The Peninsula Hotels

Displaying 1-19 of 19 results

  • White Papers // Mar 2014

    A Case for Virtualizing the Electric Utility in Cloud Data Centers

    Since energy-related costs make up an increasingly significant component of overall costs for data centers run by cloud providers, it is important that these costs be propagated to the tenants in ways that are fair and pro-mote workload modulation that is aligned with overall cost-efficacy. The authors argue that there...

    Provided By The Peninsula Hotels

  • White Papers // Nov 2013

    A Study of Semantic Data Compression

    A two-way semantic model is considered with two sources sharing their ideas chosen from different sets of facts. These facts may be expressed in the form of RDF (Resource Description Framework) triples. A set of conclusions can be derived by using the logical relations between these facts. This set of...

    Provided By The Peninsula Hotels

  • White Papers // Sep 2013

    Data Center Power Cost Optimization Via Workload Modulation

    The authors formulate optimization problems to study how data centers might modulate their power demands for cost-effective operation taking into account various complexities exhibited by real-world electricity pricing schemes. For computational tractability reasons, they work with a fluid model for power demands which they imagine can be modulated using two...

    Provided By The Peninsula Hotels

  • White Papers // Jul 2013

    ACE: Abstracting, Characterizing and Exploiting Datacenter Power Demands

    Peak power management of datacenters has tremendous cost implications. While numerous mechanisms have been proposed to cap power consumption, real datacenter power consumption data is scarce. Prior studies have either used a small set of applications and/or servers, or presented data that is at an aggregate scale from which it...

    Provided By The Peninsula Hotels

  • White Papers // Apr 2013

    A Case for Heterogeneous Flash in the Datacenter

    The authors explore the idea of heterogeneous NAND flash which possesses pages and blocks of multiple sizes. This heterogeneity can then be exploited to accommodate the diversity in data access patterns found in most datacenter storage workloads. They identify various tradeoffs offered by such pages and blocks. By characterizing seven...

    Provided By The Peninsula Hotels

  • White Papers // Aug 2012

    Communicating Using an Energy Harvesting Transmitter: Optimum Policies Under Energy Storage Losses

    In this paper, short-term throughput optimal power allocation policies are derived for an energy harvesting transmitter with energy storage losses. In particular, the energy harvesting transmitter is equipped with a battery that loses a fraction of its stored energy. Both single user, i.e. one transmitter-one receiver, and the broadcast channel,...

    Provided By The Peninsula Hotels

  • White Papers // Aug 2011

    Software Configuration Management in the Context of BPM and SOA

    Service Oriented Architectures (SOA) has established to shape large IT landscapes. Business Process Management (BPM) aims to bring more flexibility to the enterprise and pushes a business driven SOA. In the last years BPM-Suites (BPMS) have grown to large and powerful systems. They both address development (modelling) as well as...

    Provided By The Peninsula Hotels

  • White Papers // Feb 2011

    Reducing Data Center Power With Server Consolidation: Approximation and Evaluation

    With the growing costs of powering data centers, power management is gaining importance. Server consolidation in data centers, enabled by virtualization technologies, is becoming a popular option for organizations to reduce costs and improve manageability. While consolidation offers these benefits, it is important to ensure proper resource provisioning so that...

    Provided By The Peninsula Hotels

  • White Papers // Dec 2010

    Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions

    Kernel extensions are widely used by attackers to compromise the operating system kernel. With the presence of various untrusted extensions, it remains a challenging problem to comprehensively preserve the integrity of OS kernels in a practical and generic way. In this paper, the authors present HUKO, a hypervisor-based integrity protection...

    Provided By The Peninsula Hotels

  • White Papers // Sep 2010

    Compressing Trajectories Using Inter-Frame Coding

    With the advances in wireless communications and GPS technology, there is increasing interest in the field of location-aware services. Because of the proliferation of GPS-enabled devices and applications, in this study, the authors address the scalability issue in trajectory data management. Specifically, they propose a scheme called Inter-Frame Coding (IFC)...

    Provided By The Peninsula Hotels

  • White Papers // Jul 2010

    Multi-level Crypto Disk: Secondary Storage with Flexible Performance Versus Security Trade-offs

    Secondary storage devices have become increasingly vulnerable to security attacks as they are now accessed remotely, attached to mobile devices, or used in other previously unanticipated operating environments. Storage vendors have responded to this by offering solutions that encrypt data on the fly - in software or device firmware -...

    Provided By The Peninsula Hotels

  • White Papers // Feb 2010

    Auditing Workflow Executions Against Dataflow Policies

    In this paper, the authors present IFAudit, an approach for the audit of dataflow policies in workflow models. IFAudit encompasses three steps. First, propagation graphs are generated from workflows' log data. They represent the explicit information flows caused, e.g., by data access and message-passing, that have occurred during the execution...

    Provided By The Peninsula Hotels

  • White Papers // Nov 2008

    Empirical Analysis on Energy Efficiency of Flash-Based SSDs

    Hard Disk Drives (HDDs) have been used as a primary storage device and have been improving continually in capacity as well as performance. However, their poor random access still remains a significant bottleneck for the overall throughput of many computing systems. Flash memory has come to the forefront in the...

    Provided By The Peninsula Hotels

  • White Papers // Sep 2008

    Profiling, Prediction, and Capping of Power Consumption in Consolidated Environments

    Consolidation of workloads has emerged as a key mechanism to dampen the rapidly growing energy expenditure within enterprise-scale data centers. To gainfully utilize consolidation-based techniques, the authors must be able to characterize the power consumption of groups of co-located applications. Such characterization is crucial for effective prediction and enforcement of...

    Provided By The Peninsula Hotels

  • White Papers // May 2008

    Predicting Web Cache Behavior using Stochastic State-Space Models

    Accurate analytical models of Web caches are desirable as they can provide inexpensive ways to make resource provisioning decisions at a cache itself as well as at the Web servers it is servicing. Explicitly modeling a Web cache has two major shortcomings: several simplifying assumptions about the operation of the...

    Provided By The Peninsula Hotels

  • White Papers // Apr 2008

    Analysis and Solutions to Issue Queue Process Variation

    The last few years have witnessed an unprecedented explosion in transistor densities. Diminutive feature sizes have enabled microprocessor designers to break the billion-transistors per chip mark. However various new reliability challenges such as Process Variation (PV) have emerged that can no longer be ignored by chip designers. In this paper,...

    Provided By The Peninsula Hotels

  • White Papers // Jan 2008

    MIRAGE: Storage Provisioning in Large Data Centers Using Balanced Component Utilizations

    This paper presents MIRAGE, an architecture for data center storage provisioning that takes the approach of maintaining storage services for applications by ensuring well-balanced utilizations in all internal components of the storage infrastructure. The authors implemented MIRAGE on their local storage infrastructure and observed the sensitivity of the MIRAGE load-balancing...

    Provided By The Peninsula Hotels

  • White Papers // Dec 2006

    Application of Business Process Execution Language to Scientific Workflows

    This paper investigates the use of the Business Process Execution Language for Web services (BPEL4WS/ BPEL) for managing scientific workflows. The complexity, unpredictability and inter-dependency of the components in a scientific workflow often demand great flexibility in a workflow-language in order to support; exception handling, recovery from uncertain situations, user...

    Provided By The Peninsula Hotels

  • White Papers // Nov 2006

    Password Exhaustion: Predicting the End of Password Usefulness

    Passwords are currently the dominant authentication mechanism in computing systems. However, users are unwilling or unable to retain passwords with a large amount of entropy. This reality is exacerbated by the increasing ability of systems to mount offline attacks. In this paper, the authors evaluate the degree to which the...

    Provided By The Peninsula Hotels

  • White Papers // Dec 2010

    Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions

    Kernel extensions are widely used by attackers to compromise the operating system kernel. With the presence of various untrusted extensions, it remains a challenging problem to comprehensively preserve the integrity of OS kernels in a practical and generic way. In this paper, the authors present HUKO, a hypervisor-based integrity protection...

    Provided By The Peninsula Hotels

  • White Papers // Aug 2012

    Communicating Using an Energy Harvesting Transmitter: Optimum Policies Under Energy Storage Losses

    In this paper, short-term throughput optimal power allocation policies are derived for an energy harvesting transmitter with energy storage losses. In particular, the energy harvesting transmitter is equipped with a battery that loses a fraction of its stored energy. Both single user, i.e. one transmitter-one receiver, and the broadcast channel,...

    Provided By The Peninsula Hotels

  • White Papers // Sep 2010

    Compressing Trajectories Using Inter-Frame Coding

    With the advances in wireless communications and GPS technology, there is increasing interest in the field of location-aware services. Because of the proliferation of GPS-enabled devices and applications, in this study, the authors address the scalability issue in trajectory data management. Specifically, they propose a scheme called Inter-Frame Coding (IFC)...

    Provided By The Peninsula Hotels

  • White Papers // Mar 2014

    A Case for Virtualizing the Electric Utility in Cloud Data Centers

    Since energy-related costs make up an increasingly significant component of overall costs for data centers run by cloud providers, it is important that these costs be propagated to the tenants in ways that are fair and pro-mote workload modulation that is aligned with overall cost-efficacy. The authors argue that there...

    Provided By The Peninsula Hotels

  • White Papers // Apr 2008

    Analysis and Solutions to Issue Queue Process Variation

    The last few years have witnessed an unprecedented explosion in transistor densities. Diminutive feature sizes have enabled microprocessor designers to break the billion-transistors per chip mark. However various new reliability challenges such as Process Variation (PV) have emerged that can no longer be ignored by chip designers. In this paper,...

    Provided By The Peninsula Hotels

  • White Papers // Jan 2008

    MIRAGE: Storage Provisioning in Large Data Centers Using Balanced Component Utilizations

    This paper presents MIRAGE, an architecture for data center storage provisioning that takes the approach of maintaining storage services for applications by ensuring well-balanced utilizations in all internal components of the storage infrastructure. The authors implemented MIRAGE on their local storage infrastructure and observed the sensitivity of the MIRAGE load-balancing...

    Provided By The Peninsula Hotels

  • White Papers // Sep 2008

    Profiling, Prediction, and Capping of Power Consumption in Consolidated Environments

    Consolidation of workloads has emerged as a key mechanism to dampen the rapidly growing energy expenditure within enterprise-scale data centers. To gainfully utilize consolidation-based techniques, the authors must be able to characterize the power consumption of groups of co-located applications. Such characterization is crucial for effective prediction and enforcement of...

    Provided By The Peninsula Hotels

  • White Papers // May 2008

    Predicting Web Cache Behavior using Stochastic State-Space Models

    Accurate analytical models of Web caches are desirable as they can provide inexpensive ways to make resource provisioning decisions at a cache itself as well as at the Web servers it is servicing. Explicitly modeling a Web cache has two major shortcomings: several simplifying assumptions about the operation of the...

    Provided By The Peninsula Hotels

  • White Papers // Jul 2013

    ACE: Abstracting, Characterizing and Exploiting Datacenter Power Demands

    Peak power management of datacenters has tremendous cost implications. While numerous mechanisms have been proposed to cap power consumption, real datacenter power consumption data is scarce. Prior studies have either used a small set of applications and/or servers, or presented data that is at an aggregate scale from which it...

    Provided By The Peninsula Hotels

  • White Papers // Sep 2013

    Data Center Power Cost Optimization Via Workload Modulation

    The authors formulate optimization problems to study how data centers might modulate their power demands for cost-effective operation taking into account various complexities exhibited by real-world electricity pricing schemes. For computational tractability reasons, they work with a fluid model for power demands which they imagine can be modulated using two...

    Provided By The Peninsula Hotels

  • White Papers // Apr 2013

    A Case for Heterogeneous Flash in the Datacenter

    The authors explore the idea of heterogeneous NAND flash which possesses pages and blocks of multiple sizes. This heterogeneity can then be exploited to accommodate the diversity in data access patterns found in most datacenter storage workloads. They identify various tradeoffs offered by such pages and blocks. By characterizing seven...

    Provided By The Peninsula Hotels

  • White Papers // Nov 2008

    Empirical Analysis on Energy Efficiency of Flash-Based SSDs

    Hard Disk Drives (HDDs) have been used as a primary storage device and have been improving continually in capacity as well as performance. However, their poor random access still remains a significant bottleneck for the overall throughput of many computing systems. Flash memory has come to the forefront in the...

    Provided By The Peninsula Hotels

  • White Papers // Feb 2011

    Reducing Data Center Power With Server Consolidation: Approximation and Evaluation

    With the growing costs of powering data centers, power management is gaining importance. Server consolidation in data centers, enabled by virtualization technologies, is becoming a popular option for organizations to reduce costs and improve manageability. While consolidation offers these benefits, it is important to ensure proper resource provisioning so that...

    Provided By The Peninsula Hotels

  • White Papers // Jul 2010

    Multi-level Crypto Disk: Secondary Storage with Flexible Performance Versus Security Trade-offs

    Secondary storage devices have become increasingly vulnerable to security attacks as they are now accessed remotely, attached to mobile devices, or used in other previously unanticipated operating environments. Storage vendors have responded to this by offering solutions that encrypt data on the fly - in software or device firmware -...

    Provided By The Peninsula Hotels

  • White Papers // Aug 2011

    Software Configuration Management in the Context of BPM and SOA

    Service Oriented Architectures (SOA) has established to shape large IT landscapes. Business Process Management (BPM) aims to bring more flexibility to the enterprise and pushes a business driven SOA. In the last years BPM-Suites (BPMS) have grown to large and powerful systems. They both address development (modelling) as well as...

    Provided By The Peninsula Hotels

  • White Papers // Nov 2013

    A Study of Semantic Data Compression

    A two-way semantic model is considered with two sources sharing their ideas chosen from different sets of facts. These facts may be expressed in the form of RDF (Resource Description Framework) triples. A set of conclusions can be derived by using the logical relations between these facts. This set of...

    Provided By The Peninsula Hotels

  • White Papers // Nov 2006

    Password Exhaustion: Predicting the End of Password Usefulness

    Passwords are currently the dominant authentication mechanism in computing systems. However, users are unwilling or unable to retain passwords with a large amount of entropy. This reality is exacerbated by the increasing ability of systems to mount offline attacks. In this paper, the authors evaluate the degree to which the...

    Provided By The Peninsula Hotels

  • White Papers // Feb 2010

    Auditing Workflow Executions Against Dataflow Policies

    In this paper, the authors present IFAudit, an approach for the audit of dataflow policies in workflow models. IFAudit encompasses three steps. First, propagation graphs are generated from workflows' log data. They represent the explicit information flows caused, e.g., by data access and message-passing, that have occurred during the execution...

    Provided By The Peninsula Hotels

  • White Papers // Dec 2006

    Application of Business Process Execution Language to Scientific Workflows

    This paper investigates the use of the Business Process Execution Language for Web services (BPEL4WS/ BPEL) for managing scientific workflows. The complexity, unpredictability and inter-dependency of the components in a scientific workflow often demand great flexibility in a workflow-language in order to support; exception handling, recovery from uncertain situations, user...

    Provided By The Peninsula Hotels