University of Melbourne

Displaying 1-40 of 171 results

  • White Papers // Dec 2013

    Security in the Cloud Based Systems: Structure and Breaches

    Cloud Based Systems (CBSs) are increasing in the computing world. These systems derive their complexity due to both the disparate components and the diverse stake holders involved in them. The component wise security alone does not solve the problem of securing CBSs, but the stakeholder's computational space spanning across many...

    Provided By University of Melbourne

  • White Papers // Jul 2012

    Security and Compliance Testing Strategies for Cloud Computing

    Due to rapidly changing Information Technologies, it is becoming more expensive for companies/organizations to regularly update hardware and software, and also maintain a big IT department with highly technical staff. So many organizations are adopting cloud services to reduce the cost and increase the flexibility of their IT infrastructures. While...

    Provided By University of Melbourne

  • White Papers // May 2012

    Preemption-Aware Energy Management in Virtualized DataCenters

    Energy efficiency is one of the main challenges that datacenters are facing nowadays. A considerable portion of the consumed energy in these environments is wasted because of idling resources. To avoid wastage, offering services with variety of SLAs (with different prices and priorities) is a common practice. The question the...

    Provided By University of Melbourne

  • White Papers // Jan 2012

    Peer-to-Peer Networks for Content Sharing

    Peer-To-Peer (P2P) systems are popularly used as "File-swapping" networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Napster, Gnutella, and Fasttrack are three popular P2P systems. This paper presents a broad overview of P2P computing and focuses on content sharing...

    Provided By University of Melbourne

  • White Papers // Oct 2011

    Reliable Provisioning of Spot Instances for Compute-Intensive Applications

    Cloud computing providers are now offering their unused resources for leasing in the spot market, which has been considered the first step towards a full-fledged market economy for computational resources. Spot instances are Virtual Machines (VMs) available at lower prices than their standard on-demand counterparts. These VMs will run for...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    Contention-Aware Resource Management System in a Virtualized Grid Federation

    Several efforts have been made towards the development of architectures, mechanisms, and policies that enable resource allocation across several Grids. Recently, such federated Grids have applied lease-based and Virtual Machine-based approaches in allocating resources. Lease-based approach along with VMs impose new challenges to the resource management systems in federated Grids....

    Provided By University of Melbourne

  • White Papers // Sep 2011

    Statistical Modeling of Spot Instance Prices in Public Cloud Environments

    The surge in demand for utilizing public Cloud resources has introduced many trade-offs between price, performance and recently reliability. Amazon's Spot Instances (SIs) create a competitive bidding option for the public Cloud users at lower prices without providing reliability on services. It is generally believed that SIs reduce monetary cost...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    NetworkCloudSim: Modelling Parallel Applications in Cloud Simulations

    As interest in adopting Cloud computing for various applications is rapidly growing, it is important to understand how these applications and systems will perform when deployed on Clouds. Due to the scale and complexity of shared resources, it is often hard to analyze the performance of new scheduling and provisioning...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    SMICloud: A Framework for Comparing and Ranking Cloud Services

    With the growth of Cloud Computing, more and more companies are offering different cloud services. From the customer's point of view, it is always difficult to decide whose services they should use, based on users' requirements. Currently there is no software framework which can automatically index cloud providers based on...

    Provided By University of Melbourne

  • White Papers // Aug 2011

    Provisioning Spot Market Cloud Resources to Create Cost-Effective Virtual Clusters

    Infrastructure-as-a-Service providers are offering their unused resources in the form of variable-priced Virtual Machines (VMs), known as "Spot instances", at prices significantly lower than their standard fixed-priced resources. To lease spot instances, users specify a maximum price they are willing to pay per hour and VMs will run only when...

    Provided By University of Melbourne

  • White Papers // Aug 2011

    SLA-Based Resource Provisioning for Heterogeneous Workloads in a Virtualized Cloud Datacenter

    Efficient provisioning of resources is a challenging problem in cloud computing environments due to its dynamic nature and the need for supporting heterogeneous applications with different performance requirements. Currently, cloud datacenter providers either do not offer any performance guarantee or prefer static VM allocation over dynamic, which lead to inefficient...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Resource Provisioning Policies to Increase IaaS Provider's Profit in a Federated Cloud Environment

    Cloud Federation is a recent paradigm that helps Infrastructure as a Service (IaaS) providers to overcome resource limitation during spikes in demand for Virtual Machines (VMs) by outsourcing requests to other federation members. IaaS providers also have the option of terminating spot VMs, i.e, cheaper VMs that can be canceled...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Market-Oriented Cloud Computing and the Cloudbus Toolkit

    Cloud computing has penetrated the Information Technology industry deep enough to influence major companies to adopt it into their mainstream business. A strong thrust on the use of virtualization technology to realize Infrastructure-as-a-Service (IaaS) has led enterprises to leverage subscription-oriented computing capabilities of public Clouds for hosting their application services....

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Aneka Platform and QoS-Driven Resource Provisioning for Elastic Applications on Hybrid Clouds

    Cloud computing alters the way traditional software systems are built and run by introducing a utility-based model for delivering IT infrastructure, platforms, applications, and services. The consolidation of this new paradigm in both enterprises and academia demanded reconsideration in the way IT resources are used, so Cloud computing can be...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    Virtual Machine Provisioning Based on Analytical Performance and QoS in Cloud Computing Environments

    Cloud computing is the latest computing paradigm that delivers IT resources as services in which users are free from the burden of worrying about the low-level implementation or system administration details. However, there are significant problems that exist with regard to efficient provisioning and delivery of applications using Cloud-based IT...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    Performance Analysis of Preemption-Aware Scheduling in Multi-Cluster Grid Environments

    Resource provisioning is one of the main challenges in resource sharing environments such as multi-cluster Grids. In these environments each cluster serves requests from external (grid) users along with their own local users. The problem arises when there is not sufficient resources for local users (which have higher priority than...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    KLEIN: A New Family of Lightweight Block Ciphers

    Resource-efficient cryptographic primitives are essential for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, the authors describe a new family of lightweight block ciphers...

    Provided By University of Melbourne

  • White Papers // May 2011

    Energy-Aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing

    Cloud computing offers utility-oriented IT services to users worldwide. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. However, data centers hosting Cloud applications consume huge amounts of electrical energy, contributing to high operational costs and carbon footprints to the environment. Therefore,...

    Provided By University of Melbourne

  • White Papers // May 2011

    Green Cloud Framework for Improving Carbon Efficiency of Clouds

    The energy efficiency of ICT has become a major issue with the growing demand of cloud computing. More and more companies are investing in building large datacenters to host cloud services. These datacenters not only consume huge amount of energy but are also very complex in the infrastructure itself. Many...

    Provided By University of Melbourne

  • White Papers // May 2011

    Green Cloud Computing and Environmental Sustainability

    Cloud computing is a highly scalable and cost-effective infrastructure for running HPC, enterprise and web applications. However, the growing demand of cloud infrastructure has drastically increased the energy consumption of data centers, which has become a critical issue. High energy consumption not only translates to high operational cost, which reduces...

    Provided By University of Melbourne

  • White Papers // May 2011

    Platforms for Building and Deploying Applications for Cloud Computing

    Cloud computing is rapidly emerging as a new paradigm for delivering IT services as utility-oriented services on subscription basis. The rapid development of applications and their deployment in Cloud computing environments in efficient manner is a complex task. In this paper, the authors give a brief introduction to Cloud computing...

    Provided By University of Melbourne

  • White Papers // Apr 2011

    Deadline-Driven Provisioning of Resources for Scientific Applications in Hybrid Clouds With Aneka

    Scientific applications require large computing power, traditionally exceeding the available within the premises of a single institution. Therefore, clouds can be used to provide extra resources whenever required. For this vision to be achieved; however, it is required both policies defining when and how cloud resources are allocated to applications...

    Provided By University of Melbourne

  • White Papers // Mar 2011

    Aneka Cloud Application Platform and Its Integration With Windows Azure

    Aneka is an Application Platform-as-a-Service (Aneka PaaS) for Cloud Computing. It acts as a framework for building customized applications and deploying them on either public or private Clouds. One of the key features of Aneka is its support for provisioning resources on different public Cloud providers such as Amazon EC2,...

    Provided By University of Melbourne

  • White Papers // Mar 2011

    Consolidation And Price Discrimination In The Cable Television Industry

    This paper measures the impact of consolidation on cable television prices, product quality, profits and consumer welfare. The author estimates a multi-product monopoly model using panel data on cable menus and costs in Canada from 1990 to 1996. Using counterfactual simulations, the author finds mean consumer welfare rises with acquisitions,...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    A Grid Service Broker for Scheduling Distributed Data-Oriented Applications on Global Grids

    The next generation of scientific experiments and studies, popularly called as e-Science, is carried out by large collaborations of researchers distributed around the world engaged in analysis of huge collections of data generated by scientific instruments. Grid computing has emerged as an enabler for e-Science as it permits the creation...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Predicting Short-Term Interest Rates: Does Bayesian Model Averaging Provide Forecast Improvement?

    This paper examines the forecasting qualities of Bayesian Model Averaging (BMA) over a set of single factor models of short-term interest rates. Using weekly and high frequency data for the one-month Eurodollar rate, BMA produces predictive likelihoods that are considerably better than the majority of the short-rate models, but marginally...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Active Probing Using Packet Quartets

    A significant proportion of link bandwidth measurement methods are based on IP's ability to control the number of hops a packet can traverse along a route via the Time-To-Live (TTL) field of the IP header. A new delay variation based path model is introduced and used to analyze the fundamental...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Dynamically Scaling Applications in the Cloud

    Scalability is said to be one of the major advantages brought by the cloud paradigm and, more specifically, the one that makes it different to an "Advanced Outsourcing" solution. However, there are some important pending issues before making the dreamed automated scaling for applications come true. In this paper, the...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Querying and Updating Treebanks: A Critical Survey and Requirements Analysis

    Language technology makes extensive use of hierarchically annotated text and speech data. These databases are stored in flat files and manipulated using corpus specific query tool or scripts. While the size of these databases and the range of applications has grown rapidly in recent years, neither method for managing the...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Continuous Intersection Joins Over Moving Objects

    The continuous intersection join query is computationally expensive yet important for various applications on moving objects. No previous study has specifically addressed this query type. The authors can adopt a naive algorithm or extend an existing technique (TP-Join) to process the query. However, they compute the answer for either too...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    PathSensor: Towards Efficient Available Bandwidth Measurement

    Efficient and reliable available bandwidth measurement remains an important goal for many applications. Recently a new class of active probing techniques has emerged which has clear advantages over earlier approaches, prominent members being pathload and pathChirp. They are based on observing an increased separation of probe packets due to local...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    SOVoIP: True Convergence of Data and Voice Network

    Voice over Internet Protocol (VoIP) is the reality of future telephony provided over the Internet. In the process it is claimed that, voice and data networks are converging into one network. However, such claim only introduced new protocols for telephony on the Internet which are not truly interoperable with existing...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats

    The explosion of Online Social Networking (OSN) in recent years has caused damages to organisations due to leakage of information by their employees. Employees' social networking behaviour, whether accidental or intentional, provides an opportunity for Advanced Persistent Threats (APT) attackers to realise their social engineering techniques and undetectable zero-day exploits....

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Information Security Risk Assessment: Towards a Business Practice Perspective

    Information Security Risk Assessments (ISRAs) are of great importance for organisations. Current ISRA methods identify an organisation's security risks and provide a measured, analyzed security risk profile of critical information assets in order to build plans to treat risk. However, despite prevalent use in organisations today, current methods adopt a...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Organisational Learning and Incident Response: Promoting Effective Learning Through the Incident Response Process

    Effective response to information security incidents is a critical function of modern organisations. However, recent studies have indicated that organisations have adopted a narrow and technical view of Incident Response (IR), focusing on the immediate concern of detection and subsequent corrective actions. Although some reflection on the IR process may...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Measuring Information Flow in Networks of Stochastic Processes

    This paper addresses the problem of inferring circulation of information between nodes of a complex network. Observations at each node will be supposed to be realizations of stochastic processes. Recently introduced directed information is investigated and causal conditioning of directed information is shown to provide adequate solutions for the problem....

    Provided By University of Melbourne

  • White Papers // Dec 2010

    A Loglinear Tax And Transfer Function: Majority Voting And Optimal Rates

    This paper explores the use of a loglinear tax and transfer function, displaying increasing marginal and average tax rates along with a means-tested transfer payment. The two parameters are a breakeven income threshold, where the average tax rate is zero, and a tax parameter equivalent to the marginal tax rate...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Protecting Antiquities: A Role For Long- Term Leases?

    Most countries prohibit the export of certain antiquities. This practice often leads to illegal excavation and looting for the black market, which damages the items and compromises the archaeological record. The authors consider the prospect of long-term antiquity leases and sales contracts with a pre-arranged repurchase option. Such mechanisms could...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    The Lure Authority: Motivation And Incentive Effects Of Power

    Authority and power permeate political, social, and economic life but there is limited empirical knowledge about the motivational origins and consequences of authority. The authors experimentally study the motivation and incentive effects of authority in an authority-delegation game. Individuals exhibit a strong tendency to retain authority even when its delegation...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    A Simple Theory Of Trade And Unemployment In General Equilibrium

    The authors develop an open economy general equilibrium model, with auction-based directed search unemployment, to study the interactions of trade and unemployment. The theory ascribes all outcomes purely to the fundamentals of technology and endowment. If countries differ by endowment, trade makes both the unemployment rate and the rental in...

    Provided By University of Melbourne