Resource Usage Monitoring for Web Systems Using Real-time Statistical Analysis of Log Data

Size: px
Start display at page:

Download "Resource Usage Monitoring for Web Systems Using Real-time Statistical Analysis of Log Data"

Transcription

1 Resource Usage Monitoring for Web Systems Using Real- Statistical Analysis of Log Data MATSUKI YOSHINO, ATSURO HANDA Software Division, Hitachi Ltd. 53, Totsuka-cho, Totsuka-ku, Yokohama, JAPAN {matsuki.yoshino.pw, NORIHISA KOMODA Graduate School of Information Science and Technology Osaka University 2-1 Yamadaoka, Suita, Osaka, JAPAN MICHIKO OBA The School of Systems Information Science Future University Hakodate Kamedanakano-cho, Hakodate, Hokkaido, JAPAN Abstract: - For Web-based systems accessible from the Internet, it is difficult to estimate workloads precisely. Precise estimation of resources necessary for the system is important for effective utilization of resources in a datacenter. Therefore, capacity planning to forecast the amount of IT resources necessary for a system is important. In capacity planning, the amount of resources necessary for a system is calculated based upon numbers determined by the architecture and business requirements of the system. An example of a number determined by the architecture is the amount of memory required by a single user. An example of a number determined by business requirements is the estimated maximum number of simultaneous users. By multiplying these two numbers, a maximum memory requirement can be calculated. Usually, system memory consumption and the number of simultaneous users are monitored during operation, and if either value exceeds a threshold, an alarm is sent to operators. The authors propose a method to monitor memory consumption per user from memory consumption data and the number of users, and perform statistical significance testing in real by applying a stream database. The window size used in a CQL statement for the test affects the precision of the test and memory consumption of the stream database. Through experimentation, the authors propose an optimal window size. Key-Words: - Web systems, Resource usage, Statistical testing, Real- analysis, Stream database, Capacity planning 1 Introduction Currently, most information systems provided to enterprises and by enterprises to customers and end users are Web based. For Web-based systems, it is common that the number of accesses varies dramatically and rapidly. To maintain stable system performance, it is necessary to prepare sufficient resources. Capacity planning is widely conducted in order to estimate the amount of resources necessary for information systems. A method for capacity planning applied in a real-world rapidly expanding service is published in [1]. Even with capacity planning, resource shortages can occur due to various reasons. Resource shortages occur if assumptions of capacity planning do not hold. There are two salient assumptions in capacity planning. One is the number of expected ISBN:

2 accesses, and the other is the amount of resources necessary for a single access. The total amount of resources is estimated by the product of these numbers. Traditionally, the amount of resources dedicated to a system is determined by the results of capacity planning that consider peak usage, or the system and safety coefficient based upon experience. Therefore, considering an entire enterprise, too many resources are deployed. To avoid this over-deployment of resources, cloud technologies have been introduced to assign resources to applications adequately in order to optimize resource usage. In a cloud environment, if a resource shortage occurs in a system, additional resources are deployed to the system from a resource pool. Nevertheless, because the additional resources are costly and may not available, monitoring the resource usage of systems is still very important, even in a cloud environment. In order to detect resource shortages in advance and prevent the system from going down, resource usage monitoring by using thresholds is widely implemented. Because monitoring the total amount resource usage means monitoring a product of two factors of capacity planning, it is difficult to analyze the real cause of unexpected usage of resources. The authors propose a method to monitor each factor by analyzing log data in real by using a stream database and to detect unexpected resource usage by applying statistical testing. 2 Limitations of Threshold Monitoring 2.1 Limitations of Total Resource Monitoring In capacity planning, the amount of resources necessary for processing a unit of work, such as a transaction or a user, is determined by considering the application framework used for the applications and experiences of similar applications. In this paper, this value is called the design base value. The total amount of resources is calculated by multiplying the design base values by the estimated number of maximum number of units of work to be processed simultaneously. Let r be the design base value, F be the amount of resources necessary without any work units, and q be the number of work units to be processed. The total amount of necessary resources R is thus given as follows: R F qr (1) It is common to set two levels of thresholds for monitoring total resource usage. The first threshold is a warning level, and the second one is an emergency level. Figure 1 shows an example of these two thresholds. In this case, the warning threshold is set to 5%, and the emergency threshold is set to 8%. Both graphs shown in Fig.1 and Fig.2 are example cases in which total resource monitoring does not work well. Fig.1 shows a case in which resource usage rises too rapidly, and there is little interval between exceeding the warning threshold and then exceeding the emergency threshold. Fig.2 shows a case where three incidents exceeded the warning threshold, but the system returns to normal status immediately; therefore, these warnings are false alarms. CPU Usage[%] emergency threshold warning 11:23:2 11:46:4 12:1: 12:33:2 12:56:4 13:2: 13:43:2 14:6:4 14:3: 14:53:2 15:16:4 15:4: 16:3:2 16:26:4 16:5: 17:13:2 17:36:4 Fig.1 An example of threshold monitoring (case 1) CPU Usage[%] emergency threshold warning threshold 11:26:2 11:52:4 12:19: 12:45:2 13:11:4 13:38: 14:4:2 14:3:4 14:57: 15:23:2 15:49:4 16:16: 16:42:2 17:8:4 17:35: Fig.2 An example of threshold monitoring (case 2) ISBN:

3 2.2 Method of Monitoring the Run Base Value, and Its Limitation In total resource monitoring, only the result of expression (1) is taken into account. In order to take account of the meaning of expression (1), by transforming expression (1), consider the following expression: R F r (2) q Obtaining total amount of resource usage R m and a number of units of work q for example, a number of simultaneous accesses from log data the amount of resources consumed by a unit of work during run r m can be calculated by following expression: Rm F rm (3) q The value calculated by expression (3) in run is called the run base value. By comparing the run base value and design base value during run, it is possible to verify whether the system consumes resources as planned in capacity planning. In preliminary experimentation, comparison between these two values is performed by evaluating the difference of these values by using a simple threshold. In a real Web system, the variance of the run base value is large. A threshold that is too large causes a delay in detecting abnormal behavior of the system, and a threshold that is too small causes too many false alarms. σ 2 /n. In large scale Web systems, the number of units of work for example, the number of users simultaneously accessing the system can be in the hundreds and regarded as large enough to apply the central limit theorem. Furthermore, the interval for calculating the run base value is larger than the duration of each transaction in the Web system, and each run base value has no correlation and can be considered independent. By these observations, the distribution of run base values can be assumed as a normal distribution, and a t-test can be applied. In the following discussion, let m be the design base value and consider the test of equivalence of m and the mean of the distribution of run base values. In this case, the variance of the distribution of run base values is unknown. Then, by a twosided t-test of significance level α, the condition to conclude that a mean of run base values is equivalent to m is as follows, where is a mean of run base values and n is the number of run base values to be tested: In expression (4), α (4) is an α/2 percentile of the t-distribution of degree of freedom n-1, and u 2 is an unbiased variance, which is given by the following expression, where x 1, x 2,..., x n are run base values: 3 Monitoring Resource Usage by Statistical Test In order to overcome the limitation shown above, the authors propose a method to evaluate the deviation of the run base value from the design base value quantitatively. Assuming that a distribution of population is normal, there are several statistical testing methods to test equivalence of means of populations with significance level α. In this paper, a t-test is applied. Because the run base value is calculated by expression (3), run base value is a mean of the amount of resources consumed by each unit of work. It is safe to assume that distributions of the amount of resources consumed by each unit of work are the same. Assuming that the mean of the distribution is m and the variance of that is σ 2, by the central limit theorem, if n is large enough, a mean of n probability distributions X i (i = 1, n) is approximated by a normal distribution of mean m and variance 4 An Implementation of Statistical Testing Using A Stream Database 4.1 Overview of Stream Databases A stream database is a CEP (complex event processing) tool and is used for analyzing continuously created data in real. A stream is defined as an infinite series data sequence, to which a datum is appended upon occurrence of some event. By applying some condition, a finite set of data can be extracted from a stream. The extracted finite set of data can be treated like a table in a relational database. In a stream database engine, CQL (Continuous Query Language) [2], which has similar syntax and semantics as SQL (Structured Query Language), can be used to perform queries to extracted finite sets of data. Among well known ISBN:

4 examples of stream databases, there are reports on monitoring packet traffic through networks [3] and monitoring messages issued in a large scale datacenter to detect abnormalities in the datacenter [4]. Data Input stream Sliding window: A CQL statement processes data within a sliding window. Output stream The window size is determined either by interval or number of data. In this case, the size is determined by the number of data. 4.2 Determining the Window Size for a CQL Statement for Statistical Testing In Chapter 3, it is assumed that the number of run base values used for a statistical test is sufficiently large. In a CQL statement for statistical testing, the number of run base values used for a statistical test is expressed as a window size of the CQL statement. A window size is the width of a sliding window to extract a finite set of data from a stream. The concept of sliding windows and window size is explained in Fig.3. A sliding window can be defined either by the number of data in a sliding window or by the amount of elapsed after data enters the window. For the purpose of statistical testing in this paper, the size of a sliding window is determined by the number of data. In order to realize real- processing, stream database engines handle all the data in memory. Therefore, to attain scalability of a stream database engine, it is important to reduce memory usage of the stream database engine. For example, in the stream database engine that the authors applied in the experiments mentioned in Chapter 5, 2sW + 1 (KB) of memory is consumed for each system to be monitored, where W is the window size of a CQL statement for statistical testing, and the data size of an element of the input stream is s. In the case of the authors' experiments, s is 1.25 KB. On the other hand, 2 MB of memory is consumed for registration of each CQL statement. For the experiment, 7 CQL statements have to be registered; therefore, 14 MB of memory is consumed by only the registration of CQL statements for statistical testing. In this situation, if W is less than 1, memory consumption proportional to window size is less than 2.5% of memory consumption used by registration of CQL statements, and can be considered negligible. However, if the window size is over 1,, then memory consumption proportional to window size is about 2% of memory consumption used by registration of CQL statements. This has a significant impact on overall memory usage of the stream database engine. In designing CQL statements for statistical testing, it is important to find an adequate window size to realize both early detection of abnormalities in resource Fig.3 Sliding window and window size usage and minimization of memory usage of a stream database engine used for statistical testing. 4.3 Determining the Significance Level of Statistical Testing Besides the window size for CQL statements, the significance level of statistical testing is also a critical parameter for checking conditions discussed in Chapter 3. From the definition of the significance level, it is obvious that the larger the significance level is set, the more false alarms occur, but the possibility of problems being detected increases. When an alarm is issued, it is necessary to examine whether some actions need to be taken, which causes an increase in operation costs. Balancing operation costs and the range of possible abnormal situations to detect in a datacenter can be quantitatively defined by the significance level of the statistical test. This quantification can be used as a parameter of a service level agreement with managed service providers or cloud service providers of PaaS (Platform as a Service). Service providers can demand more expensive service fees for monitoring services with larger significance levels for statistical testing. Therefore, it is important to determine an adequate significance level to set. 5 EXPERIMENTS 5.1 Environment of Experiments In order to determine the adequate window size setting and significance level, the authors conducted experiments using data simulating the environment shown in Fig.4. In the environment assumed, a Web application runs on three servers, and from each server, information about the number of users simultaneously accessing the server and the total CPU usage are periodically output to respective log files. Data that simulates typical problems in Web applications (discussed in document [5]) is created and used as test data in the experiment. ISBN:

5 Capacity planning tool Stream database Users Run environment Merged log info log info log info Load balancer log info Fig.4 Environment assumed in experiments Fig.5 shows the number of accesses for the situation shown in Fig.1. Both information shown in Fig.1 and Fig.5 are provided directly by the logs. Fig.6 shows information on CPU usage per access, that is, an example of run base values. The CQL statements used for statistical testing merge two pieces of log information, calculate the information shown in Fig.6, and perform statistical tests against the design base value, which is.1% in this test case. Fig.7 shows the number of simultaneous accesses, and Fig.8 shows run base values of the situation shown in Fig.2. Although there are three spikes in Fig.2, there are only two spikes in Fig.7. That means that only the spike around 13:3 in Fig.2 is caused by unexpected behavior of the system, and the other two spikes are due to an abrupt increase in the number of accesses and is considered to be normal behavior. Fig.8 shows the run base values for the data simulating a normal state. In all cases, the design base value is.1%. All the log data is read every 1 seconds, and new data is added to streams. Number of Access CPU Usage per Access[%] :24:5 11:49:4 12:14:3 12:39:2 13:4:1 13:29: 13:53:5 14:18:4 14:43:3 15:8:2 15:33:1 15:58: 16:22:5 16:47:4 17:12:3 17:37:2 Fig.5 Number of accesses (case 1) 11:23:2 11:46:4 12:1: 12:33:2 12:56:4 13:2: 13:43:2 14:6:4 14:3: 14:53:2 15:16:4 15:4: 16:3:2 16:26:4 16:5: 17:13:2 17:36:4 Fig.6 CPU usage per access (case 1) 5.2 Results of Experiments Experiments are performed by using CQL statements that issue an alarm when the condition discussed in Chapter 3 is not met, with various combinations of window size N and significance level α. Table 1 shows the s when deviations of a run base value from the design base value were detected. Compared with Fig.1, wherein a warning alarm is issued around 14:4, deviation of the run base values from the design base value, which causes unexpected resource usage behavior in the system, is detected well in advance. Table 2 shows the results of whether the spike at 13:3:3 is detected for the data of Fig.2 and Fig. 8. Table 3 shows number of false alarms for the norml case data shown in Fig. 9. Number of Access :22:1 11:44:2 12:6:3 12:28:4 12:5:5 13:13: 13:35:1 13:57:2 14:19:3 14:41:4 15:3:5 15:26: 15:48:1 16:1:2 16:32:3 16:54:4 17:16:5 17:39: Fig.7 Number of accesses (case 2) ISBN:

6 CPU Usage per Access[%] CPU Usage per Access[%] :23:2 11:46:4 12:1: 12:33:2 12:56:4 13:2: 13:43:2 14:6:4 14:3: 14:53:2 15:16:4 15:4: 16:3:2 16:26:4 16:5: 17:13:2 17:36:4 Fig.8 CPU usage per access (case 2) : 11:3 12: 12:3 13: 13:3 14: 14:3 15: 15:3 16: 16:3 17: 17:3 Time Fig.9 CPU usage per access (normal case) As shown in Table 1, the larger N and α are, the sooner the detection of deviations of run base values from the design base value. However, as shown in Table 3, the larger N is, the more false alarms occur. Considering the argument of memory consumption of the steam database engine in 4.2, an appropriate value of N is approximately 4, and an appropriate range of α is from.1 to.5. Compared with total resource monitoring shown in Fig.1, by using this proposed method, unexpected resource usage is detected sooner. Compared with the graph of Fig.2, by using this proposed method, false alarms can be avoided by properly setting parameters N and α. Table 1. Times of detection of abnormality α N :44:2 13:14: 13:7:1 13:5:5 13:6:1 13:6:.5 14:13:2 13:2: 13:8:5 13:7: 13:6:5 13:6: :33:2 13:26:3 13:11:1 13:8:1 13:7:2 13:7:2.1 13:35:3 13:13:1 13:1: 13:8:1 13:8:1.5 14:33: 13:49:4 13:27:4 13:8:5 13:14:5 Table 2. Detection of the spike at 13:3:3 α N Table 3. Number of false alarms α N CONCLUSION For detecting unexpected resource usage behavior of Web systems, the authors propose a method of monitoring deviations of run base values from the design base value using statistical testing. Effectiveness of the method is proven by experiment using the implementation of statistical testing using a stream database. References: [1] J. Allspaw. The Art of Capacity Planning: Scaling Web Resources, O'Reilly Media, 28. [2] A. Arasu, S. Babu, and J. Widom, The CQL Continuous Query Language: Semantic Foundations and Query Execution, Technical report, Stanford University ( 23. [3] C. Cranor, T. Johnson, O. Spataschek, and V. Shkapenyuk, Gigascope: A stream database for network applications, Proc. of the 23 ACM SIGMOD Intl. Conf. on Management of Data, 23, pp [4] M. Yoshino, M. Oba, N. Komoda, T. Yamade, and S. Nakamichi, Message analysis method based on a stream database for information system management, Proc. of the 4th International Conference on Research Challenges in Information Science 21 (RCIS 21), 21, pp [5] K. Kobori, S. Moro, M. Satou, H. Ishigaki, and T. Iiyama. Practical Debugging and Troubleshooting (Java Edition), Shoeisha, 21. (in Japanese) ISBN:

On a Method for Describing System Management Operations and its Use in Evaluating Energy Saving Operations

On a Method for Describing System Management Operations and its Use in Evaluating Energy Saving Operations DVNCS in DT NTWORKS, COMMUNICTIONS, COMPUTRS On a Method for Describing System Management s and its Use in valuating nergy Saving s Matsuki Yoshino *, Norihisa Komoda**, Michiko Oba *** * Software Division

More information

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems

An Adaptive Query Processing Method according to System Environments in Database Broadcasting Systems An Query Processing Method according to System Environments in Database Broadcasting Systems M. KASHITA T. TERADA T. HARA Graduate School of Engineering, Cybermedia Center, Graduate School of Information

More information

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data 46 Next-generation IT Platforms Delivering New Value through Accumulation and Utilization of Big Data

More information

An Efficient Execution Scheme for Designated Event-based Stream Processing

An Efficient Execution Scheme for Designated Event-based Stream Processing DEIM Forum 2014 D3-2 An Efficient Execution Scheme for Designated Event-based Stream Processing Yan Wang and Hiroyuki Kitagawa Graduate School of Systems and Information Engineering, University of Tsukuba

More information

Lab 5 - Risk Analysis, Robustness, and Power

Lab 5 - Risk Analysis, Robustness, and Power Type equation here.biology 458 Biometry Lab 5 - Risk Analysis, Robustness, and Power I. Risk Analysis The process of statistical hypothesis testing involves estimating the probability of making errors

More information

WiFi concierge at home network focusing on streaming traffic

WiFi concierge at home network focusing on streaming traffic WiFi concierge at home network focusing on streaming traffic Satoru Nishimaki a), Hiroshi Yamamoto, and Katsuyuki Yamazaki Nagaoka University of Technology, 1603 1 Kamitomioka, Nagaoka, Niigata 940 2188,

More information

Analytical and Experimental Evaluation of Stream-Based Join

Analytical and Experimental Evaluation of Stream-Based Join Analytical and Experimental Evaluation of Stream-Based Join Henry Kostowski Department of Computer Science, University of Massachusetts - Lowell Lowell, MA 01854 Email: hkostows@cs.uml.edu Kajal T. Claypool

More information

IX: A Protected Dataplane Operating System for High Throughput and Low Latency

IX: A Protected Dataplane Operating System for High Throughput and Low Latency IX: A Protected Dataplane Operating System for High Throughput and Low Latency Belay, A. et al. Proc. of the 11th USENIX Symp. on OSDI, pp. 49-65, 2014. Reviewed by Chun-Yu and Xinghao Li Summary In this

More information

Quick Note 044. Estimating Cellular Data Overhead When Using TransPort Enterprise Routers and Digi Remote Manager SM 2.0

Quick Note 044. Estimating Cellular Data Overhead When Using TransPort Enterprise Routers and Digi Remote Manager SM 2.0 Quick Note 044 Estimating Cellular Data Overhead When Using TransPort Enterprise Routers and Digi Remote Manager SM 2.0 Digi Technical Support February 2014 Contents 1 Document Version...2 2 Abstract...3

More information

Load Shedding for Aggregation Queries over Data Streams

Load Shedding for Aggregation Queries over Data Streams Load Shedding for Aggregation Queries over Data Streams Brian Babcock Mayur Datar Rajeev Motwani Department of Computer Science Stanford University, Stanford, CA 94305 {babcock, datar, rajeev}@cs.stanford.edu

More information

KEMP 360 Vision. KEMP 360 Vision. Product Overview

KEMP 360 Vision. KEMP 360 Vision. Product Overview KEMP 360 Vision Product Overview VERSION: 1.0 UPDATED: SEPTEMBER 2016 Table of Contents 1 Introduction... 3 1.1 Document Purpose... 3 1.2 Intended Audience... 3 2 Architecture... 4 3 Sample Scenarios...

More information

Automated Control for Elastic Storage

Automated Control for Elastic Storage Automated Control for Elastic Storage Summarized by Matthew Jablonski George Mason University mjablons@gmu.edu October 26, 2015 Lim, H. C. and Babu, S. and Chase, J. S. (2010) Automated Control for Elastic

More information

Design, Implementation and Evaluation of. Resource Management System for Internet Servers

Design, Implementation and Evaluation of. Resource Management System for Internet Servers Design, Implementation and Evaluation of Resource Management System for Internet Servers Kazuhiro Azuma, Takuya Okamoto, Go Hasegawa and Masayuki Murata Graduate School of Information Science and Technology,

More information

Adaptive Aggregation Scheduling Using. Aggregation-degree Control in Sensor Network

Adaptive Aggregation Scheduling Using. Aggregation-degree Control in Sensor Network Contemporary Engineering Sciences, Vol. 7, 2014, no. 14, 725-730 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4681 Adaptive Aggregation Scheduling Using Aggregation-degree Control in

More information

Econ 3790: Business and Economics Statistics. Instructor: Yogesh Uppal

Econ 3790: Business and Economics Statistics. Instructor: Yogesh Uppal Econ 3790: Business and Economics Statistics Instructor: Yogesh Uppal Email: yuppal@ysu.edu Chapter 8: Interval Estimation Population Mean: Known Population Mean: Unknown Margin of Error and the Interval

More information

Mark Sandstrom ThroughPuter, Inc.

Mark Sandstrom ThroughPuter, Inc. Hardware Implemented Scheduler, Placer, Inter-Task Communications and IO System Functions for Many Processors Dynamically Shared among Multiple Applications Mark Sandstrom ThroughPuter, Inc mark@throughputercom

More information

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Performance Modeling and Evaluation of Web Systems with Proxy Caching

Performance Modeling and Evaluation of Web Systems with Proxy Caching Performance Modeling and Evaluation of Web Systems with Proxy Caching Yasuyuki FUJITA, Masayuki MURATA and Hideo MIYAHARA a a Department of Infomatics and Mathematical Science Graduate School of Engineering

More information

Remote Health Monitoring for an Embedded System

Remote Health Monitoring for an Embedded System July 20, 2012 Remote Health Monitoring for an Embedded System Authors: Puneet Gupta, Kundan Kumar, Vishnu H Prasad 1/22/2014 2 Outline Background Background & Scope Requirements Key Challenges Introduction

More information

AN INFORMATION FILTERING SYSTEM THAT OPTIMIZES THE PROCESSING METHOD BASED ON MATHEMATICAL PROPERTIES

AN INFORMATION FILTERING SYSTEM THAT OPTIMIZES THE PROCESSING METHOD BASED ON MATHEMATICAL PROPERTIES AN INFORMATION FILTERING SYSTEM THAT OPTIMIZES THE PROCESSING METHOD BASED ON MATHEMATICAL PROPERTIES Takuya Kodera Rie Sawai Tsutomu Terada Masahiko Tsukamoto Shojiro Nishio Graduate School of Information

More information

Case Study II: A Web Server

Case Study II: A Web Server Case Study II: A Web Server Prof. Daniel A. Menascé Department of Computer Science George Mason University www.cs.gmu.edu/faculty/menasce.html 1 Copyright Notice Most of the figures in this set of slides

More information

Evaluating Auto Scalable Application on Cloud

Evaluating Auto Scalable Application on Cloud Evaluating Auto Scalable Application on Cloud Takashi Okamoto Abstract Cloud computing enables dynamic scaling out of system resources, depending on workloads and data volume. In addition to the conventional

More information

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose

QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING. Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose QUANTIZER DESIGN FOR EXPLOITING COMMON INFORMATION IN LAYERED CODING Mehdi Salehifar, Tejaswi Nanjundaswamy, and Kenneth Rose Department of Electrical and Computer Engineering University of California,

More information

How To Keep Your Head Above Water While Detecting Errors

How To Keep Your Head Above Water While Detecting Errors USENIX / ACM / IFIP 10th International Middleware Conference How To Keep Your Head Above Water While Detecting Errors Ignacio Laguna, Fahad A. Arshad, David M. Grothe, Saurabh Bagchi Dependable Computing

More information

Exploiting Predicate-window Semantics over Data Streams

Exploiting Predicate-window Semantics over Data Streams Exploiting Predicate-window Semantics over Data Streams Thanaa M. Ghanem Walid G. Aref Ahmed K. Elmagarmid Department of Computer Sciences, Purdue University, West Lafayette, IN 47907-1398 {ghanemtm,aref,ake}@cs.purdue.edu

More information

DISTRIBUTED computing, in which large-scale computing

DISTRIBUTED computing, in which large-scale computing Proceedings of the International Multiconference on Computer Science and Information Technology pp. 475 48 ISBN 978-83-681-14-9 IN 1896-794 On the Robustness of the Soft State for Task Scheduling in Large-scale

More information

Introduction to Queueing Theory for Computer Scientists

Introduction to Queueing Theory for Computer Scientists Introduction to Queueing Theory for Computer Scientists Raj Jain Washington University in Saint Louis Jain@eecs.berkeley.edu or Jain@wustl.edu A Mini-Course offered at UC Berkeley, Sept-Oct 2012 These

More information

Design of an IP Flow Record Query Language

Design of an IP Flow Record Query Language Design of an IP Flow Record Query Language Vladislav Marinov and Jürgen Schönwälder Computer Science, Jacobs University Bremen, Germany {v.marinov,j.schoenwaelder}@jacobs-university.de Abstract. Internet

More information

Log System Based on Software Testing System Design And Implementation

Log System Based on Software Testing System Design And Implementation 4th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2015) Log System Based on Software Testing System Design And Implementation Yan Liu1, a, Dahai Jin1,

More information

Static Compaction Techniques to Control Scan Vector Power Dissipation

Static Compaction Techniques to Control Scan Vector Power Dissipation Static Compaction Techniques to Control Scan Vector Power Dissipation Ranganathan Sankaralingam, Rama Rao Oruganti, and Nur A. Touba Computer Engineering Research Center Department of Electrical and Computer

More information

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3

More information

Ch. 13: Measuring Performance

Ch. 13: Measuring Performance Ch. 13: Measuring Performance Kenneth Mitchell School of Computing & Engineering, University of Missouri-Kansas City, Kansas City, MO 64110 Kenneth Mitchell, CS & EE dept., SCE, UMKC p. 1/3 Introduction

More information

Multi-Model Based Optimization for Stream Query Processing

Multi-Model Based Optimization for Stream Query Processing Multi-Model Based Optimization for Stream Query Processing Ying Liu and Beth Plale Computer Science Department Indiana University {yingliu, plale}@cs.indiana.edu Abstract With recent explosive growth of

More information

Dynamic Cloud Resource Scheduling in Virtualized 5G Mobile Systems

Dynamic Cloud Resource Scheduling in Virtualized 5G Mobile Systems Dynamic Cloud Resource Scheduling in Virtualized 5G Mobile Systems Ahmad Bilal, Taleb Tarik, Andras Vajda and Bagaa Miloud Ericsson, Finland Aalto University, Finland bilal.x.ahmad@ericsson.com, talebtarik@ieee.org,

More information

Integrated Usage of Heterogeneous Databases for Novice Users

Integrated Usage of Heterogeneous Databases for Novice Users International Journal of Networked and Distributed Computing, Vol. 3, No. 2 (April 2015), 109-118 Integrated Usage of Heterogeneous Databases for Novice Users Ayano Terakawa Dept. of Information Science,

More information

Technical White Paper for Huawei's Videoconferencing Network Diagnostics Tool (NLog)

Technical White Paper for Huawei's Videoconferencing Network Diagnostics Tool (NLog) Technical White Paper for Huawei's Videoconferencing Network Diagnostics Tool (NLog) Huawei Technologies Co., Ltd. All rights reserved. Contents 1 Videoconferencing Network Conditions... 3 2 Overall Description...

More information

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications

McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications McPAD and HMM-Web: two different approaches for the detection of attacks against Web applications Davide Ariu, Igino Corona, Giorgio Giacinto, Fabio Roli University of Cagliari, Dept. of Electrical and

More information

UDP Packet Monitoring with Stanford Data Stream Manager

UDP Packet Monitoring with Stanford Data Stream Manager UDP Packet Monitoring with Stanford Data Stream Manager Nadeem Akhtar #1, Faridul Haque Siddiqui #2 # Department of Computer Engineering, Aligarh Muslim University Aligarh, India 1 nadeemalakhtar@gmail.com

More information

WHITE PAPER Hybrid Approach to DDoS Mitigation

WHITE PAPER Hybrid Approach to DDoS Mitigation WHITE PAPER Hybrid Approach to DDoS Mitigation FIRST LINE OF DEFENSE Executive Summary As organizations consider options for DDoS mitigation, it is important to realize that the optimal solution is a hybrid

More information

The concept of a storage-centric network which is safe and secure anywhere jointly developed

The concept of a storage-centric network which is safe and secure anywhere jointly developed November 20, 2003 Nippon Telegraph and Telephone Corporation Hitachi, Ltd. The concept of a storage-centric network which is safe and secure anywhere jointly developed Nippon Telegraph and Telephone Corporation

More information

File Reputation Filtering and File Analysis

File Reputation Filtering and File Analysis This chapter contains the following sections: Overview of, page 1 Configuring File Reputation and Analysis Features, page 5 File Reputation and File Analysis Reporting and Tracking, page 14 Taking Action

More information

NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst

NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst ESG Lab Spotlight NetApp Clustered Data ONTAP 8.2 Storage QoS Date: June 2013 Author: Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab Spotlight explores how NetApp Data ONTAP 8.2 Storage QoS can

More information

Advancing AiHD Cloud Solution

Advancing AiHD Cloud Solution NEW Advancing AiHD Cloud Solution Ai Holdings Corporation (parent company to Graphtec) created the "" cloud system by consolidating resources from group companies to provide advanced IoT platform with

More information

Interstage Big Data Complex Event Processing Server V1.0.0

Interstage Big Data Complex Event Processing Server V1.0.0 Interstage Big Data Complex Event Processing Server V1.0.0 User's Guide Linux(64) J2UL-1665-01ENZ0(00) October 2012 PRIMERGY Preface Purpose This manual provides an overview of the features of Interstage

More information

System Monitor - Performance Monitoring Services 5.8 User's Guide

System Monitor - Performance Monitoring Services 5.8 User's Guide System Monitor - Performance Monitoring Services 5.8 User's Guide - First Edition - Copyright (C) NEC Corporation 2004-2017. Disclaimer of Warranty All the information, text, graphics, links or other items

More information

Event-Driven Virtual Machine for Business Integration Middleware

Event-Driven Virtual Machine for Business Integration Middleware Event-Driven Virtual Machine for Business Integration Middleware Joachim H. Frank 1, Liangzhao Zeng 2, and Henry Chang 2 1 IBM Software Group jhfrank@us.ibm.com 2 IBM T.J. Watson Research Center {lzeng,hychang}@us.ibm.com

More information

A Robust Wipe Detection Algorithm

A Robust Wipe Detection Algorithm A Robust Wipe Detection Algorithm C. W. Ngo, T. C. Pong & R. T. Chin Department of Computer Science The Hong Kong University of Science & Technology Clear Water Bay, Kowloon, Hong Kong Email: fcwngo, tcpong,

More information

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks

Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Mobile Information Systems 9 (23) 295 34 295 DOI.3233/MIS-364 IOS Press Data gathering using mobile agents for reducing traffic in dense mobile wireless sensor networks Keisuke Goto, Yuya Sasaki, Takahiro

More information

HP ProLiant BladeSystem Gen9 vs Gen8 and G7 Server Blades on Data Warehouse Workloads

HP ProLiant BladeSystem Gen9 vs Gen8 and G7 Server Blades on Data Warehouse Workloads HP ProLiant BladeSystem Gen9 vs Gen8 and G7 Server Blades on Data Warehouse Workloads Gen9 server blades give more performance per dollar for your investment. Executive Summary Information Technology (IT)

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

Data Stream Mining. Tore Risch Dept. of information technology Uppsala University Sweden

Data Stream Mining. Tore Risch Dept. of information technology Uppsala University Sweden Data Stream Mining Tore Risch Dept. of information technology Uppsala University Sweden 2016-02-25 Enormous data growth Read landmark article in Economist 2010-02-27: http://www.economist.com/node/15557443/

More information

Hosted Microsoft Exchange Server 2003 Deployment Utilizing Network Appliance Storage Solutions

Hosted Microsoft Exchange Server 2003 Deployment Utilizing Network Appliance Storage Solutions Hosted Microsoft Exchange Server 23 Deployment Utilizing Network Appliance Storage Solutions Large-Scale, 68,-Mailbox Exchange Server Proof of Concept Lee Dorrier, Network Appliance, Inc. Eric Johnson,

More information

MultiDSLA. Measuring Network Performance. Malden Electronics Ltd

MultiDSLA. Measuring Network Performance. Malden Electronics Ltd MultiDSLA Measuring Network Performance Malden Electronics Ltd The Business Case for Network Performance Measurement MultiDSLA is a highly scalable solution for the measurement of network speech transmission

More information

CES: A FRAMEWORK FOR EFFICIENT INFRASTRUCTURE UTILIZATION THROUGH CLOUD ELASTICITY AS A SERVICE (CES)

CES: A FRAMEWORK FOR EFFICIENT INFRASTRUCTURE UTILIZATION THROUGH CLOUD ELASTICITY AS A SERVICE (CES) International Journal of Computer Engineering & Technology (IJCET) Volume 6, Issue 8, Aug 2015, pp. 24-30, Article ID: IJCET_06_08_004 Available online at http://www.iaeme.com/ijcet/issues.asp?jtypeijcet&vtype=6&itype=8

More information

Congestion Propagation among Routers in the Internet

Congestion Propagation among Routers in the Internet Congestion Propagation among Routers in the Internet Kouhei Sugiyama, Hiroyuki Ohsaki and Makoto Imase Graduate School of Information Science and Technology, Osaka University -, Yamadaoka, Suita, Osaka,

More information

SLiM : Scalable Live Media Streaming Framework for a U-City

SLiM : Scalable Live Media Streaming Framework for a U-City SLiM : Scalable Live Media Streaming Framework for a U-City Eun-Seok Ryu, Chuck Yoo 236, Department of Computer Science and Engineering, Korea University, Anam-Dong, Seongbuk-Gu, Seoul, Korea { esryu,

More information

White Paper. Major Performance Tuning Considerations for Weblogic Server

White Paper. Major Performance Tuning Considerations for Weblogic Server White Paper Major Performance Tuning Considerations for Weblogic Server Table of Contents Introduction and Background Information... 2 Understanding the Performance Objectives... 3 Measuring your Performance

More information

Oracle Event Processing Extreme Performance on Sparc T5

Oracle Event Processing Extreme Performance on Sparc T5 Oracle Event Processing Extreme Performance on Sparc T5 An Oracle Event Processing (OEP) Whitepaper ORACLE WHITE PAPER AUGUST 2014 Table of Contents Introduction 2 OEP Architecture 2 Server Architecture

More information

Towards Energy Efficient Change Management in a Cloud Computing Environment

Towards Energy Efficient Change Management in a Cloud Computing Environment Towards Energy Efficient Change Management in a Cloud Computing Environment Hady AbdelSalam 1,KurtMaly 1,RaviMukkamala 1, Mohammad Zubair 1, and David Kaminsky 2 1 Computer Science Department, Old Dominion

More information

Cloud Monitoring as a Service. Built On Machine Learning

Cloud Monitoring as a Service. Built On Machine Learning Cloud Monitoring as a Service Built On Machine Learning Table of Contents 1 2 3 4 5 6 7 8 9 10 Why Machine Learning Who Cares Four Dimensions to Cloud Monitoring Data Aggregation Anomaly Detection Algorithms

More information

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM

Network Traffic Characteristics of Data Centers in the Wild. Proceedings of the 10th annual conference on Internet measurement, ACM Network Traffic Characteristics of Data Centers in the Wild Proceedings of the 10th annual conference on Internet measurement, ACM Outline Introduction Traffic Data Collection Applications in Data Centers

More information

Rediffmail Enterprise High Availability Architecture

Rediffmail Enterprise High Availability Architecture Rediffmail Enterprise High Availability Architecture Introduction Rediffmail Enterprise has proven track record of 99.9%+ service availability. Multifold increase in number of users and introduction of

More information

Sec 6.3. Bluman, Chapter 6 1

Sec 6.3. Bluman, Chapter 6 1 Sec 6.3 Bluman, Chapter 6 1 Bluman, Chapter 6 2 Review: Find the z values; the graph is symmetrical. z = ±1. 96 z 0 z the total area of the shaded regions=5% Bluman, Chapter 6 3 Review: Find the z values;

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

Reusing Reused Code II. CODE SUGGESTION ARCHITECTURE. A. Overview

Reusing Reused Code II. CODE SUGGESTION ARCHITECTURE. A. Overview Reusing Reused Tomoya Ishihara, Keisuke Hotta, Yoshiki Higo, Shinji Kusumoto Graduate School of Information Science and Technology, Osaka University 1-5, Yamadaoka, Suita, Osaka, 565-0871, Japan {t-ishihr,

More information

An introductory look. cloud computing in education

An introductory look. cloud computing in education An introductory look cloud computing in education An introductory look cloud computing in education Today, the question for education IT managers is not whether to adopt cloud computing, but when. With

More information

Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH

Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH 2011 International Conference on Document Analysis and Recognition Real-Time Document Image Retrieval for a 10 Million Pages Database with a Memory Efficient and Stability Improved LLAH Kazutaka Takeda,

More information

Improved Load Balancing in Distributed Service Architectures

Improved Load Balancing in Distributed Service Architectures Improved Load Balancing in Distributed Service Architectures LI-CHOO CHEN, JASVAN LOGESWAN, AND AZIAH ALI Faculty of Engineering, Multimedia University, 631 Cyberjaya, MALAYSIA. Abstract: - The advancement

More information

Extending a Method of Describing System Management Operations to Energy-Saving Operations in Data Centers

Extending a Method of Describing System Management Operations to Energy-Saving Operations in Data Centers INTRNTIONL JOURNL OF COMPUTRS xtending a Method of Describing System Management Operations to nergy-saving Operations in Data Centers Matsuki Yoshino, Michiko Oba, Norihisa Komoda bstract The authors propose

More information

Evaluation of a Business Application Framework Using Complexity and Functionality Metrics

Evaluation of a Business Application Framework Using Complexity and Functionality Metrics Evaluation of a Business Application Framework Using Complexity and Functionality Metrics Hikaru Fujiwara 1, Shinji Kusumoto 1, Katsuro Inoue 1, Toshifusa Ootsubo 2 and Katsuhiko Yuura 2 1 Graduate School

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud US Region Price List (February 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

A Low-Latency DMR Architecture with Efficient Recovering Scheme Exploiting Simultaneously Copiable SRAM

A Low-Latency DMR Architecture with Efficient Recovering Scheme Exploiting Simultaneously Copiable SRAM A Low-Latency DMR Architecture with Efficient Recovering Scheme Exploiting Simultaneously Copiable SRAM Go Matsukawa 1, Yohei Nakata 1, Yuta Kimi 1, Yasuo Sugure 2, Masafumi Shimozawa 3, Shigeru Oho 4,

More information

ASSURING PERFORMANCE IN VDI DEPLOYMENTS

ASSURING PERFORMANCE IN VDI DEPLOYMENTS ASSURING PERFORMANCE IN VDI DEPLOYMENTS EXECUTIVE SUMMARY Virtual Desktop Infrastructure (VDI) holds great promise for end-user computing teams to centralize management and maintenance, lower operational

More information

VMware vcloud Architecture Toolkit Cloud Bursting

VMware vcloud Architecture Toolkit Cloud Bursting VMware vcloud Architecture Toolkit VMware vcloud Architecture Toolkit Version 3.0 September 2012 Version 2.0.1 This product is protected by U.S. and international copyright and intellectual property laws.

More information

MOC 20463C: Implementing a Data Warehouse with Microsoft SQL Server

MOC 20463C: Implementing a Data Warehouse with Microsoft SQL Server MOC 20463C: Implementing a Data Warehouse with Microsoft SQL Server Course Overview This course provides students with the knowledge and skills to implement a data warehouse with Microsoft SQL Server.

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud UK Region Price List (November 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

5th World Congress for Software Quality Shanghai, China November 2011

5th World Congress for Software Quality Shanghai, China November 2011 Yoshihiro Kita University of Miyazaki Miyazaki, Japan kita@earth.cs.miyazaki-u.ac.jp Proposal of Execution Paths Indication Method for Integration Testing by Using an Automatic Visualization Tool Avis

More information

VANS: Visual Ad hoc Network Simulator

VANS: Visual Ad hoc Network Simulator VANS: Visual Ad hoc Network Simulator Masako Shinohara, Hideki Hayashi, Takahiro Hara, Akimitsu Kanzaki and Shojiro Nishio Graduate School of Information Science and Tech., Osaka University {sinohara.masako,

More information

IBM InfoSphere Streams v4.0 Performance Best Practices

IBM InfoSphere Streams v4.0 Performance Best Practices Henry May IBM InfoSphere Streams v4.0 Performance Best Practices Abstract Streams v4.0 introduces powerful high availability features. Leveraging these requires careful consideration of performance related

More information

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing Yuki Katsurai *, Yoshitaka Nakamura **, and Osamu Takahashi ** * Graduate School

More information

Contents Overview of the Compression Server White Paper... 5 Business Problem... 7

Contents Overview of the Compression Server White Paper... 5 Business Problem... 7 P6 Professional Compression Server White Paper for On-Premises Version 17 July 2017 Contents Overview of the Compression Server White Paper... 5 Business Problem... 7 P6 Compression Server vs. Citrix...

More information

Anti-DDoS. User Guide. Issue 05 Date

Anti-DDoS. User Guide. Issue 05 Date Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Functions... 1 1.2 Application Scenarios...1 1.3 Accessing and Using Anti-DDoS... 2 1.3.1 How to Access Anti-DDoS...2 1.3.2 How to Use

More information

Monitoring Agent for Microsoft Hyper-V Server Fix Pack 12. Reference IBM

Monitoring Agent for Microsoft Hyper-V Server Fix Pack 12. Reference IBM Monitoring Agent for Microsoft Hyper-V Server 6.3.1 Fix Pack 12 Reference IBM Monitoring Agent for Microsoft Hyper-V Server 6.3.1 Fix Pack 12 Reference IBM Note Before using this information and the product

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Germany Region Price List (March 2018) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

NOISE SOURCE DETECTION USING NON-ORTHOGONAL MICROPHONE ARRAY

NOISE SOURCE DETECTION USING NON-ORTHOGONAL MICROPHONE ARRAY NOISE SOURCE DETECTION USING NON-ORTHOGONAL MICROPHONE ARRAY..YW INSTRUMENTATION AND TECHIQUES FOR NOISE MEASUREMENT AND ANALYSIS Fujita, Hajime ; Fuma, Hidenori ; Katoh, Yuhichi ; and Nobuhiro Nagasawa

More information

An Approach To ANOM Chart. Muhammad Riaz

An Approach To ANOM Chart. Muhammad Riaz An Approach To ANOM Chart Muhammad Riaz Department of tatistics, Quaid-i-Azam University, Islamabad, Pakistan E-mail: riaz76qau@yahoo.com Abstract The study proposes a scheme for the structure of Analysis

More information

A Cost Model for Adaptive Resource Management in Data Stream Systems

A Cost Model for Adaptive Resource Management in Data Stream Systems A Cost Model for Adaptive Resource Management in Data Stream Systems Michael Cammert, Jürgen Krämer, Bernhard Seeger, Sonny Vaupel Department of Mathematics and Computer Science University of Marburg 35032

More information

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks An Based on the Temporal-spatial Correlation in Wireless Sensor Networks 1 Department of Computer Science & Technology, Harbin Institute of Technology at Weihai,Weihai, 264209, China E-mail: Liuyang322@hit.edu.cn

More information

Occlusion Detection of Real Objects using Contour Based Stereo Matching

Occlusion Detection of Real Objects using Contour Based Stereo Matching Occlusion Detection of Real Objects using Contour Based Stereo Matching Kenichi Hayashi, Hirokazu Kato, Shogo Nishida Graduate School of Engineering Science, Osaka University,1-3 Machikaneyama-cho, Toyonaka,

More information

IaaS. IaaS. Virtual Server

IaaS. IaaS. Virtual Server FUJITSU Cloud Service K5 for Public & Virtual Private Cloud Germany Region Price List (December 2017) Pricing Overview: FUJITSU Cloud Service K5 for Type 1 and Type 2 Cloud Services is priced on a consumption

More information

Event Object Boundaries in RDF Streams A Position Paper

Event Object Boundaries in RDF Streams A Position Paper Event Object Boundaries in RDF Streams A Position Paper Robin Keskisärkkä and Eva Blomqvist Department of Computer and Information Science Linköping University, Sweden {robin.keskisarkka eva.blomqvist}@liu.se

More information

Identifying and Preventing Distributed-Denial-Of-Service Attacks

Identifying and Preventing Distributed-Denial-Of-Service Attacks CHAPTER 11 Identifying and Preventing Distributed-Denial-Of-Service Attacks This module describes the ability of the SCE platform to identify and prevent DDoS attacks, and the various procedures for configuring

More information

Construction and Application of Cloud Data Center in University

Construction and Application of Cloud Data Center in University International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2014) Construction and Application of Cloud Data Center in University Hong Chai Institute of Railway Technology,

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

Design, Implementation and Evaluation of Resource Management System for Internet Servers

Design, Implementation and Evaluation of Resource Management System for Internet Servers Design, Implementation and Evaluation of Resource Management System for Internet Servers Paper ID: 193 Total number of pages: 14 Abstract A great deal of research has been devoted to solving the problem

More information

P6 Compression Server White Paper Release 8.2 December 2011 Copyright Oracle Primavera P6 Compression Server White Paper Copyright 2005, 2011, Oracle and/or its affiliates. All rights reserved. Oracle

More information

We have seen that as n increases, the length of our confidence interval decreases, the confidence interval will be more narrow.

We have seen that as n increases, the length of our confidence interval decreases, the confidence interval will be more narrow. {Confidence Intervals for Population Means} Now we will discuss a few loose ends. Before moving into our final discussion of confidence intervals for one population mean, let s review a few important results

More information

MHPS-TOMONI: Thermal Power Generation Digitalization Platform Cloud/Edge Service and System Architecture

MHPS-TOMONI: Thermal Power Generation Digitalization Platform Cloud/Edge Service and System Architecture 1 MHPS-TOMONI: Thermal Power Generation Digitalization Platform Cloud/Edge Service and System Architecture HIROYASU ISHIGAKI *1 SATORU MOURI *2 DAISUKE GOTO *3 NAOYUKI NAGAFUCHI *2 To increase the efficiency

More information

Monitoring & Tuning Azure SQL Database

Monitoring & Tuning Azure SQL Database Monitoring & Tuning Azure SQL Database Dustin Ryan, Data Platform Solution Architect, Microsoft Moderated By: Paresh Motiwala Presenting Sponsors Thank You to Our Presenting Sponsors Empower users with

More information