University of Melbourne

Displaying 1-40 of 206 results

  • White Papers // Dec 2013

    Security in the Cloud Based Systems: Structure and Breaches

    Cloud Based Systems (CBSs) are increasing in the computing world. These systems derive their complexity due to both the disparate components and the diverse stake holders involved in them. The component wise security alone does not solve the problem of securing CBSs, but the stakeholder's computational space spanning across many...

    Provided By University of Melbourne

  • White Papers // Jul 2012

    Security and Compliance Testing Strategies for Cloud Computing

    Due to rapidly changing Information Technologies, it is becoming more expensive for companies/organizations to regularly update hardware and software, and also maintain a big IT department with highly technical staff. So many organizations are adopting cloud services to reduce the cost and increase the flexibility of their IT infrastructures. While...

    Provided By University of Melbourne

  • White Papers // May 2012

    Preemption-Aware Energy Management in Virtualized DataCenters

    Energy efficiency is one of the main challenges that datacenters are facing nowadays. A considerable portion of the consumed energy in these environments is wasted because of idling resources. To avoid wastage, offering services with variety of SLAs (with different prices and priorities) is a common practice. The question the...

    Provided By University of Melbourne

  • White Papers // Jan 2012

    Peer-to-Peer Networks for Content Sharing

    Peer-To-Peer (P2P) systems are popularly used as "File-swapping" networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Napster, Gnutella, and Fasttrack are three popular P2P systems. This paper presents a broad overview of P2P computing and focuses on content sharing...

    Provided By University of Melbourne

  • White Papers // Oct 2011

    Reliable Provisioning of Spot Instances for Compute-Intensive Applications

    Cloud computing providers are now offering their unused resources for leasing in the spot market, which has been considered the first step towards a full-fledged market economy for computational resources. Spot instances are Virtual Machines (VMs) available at lower prices than their standard on-demand counterparts. These VMs will run for...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    Contention-Aware Resource Management System in a Virtualized Grid Federation

    Several efforts have been made towards the development of architectures, mechanisms, and policies that enable resource allocation across several Grids. Recently, such federated Grids have applied lease-based and Virtual Machine-based approaches in allocating resources. Lease-based approach along with VMs impose new challenges to the resource management systems in federated Grids....

    Provided By University of Melbourne

  • White Papers // Sep 2011

    Statistical Modeling of Spot Instance Prices in Public Cloud Environments

    The surge in demand for utilizing public Cloud resources has introduced many trade-offs between price, performance and recently reliability. Amazon's Spot Instances (SIs) create a competitive bidding option for the public Cloud users at lower prices without providing reliability on services. It is generally believed that SIs reduce monetary cost...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    NetworkCloudSim: Modelling Parallel Applications in Cloud Simulations

    As interest in adopting Cloud computing for various applications is rapidly growing, it is important to understand how these applications and systems will perform when deployed on Clouds. Due to the scale and complexity of shared resources, it is often hard to analyze the performance of new scheduling and provisioning...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    SMICloud: A Framework for Comparing and Ranking Cloud Services

    With the growth of Cloud Computing, more and more companies are offering different cloud services. From the customer's point of view, it is always difficult to decide whose services they should use, based on users' requirements. Currently there is no software framework which can automatically index cloud providers based on...

    Provided By University of Melbourne

  • White Papers // Aug 2011

    Provisioning Spot Market Cloud Resources to Create Cost-Effective Virtual Clusters

    Infrastructure-as-a-Service providers are offering their unused resources in the form of variable-priced Virtual Machines (VMs), known as "Spot instances", at prices significantly lower than their standard fixed-priced resources. To lease spot instances, users specify a maximum price they are willing to pay per hour and VMs will run only when...

    Provided By University of Melbourne

  • White Papers // Aug 2011

    SLA-Based Resource Provisioning for Heterogeneous Workloads in a Virtualized Cloud Datacenter

    Efficient provisioning of resources is a challenging problem in cloud computing environments due to its dynamic nature and the need for supporting heterogeneous applications with different performance requirements. Currently, cloud datacenter providers either do not offer any performance guarantee or prefer static VM allocation over dynamic, which lead to inefficient...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Resource Provisioning Policies to Increase IaaS Provider's Profit in a Federated Cloud Environment

    Cloud Federation is a recent paradigm that helps Infrastructure as a Service (IaaS) providers to overcome resource limitation during spikes in demand for Virtual Machines (VMs) by outsourcing requests to other federation members. IaaS providers also have the option of terminating spot VMs, i.e, cheaper VMs that can be canceled...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Market-Oriented Cloud Computing and the Cloudbus Toolkit

    Cloud computing has penetrated the Information Technology industry deep enough to influence major companies to adopt it into their mainstream business. A strong thrust on the use of virtualization technology to realize Infrastructure-as-a-Service (IaaS) has led enterprises to leverage subscription-oriented computing capabilities of public Clouds for hosting their application services....

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Aneka Platform and QoS-Driven Resource Provisioning for Elastic Applications on Hybrid Clouds

    Cloud computing alters the way traditional software systems are built and run by introducing a utility-based model for delivering IT infrastructure, platforms, applications, and services. The consolidation of this new paradigm in both enterprises and academia demanded reconsideration in the way IT resources are used, so Cloud computing can be...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    Virtual Machine Provisioning Based on Analytical Performance and QoS in Cloud Computing Environments

    Cloud computing is the latest computing paradigm that delivers IT resources as services in which users are free from the burden of worrying about the low-level implementation or system administration details. However, there are significant problems that exist with regard to efficient provisioning and delivery of applications using Cloud-based IT...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    Performance Analysis of Preemption-Aware Scheduling in Multi-Cluster Grid Environments

    Resource provisioning is one of the main challenges in resource sharing environments such as multi-cluster Grids. In these environments each cluster serves requests from external (grid) users along with their own local users. The problem arises when there is not sufficient resources for local users (which have higher priority than...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    KLEIN: A New Family of Lightweight Block Ciphers

    Resource-efficient cryptographic primitives are essential for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, the authors describe a new family of lightweight block ciphers...

    Provided By University of Melbourne

  • White Papers // May 2011

    Energy-Aware Resource Allocation Heuristics for Efficient Management of Data Centers for Cloud Computing

    Cloud computing offers utility-oriented IT services to users worldwide. Based on a pay-as-you-go model, it enables hosting of pervasive applications from consumer, scientific, and business domains. However, data centers hosting Cloud applications consume huge amounts of electrical energy, contributing to high operational costs and carbon footprints to the environment. Therefore,...

    Provided By University of Melbourne

  • White Papers // May 2011

    Green Cloud Framework for Improving Carbon Efficiency of Clouds

    The energy efficiency of ICT has become a major issue with the growing demand of cloud computing. More and more companies are investing in building large datacenters to host cloud services. These datacenters not only consume huge amount of energy but are also very complex in the infrastructure itself. Many...

    Provided By University of Melbourne

  • White Papers // May 2011

    Green Cloud Computing and Environmental Sustainability

    Cloud computing is a highly scalable and cost-effective infrastructure for running HPC, enterprise and web applications. However, the growing demand of cloud infrastructure has drastically increased the energy consumption of data centers, which has become a critical issue. High energy consumption not only translates to high operational cost, which reduces...

    Provided By University of Melbourne

  • White Papers // May 2011

    Platforms for Building and Deploying Applications for Cloud Computing

    Cloud computing is rapidly emerging as a new paradigm for delivering IT services as utility-oriented services on subscription basis. The rapid development of applications and their deployment in Cloud computing environments in efficient manner is a complex task. In this paper, the authors give a brief introduction to Cloud computing...

    Provided By University of Melbourne

  • White Papers // Apr 2011

    Deadline-Driven Provisioning of Resources for Scientific Applications in Hybrid Clouds With Aneka

    Scientific applications require large computing power, traditionally exceeding the available within the premises of a single institution. Therefore, clouds can be used to provide extra resources whenever required. For this vision to be achieved; however, it is required both policies defining when and how cloud resources are allocated to applications...

    Provided By University of Melbourne

  • White Papers // Mar 2011

    Aneka Cloud Application Platform and Its Integration With Windows Azure

    Aneka is an Application Platform-as-a-Service (Aneka PaaS) for Cloud Computing. It acts as a framework for building customized applications and deploying them on either public or private Clouds. One of the key features of Aneka is its support for provisioning resources on different public Cloud providers such as Amazon EC2,...

    Provided By University of Melbourne

  • White Papers // Mar 2011

    Consolidation And Price Discrimination In The Cable Television Industry

    This paper measures the impact of consolidation on cable television prices, product quality, profits and consumer welfare. The author estimates a multi-product monopoly model using panel data on cable menus and costs in Canada from 1990 to 1996. Using counterfactual simulations, the author finds mean consumer welfare rises with acquisitions,...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    A Grid Service Broker for Scheduling Distributed Data-Oriented Applications on Global Grids

    The next generation of scientific experiments and studies, popularly called as e-Science, is carried out by large collaborations of researchers distributed around the world engaged in analysis of huge collections of data generated by scientific instruments. Grid computing has emerged as an enabler for e-Science as it permits the creation...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    SOVoIP: True Convergence of Data and Voice Network

    Voice over Internet Protocol (VoIP) is the reality of future telephony provided over the Internet. In the process it is claimed that, voice and data networks are converging into one network. However, such claim only introduced new protocols for telephony on the Internet which are not truly interoperable with existing...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Predicting Short-Term Interest Rates: Does Bayesian Model Averaging Provide Forecast Improvement?

    This paper examines the forecasting qualities of Bayesian Model Averaging (BMA) over a set of single factor models of short-term interest rates. Using weekly and high frequency data for the one-month Eurodollar rate, BMA produces predictive likelihoods that are considerably better than the majority of the short-rate models, but marginally...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Querying and Updating Treebanks: A Critical Survey and Requirements Analysis

    Language technology makes extensive use of hierarchically annotated text and speech data. These databases are stored in flat files and manipulated using corpus specific query tool or scripts. While the size of these databases and the range of applications has grown rapidly in recent years, neither method for managing the...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Continuous Intersection Joins Over Moving Objects

    The continuous intersection join query is computationally expensive yet important for various applications on moving objects. No previous study has specifically addressed this query type. The authors can adopt a naive algorithm or extend an existing technique (TP-Join) to process the query. However, they compute the answer for either too...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    PathSensor: Towards Efficient Available Bandwidth Measurement

    Efficient and reliable available bandwidth measurement remains an important goal for many applications. Recently a new class of active probing techniques has emerged which has clear advantages over earlier approaches, prominent members being pathload and pathChirp. They are based on observing an increased separation of probe packets due to local...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Dynamically Scaling Applications in the Cloud

    Scalability is said to be one of the major advantages brought by the cloud paradigm and, more specifically, the one that makes it different to an "Advanced Outsourcing" solution. However, there are some important pending issues before making the dreamed automated scaling for applications come true. In this paper, the...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    Active Probing Using Packet Quartets

    A significant proportion of link bandwidth measurement methods are based on IP's ability to control the number of hops a packet can traverse along a route via the Time-To-Live (TTL) field of the IP header. A new delay variation based path model is introduced and used to analyze the fundamental...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats

    The explosion of Online Social Networking (OSN) in recent years has caused damages to organisations due to leakage of information by their employees. Employees' social networking behaviour, whether accidental or intentional, provides an opportunity for Advanced Persistent Threats (APT) attackers to realise their social engineering techniques and undetectable zero-day exploits....

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Information Security Risk Assessment: Towards a Business Practice Perspective

    Information Security Risk Assessments (ISRAs) are of great importance for organisations. Current ISRA methods identify an organisation's security risks and provide a measured, analyzed security risk profile of critical information assets in order to build plans to treat risk. However, despite prevalent use in organisations today, current methods adopt a...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Organisational Learning and Incident Response: Promoting Effective Learning Through the Incident Response Process

    Effective response to information security incidents is a critical function of modern organisations. However, recent studies have indicated that organisations have adopted a narrow and technical view of Incident Response (IR), focusing on the immediate concern of detection and subsequent corrective actions. Although some reflection on the IR process may...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Measuring Information Flow in Networks of Stochastic Processes

    This paper addresses the problem of inferring circulation of information between nodes of a complex network. Observations at each node will be supposed to be realizations of stochastic processes. Recently introduced directed information is investigated and causal conditioning of directed information is shown to provide adequate solutions for the problem....

    Provided By University of Melbourne

  • White Papers // Dec 2010

    How SMEs Exploit Their Intellectual Property Assets: Evidence From Survey Data

    This paper seeks to understand how motives to patent affect the use of the patent portfolio with a particular focus on motives aimed at the monetization of Intellectual Property (IP). The analysis relies on data from an international survey conducted by the European Patent Office (EPO). The main results can...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    The Effects Of Taxation On Migration: Some Evidence For The ASEAN And APEC Economies

    This paper investigates the effects of taxation on migration. It develops a stylized, two country model to examine the impact of taxation on labor mobility. The theoretical prediction that taxation affects migration decisions is supported by some empirical evidence for the ASEAN and APEC economies. Average tax rates are found...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    A Loglinear Tax And Transfer Function: Majority Voting And Optimal Rates

    This paper explores the use of a loglinear tax and transfer function, displaying increasing marginal and average tax rates along with a means-tested transfer payment. The two parameters are a breakeven income threshold, where the average tax rate is zero, and a tax parameter equivalent to the marginal tax rate...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Protecting Antiquities: A Role For Long- Term Leases?

    Most countries prohibit the export of certain antiquities. This practice often leads to illegal excavation and looting for the black market, which damages the items and compromises the archaeological record. The authors consider the prospect of long-term antiquity leases and sales contracts with a pre-arranged repurchase option. Such mechanisms could...

    Provided By University of Melbourne

  • White Papers // Jan 2012

    Peer-to-Peer Networks for Content Sharing

    Peer-To-Peer (P2P) systems are popularly used as "File-swapping" networks to support distributed content sharing. A number of P2P networks for file sharing have been developed and deployed. Napster, Gnutella, and Fasttrack are three popular P2P systems. This paper presents a broad overview of P2P computing and focuses on content sharing...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Information Leakage Through Online Social Networking: Opening the Doorway for Advanced Persistence Threats

    The explosion of Online Social Networking (OSN) in recent years has caused damages to organisations due to leakage of information by their employees. Employees' social networking behaviour, whether accidental or intentional, provides an opportunity for Advanced Persistent Threats (APT) attackers to realise their social engineering techniques and undetectable zero-day exploits....

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Information Security Risk Assessment: Towards a Business Practice Perspective

    Information Security Risk Assessments (ISRAs) are of great importance for organisations. Current ISRA methods identify an organisation's security risks and provide a measured, analyzed security risk profile of critical information assets in order to build plans to treat risk. However, despite prevalent use in organisations today, current methods adopt a...

    Provided By University of Melbourne

  • White Papers // Dec 2010

    Organisational Learning and Incident Response: Promoting Effective Learning Through the Incident Response Process

    Effective response to information security incidents is a critical function of modern organisations. However, recent studies have indicated that organisations have adopted a narrow and technical view of Incident Response (IR), focusing on the immediate concern of detection and subsequent corrective actions. Although some reflection on the IR process may...

    Provided By University of Melbourne

  • White Papers // Feb 2010

    Tactical Analysis of Attack in Physical and Digital Security Incidents: Towards a Model of Asymmetry

    Asymmetric warfare is frequently described as a conflict where 'Weaker' parties aim to offset their relatively inadequate resources by using particular strategies and tactics to their advantage. This paper develops a concept model of asymmetric warfare that represents the leverage available to the 'Weaker' party over the 'Stronger' party simply...

    Provided By University of Melbourne

  • White Papers // Oct 2008

    Rescheduling Co-Allocation Requests Based on Flexible Advance Reservations and Processor Remapping

    Large-scale computing environments, such as TeraGrid, Distributed ASCI Supercomputer (DAS), and Grid'5000, have been using resource co-allocation to execute applications on multiple sites. Their schedulers work with requests that contain imprecise estimations provided by users. This lack of accuracy generates fragments inside the scheduling queues that can be filled by...

    Provided By University of Melbourne

  • White Papers // Sep 2010

    Downlink Beamforming With Transmit-Side Channel Correlation: A Large System Analysis

    In this paper, the authors consider a large system analysis of Regularized Channel Inversion (RCI) beamforming for MISO Broadcast Channels (BC) with transmit-side channel correlation. In the analysis, they assume that both the number of users and transmit antennas grow unbounded with a constant ratio. They also assume that the...

    Provided By University of Melbourne

  • White Papers // Oct 2009

    Counter Availability and Characteristics for Feed-Forward Based Synchronization

    The availability of hardware counters in computers is essential both to the applications in charge of timekeeping, and those in need of accurate time-stamping. Newer counters are now supported by open source operating systems, but the access interfaces are unnecessarily restricted, and in particular fail to satisfy the needs of...

    Provided By University of Melbourne

  • White Papers // Sep 2008

    The Cost of Variability

    The authors explore the robustness of synchronization performed in the presence of variable latencies using two software clocks: the TSCclock, designed to replace ntpd for Internet synchronisation, and ptpd, a software implementation of IEEE- 1588. Using a precise comparison methodology the TSCclock is shown to be more accurate and far...

    Provided By University of Melbourne

  • White Papers // May 2009

    Dynamic Allocation of Subcarriers and Transmit Powers in an OFDMA Cellular Network

    This paper considers the problem of minimizing outage probabilities in the downlink of a multiuser, multicell OFDMA cellular network with frequency selective fading, imperfect channel state information and frequency hopping. The task is to determine the allocation of powers and subcarriers for users to ensure that the user outage probabilities...

    Provided By University of Melbourne

  • White Papers // Jan 2009

    Mitigation Strategy for Transmission Impairments in Millimeterwave Radio-Over-Fiber Networks

    Hybrid fiber - wireless networks for fixed wireless access operating in the millimeter-wave (mm-wave) frequency region have been actively pursued to provide ultrahigh bandwidth for untethered connectivity. Moving the radio operating frequency into the mm-wave region overcomes the spectral congestion in the lower microwave region and is also capable of...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    KLEIN: A New Family of Lightweight Block Ciphers

    Resource-efficient cryptographic primitives are essential for realizing both security and efficiency in embedded systems like RFID tags and sensor nodes. Among those primitives, lightweight block cipher plays a major role as a building block for security protocols. In this paper, the authors describe a new family of lightweight block ciphers...

    Provided By University of Melbourne

  • White Papers // Jun 2011

    Performance Analysis of Preemption-Aware Scheduling in Multi-Cluster Grid Environments

    Resource provisioning is one of the main challenges in resource sharing environments such as multi-cluster Grids. In these environments each cluster serves requests from external (grid) users along with their own local users. The problem arises when there is not sufficient resources for local users (which have higher priority than...

    Provided By University of Melbourne

  • White Papers // May 2012

    Preemption-Aware Energy Management in Virtualized DataCenters

    Energy efficiency is one of the main challenges that datacenters are facing nowadays. A considerable portion of the consumed energy in these environments is wasted because of idling resources. To avoid wastage, offering services with variety of SLAs (with different prices and priorities) is a common practice. The question the...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    Contention-Aware Resource Management System in a Virtualized Grid Federation

    Several efforts have been made towards the development of architectures, mechanisms, and policies that enable resource allocation across several Grids. Recently, such federated Grids have applied lease-based and Virtual Machine-based approaches in allocating resources. Lease-based approach along with VMs impose new challenges to the resource management systems in federated Grids....

    Provided By University of Melbourne

  • White Papers // Jul 2012

    Security and Compliance Testing Strategies for Cloud Computing

    Due to rapidly changing Information Technologies, it is becoming more expensive for companies/organizations to regularly update hardware and software, and also maintain a big IT department with highly technical staff. So many organizations are adopting cloud services to reduce the cost and increase the flexibility of their IT infrastructures. While...

    Provided By University of Melbourne

  • White Papers // Nov 2010

    Towards Autonomic Detection of SLA Violations in Cloud Infrastructures

    Cloud computing has become a popular paradigm for implementing scalable on-demand computing. Self-manageable Cloud infrastructures are required in order to comply with users' requirements defined by Service Level Agreements (SLAs) and to minimize user interactions with the computing environment. Thus, adequate SLA monitoring strategies and timely detection of possible SLA...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Aneka Platform and QoS-Driven Resource Provisioning for Elastic Applications on Hybrid Clouds

    Cloud computing alters the way traditional software systems are built and run by introducing a utility-based model for delivering IT infrastructure, platforms, applications, and services. The consolidation of this new paradigm in both enterprises and academia demanded reconsideration in the way IT resources are used, so Cloud computing can be...

    Provided By University of Melbourne

  • White Papers // Jul 2009

    Building an Automated and Self-Configurable Emulation Testbed for Grid Applications

    Distributed systems such as grids are composed of geographically distributed computing elements that belong to multiple administrative domains and are controlled by multiple entities. Then, it is unlikely that testers are able to acquire repeatedly the same resources, for the same amount of time, and under the same network conditions,...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Resource Provisioning Policies to Increase IaaS Provider's Profit in a Federated Cloud Environment

    Cloud Federation is a recent paradigm that helps Infrastructure as a Service (IaaS) providers to overcome resource limitation during spikes in demand for Virtual Machines (VMs) by outsourcing requests to other federation members. IaaS providers also have the option of terminating spot VMs, i.e, cheaper VMs that can be canceled...

    Provided By University of Melbourne

  • White Papers // Jul 2009

    A Heuristic for Mapping Virtual Machines and Links in Emulation Testbeds

    Distributed system emulators provide a paramount platform for testing of network protocols and distributed applications in clusters and networks of workstations. However, to allow testers to benefit from these systems, it is necessary an efficient and automatic mapping of hundreds, or even thousands, of virtual nodes to physical hosts -...

    Provided By University of Melbourne

  • White Papers // Mar 2009

    Towards Self-Managed Adaptive Emulation of Grid Environments

    Distributed systems emulators built with the aid of virtualization tools allow testing of systems in a testbed whose number of real elements are orders of magnitude smaller than the number of virtual elements being tested. However, to allow testers to benefit from these systems, operation of the virtual environment should...

    Provided By University of Melbourne

  • White Papers // Aug 2009

    OpenPEX: An Open Provisioning and EXecution System for Virtual Machines

    Virtual Machines (VMs) have become capable enough to emulate full-featured physical machines in all aspects. Therefore, they have become the foundation not only for flexible data center infrastructure but also for commercial Infrastructure-as-a-Service (IaaS) solutions. However, current providers of virtual infrastructure offer simple mechanisms through which users can ask for...

    Provided By University of Melbourne

  • White Papers // Sep 2008

    Maximizing the Sum Rate in Symmetric Networks of Interfering Links Under Flat Power Constraints

    The authors consider the power control problem of maximizing the sum rate of a symmetric network of interfering links in Gaussian noise. They consider a static network: there is no time-varying fading and the power allocation is also mandated to be time and frequency flat. All transmitters have a maximum...

    Provided By University of Melbourne

  • White Papers // Oct 2009

    Asymptotics and Power Allocation for State Estimation Over Fading Channels

    Wireless sensor networks are collections of sensors which can communicate with each other or to a central node or base station through wireless links. Potential uses include environment and infrastructure monitoring, healthcare and military applications, to name a few. Often these sensors will have limited energy and computational ability which...

    Provided By University of Melbourne

  • White Papers // Jan 2011

    A Grid Service Broker for Scheduling Distributed Data-Oriented Applications on Global Grids

    The next generation of scientific experiments and studies, popularly called as e-Science, is carried out by large collaborations of researchers distributed around the world engaged in analysis of huge collections of data generated by scientific instruments. Grid computing has emerged as an enabler for e-Science as it permits the creation...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    NetworkCloudSim: Modelling Parallel Applications in Cloud Simulations

    As interest in adopting Cloud computing for various applications is rapidly growing, it is important to understand how these applications and systems will perform when deployed on Clouds. Due to the scale and complexity of shared resources, it is often hard to analyze the performance of new scheduling and provisioning...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    SMICloud: A Framework for Comparing and Ranking Cloud Services

    With the growth of Cloud Computing, more and more companies are offering different cloud services. From the customer's point of view, it is always difficult to decide whose services they should use, based on users' requirements. Currently there is no software framework which can automatically index cloud providers based on...

    Provided By University of Melbourne

  • White Papers // May 2009

    Autonomic Metered Pricing for a Utility Computing Service

    An increasing number of providers are offering utility computing services which require users to pay only when they use. Most of these providers currently charge users for metered usage based on fixed prices. In this paper, the authors analyze the pros and cons of charging fixed prices as compared to...

    Provided By University of Melbourne

  • White Papers // Sep 2011

    Statistical Modeling of Spot Instance Prices in Public Cloud Environments

    The surge in demand for utilizing public Cloud resources has introduced many trade-offs between price, performance and recently reliability. Amazon's Spot Instances (SIs) create a competitive bidding option for the public Cloud users at lower prices without providing reliability on services. It is generally believed that SIs reduce monetary cost...

    Provided By University of Melbourne

  • White Papers // Jul 2011

    Market-Oriented Cloud Computing and the Cloudbus Toolkit

    Cloud computing has penetrated the Information Technology industry deep enough to influence major companies to adopt it into their mainstream business. A strong thrust on the use of virtualization technology to realize Infrastructure-as-a-Service (IaaS) has led enterprises to leverage subscription-oriented computing capabilities of public Clouds for hosting their application services....

    Provided By University of Melbourne

  • White Papers // May 2010

    Decentralised Orchestration of Service-Oriented Workflows

    Service-oriented workflows in the scientific domain are commonly composed as Directed Acyclic Graphs (DAGs), formed from a collection of vertices and directed edges. When orchestrating service-oriented DAGs, intermediate data are typically routed through a single centralised engine, which results in unnecessary data transfer, increasing the execution time of a workflow...

    Provided By University of Melbourne

  • White Papers // Jul 2009

    Dynamic Tunnel Routing for Reliable and Resilient Data Forwarding in Wireless Sensor Networks

    In this paper, the authors propose a novel dynamic routing strategy called tunnel routing that enables efficient and resilient data forwarding from sensors to a destination in wireless sensor networks. Instead of establishing a single static path, tunnel routing identifies a set of trusted sensor nodes that form a tunnel...

    Provided By University of Melbourne

  • White Papers // Jul 2010

    Secure Rateless Deluge: Pollution-Resistant Reprogramming and Data Dissemination for Wireless Sensor Networks

    A network reprogramming protocol is made for updating the firmware of a Wireless Sensor Network (WSN) in situ. For security reasons, every firmware update must be authenticated to prevent an attacker from installing its code in the network. While existing schemes can provide authentication services, they are insufficient for a...

    Provided By University of Melbourne

  • White Papers // Oct 2009

    Failure Control in Multipath Route Tracing

    Traceroute is widely used to report the path packets take between two internet hosts, but the widespread deployment of load balancing routers breaks a basic assumption - that there is only a single such path. The authors specify an adaptive, stochastic probing algorithm, the Multipath Detection Algorithm (MDA), to report...

    Provided By University of Melbourne

  • White Papers // Oct 2011

    Reliable Provisioning of Spot Instances for Compute-Intensive Applications

    Cloud computing providers are now offering their unused resources for leasing in the spot market, which has been considered the first step towards a full-fledged market economy for computational resources. Spot instances are Virtual Machines (VMs) available at lower prices than their standard on-demand counterparts. These VMs will run for...

    Provided By University of Melbourne

  • White Papers // May 2007

    A Framework for Aligning Testing and Development

    Strategic alignment between an organization's business strategy/capabilities and those of its Information Technology (IT) unit has been researched extensively and has found significant application in industry in the last decade. Given the critical interdependencies between development and testing groups within a corporate IT unit, this paper presents a similar alignment...

    Provided By University of Melbourne

  • White Papers // Dec 2013

    Security in the Cloud Based Systems: Structure and Breaches

    Cloud Based Systems (CBSs) are increasing in the computing world. These systems derive their complexity due to both the disparate components and the diverse stake holders involved in them. The component wise security alone does not solve the problem of securing CBSs, but the stakeholder's computational space spanning across many...

    Provided By University of Melbourne

  • White Papers // Mar 2002

    The Influence of Plasterboard Clad Walls on the Structural Behavior of Low Rise Residential Buildings

    This paper focuses on the bracing capacity of plasterboard clad walls which could be considered either structural or non-structural. While such walls may be installed purely as partition walls, they may provide lateral strength and stiffness due to the complex load paths. The paper presents in detail the possible load...

    Provided By University of Melbourne

  • White Papers // Jul 2008

    Market-Oriented Cloud Computing: Vision, Hype, and Reality for Delivering IT Services as Computing Utilities

    This keynote paper: presents a 21st century vision of computing; identifies various computing paradigms promising to deliver the vision of computing utilities; defines Cloud computing and provides the architecture for creating market-oriented Clouds by leveraging technologies such as VMs; provides thoughts on market-based resource management strategies that encompass both customer-driven...

    Provided By University of Melbourne