the...

    Provided By Dresden University of Technology

  • White Papers // Nov 2013

    Combining Error Detection and Transactional Memory for Energy-efficient Computing below Safe Operation Margins

    The power envelope has become a major issue for the design of computer systems. One way of reducing energy consumption is to downscale the voltage of microprocessors. However, this does not come without costs. By decreasing the voltage, the likelihood of failures increases drastically and without mechanisms for reliability, the...

    Provided By Dresden University of Technology

  • White Papers // Oct 2013

    Elastic and Fault Tolerant Event Stream Processing Using StreamMine3G

    The massive amount of new data being generated each day by data sources such as Smartphone and sensor devices calls for new techniques to process such continues streams of data. Event Stream Processing (ESP) addresses this problem and enables users to process such data streams in (soft) real-time allowing the...

    Provided By Dresden University of Technology

  • White Papers // Jul 2013

    StreamMine3G OneClick Deploy & Monitor ESP Applications With A Single Click

    In this paper, the authors present StreamMine3G OneClick, a web based application relieving users from the burden of the complex installation and setup process of Event Stream Processing (ESP) systems such as StreamMine3G in cloud environments. Using StreamMine3G OneClick, users just upload their application logic and choose their favorite cloud...

    Provided By Dresden University of Technology

  • White Papers // Jul 2013

    RAIC Integration for Network Storages on Mobile Devices

    Systems to combine multiple network and online storage targets with implied redundancy, security and fault tolerance, so-called RAICs, have recently seen renewed discussion due to the growing popularity of convenient cloud storage service offerings. For mobile device access to RAICs, less research results are available. A \"Smartphone for the future\"...

    Provided By Dresden University of Technology

  • White Papers // Jun 2013

    Towards Flexible Data Sharing in Multi-Device Mobility Scenarios

    For most people, computers have evolved from large stationary machines into a multitude of interconnected personal and mobile devices which can be and are used at any convenient time. Likewise, the handling of data has evolved from the traditional input-processing-output chain into more sophisticated flows which involve splitting, joining, duplication,...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    Integration of Information Systems in Cloud Computing for Establishing a Long-term Profitable Customer Portfolio

    Cloud service providers are interested both in a revenue maximizing allocation of their limited capacity resources (as goal of revenue management) and the establishment of long-term business relations with their clients (as goal of customer relationship management). Confronted with these partly diametric objectives, the paper introduces a framework for integrating...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    Complexity in Enterprise Architectures - Conceptualization and Introduction of a Measure From a System Theoretic Perspective

    Measurability is the essential basis for management. Although the management of complexity is a central task of CIOs and IT-architects, literature has not proposed a concrete measure to quantify complexity in enterprise architectures so far. Against this background the contribution of this paper is the introduction of a system theoretic...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    The Blurring Boundaries of Work-Related and Personal Media Use: A Grounded Theory Study on the Employee's Perspective

    The ongoing consumerization of Information Technology (IT) demands to rethink the traditional paradigms of media use at the workplace. Past research has focused on the use of company IT resources for personal purposes (e.g., 'Cyber-loafing') and primarily emphasized the adverse effects. This study takes a wider perspective and includes the...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    An IT Architecture Enabling Flexible Adjustment of Exploration/exploitation Trade-Off

    The trade-off between exploration of new ideas and exploitation of certainties create a need for managing a balance between those two concepts within organizations. To align with an associated strategy, the authors suggest an IT architecture with an embedded mechanism to manage this balance when trying new approaches. A prototype...

    Provided By Dresden University of Technology

  • White Papers // Mar 2013

    Leveraging Transactional Memory for Energy-Efficient Computing Below Safe Operation Margins

    The power envelope has become a major issue for the design of computer systems. One way of reducing energy consumption is to downscale the voltage of microprocessors. However, this does not come without costs. By decreasing the voltage, the likelihood of failures increases drastically and without mechanisms for reliability, the...

    Provided By Dresden University of Technology

  • White Papers // Feb 2013

    Managing the Cloud Service Lifecycle From the User's View

    The concept of Cloud Computing has become indispensable in recent years. The use of distributed computing resources facilitates primarily infinite scalability and cost reductions by pay per use agreements. However, the management of cloud services is extensive with regard to the Cloud Service Lifecycle phases. The analysis of operational Cloud...

    Provided By Dresden University of Technology

  • White Papers // Jan 2013

    Personal Cloud Management Cockpit With Social or Market-Driven Asset Exchange

    Digital and physical assets such as software, data and hardware resources have historically been exchanged in a product-style wholesome transfer. Now, the rise of Cloud Computing and the increasing delivery of Everything-as-a-Service in an Internet of Services require new techniques for users to perform asset discovery, exchange and management. This...

    Provided By Dresden University of Technology

  • White Papers // Jan 2013

    Experimental Evaluation of NUMA Effects on Database Management Systems

    NUMA systems with multiple CPUs and large main memories are common today. Consequently, DataBase Management Systems (DBMSs) in data centers are deployed on NUMA systems. They serve a wide range of database use-cases, single large applications having high performance needs as well as many small applications that are consolidated on...

    Provided By Dresden University of Technology

  • White Papers // Dec 2012

    Does Live Migration of Virtual Machines Cost Energy?

    Live migration, the process of moving a Virtual Machine (VM) interruption-free between physical hosts is a core concept in modern data centers. Power management strategies use live migration to consolidate services in a cluster environment and switch off underutilized machines to save power. However, most migration models do not consider...

    Provided By Dresden University of Technology

  • White Papers // Dec 2012

    Performance Analysis of a Handover Mechanism for a Mobile Wireless Sensor Network

    Several applications have been proposed for mobile wireless sensor networks. Some of these applications require the transfer of a large amount of data in a short period of time. This is challenging, since the mobile node may be required to repeatedly establish a link with multiple relay nodes which proceed...

    Provided By Dresden University of Technology

  • White Papers // Nov 2012

    Flexible Data Distribution Policy Language and Gateway Architecture

    Concerns about the security and reliability of data storage in online systems, alias cloud storage services, have led to the design of application-independent storage overlays and controllers which guarantee security and optimality with regards to the requirements of their users. In roaming and multi-user environments, the configuration and rules steering...

    Provided By Dresden University of Technology

  • White Papers // Nov 2012

    Analysis of Overhead and Profitability in Nested Cloud Environments

    The on-demand provisioning of computing and storage resources and the corresponding pay-as-you-go billing have made cloud computing a popular paradigm to achieve a high technological utility. While most use cases can adequately be covered by the offers of existing public cloud providers, the granularity in provisioning and pricing is not...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Dynamic Voltage and Frequency Scaling in Multimedia Servers

    In this paper, the authors experimentally investigate the scope and usefulness of Dynamic Voltage and Frequency Scaling (DVFS) in multimedia servers. For their experiment, they considered four scaling policies, two heterogeneous servers, and two different application scenarios. In the first scenario, they used an IO-Intensive multimedia downloading application while in...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Autonomous Participation in Cloud Services

    A Cyber-Physical System (CPS) is a combination of multiple physical devices connected and organized by a central controlling infrastructure using a feedback-loop mechanism. In order to increase the autonomy of CPS they must be connected to rich cloud services (e.g., social software and elastic resource services) enabling more sophisticated decision...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Vertical Scaling for Prioritized VMs Provisioning

    The elastic scaling of services permits one to meet service provisioning requirements (i.e., not to violate its SLAs), and to efficiently use available resources (i.e., to minimize the cost of running the application). In this paper, the authors describe a novel online controller design built on top of the Xen...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Linear Precoding in MISO Cognitive Channels with Causal Primary Message

    The coexistence of a Single-Input Single-Output (SISO) primary link and a Multiple-Input Single-Output (MISO) secondary link is considered in an extended cognitive radio channel setup, where the secondary transmitter has to obtain ("Learn") the primary message in a first phase rather than having non-causal knowledge of it. An achievable rate...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    A Highly-Virtualising Cloud Resource Broker

    Cloud computing infrastructure services encompass temporally, spatially and structurally coarse-grained access to computing resources. This prevents a genuine pay-per-use model for the consumer and effectively leads to over-reservation and inadequate tariffs especially for short-term, small-scale computations. The authors propose an economically motivated compensation approach to increase the granularity and utility...

    Provided By Dresden University of Technology

  • White Papers // Aug 2012

    Spot-On for Timed Instances: Striking a Balance Between Spot and On-Demand Instances

    Infrastructure as a Service (IaaS) providers currently have no knowledge of the time frame customers intend to lease resources. However, scheduling in the absence of lease time information leads to wasted resources in times of decreasing demand. The authors explore how IaaS providers can use lease times to optimize resource...

    Provided By Dresden University of Technology

  • White Papers // Jul 2012

    The Application of Business Intelligence to Higher Education: Technical and Managerial Perspectives

    Business-intelligence has proven to be an effective means of improving the decision-making within an organization. While traditionally applied to profit making private companies BI has recently been applied to public institutions as well. The authors present a case study of the application of BI to a public university. The details...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Universal Cheat-Proof Pricing for Multiple Access Channels Without SIC Under QoS Requirements

    This paper studies universal cheat-proof pricing by a repeated game for the general Multiple Access Channel (MAC) without Successive Interference Cancelation (SIC). The authors model the system by three entities: regulator, system optimizer and users. The regulator is designed to ensure the Signal-to-Interference plus Noise Ratio (SINR) based Quality-of-Service (QoS)...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Connecting Spatially Coupled LDPC Code Chains

    Recently, iterative processing on spatially coupled sparse graphs has received a lot of attention in the literature. Codes constructed from connected Spatially Coupled Low-Density Parity-Check Code (SC-LDPCC) chains are proposed and analyzed. It is demonstrated that connecting coupled chains results in improved iterative decoding performance. The constructed protograph ensembles have...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Analysis of the Power Consumption of a Multimedia Server Under Different DVFS Policies

    Dynamic Voltage and Frequency Scaling (DVFS) has been a useful power management strategy in embedded systems, mobile devices, and wireless sensor networks. Recently, it has also been proposed for servers and data centers in conjunction with service consolidation and optimal resource-pool sizing. In this paper, the authors experimentally investigate the...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Analysis of the Power and Hardware Resource Consumption of Servers Under Different Load Balancing Policies

    Most Internet applications employ some kind of load balancing policies in a cluster setting to achieve reliable service provision as well as to deal with a resource bottleneck. However, these policies may not ensure the utilization of all of the hardware resources in a server equally efficiently. This paper experimentally...

    Provided By Dresden University of Technology

  • White Papers // Mar 2012

    Evaluation of the Reliability of RSSI for Indoor Localization

    In wireless sensor networks, nodes can be static or mobile, depending on the application requirements. Dealing with mobility can pose some formidable challenges in protocol design, particularly, at the link and network layers. These difficulties require mobility adaption algorithms to efficiently localize mobile nodes and predict the quality of link...

    Provided By Dresden University of Technology

  • White Papers // Mar 2012

    Cooperative Feeder Links for Relay Enhanced Networks

    Heterogeneous networks are gaining more and more interest as one means to cope with the expected data rise in future mobile networks. The upgrade of cellular macro networks by placing relay nodes, as one option, has the benefit of avoiding any wired backhaul network, but has to be paid by...

    Provided By Dresden University of Technology

  • White Papers // Mar 2012

    Cyclostationary Detection of Cognitive Radio Systems Using GFDM Modulation

    A cognitive radio should be able to detect unused spectrum band and to change its transmission parameters in order to transmit within these free bands. To achieve this, reliable detection of incumbent signals as well as of other opportunistic signals that are using the said spectrum, is necessary. Generalized Frequency...

    Provided By Dresden University of Technology

  • White Papers // Jan 2012

    A Semantic Extension of a Hierarchical Storage Management System for Small and Medium-Sized Enterprises

    The number of company data deposited in hierarchical storage management systems heavily increases. Thus, new approaches are necessary to keep track of a data pool. This paper introduces a Semantic Storage Extension (SSE) for existing hierarchical storage management systems that allows them to exploit semantic relations between files and use...

    Provided By Dresden University of Technology

  • White Papers // Dec 2011

    Dynamic Replication Technique for Micro-Clouds Based Distributed Storage System

    In this paper, the authors investigate a dynamic replica placement strategy to achieve minimum repair time during a complete loss of datacenter in large-scale distributed object storage systems while keeping the high availability and durability of the system as well as its balanced load and minimum network latency. Specifically, they...

    Provided By Dresden University of Technology

  • White Papers // Nov 2011

    AN-Encoding Compiler: Building Safety-Critical Systems with Commodity Hardware

    In the future, the authors expect commodity hardware to be used in safety-critical applications. However, in the future commodity hardware is expected to become less reliable and more susceptible to soft errors because of decreasing feature size and reduced power supply. Thus, software-implemented approaches to deal with unreliable hardware will...

    Provided By Dresden University of Technology

  • White Papers // Sep 2011

    Information Dispersion Over Redundant Arrays of Optimal Cloud Storage for Desktop Users

    Data storage in cloud computing centers is gaining popularity for personal and institutional data backups as well as for highly scalable access from software applications running on attached compute servers. The data is usually access protected, encrypted and replicated depending on the security and scalability needs. Despite the advances in...

    Provided By Dresden University of Technology

  • White Papers // Sep 2011

    EPASS-IoS 1.1: Enabling Inter-Enterprise Business Process Modeling by S-BPM and the Internet of Services Concept

    The future \"Internet of Services\" (IoS) will provide an open environment allowing market participants to offer and consume services over Internet marketplaces. It gives businesses the opportunity to outsource parts of their business processes. This leads to networks of cooperating businesses with a distributed execution of processes and provides a...

    Provided By Dresden University of Technology

  • White Papers // Aug 2011

    Scaling Non-Elastic Applications Using Virtual Machines

    Hardware virtualization is a cost effective mean to reduce the number of Physical Machines (PMs) required to handle computational tasks. Virtualization also guarantees high levels of isolation (performance and security wise) between virtual machines running on the same physical hardware. Besides enabling consolidation of workloads, Virtual Machine (VM) technology also...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Dynamic Voltage and Frequency Scaling in Multimedia Servers

    In this paper, the authors experimentally investigate the scope and usefulness of Dynamic Voltage and Frequency Scaling (DVFS) in multimedia servers. For their experiment, they considered four scaling policies, two heterogeneous servers, and two different application scenarios. In the first scenario, they used an IO-Intensive multimedia downloading application while in...

    Provided By Dresden University of Technology

  • White Papers // Dec 2012

    Does Live Migration of Virtual Machines Cost Energy?

    Live migration, the process of moving a Virtual Machine (VM) interruption-free between physical hosts is a core concept in modern data centers. Power management strategies use live migration to consolidate services in a cluster environment and switch off underutilized machines to save power. However, most migration models do not consider...

    Provided By Dresden University of Technology

  • White Papers // Dec 2012

    Performance Analysis of a Handover Mechanism for a Mobile Wireless Sensor Network

    Several applications have been proposed for mobile wireless sensor networks. Some of these applications require the transfer of a large amount of data in a short period of time. This is challenging, since the mobile node may be required to repeatedly establish a link with multiple relay nodes which proceed...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Analysis of the Power Consumption of a Multimedia Server Under Different DVFS Policies

    Dynamic Voltage and Frequency Scaling (DVFS) has been a useful power management strategy in embedded systems, mobile devices, and wireless sensor networks. Recently, it has also been proposed for servers and data centers in conjunction with service consolidation and optimal resource-pool sizing. In this paper, the authors experimentally investigate the...

    Provided By Dresden University of Technology

  • White Papers // Mar 2012

    Evaluation of the Reliability of RSSI for Indoor Localization

    In wireless sensor networks, nodes can be static or mobile, depending on the application requirements. Dealing with mobility can pose some formidable challenges in protocol design, particularly, at the link and network layers. These difficulties require mobility adaption algorithms to efficiently localize mobile nodes and predict the quality of link...

    Provided By Dresden University of Technology

  • White Papers // May 2012

    Analysis of the Power and Hardware Resource Consumption of Servers Under Different Load Balancing Policies

    Most Internet applications employ some kind of load balancing policies in a cluster setting to achieve reliable service provision as well as to deal with a resource bottleneck. However, these policies may not ensure the utilization of all of the hardware resources in a server equally efficiently. This paper experimentally...

    Provided By Dresden University of Technology

  • White Papers // Mar 2012

    Cooperative Feeder Links for Relay Enhanced Networks

    Heterogeneous networks are gaining more and more interest as one means to cope with the expected data rise in future mobile networks. The upgrade of cellular macro networks by placing relay nodes, as one option, has the benefit of avoiding any wired backhaul network, but has to be paid by...

    Provided By Dresden University of Technology

  • White Papers // Aug 2009

    Scheduling Strategies Support for Multiple VPNs Over Broadband PLC Access Networks

    Broadband PowerLine Communications (BPLC) uses the infrastructure of the electrical power lines to provide broadband access to the end-users. A BPLC system supports users with multiple services, utilizes the scheduler to manage the available network transmission capacity via a bandwidth broker, and delivers the access right to the users based...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    Complexity in Enterprise Architectures - Conceptualization and Introduction of a Measure From a System Theoretic Perspective

    Measurability is the essential basis for management. Although the management of complexity is a central task of CIOs and IT-architects, literature has not proposed a concrete measure to quantify complexity in enterprise architectures so far. Against this background the contribution of this paper is the introduction of a system theoretic...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    The Blurring Boundaries of Work-Related and Personal Media Use: A Grounded Theory Study on the Employee's Perspective

    The ongoing consumerization of Information Technology (IT) demands to rethink the traditional paradigms of media use at the workplace. Past research has focused on the use of company IT resources for personal purposes (e.g., 'Cyber-loafing') and primarily emphasized the adverse effects. This study takes a wider perspective and includes the...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    An IT Architecture Enabling Flexible Adjustment of Exploration/exploitation Trade-Off

    The trade-off between exploration of new ideas and exploitation of certainties create a need for managing a balance between those two concepts within organizations. To align with an associated strategy, the authors suggest an IT architecture with an embedded mechanism to manage this balance when trying new approaches. A prototype...

    Provided By Dresden University of Technology

  • White Papers // Jan 2013

    Personal Cloud Management Cockpit With Social or Market-Driven Asset Exchange

    Digital and physical assets such as software, data and hardware resources have historically been exchanged in a product-style wholesome transfer. Now, the rise of Cloud Computing and the increasing delivery of Everything-as-a-Service in an Internet of Services require new techniques for users to perform asset discovery, exchange and management. This...

    Provided By Dresden University of Technology

  • White Papers // Feb 2013

    Managing the Cloud Service Lifecycle From the User's View

    The concept of Cloud Computing has become indispensable in recent years. The use of distributed computing resources facilitates primarily infinite scalability and cost reductions by pay per use agreements. However, the management of cloud services is extensive with regard to the Cloud Service Lifecycle phases. The analysis of operational Cloud...

    Provided By Dresden University of Technology

  • White Papers // Nov 2012

    Flexible Data Distribution Policy Language and Gateway Architecture

    Concerns about the security and reliability of data storage in online systems, alias cloud storage services, have led to the design of application-independent storage overlays and controllers which guarantee security and optimality with regards to the requirements of their users. In roaming and multi-user environments, the configuration and rules steering...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    A Highly-Virtualising Cloud Resource Broker

    Cloud computing infrastructure services encompass temporally, spatially and structurally coarse-grained access to computing resources. This prevents a genuine pay-per-use model for the consumer and effectively leads to over-reservation and inadequate tariffs especially for short-term, small-scale computations. The authors propose an economically motivated compensation approach to increase the granularity and utility...

    Provided By Dresden University of Technology

  • White Papers // Nov 2012

    Analysis of Overhead and Profitability in Nested Cloud Environments

    The on-demand provisioning of computing and storage resources and the corresponding pay-as-you-go billing have made cloud computing a popular paradigm to achieve a high technological utility. While most use cases can adequately be covered by the offers of existing public cloud providers, the granularity in provisioning and pricing is not...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Autonomous Participation in Cloud Services

    A Cyber-Physical System (CPS) is a combination of multiple physical devices connected and organized by a central controlling infrastructure using a feedback-loop mechanism. In order to increase the autonomy of CPS they must be connected to rich cloud services (e.g., social software and elastic resource services) enabling more sophisticated decision...

    Provided By Dresden University of Technology

  • White Papers // Sep 2011

    Information Dispersion Over Redundant Arrays of Optimal Cloud Storage for Desktop Users

    Data storage in cloud computing centers is gaining popularity for personal and institutional data backups as well as for highly scalable access from software applications running on attached compute servers. The data is usually access protected, encrypted and replicated depending on the security and scalability needs. Despite the advances in...

    Provided By Dresden University of Technology

  • White Papers // Aug 2011

    User-Controlled Data Sovereignty in the Cloud

    Cloud computing plays an increasing role in the IT-market. Promised scalability and flexibility attracts enterprises as well as private end users. The loss of data sovereignty is seldom addressed but nevertheless a serious threat to users. The FlexCloud research group proposes an approach that enables users to profit from public...

    Provided By Dresden University of Technology

  • White Papers // Apr 2011

    Towards User CentricData Governance and Control in the Cloud

    Cloud Computing, i. e. providing on-demand access to virtualised computing resources over the Internet, is one of the current mega-trends in IT. Today, there are already several providers offering cloud computing Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS) services. Although the cloud computing paradigm promises both economical as well as...

    Provided By Dresden University of Technology

  • White Papers // Jul 2012

    The Application of Business Intelligence to Higher Education: Technical and Managerial Perspectives

    Business-intelligence has proven to be an effective means of improving the decision-making within an organization. While traditionally applied to profit making private companies BI has recently been applied to public institutions as well. The authors present a case study of the application of BI to a public university. The details...

    Provided By Dresden University of Technology

  • White Papers // Dec 2008

    Culture as a Critical Success Factor for Successful Global Project Management in Multi-National IT Service Projects

    The concepts of globalization apply to both large multi-national corporations and local organizations buying goods or services from other countries or contracting people globally. IT services like application development or outsourcing services are delivered as projects using global resources from different cultures. Therefore, this paper analyses whether considering cultural management...

    Provided By Dresden University of Technology

  • White Papers // Aug 2010

    Applying TOGAF to Define and Govern a Service-Oriented Architecture in a Large-Scale Research Project

    The Service-oriented Architecture paradigm has become a widely adopted solution for enterprise application landscapes. SOA promises system integration improvement, business and IT alignment, applications reusability, and fast adaptability to changing requirements. Yet, the advantages that SOA offers lead to its main management challenges. An SOA consists not only of services....

    Provided By Dresden University of Technology

  • White Papers // Dec 2009

    Improving the Development of Service-Based Applications Through Service Annotations

    Following the concept of service-oriented architectures, applications can easily be built by selecting services and composing them in a loosely coupled manner. Because of the high flexibility and reusability of services the approach is well established for the implementation of business processes and software in business-to-business scenarios. However, SOA approaches...

    Provided By Dresden University of Technology

  • White Papers // May 2011

    Spaceflight - A Versatile Live Demonstrator and Teaching System for Advanced Service-Oriented Technologies

    New research advances in loosely-coupled, uniformly described service-oriented systems continue to appear at a high rate. Application areas such as enterprise information systems, cloud computing and programmable web applications benefit from these developments. Yet, it is hard for researchers, developers and students to understand the combined effect of methodologies, which...

    Provided By Dresden University of Technology

  • White Papers // Sep 2011

    EPASS-IoS 1.1: Enabling Inter-Enterprise Business Process Modeling by S-BPM and the Internet of Services Concept

    The future \"Internet of Services\" (IoS) will provide an open environment allowing market participants to offer and consume services over Internet marketplaces. It gives businesses the opportunity to outsource parts of their business processes. This leads to networks of cooperating businesses with a distributed execution of processes and provides a...

    Provided By Dresden University of Technology

  • White Papers // Sep 2012

    Vertical Scaling for Prioritized VMs Provisioning

    The elastic scaling of services permits one to meet service provisioning requirements (i.e., not to violate its SLAs), and to efficiently use available resources (i.e., to minimize the cost of running the application). In this paper, the authors describe a novel online controller design built on top of the Xen...

    Provided By Dresden University of Technology

  • White Papers // Jan 2013

    Experimental Evaluation of NUMA Effects on Database Management Systems

    NUMA systems with multiple CPUs and large main memories are common today. Consequently, DataBase Management Systems (DBMSs) in data centers are deployed on NUMA systems. They serve a wide range of database use-cases, single large applications having high performance needs as well as many small applications that are consolidated on...

    Provided By Dresden University of Technology

  • White Papers // Jun 2013

    Towards Flexible Data Sharing in Multi-Device Mobility Scenarios

    For most people, computers have evolved from large stationary machines into a multitude of interconnected personal and mobile devices which can be and are used at any convenient time. Likewise, the handling of data has evolved from the traditional input-processing-output chain into more sophisticated flows which involve splitting, joining, duplication,...

    Provided By Dresden University of Technology

  • White Papers // May 2013

    Integration of Information Systems in Cloud Computing for Establishing a Long-term Profitable Customer Portfolio

    Cloud service providers are interested both in a revenue maximizing allocation of their limited capacity resources (as goal of revenue management) and the establishment of long-term business relations with their clients (as goal of customer relationship management). Confronted with these partly diametric objectives, the paper introduces a framework for integrating...

    Provided By Dresden University of Technology

  • White Papers // Dec 2011

    Dynamic Replication Technique for Micro-Clouds Based Distributed Storage System

    In this paper, the authors investigate a dynamic replica placement strategy to achieve minimum repair time during a complete loss of datacenter in large-scale distributed object storage systems while keeping the high availability and durability of the system as well as its balanced load and minimum network latency. Specifically, they...

    Provided By Dresden University of Technology

  • White Papers // Apr 2008

    Constrained Dynamic Physical Database Design

    Physical design has always been an important part of database administration. Today's commercial database management systems offer physical design tools, which recommend a physical design for a given workload. However, these tools work only with static workloads and ignore the fact that workloads, and physical designs, may change over time....

    Provided By Dresden University of Technology

  • White Papers // Jul 2013

    StreamMine3G OneClick Deploy & Monitor ESP Applications With A Single Click

    In this paper, the authors present StreamMine3G OneClick, a web based application relieving users from the burden of the complex installation and setup process of Event Stream Processing (ESP) systems such as StreamMine3G in cloud environments. Using StreamMine3G OneClick, users just upload their application logic and choose their favorite cloud...

    Provided By Dresden University of Technology

  • White Papers // Oct 2013

    Elastic and Fault Tolerant Event Stream Processing Using StreamMine3G

    The massive amount of new data being generated each day by data sources such as Smartphone and sensor devices calls for new techniques to process such continues streams of data. Event Stream Processing (ESP) addresses this problem and enables users to process such data streams in (soft) real-time allowing the...

    Provided By Dresden University of Technology

  • White Papers // Aug 2012

    Spot-On for Timed Instances: Striking a Balance Between Spot and On-Demand Instances

    Infrastructure as a Service (IaaS) providers currently have no knowledge of the time frame customers intend to lease resources. However, scheduling in the absence of lease time information leads to wasted resources in times of decreasing demand. The authors explore how IaaS providers can use lease times to optimize resource...

    Provided By Dresden University of Technology

  • White Papers // Apr 2011

    Transactional Memory for Dependable Embedded Systems

    Transactional Memory (TM) has been touted as one of the most promising approaches to concurrent programming for multi-core processors. By combining ease of use with high scalability potential, as well as check-pointing capabilities particularly useful for developing dependable software, TM has attracted considerable attention from the research community. Many of...

    Provided By Dresden University of Technology

  • White Papers // Jun 2011

    Aaron: An Adaptable Execution Environment

    Software bugs and hardware errors are the largest contributors to downtime, and can be permanent (e.g. deterministic memory violations, broken memory modules) or transient (e.g. race conditions, bit-flips). Although a large variety of dependability mechanisms exist, only few are used in practice. The existing techniques do not prevail for several...

    Provided By Dresden University of Technology

  • White Papers // Jun 2011

    SIListra Compiler: Building Reliable Systems with Unreliable Hardware

    On one hand, hardware is expected to become more unreliable in future. On the other hand, more and more applications become safety critical, i.e., rely on the correct function of the underlying hardware. To close this gap the authors proposed to add error detection capabilities to the application with their...

    Provided By Dresden University of Technology

  • White Papers // Apr 2010

    Software-Implemented Hardware Error Detection: Costs and Gains

    Commercial Off-The-Shelf (COTS) hardware is becoming less and less reliable because of the continuously decreasing feature sizes of integrated circuits. But due to economic constraints, more and more critical systems will be based on basically unreliable COTS hardware. Usually in such systems redundant execution is used to detect erroneous executions....

    Provided By Dresden University of Technology

  • White Papers // Mar 2009

    Minimizing Latency in Fault-Tolerant Distributed Stream Processing Systems

    Event Stream Processing (ESP) applications target the real-time processing of huge amounts of data. Events traverse a graph of stream processing operators where the information of interest is extracted. As these applications gain popularity, the requirements for scalability, availability, and dependability increase. In terms of dependability and availability, many applications...

    Provided By Dresden University of Technology