University of Melbourne

Displaying 1-40 of 180 results

  • White Papers // Dec 2013

    Security in the Cloud Based Systems: Structure and Breaches

    Cloud Based Systems (CBSs) are increasing in the computing world. These systems derive their complexity due to both the disparate components and the diverse stake holders involved in them. The component wise security alone does not solve the problem of securing CBSs, but the stakeholder's computational space spanning across many...

    Provided By University of Melbourne

  • White Papers // Jul 2012

    Security and Compliance Testing Strategies for Cloud Computing

    Due to rapidly changing Information Technologies, it is becoming more expensive for companies/organizations to regularly update hardware and software, and also maintain a big IT department with highly technical staff. So many organizations are adopting cloud services to reduce the cost and increase the flexibility of their IT infrastructures. While...

    Provided By University of Melbourne

  • White Papers // May 2012

    Preemption-Aware Energy Management in Virtualized DataCenters

    Energy efficiency is one of the main challenges that datacenters are facing nowadays. A considerable portion of the consumed energy in these environments is wasted because of idling resources. To avoid wastage, offering services with variety of SLAs (with different prices and priorities) is a common practice. The question the...

    Provided By University of Melbourne

  • White Papers // Jan 2012

    Peer-to-Peer Networks for Content Sharing

    Peer-To-Peer (P2P) systems are popularly used as "File-swapping" networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Napster, Gnutella, and Fasttrack are three popular P2P systems. This paper presents a broad overview of P2P computing and focuses on content sharing...

    Provided By University of Melbourne

  • White Papers // Oct 2011

    Reliable Provisioning of Spot Instances for Compute-Intensive Applications

    Cloud computing providers are now offering their unused resources for leasing in the spot market, which has been considered the first step towards a full-fledged market economy for computational resources. Spot instances are Virtual Machines (VMs) available at lower prices than their standard on-demand counterparts. These VMs will run for...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    Contention-Aware Resource Management System in a Virtualized Grid Federation

    Several efforts have been made towards the development of architectures, mechanisms, and policies that enable resource allocation across several Grids. Recently, such federated Grids have applied lease-based and Virtual Machine-based approaches in allocating resources. Lease-based approach along with VMs impose new challenges to the resource management systems in federated Grids....

    Provided By University of Melbourne

  • White Papers // Sep 2011

    Statistical Modeling of Spot Instance Prices in Public Cloud Environments

    The surge in demand for utilizing public Cloud resources has introduced many trade-offs between price, performance and recently reliability. Amazon's Spot Instances (SIs) create a competitive bidding option for the public Cloud users at lower prices without providing reliability on services. It is generally believed that SIs reduce monetary cost...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    NetworkCloudSim: Modelling Parallel Applications in Cloud Simulations

    As interest in adopting Cloud computing for various applications is rapidly growing, it is important to understand how these applications and systems will perform when deployed on Clouds. Due to the scale and complexity of shared resources, it is often hard to analyze the performance of new scheduling and provisioning...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    SMICloud: A Framework for Comparing and Ranking Cloud Services

    With the growth of Cloud Computing, more and more companies are offering different cloud services. From the customer's point of view, it is always difficult to decide whose services they should use, based on users' requirements. Currently there is no software framework which can automatically index cloud providers based on...

    Provided By University of Melbourne

  • White Papers // Aug 2011

    Provisioning Spot Market Cloud Resources to Create Cost-Effective Virtual Clusters

    Infrastructure-as-a-Service providers are offering their unused resources in the form of variable-priced Virtual Machines (VMs), known as "Spot instances", at prices significantly lower than their standard fixed-priced resources. To lease spot instances, users specify a maximum price they are willing to pay per hour and VMs will run only when...

    Provided By University of Melbourne

  • White Papers // Aug 2011

    SLA-Based Resource Provisioning for Heterogeneous Workloads in a Virtualized Cloud Datacenter

    Efficient provisioning of resources is a challenging problem in cloud computing environments due to its dynamic nature and the need for supporting heterogeneous applications with different performance requirements. Currently, cloud datacenter providers either do not offer any performance guarantee or prefer static VM allocation over dynamic, which lead to inefficient...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Resource Provisioning Policies to Increase IaaS Provider's Profit in a Federated Cloud Environment

    Cloud Federation is a recent paradigm that helps Infrastructure as a Service (IaaS) providers to overcome resource limitation during spikes in demand for Virtual Machines (VMs) by outsourcing requests to other federation members. IaaS providers also have the option of terminating spot VMs, i.e, cheaper VMs that can be canceled...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Market-Oriented Cloud Computing and the Cloudbus Toolkit

    Cloud computing has penetrated the Information Technology industry deep enough to influence major companies to adopt it into their mainstream business. A strong thrust on the use of virtualization technology to realize Infrastructure-as-a-Service (IaaS) has led enterprises to leverage subscription-oriented computing capabilities of public Clouds for hosting their application services....

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Aneka Platform and QoS-Driven Resource Provisioning for Elastic Applications on Hybrid Clouds

    Cloud computing alters the way traditional software systems are built and run by introducing a utility-based model for delivering IT infrastructure, platforms, applications, and services. The consolidation of this new paradigm in both enterprises and academia demanded reconsideration in the way IT resources are used, so Cloud computing can be...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    Virtual Machine Provisioning Based on Analytical Performance and QoS in Cloud Computing Environments

    Cloud computing is the latest computing paradigm that delivers IT resources as services in which users are free from the burden of worrying about the low-level implementation or system administration details. However, there are significant problems that exist with regard to efficient provisioning and delivery of applications using Cloud-based IT...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    Performance Analysis of Preemption-Aware Scheduling in Multi-Cluster Grid Environments

    Resource provisioning is one of the main challenges in resource sharing environments such as multi-cluster Grids. In these environments each cluster serves requests from external (grid) users along with their own local users. The problem arises when there is not sufficient resources for local users (which have higher priority than...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    KLEIN: A New Family of Lightweight Block Ciphers

    Resource-efficient cryptographic primitives are essential for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, the authors describe a new family of lightweight block ciphers...

    Provided By University of Melbourne

  • White Papers // May 2011

    Energy-Aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing

    Cloud computing offers utility-oriented IT services to users worldwide. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. However, data centers hosting Cloud applications consume huge amounts of electrical energy, contributing to high operational costs and carbon footprints to the environment. Therefore,...

    Provided By University of Melbourne

  • White Papers // May 2011

    Green Cloud Framework for Improving Carbon Efficiency of Clouds

    The energy efficiency of ICT has become a major issue with the growing demand of cloud computing. More and more companies are investing in building large datacenters to host cloud services. These datacenters not only consume huge amount of energy but are also very complex in the infrastructure itself. Many...

    Provided By University of Melbourne

  • White Papers // May 2011

    Green Cloud Computing and Environmental Sustainability

    Cloud computing is a highly scalable and cost-effective infrastructure for running HPC, enterprise and web applications. However, the growing demand of cloud infrastructure has drastically increased the energy consumption of data centers, which has become a critical issue. High energy consumption not only translates to high operational cost, which reduces...

    Provided By University of Melbourne

  • White Papers // May 2011

    Platforms for Building and Deploying Applications for Cloud Computing

    Cloud computing is rapidly emerging as a new paradigm for delivering IT services as utility-oriented services on subscription basis. The rapid development of applications and their deployment in Cloud computing environments in efficient manner is a complex task. In this paper, the authors give a brief introduction to Cloud computing...

    Provided By University of Melbourne

  • White Papers // Apr 2011

    Deadline-Driven Provisioning of Resources for Scientific Applications in Hybrid Clouds With Aneka

    Scientific applications require large computing power, traditionally exceeding the available within the premises of a single institution. Therefore, clouds can be used to provide extra resources whenever required. For this vision to be achieved; however, it is required both policies defining when and how cloud resources are allocated to applications...

    Provided By University of Melbourne

  • White Papers // Mar 2011

    Aneka Cloud Application Platform and Its Integration With Windows Azure

    Aneka is an Application Platform-as-a-Service (Aneka PaaS) for Cloud Computing. It acts as a framework for building customized applications and deploying them on either public or private Clouds. One of the key features of Aneka is its support for provisioning resources on different public Cloud providers such as Amazon EC2,...

    Provided By University of Melbourne

  • White Papers // Mar 2011

    Consolidation And Price Discrimination In The Cable Television Industry

    This paper measures the impact of consolidation on cable television prices, product quality, profits and consumer welfare. The author estimates a multi-product monopoly model using panel data on cable menus and costs in Canada from 1990 to 1996. Using counterfactual simulations, the author finds mean consumer welfare rises with acquisitions,...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    A Grid Service Broker for Scheduling Distributed Data-Oriented Applications on Global Grids

    The next generation of scientific experiments and studies, popularly called as e-Science, is carried out by large collaborations of researchers distributed around the world engaged in analysis of huge collections of data generated by scientific instruments. Grid computing has emerged as an enabler for e-Science as it permits the creation...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Predicting Short-Term Interest Rates: Does Bayesian Model Averaging Provide Forecast Improvement?

    This paper examines the forecasting qualities of Bayesian Model Averaging (BMA) over a set of single factor models of short-term interest rates. Using weekly and high frequency data for the one-month Eurodollar rate, BMA produces predictive likelihoods that are considerably better than the majority of the short-rate models, but marginally...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Active Probing Using Packet Quartets

    A significant proportion of link bandwidth measurement methods are based on IP's ability to control the number of hops a packet can traverse along a route via the Time-To-Live (TTL) field of the IP header. A new delay variation based path model is introduced and used to analyze the fundamental...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Dynamically Scaling Applications in the Cloud

    Scalability is said to be one of the major advantages brought by the cloud paradigm and, more specifically, the one that makes it different to an "Advanced Outsourcing" solution. However, there are some important pending issues before making the dreamed automated scaling for applications come true. In this paper, the...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Querying and Updating Treebanks: A Critical Survey and Requirements Analysis

    Language technology makes extensive use of hierarchically annotated text and speech data. These databases are stored in flat files and manipulated using corpus specific query tool or scripts. While the size of these databases and the range of applications has grown rapidly in recent years, neither method for managing the...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Continuous Intersection Joins Over Moving Objects

    The continuous intersection join query is computationally expensive yet important for various applications on moving objects. No previous study has specifically addressed this query type. The authors can adopt a naive algorithm or extend an existing technique (TP-Join) to process the query. However, they compute the answer for either too...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    PathSensor: Towards Efficient Available Bandwidth Measurement

    Efficient and reliable available bandwidth measurement remains an important goal for many applications. Recently a new class of active probing techniques has emerged which has clear advantages over earlier approaches, prominent members being pathload and pathChirp. They are based on observing an increased separation of probe packets due to local...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    SOVoIP: True Convergence of Data and Voice Network

    Voice over Internet Protocol (VoIP) is the reality of future telephony provided over the Internet. In the process it is claimed that, voice and data networks are converging into one network. However, such claim only introduced new protocols for telephony on the Internet which are not truly interoperable with existing...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats

    The explosion of Online Social Networking (OSN) in recent years has caused damages to organisations due to leakage of information by their employees. Employees' social networking behaviour, whether accidental or intentional, provides an opportunity for Advanced Persistent Threats (APT) attackers to realise their social engineering techniques and undetectable zero-day exploits....

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Information Security Risk Assessment: Towards a Business Practice Perspective

    Information Security Risk Assessments (ISRAs) are of great importance for organisations. Current ISRA methods identify an organisation's security risks and provide a measured, analyzed security risk profile of critical information assets in order to build plans to treat risk. However, despite prevalent use in organisations today, current methods adopt a...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Organisational Learning and Incident Response: Promoting Effective Learning Through the Incident Response Process

    Effective response to information security incidents is a critical function of modern organisations. However, recent studies have indicated that organisations have adopted a narrow and technical view of Incident Response (IR), focusing on the immediate concern of detection and subsequent corrective actions. Although some reflection on the IR process may...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Measuring Information Flow in Networks of Stochastic Processes

    This paper addresses the problem of inferring circulation of information between nodes of a complex network. Observations at each node will be supposed to be realizations of stochastic processes. Recently introduced directed information is investigated and causal conditioning of directed information is shown to provide adequate solutions for the problem....

    Provided By University of Melbourne

  • White Papers // Dec 2010

    A Loglinear Tax And Transfer Function: Majority Voting And Optimal Rates

    This paper explores the use of a loglinear tax and transfer function, displaying increasing marginal and average tax rates along with a means-tested transfer payment. The two parameters are a breakeven income threshold, where the average tax rate is zero, and a tax parameter equivalent to the marginal tax rate...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Protecting Antiquities: A Role For Long- Term Leases?

    Most countries prohibit the export of certain antiquities. This practice often leads to illegal excavation and looting for the black market, which damages the items and compromises the archaeological record. The authors consider the prospect of long-term antiquity leases and sales contracts with a pre-arranged repurchase option. Such mechanisms could...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    The Lure Authority: Motivation And Incentive Effects Of Power

    Authority and power permeate political, social, and economic life but there is limited empirical knowledge about the motivational origins and consequences of authority. The authors experimentally study the motivation and incentive effects of authority in an authority-delegation game. Individuals exhibit a strong tendency to retain authority even when its delegation...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    A Simple Theory Of Trade And Unemployment In General Equilibrium

    The authors develop an open economy general equilibrium model, with auction-based directed search unemployment, to study the interactions of trade and unemployment. The theory ascribes all outcomes purely to the fundamentals of technology and endowment. If countries differ by endowment, trade makes both the unemployment rate and the rental in...

    Provided By University of Melbourne

  • White Papers // Oct 2009

    Failure Control in Multipath Route Tracing

    Traceroute is widely used to report the path packets take between two internet hosts, but the widespread deployment of load balancing routers breaks a basic assumption - that there is only a single such path. The authors specify an adaptive, stochastic probing algorithm, the Multipath Detection Algorithm (MDA), to report...

    Provided By University of Melbourne

  • White Papers // Oct 2011

    Reliable Provisioning of Spot Instances for Compute-Intensive Applications

    Cloud computing providers are now offering their unused resources for leasing in the spot market, which has been considered the first step towards a full-fledged market economy for computational resources. Spot instances are Virtual Machines (VMs) available at lower prices than their standard on-demand counterparts. These VMs will run for...

    Provided By University of Melbourne

  • White Papers // Nov 2010

    Towards Autonomic Detection of SLA Violations in Cloud Infrastructures

    Cloud computing has become a popular paradigm for implementing scalable on-demand computing. Self-manageable Cloud infrastructures are required in order to comply with users' requirements defined by Service Level Agreements (SLAs) and to minimize user interactions with the computing environment. Thus, adequate SLA monitoring strategies and timely detection of possible SLA...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Aneka Platform and QoS-Driven Resource Provisioning for Elastic Applications on Hybrid Clouds

    Cloud computing alters the way traditional software systems are built and run by introducing a utility-based model for delivering IT infrastructure, platforms, applications, and services. The consolidation of this new paradigm in both enterprises and academia demanded reconsideration in the way IT resources are used, so Cloud computing can be...

    Provided By University of Melbourne

  • White Papers // Jul 2009

    Building an Automated and Self-Configurable Emulation Testbed for Grid Applications

    Distributed systems such as grids are composed of geographically distributed computing elements that belong to multiple administrative domains and are controlled by multiple entities. Then, it is unlikely that testers are able to acquire repeatedly the same resources, for the same amount of time, and under the same network conditions,...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Resource Provisioning Policies to Increase IaaS Provider's Profit in a Federated Cloud Environment

    Cloud Federation is a recent paradigm that helps Infrastructure as a Service (IaaS) providers to overcome resource limitation during spikes in demand for Virtual Machines (VMs) by outsourcing requests to other federation members. IaaS providers also have the option of terminating spot VMs, i.e, cheaper VMs that can be canceled...

    Provided By University of Melbourne

  • White Papers // Jul 2009

    A Heuristic for Mapping Virtual Machines and Links in Emulation Testbeds

    Distributed system emulators provide a paramount platform for testing of network protocols and distributed applications in clusters and networks of workstations. However, to allow testers to benefit from these systems, it is necessary an efficient and automatic mapping of hundreds, or even thousands, of virtual nodes to physical hosts -...

    Provided By University of Melbourne

  • White Papers // Mar 2009

    Towards Self-Managed Adaptive Emulation of Grid Environments

    Distributed systems emulators built with the aid of virtualization tools allow testing of systems in a testbed whose number of real elements are orders of magnitude smaller than the number of virtual elements being tested. However, to allow testers to benefit from these systems, operation of the virtual environment should...

    Provided By University of Melbourne

  • White Papers // Aug 2009

    OpenPEX: An Open Provisioning and EXecution System for Virtual Machines

    Virtual Machines (VMs) have become capable enough to emulate full-featured physical machines in all aspects. Therefore, they have become the foundation not only for flexible data center infrastructure but also for commercial Infrastructure-as-a-Service (IaaS) solutions. However, current providers of virtual infrastructure offer simple mechanisms through which users can ask for...

    Provided By University of Melbourne

  • White Papers // Oct 2009

    Asymptotics and Power Allocation for State Estimation Over Fading Channels

    Wireless sensor networks are collections of sensors which can communicate with each other or to a central node or base station through wireless links. Potential uses include environment and infrastructure monitoring, healthcare and military applications, to name a few. Often these sensors will have limited energy and computational ability which...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    A Grid Service Broker for Scheduling Distributed Data-Oriented Applications on Global Grids

    The next generation of scientific experiments and studies, popularly called as e-Science, is carried out by large collaborations of researchers distributed around the world engaged in analysis of huge collections of data generated by scientific instruments. Grid computing has emerged as an enabler for e-Science as it permits the creation...

    Provided By University of Melbourne

  • White Papers // Jan 2012

    Peer-to-Peer Networks for Content Sharing

    Peer-To-Peer (P2P) systems are popularly used as "File-swapping" networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Napster, Gnutella, and Fasttrack are three popular P2P systems. This paper presents a broad overview of P2P computing and focuses on content sharing...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats

    The explosion of Online Social Networking (OSN) in recent years has caused damages to organisations due to leakage of information by their employees. Employees' social networking behaviour, whether accidental or intentional, provides an opportunity for Advanced Persistent Threats (APT) attackers to realise their social engineering techniques and undetectable zero-day exploits....

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Information Security Risk Assessment: Towards a Business Practice Perspective

    Information Security Risk Assessments (ISRAs) are of great importance for organisations. Current ISRA methods identify an organisation's security risks and provide a measured, analyzed security risk profile of critical information assets in order to build plans to treat risk. However, despite prevalent use in organisations today, current methods adopt a...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Organisational Learning and Incident Response: Promoting Effective Learning Through the Incident Response Process

    Effective response to information security incidents is a critical function of modern organisations. However, recent studies have indicated that organisations have adopted a narrow and technical view of Incident Response (IR), focusing on the immediate concern of detection and subsequent corrective actions. Although some reflection on the IR process may...

    Provided By University of Melbourne

  • White Papers // Feb 2010

    Tactical Analysis of Attack in Physical and Digital Security Incidents: Towards a Model of Asymmetry

    Asymmetric warfare is frequently described as a conflict where 'Weaker' parties aim to offset their relatively inadequate resources by using particular strategies and tactics to their advantage. This paper develops a concept model of asymmetric warfare that represents the leverage available to the 'Weaker' party over the 'Stronger' party simply...

    Provided By University of Melbourne

  • White Papers // Oct 2008

    Rescheduling Co-Allocation Requests Based on Flexible Advance Reservations and Processor Remapping

    Large-scale computing environments, such as TeraGrid, Distributed ASCI Supercomputer (DAS), and Grid'5000, have been using resource co-allocation to execute applications on multiple sites. Their schedulers work with requests that contain imprecise estimations provided by users. This lack of accuracy generates fragments inside the scheduling queues that can be filled by...

    Provided By University of Melbourne

  • White Papers // Sep 2010

    Downlink Beamforming With Transmit-Side Channel Correlation: A Large System Analysis

    In this paper, the authors consider a large system analysis of Regularized Channel Inversion (RCI) beamforming for MISO Broadcast Channels (BC) with transmit-side channel correlation. In the analysis, they assume that both the number of users and transmit antennas grow unbounded with a constant ratio. They also assume that the...

    Provided By University of Melbourne

  • White Papers // Oct 2009

    Counter Availability and Characteristics for Feed-Forward Based Synchronization

    The availability of hardware counters in computers is essential both to the applications in charge of timekeeping, and those in need of accurate time-stamping. Newer counters are now supported by open source operating systems, but the access interfaces are unnecessarily restricted, and in particular fail to satisfy the needs of...

    Provided By University of Melbourne

  • White Papers // May 2009

    Dynamic Allocation of Subcarriers and Transmit Powers in an OFDMA Cellular Network

    This paper considers the problem of minimizing outage probabilities in the downlink of a multiuser, multicell OFDMA cellular network with frequency selective fading, imperfect channel state information and frequency hopping. The task is to determine the allocation of powers and subcarriers for users to ensure that the user outage probabilities...

    Provided By University of Melbourne

  • White Papers // Jan 2009

    Mitigation Strategy for Transmission Impairments in Millimeterwave Radio-Over-Fiber Networks

    Hybrid fiber - wireless networks for fixed wireless access operating in the millimeter-wave (mm-wave) frequency region have been actively pursued to provide ultrahigh bandwidth for untethered connectivity. Moving the radio operating frequency into the mm-wave region overcomes the spectral congestion in the lower microwave region and is also capable of...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    KLEIN: A New Family of Lightweight Block Ciphers

    Resource-efficient cryptographic primitives are essential for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, the authors describe a new family of lightweight block ciphers...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    Performance Analysis of Preemption-Aware Scheduling in Multi-Cluster Grid Environments

    Resource provisioning is one of the main challenges in resource sharing environments such as multi-cluster Grids. In these environments each cluster serves requests from external (grid) users along with their own local users. The problem arises when there is not sufficient resources for local users (which have higher priority than...

    Provided By University of Melbourne

  • White Papers // May 2012

    Preemption-Aware Energy Management in Virtualized DataCenters

    Energy efficiency is one of the main challenges that datacenters are facing nowadays. A considerable portion of the consumed energy in these environments is wasted because of idling resources. To avoid wastage, offering services with variety of SLAs (with different prices and priorities) is a common practice. The question the...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    Contention-Aware Resource Management System in a Virtualized Grid Federation

    Several efforts have been made towards the development of architectures, mechanisms, and policies that enable resource allocation across several Grids. Recently, such federated Grids have applied lease-based and Virtual Machine-based approaches in allocating resources. Lease-based approach along with VMs impose new challenges to the resource management systems in federated Grids....

    Provided By University of Melbourne

  • White Papers // Jul 2012

    Security and Compliance Testing Strategies for Cloud Computing

    Due to rapidly changing Information Technologies, it is becoming more expensive for companies/organizations to regularly update hardware and software, and also maintain a big IT department with highly technical staff. So many organizations are adopting cloud services to reduce the cost and increase the flexibility of their IT infrastructures. While...

    Provided By University of Melbourne

  • White Papers // Mar 2009

    Low-Paid Employment And Unemployment Dynamics In Australia

    This paper uses longitudinal data from the Household, Income and Labor Dynamics in Australia (or HILDA) Survey to examine the extent to which the relatively high rates of transition from low-paid employment into unemployment are the result of disadvantageous personal characteristics or are instead a function of low-paid work itself....

    Provided By University of Melbourne

  • White Papers // Mar 2009

    Imperfect Quality Information In A Quality-Competitive Hospital Market

    The authors examine the implications of policies to improve information about the qualities of profit seeking duopoly hospitals which face the same regulated price and compete on quality. They show that if the hospital costs of quality are similar then better information increases the quality of both hospitals. However if...

    Provided By University of Melbourne

  • White Papers // Mar 2009

    Measuring Poverty And Social Exclusion In Australia: A Proposed Multidimensional Framework For Identifying Socio-Economic Disadvantage

    The authors propose a framework for measuring social exclusion in Australia and discuss a number of issues that need to be resolved in order to arrive at valid and useful indicators or measures. To do this they first provide a general overview of international developments in the measurement of poverty...

    Provided By University of Melbourne

  • White Papers // Mar 2009

    Linking A Dynamic CGE Model And A Microsimulation Model: Climate Change Mitigation Policies And Income Distribution In Australia

    This paper extends the 'Top-down' framework, introduced by Robilliard et al. (2001), to link a Computable General Equilibrium (CGE) model to a micro simulation model. The proposed approach allows the linking of a micro simulation model to a dynamic, and not simply a static, CGE model by enabling the micro...

    Provided By University of Melbourne

  • White Papers // Dec 2008

    The World Credit Crisis: Understanding It, And What To Do

    This paper expounds a story in four stages to explain the world credit crisis, namely: too much credit - an international perspective, too much risk - reaction to low real interest rate, the fatal flaw - the new complex financial instruments, and the panic-bank lending dries up. The paper also...

    Provided By University of Melbourne

  • White Papers // Nov 2008

    Retirement Expectations And Labour Force Transitions: The Experience Of The Baby Boomer Generation

    This paper examines the retirement intentions and labor force participation patterns of Australian baby boomers. It has two main specific objectives. First, to describe the retirement intentions of baby boomers: how many are already in a transition job; how many intend to retire gradually; and how long they intend to...

    Provided By University of Melbourne

  • White Papers // Nov 2008

    Australia?s Retirement Income System: Historical Development And Effects Of Recent Reforms

    This paper describes the current retirement system in Australia and provides a summary of the historical development of the Australian retirement system, with special emphasis placed on the recent reform initiatives designed to increase labor force participation of mature age Australians, provide higher levels of savings for retirement, and reduce...

    Provided By University of Melbourne

  • White Papers // Oct 2008

    Phillips Curve And The Equilibrium Rate Of Unemployment

    A time-varying Phillips curve was estimated as a means to examine the changing nature of the negative relationship between wage inflation and the unemployment rate in Australia. The implied equilibrium unemployment rate was generated and the analysis showed the important role played by variations in the slope of the Phillips...

    Provided By University of Melbourne

  • White Papers // Oct 2008

    Minimum Wages And Employment: Reconsidering The Use Of A Time-Series Approach As An Evaluation Tool

    The time-series approach used in the minimum wage literature essentially aims to estimate a treatment effect of increasing the minimum wage. In this paper, the authors employ a novel approach based on aggregate time-series data that allows determining if minimum wage changes have significant effects on employment. This involves the...

    Provided By University of Melbourne

  • White Papers // Sep 2007

    In The Shadow Of The China?Australia FTA Negotiations: What Australian Business Thinks About IP

    This paper collated responses from a survey of over 2,100 businesses across Australia to assess the extent of both their business dealings with China and their commercial interest in IP. The survey results reveal that among Australian businesses which have direct business dealings with China, IP issues (registration, examination and...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Predicting Short-Term Interest Rates: Does Bayesian Model Averaging Provide Forecast Improvement?

    This paper examines the forecasting qualities of Bayesian Model Averaging (BMA) over a set of single factor models of short-term interest rates. Using weekly and high frequency data for the one-month Eurodollar rate, BMA produces predictive likelihoods that are considerably better than the majority of the short-rate models, but marginally...

    Provided By University of Melbourne

  • White Papers // Jan 2009

    Measuring Trade Union Membership Status In The HILDA Survey

    The HILDA Survey is no exception. It has come to the attention, however, that the population weighted estimates of trade union membership from the HILDA Survey are considerably above the estimates reported each year by the Australian Bureau of Statistics (ABS) from its Employee Earnings, Benefits and Trade Union Membership...

    Provided By University of Melbourne

  • White Papers // Mar 2009

    Quality Of The Occupation And Industry Coding In The HILDA Survey

    Each year, respondents to the HILDA Survey are asked to describe the occupation and industry of their current job and / or their previous job. These verbatim responses are then coded to standard occupation and industry code frames. Analysis of the recoding work has lead to an investigation of the...

    Provided By University of Melbourne

  • White Papers // Apr 2010

    Assessing The Quality Of The Expenditure Data Collected In The Self-Completion Questionnaire

    The HILDA Survey is, in part, designed to help analyze living standards in Australia. It thus follows that consideration needs to be given to collecting data on not just income, which is standard in socio-economic surveys, but on household expenditure. From the very inception of the HILDA Survey, consideration has...

    Provided By University of Melbourne