Ad-hoc, Mobile, and Wireless Networks [[electronic resource] ] : 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings / / edited by Antonio Puliafito, Dario Bruneo, Salvatore Distefano, Francesco Longo |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIV, 396 p. 163 illus.) |
Disciplina | 004.685 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Computers Special purpose computers Computer security Data structures (Computer science) Electrical engineering Computer Communication Networks Information Systems and Communication Service Special Purpose and Application-Based Systems Systems and Data Security Data Structures and Information Theory Communications Engineering, Networks |
ISBN | 3-319-67910-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Internet of Things -- SustainaBLE: a Power-Aware Algorithm for Greener Industrial IoT Networks -- The 3D redeployment of nodes in Wireless Sensor Networks with real testbed prototyping -- Semantic Resource Management of Federated IoT Testbeds -- Targeted Content Delivery to IoT Devices Using Bloom Filters -- Security -- Trust Based Monitoring Approach for Mobile Ad Hoc Networks -- An Implementation and Evaluation of the Security Features of RPL -- A ticket-based Authentication Scheme for VANETs preserving Privacy -- A Trust based Communication Scheme for Safety Messages Exchange in VANETs -- Smart City -- Mobility as the main enabler of opportunistic data dissemination in urban scenarios -- Analysis and classification of the vehicular traffic distribution in an urban area -- User-space network tunneling under a mobile platform: a case study for Android environments -- Mobile Crowd Sensing as an Enabler for People as a Service Mobile Computing -- Ad-hoc networks -- SVM- MUSIC Algorithm for Spectrum Sensing in Cognitive Radio Ad-Hoc Networks -- Optimization of a modular ad hoc land wireless system via distributed joint Source-Network Coding for correlated sensors -- AdhocInfra Toggle: Opportunistic Auto-configuration of Wireless Interface for Maintaining Data Sessions in WiFi Networks -- Simulation of AdHoc Networks Including Clustering and Mobility -- Implementations and validations -- Highlighting Some Shortcomings of the CoCoA+ Congestion Control Algorithm -- Experimental Evaluation of Non-Coherent MIMO Grassmannian Signaling Schemes.-WEVA: A Complete Solution for Industrial Internet of Things -- Validating Contact Times Extracted from Mobility Traces -- Wireless sensor networks. -Optimising Wireless Sensor Network Link Quality through Power Control with non-Convex Utilities using Game Theory -- Routing protocol enhancement for mobility support in wireless sensor networks -- Correlation-Free MultiPath Routing for Multimedia traffic in Wireless Sensor Networks -- Impact of Simulation Environment in Performance Evaluation of Protocols for WSNs. -Data management -- A Real-Time Query Processing System for WSN -- Centralized and distributed architectures: Approximation of the response time in a video surveillance system of road traffic by logarithm, power and linear functions -- Secure Storage as a Service in Multi-Cloud Environment -- Policy Management and Enforcement Using OWL and SWRL for the Internet of Things -- Wireless systems -- BSSACH: A Big Slot Scheduling Algorithms with Channel Hopping for Dynamic Wireless Sensor Networks -- A hybrid ant-genetic algorithm to solve a real deployment problem: a case study with experimental validation -- Interference Analysis of Nonlinear and Asynchronous OFDM in Multiuser Cognitive Radio Networks. |
Record Nr. | UNISA-996465550603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Ad-hoc, Mobile, and Wireless Networks : 16th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2017, Messina, Italy, September 20-22, 2017, Proceedings / / edited by Antonio Puliafito, Dario Bruneo, Salvatore Distefano, Francesco Longo |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIV, 396 p. 163 illus.) |
Disciplina | 004.685 |
Collana | Computer Communication Networks and Telecommunications |
Soggetto topico |
Computer communication systems
Computers Special purpose computers Computer security Data structures (Computer science) Electrical engineering Computer Communication Networks Information Systems and Communication Service Special Purpose and Application-Based Systems Systems and Data Security Data Structures and Information Theory Communications Engineering, Networks |
ISBN | 3-319-67910-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Internet of Things -- SustainaBLE: a Power-Aware Algorithm for Greener Industrial IoT Networks -- The 3D redeployment of nodes in Wireless Sensor Networks with real testbed prototyping -- Semantic Resource Management of Federated IoT Testbeds -- Targeted Content Delivery to IoT Devices Using Bloom Filters -- Security -- Trust Based Monitoring Approach for Mobile Ad Hoc Networks -- An Implementation and Evaluation of the Security Features of RPL -- A ticket-based Authentication Scheme for VANETs preserving Privacy -- A Trust based Communication Scheme for Safety Messages Exchange in VANETs -- Smart City -- Mobility as the main enabler of opportunistic data dissemination in urban scenarios -- Analysis and classification of the vehicular traffic distribution in an urban area -- User-space network tunneling under a mobile platform: a case study for Android environments -- Mobile Crowd Sensing as an Enabler for People as a Service Mobile Computing -- Ad-hoc networks -- SVM- MUSIC Algorithm for Spectrum Sensing in Cognitive Radio Ad-Hoc Networks -- Optimization of a modular ad hoc land wireless system via distributed joint Source-Network Coding for correlated sensors -- AdhocInfra Toggle: Opportunistic Auto-configuration of Wireless Interface for Maintaining Data Sessions in WiFi Networks -- Simulation of AdHoc Networks Including Clustering and Mobility -- Implementations and validations -- Highlighting Some Shortcomings of the CoCoA+ Congestion Control Algorithm -- Experimental Evaluation of Non-Coherent MIMO Grassmannian Signaling Schemes.-WEVA: A Complete Solution for Industrial Internet of Things -- Validating Contact Times Extracted from Mobility Traces -- Wireless sensor networks. -Optimising Wireless Sensor Network Link Quality through Power Control with non-Convex Utilities using Game Theory -- Routing protocol enhancement for mobility support in wireless sensor networks -- Correlation-Free MultiPath Routing for Multimedia traffic in Wireless Sensor Networks -- Impact of Simulation Environment in Performance Evaluation of Protocols for WSNs. -Data management -- A Real-Time Query Processing System for WSN -- Centralized and distributed architectures: Approximation of the response time in a video surveillance system of road traffic by logarithm, power and linear functions -- Secure Storage as a Service in Multi-Cloud Environment -- Policy Management and Enforcement Using OWL and SWRL for the Internet of Things -- Wireless systems -- BSSACH: A Big Slot Scheduling Algorithms with Channel Hopping for Dynamic Wireless Sensor Networks -- A hybrid ant-genetic algorithm to solve a real deployment problem: a case study with experimental validation -- Interference Analysis of Nonlinear and Asynchronous OFDM in Multiuser Cognitive Radio Networks. |
Record Nr. | UNINA-9910484342203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2023 / / edited by Raghavendra Rao Chillarige, Salvatore Distefano, Sandeep Singh Rawat |
Autore | Chillarige Raghavendra Rao |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (430 pages) |
Disciplina | 006.3 |
Altri autori (Persone) |
DistefanoSalvatore
RawatSandeep Singh |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Machine learning Big data Telecommunication Computational Intelligence Machine Learning Big Data Communications Engineering, Networks |
ISBN | 981-9747-27-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- ICACII2023 Committee -- Foreword -- Preface -- Contents -- Editors and Contributors -- Optimizing Complex Challenges: Harnessing the Power of Genetic Algorithms and the Nelder-Mead Simplex Algorithm for Effective Problem Solving -- 1 Introduction -- 2 Overview of GA and NMA -- 2.1 Genetic Algorithm -- 2.2 Nelder-Mead Algorithm -- 3 Hybrid Genetic Algorithm with Nelder-Mead Simplex Algorithm (HGANM) -- 4 Benchmark Functions -- 4.1 Experimental Configuration -- 4.2 Result and Analysis -- 5 Real-Life Problems -- 5.1 Experimental Setup -- 5.2 Analysis and Outcome -- 6 Conclusion -- References -- State-of-the-Art Techniques and Evaluation Criteria for Mobile Application Offloading in Heterogeneous Networks: A Comprehensive Survey of Computation, Data, and Energy Offloading Approaches -- 1 Introduction -- 2 Background -- 2.1 Offloading Techniques -- 2.2 Literature Survey -- 2.3 Current Gaps in Research and Opportunities for Future Work -- 3 Conclusion -- References -- IDSSA: An Intrusion Detection System with Self-adaptive Capabilities for Strengthening the IoT Network Security -- 1 Introduction -- 1.1 Objectives of the Research -- 2 Related Works -- 3 Proposed System -- 3.1 NSL-KDD Dataset -- 3.2 Preprocessing -- 3.3 DNS and EAT -- 4 Results and Discussions -- 5 Conclusion and Future Scope -- References -- Privacy and Security Aspects of Indian Population While Using Online Social Network: An Analysis -- 1 Introduction -- 2 Related Work -- 3 Methodology -- 4 Results and Analysis -- 5 Conclusion -- References -- Digital HR Strategy in the Modern Business Environment of Ukraine in Conditions of Uncertainty -- 1 Introduction -- 2 Literature Review -- 3 Methodological Approach -- 4 Conducting the Research and the Results -- 5 Conclusion and Discussion -- References.
A Model for Quality Management in Industrial Products Based on Machine Learning and Image Processing Techniques -- 1 Introduction -- 2 Related Work -- 3 Our Work -- 3.1 Proposed Algorithm -- 3.2 Working Process -- 4 Conclusion -- References -- An Extensive Study on Financial Fraud Detection Using Artificial Intelligence-Based Models -- 1 Introduction -- 1.1 Overview to Big Data -- 1.2 Digital Banking -- 2 Data -- 2.1 Data Collection -- 2.2 Data Organization -- 2.3 Data Modality -- 3 Types of Financial Fraud -- 4 Financial Crime Compliance Risk -- 4.1 Identity Theft -- 4.2 Financial Declaration Fraud and Insurance Fraud -- 4.3 Anti-Money Laundering -- 4.4 Trafficking and Sanctions -- 5 Financial Fraud Finding Challenges and Future Instructions -- 5.1 Futures of Digital Banking -- 6 Conclusion -- References -- Exploring the State of the Art in Mobile Agent Computing: A Comparative Study of Adaptive Fault Tolerance, Security, Transaction, and Multicore Support -- 1 Introduction -- 2 Recent Techniques of Mobile Agent Computing -- 2.1 Lightweight Agent Platforms -- 2.2 Agent Migration Strategies -- 2.3 Context-Awareness -- 2.4 Security and Trust Management -- 2.5 Fault Tolerance and Resilience -- 2.6 Energy Efficiency -- 2.7 Machine Learning Integration -- 3 Comparative Table for Adaptive Fault Tolerant in the State of Art of Mobile Agent Computing: Security, Fault Tolerance, Transaction, and Multicore Support -- 4 Development of Mobile Agent Computing -- 4.1 Early Research -- 4.2 Platform Development -- 4.3 Agent Migration Strategies -- 4.4 Security and Trust Management -- 4.5 Application Development -- 4.6 Standardization Efforts -- 4.7 Performance Optimization -- 4.8 Context-Awareness and Intelligence -- 4.9 Mobile Agent Middleware -- 5 Conclusion -- References. Leveraging Bidirectional Encoder Representations from Transformers (BERT) for Enhanced Sentiment Analysis -- 1 Introduction -- 2 Problem Statement -- 2.1 Exploring BERT-Driven Models Across Various Domains -- 3 BERT Architecture -- 4 Applications of BERT Techniques -- 5 Significance of BERT for Sentiment Analysis -- 6 Methodology for BERT in Sentiment Analysis -- 7 Conclusion -- References -- Securing the Future of Connected Cars: Investigating Vulnerabilities and Preventing Cyberattacks -- 1 Introduction -- 2 Literature Review -- 3 Types of Attacks -- 3.1 Malware Attacks -- 3.2 Wireless Attacks -- 4 Methods of Detecting and Preventing Attacks -- 5 Future Directions in Connected Car Security -- 6 Conclusion -- References -- Smart Surveillance Using OpenCV -- 1 Introduction -- 1.1 Objective -- 2 Related Work -- 2.1 A Hybrid Algorithm for Tracking and Counting Many Persons in Smart Surveillance -- 2.2 Performance Evaluation of the Intelligent Traffic Surveillance System's Object Detection Algorithm -- 2.3 Crowd Counting and Detection of Normal/Abnormal Events Using Multi-Person Tracking in a Smart Surveillance System -- 2.4 Raspberry Pi-Based IoT-Based Smart Surveillance and Security System -- 2.5 Intelligent Video Security Surveillance with Mobile Remote Control -- 3 Proposed Method -- 3.1 Structural Similarity Index Metric (SSIM) -- 3.2 Detecting Faces in the Frames -- 3.3 Look for Background Noise -- 3.4 Local Binary Pattern Histogram (LBPH) -- 4 Experimental Results -- 4.1 Feature 1-Monitor -- 4.2 Feature 2-Action Detection -- 4.3 Feature 3-Rectangle -- 4.4 Feature 4-Record -- 4.5 Feature 5-Identify -- 4.6 Feature 6-In and Out -- 5 Conclusion -- References -- Hyperspectral Band Selection Considering Spectral and Spatial Information -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 5 Proposed System. 5.1 System Specifications -- 5.2 Block Diagram -- 5.3 Methodology -- 6 Experimental Setup and Results -- 6.1 Results -- 7 Summary and Future Scope -- References -- Water Pumping Requirement Prediction in Irrigation System Using Internet of Things-Assisted Machine Intelligence-Based Approach -- 1 Introduction -- 2 Related Works -- 3 Methodology -- 4 Results -- 5 Conclusion -- References -- Hybrid Method for Discovering DDOS Attack -- 1 Introduction -- 2 Objectives -- 3 Scope -- 4 Methodology -- 5 System Architecture -- 5.1 Algorithms -- 5.2 Data Set -- 5.3 Data Preprocessing -- 5.4 Results -- 6 Conclusions -- References -- A Novel Chaotic Map-Based Noise-Resistant Image Encryption Scheme for Medical Images -- 1 Introduction -- 2 Proposed Method -- 2.1 Encryption -- 3 Simulation Results -- 3.1 Encryption Efficiency Analysis -- 4 Conclusion -- References -- Survey of Attacks, Detection Techniques, and Evaluation Metrics in Wireless Sensor Networks -- 1 Introduction -- 1.1 Overview of Wireless Sensor Networks -- 2 Key Characteristics and Challenges -- 3 The Importance of Security in WSN -- 4 Different Protocols Used in WSN -- 5 Literature Review of Layerwise Attacks in WSN -- 6 Detection and Evaluation Metrics -- 7 Conclusion -- References -- Big Data's Ethical Frontier: Addressing Concerns in Data Acquisition and Analysis -- 1 Introduction -- 2 Ethical Challenges in Big Data -- 3 Cambridge Analytica Scandal -- 4 Aadhaar Data Leak -- 4.1 Ethical Concerns in Data Analysis and Regulatory Framework -- 5 Conclusion -- References -- Evaluating Security Risks and Protecting Conversational AI: An in-Depth Vulnerability Assessment and Security Testing of the ChatGPT Android Application -- 1 Introduction -- 2 Methodology -- 3 Results -- 4 Conclusion -- References -- Neural Networks and GPU-Based Weed Detection Under Varying Light Illumination -- 1 Introduction. 2 Proposed System -- 2.1 Dataset and Process Flow -- 2.2 Feature Extraction -- 2.3 Feature Selection -- 2.4 Methodology Used -- 2.5 Faster RCNN Algorithm -- 2.6 CNN Implementation Algorithm -- 3 Conclusion -- References -- Intelligent ECG-Based COVID-19 Diagnose Device Using CNN Deep Learning Approaches -- 1 Introduction -- 2 Literature Review -- 3 Techniques -- 3.1 Document Search -- 3.2 Search Methods -- 3.3 Restrictions -- 3.4 Presence in the Review Publication -- 4 Deep Convolution Transfer Learning via Neural Networks -- 4.1 Methodology -- 4.2 Different Abnormalities in ECG Images -- 5 Implementation -- 6 Conclusion -- References -- Analyzing Twitter Data Using Apache Hive-A Big Data Technology Exploration -- 1 Introduction -- 2 Big Data and Twitter Data Analysis -- 3 Experimental Setup -- 4 Conclusion -- References -- Detection of Phishing Websites Using Link Guard Algorithm -- 1 Introduction -- 2 Literature Survey -- 3 Problem Statement -- 4 Objectives -- 5 Existing Work -- 6 Proposed Work -- 6.1 Program Code -- 7 Methodology -- 8 Result -- 9 Conclusion -- References -- Forecasting Financial Commodities Using an Evolutionary Optimized Higher-Order Artificial Neural Network -- 1 Introduction -- 2 Method and Materials -- 2.1 Firefly Algorithm -- 2.2 Nelder-Mead Simplex Algorithm -- 2.3 Improved FFA -- 2.4 Pi-Sigma Neural Network -- 2.5 IFFA-PSNN Forecasting Model Training -- 3 Experimental Setup and Datasets -- 4 Results and Discussion -- 5 Conclusions -- References -- Plant Leaf Disease Classification Using GAN -- 1 Introduction -- 2 Problem Statement -- 3 Scope and Objectives -- 4 Literature Survey -- 4.1 Generative Adversarial Networks -- 4.2 VGG16 -- 4.3 Data Augmentation -- 4.4 Deep Learning -- 4.5 Data Preprocessing -- 5 Proposed System -- 5.1 System Specifications -- 5.2 Methodology -- 6 Functional Modules -- 7 Pseudocode. 8 Experimental Setup and Results. |
Record Nr. | UNINA-9910882898403321 |
Chillarige Raghavendra Rao | ||
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Computational Intelligence and Informatics : Proceedings of ICACII 2019 / / edited by Raghavendra Rao Chillarige, Salvatore Distefano, Sandeep Singh Rawat |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (414 pages) |
Disciplina | 006.3 |
Collana | Lecture Notes in Networks and Systems |
Soggetto topico |
Computational intelligence
Machine learning Bioinformatics Big data Electrical engineering Computational Intelligence Machine Learning Computational Biology/Bioinformatics Big Data Communications Engineering, Networks |
ISBN | 981-15-3338-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Extraction of Tumor Chunk Using Image Segmentation – Thresholding and HSV Color Space -- Predictive & Interactive IOT Diagnosis System with AI and ML Tools: Review -- Multi Agent Data Mining using Asymmetric AES Algorithm in Cloud Computing -- A Novel Architecture for a Two-Pass Opinion Mining Classifier -- QoS based Routing Algorithm for Software Defined Network using Ant Colony optimization -- An Integrated AdaBoost Algorithm for Down Syndrome Disease Recognition -- A Comprehensive Healthcare Model for a Smart Left Ventricle Assisting Device -- Moving Hand Segmentation from H.264 Compressed Sign Language Videos -- CNN-Based Real-time Indian Sign Language Recognition System -- Sarcasm Detection using Multiple Occurrences of Emojis and Hashtagged Words -- Multiclass Multiple Object Tracking -- Dimensionality Reduction in Hyperspectral Images using Auto-encoders -- Improved Registration of Infrared Images using EOH Descriptor -- Fine Grained Analysis of Bridging Social Capital with Triadic Analysis in a Co-Author Network -- Accumulation of Methodologies for Intensifying the Lifetime of the Wireless Sensor Networks -- A Multifactor Biometric Based User Authentication Protocol for IOT Networks -- Leveraging Topic Models with Novel Word Embeddings for Effective Document Clustering -- Survey on Access Control Mechanisms in Cloud Environments -- Sales Analysis and Performance of Super Store using Qlik Geo Analytics -- Assessment of Crop Rotation Using Multi Polarized Sentinel-1 Temporal SAR Data Over Parts of Kumaun Region of Uttarakhand -- Spatiotemporal and Delay Dynamics on a Prey Predator Fishery Model -- An Efficient Intrusion Detection System with Convolutional Neural Network -- Supervised Machine Learning Approach for Identification of Malicious URLs -- A Unified Framework for Stress Forecasting Using Machine Learning Algorithms -- Investigation and Analysis of Crop Maintenance Using IoT & KNN Techniques -- Enhancement of Anisotropic Diffusion Filtered Cardiac MR Images using Contrast based Fuzzy Approach -- Social Media Ecosystem: Review on Social Media Profile’s Security and Introduce a New Approach -- An Investigation on Managing Patient Flow at Hospital Emergency Care Unit using Tree-Based Data Mining Techniques -- A Path Based Model for Link Prediction in Location Based Social Networks -- Predicting the Cost of Pre-owned Cars using Linear Regression Mechanisms in Machine Learning -- Bio-Inspired High Utility Item Framework based Particle Swarm Optimization Tree Algorithms for Mining High Utility Itemset -- On Atom-Bond Connectivity Invariant of Graphs -- Theoretical Design and Experimental Study for Urban Data Management using Energy-Saved IoT Big Data -- An Effective Approach for Security Attacks Based on Machine Learning Algorithms -- Class Based Associative Classification using Super Subset to Predict the By-Diseases in Thyroid Disorders -- Recommendation of Diet using Hybrid Collaborative Filtering Learning Methods -- Classification of Natural Images Using Machine Learning Classifiers on Graph Based Approaches -- Convolutional Neural Network Based Diagnosis of Alzheimer’s Disease using Time Frequency features -- Humanly Evolving Robotics with Angular Sensor Control (HERASC) -- Post-occupancy Evaluation of Building Facilities in a University Community using an Electronic Platform -- Internet of Things: Demystifying Smart Cities & Communities -- Comparative Analysis of Optimizations of Antecedents and Consequents of Fuzzy Inference System Rules Lists using Genetic Algorithm Operations -- Uses and Impact of Social Media on Work Performance of Low Literate People -- A Comparative Analysis on Rumor Microblogs Detection from Social Network Sites -- Smart Sprint Methodology for Financial Management System Development -- A Novel Infrared Image Segmentation Method for Identifying the Faults in the Systems. |
Record Nr. | UNINA-9910484607303321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Quantitative assessments of distributed systems : methodologies and techniques / / edited by Dario Bruneo and Salvatore Distefano ; cover design by Russell Richardson |
Pubbl/distr/stampa | Salem, Massachusetts ; ; Hoboken, New Jersey : , : Scrivener Publishing : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (398 p.) |
Disciplina | 004.029 |
Collana | Performability Engineering Series |
Soggetto topico |
Computer systems - Evaluation - Mathematics
System analysis - Mathematics Electronic data processing - Distributed processing - Mathematical models Quantitative research |
ISBN |
1-119-13113-8
1-119-13115-4 1-119-13114-6 |
Classificazione | TEC008000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Contents; Preface; PART I VERIFICATION; 1 Modeling and Verification of Distributed Systems Using Markov Decision Processes; 1.1 Introduction; 1.2 Markov Decision Processes; 1.3 Markov Decision Well-Formed Net formalism; 1.4 Case study: Peer-to-Peer Botnets; 1.5 Conclusion; Appendices: Well-formed Net Formalism; A.0.1 Syntax of Basic Predicates; A.0.2 Markings and Enabling; References; 2 Quantitative Analysis of Distributed Systems in Stoklaim: A Tutorial; 2.1 Introduction; 2.2 StoKlaim: Stochastic Klaim; 2.2.1 Klaim in a Nutshell; 2.2.2 Syntactic Categories
2.2.3 StoKlaim Syntax2.2.4 StoKlaim at Work; 2.3 StoKlaim Operational Semantics; 2.3.1 Rate Transition Systems; 2.3.2 StoKlaim: RTS-based Semantics; 2.4 MoSL: Mobile Stochastic Logic; 2.5 jSAM: Java Stochastic Model-Checker; 2.6 Leader Election in StoKlaim; 2.6.1 As far as it can; 2.6.2 Asynchronous Leader Election; 2.7 Concluding Remarks; References; 3 Stochastic Path Properties of Distributed Systems: the CSLTA Approach; 3.1 Introduction; 3.2 The Reference Formalisms for System Definition; 3.3 The Formalism for Path Property Definition: CSLTA; 3.4 CSLTA at work: a Fault-Tolerant Node 3.5 Literature Comparison3.6 Summary and Final Remarks; References; PART II EVALUATION; 4 Failure Propagation in Load-Sharing Complex Systems; 4.1 Introduction; 4.2 Building Blocks; 4.2.1 Coarse-grained Modeling; 4.2.2 Abstract Mechanisms Impacting the Failure Occurrence; 4.2.3 Parametric Distributions Revisited; 4.2.4 Exponential Distribution; 4.2.5 Weibull Distribution; 4.2.6 Lognormal Distribution; 4.2.7 Other Distributions; 4.3 Sand Box for Distributed Failures; 4.3.1 Failure Modes; 4.3.2 LOS and Stress Rupture; 4.4 Summary; References 5 Approximating Distributions and Transient Probabilities by Matrix Exponential Distributions and Functions5.1 Introduction; 5.2 Phase Type and Matrix Exponential Distributions; 5.3 Bernstein Polynomials and Expolynomials; 5.4 Application of BEs to Distribution Fitting; 5.5 Application of BEs to Transient Probabilities; 5.6 Conclusions; References; 6 Worst-Case Analysis of Tandem Queueing Systems Using Network Calculus; 6.1 Introduction; 6.2 Basic Network Calculus Modeling: Per-fl ow Scheduling; 6.2.1 Service Curve; 6.2.2 Arrival Curve; 6.2.3 Delay and Backlog Bounds; 6.2.4 Numerical Examples 6.3 Advanced Network Calculus Modeling: Aggregate Multiplexing6.3.1 Aggregate-multiplexing Schemes; 6.4 Tandem Systems Traversed by Several Flows; 6.4.1 Model; 6.4.2 Loss of the Tightness; 6.4.3 Separated-flow Analysis; 6.5 Mathematical Programming Approach; 6.5.1 Blind Multiplexing; 6.5.2 FIFO Multiplexing; 6.6 Related Work; 6.7 Numerical Results; 6.8 Conclusions; References; 7 Cloud Evaluation: Benchmarking and Monitoring; 7.1 Introduction; 7.2 Benchmarking; 7.2.1 Benchamrking State of Art; 7.2.2 Benchmarking Big Data Services; 7.3 Benchmarking with mOSAIC; 7.4 Monitoring 7.4.1 Monitoring Problem Scenarios |
Record Nr. | UNINA-9910131281903321 |
Salem, Massachusetts ; ; Hoboken, New Jersey : , : Scrivener Publishing : , : Wiley, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Quantitative assessments of distributed systems : methodologies and techniques / / edited by Dario Bruneo and Salvatore Distefano ; cover design by Russell Richardson |
Pubbl/distr/stampa | Salem, Massachusetts ; ; Hoboken, New Jersey : , : Scrivener Publishing : , : Wiley, , 2015 |
Descrizione fisica | 1 online resource (398 p.) |
Disciplina | 004.029 |
Collana | Performability Engineering Series |
Soggetto topico |
Computer systems - Evaluation - Mathematics
System analysis - Mathematics Electronic data processing - Distributed processing - Mathematical models Quantitative research |
ISBN |
1-119-13113-8
1-119-13115-4 1-119-13114-6 |
Classificazione | TEC008000 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover; Title Page; Copyright Page; Contents; Preface; PART I VERIFICATION; 1 Modeling and Verification of Distributed Systems Using Markov Decision Processes; 1.1 Introduction; 1.2 Markov Decision Processes; 1.3 Markov Decision Well-Formed Net formalism; 1.4 Case study: Peer-to-Peer Botnets; 1.5 Conclusion; Appendices: Well-formed Net Formalism; A.0.1 Syntax of Basic Predicates; A.0.2 Markings and Enabling; References; 2 Quantitative Analysis of Distributed Systems in Stoklaim: A Tutorial; 2.1 Introduction; 2.2 StoKlaim: Stochastic Klaim; 2.2.1 Klaim in a Nutshell; 2.2.2 Syntactic Categories
2.2.3 StoKlaim Syntax2.2.4 StoKlaim at Work; 2.3 StoKlaim Operational Semantics; 2.3.1 Rate Transition Systems; 2.3.2 StoKlaim: RTS-based Semantics; 2.4 MoSL: Mobile Stochastic Logic; 2.5 jSAM: Java Stochastic Model-Checker; 2.6 Leader Election in StoKlaim; 2.6.1 As far as it can; 2.6.2 Asynchronous Leader Election; 2.7 Concluding Remarks; References; 3 Stochastic Path Properties of Distributed Systems: the CSLTA Approach; 3.1 Introduction; 3.2 The Reference Formalisms for System Definition; 3.3 The Formalism for Path Property Definition: CSLTA; 3.4 CSLTA at work: a Fault-Tolerant Node 3.5 Literature Comparison3.6 Summary and Final Remarks; References; PART II EVALUATION; 4 Failure Propagation in Load-Sharing Complex Systems; 4.1 Introduction; 4.2 Building Blocks; 4.2.1 Coarse-grained Modeling; 4.2.2 Abstract Mechanisms Impacting the Failure Occurrence; 4.2.3 Parametric Distributions Revisited; 4.2.4 Exponential Distribution; 4.2.5 Weibull Distribution; 4.2.6 Lognormal Distribution; 4.2.7 Other Distributions; 4.3 Sand Box for Distributed Failures; 4.3.1 Failure Modes; 4.3.2 LOS and Stress Rupture; 4.4 Summary; References 5 Approximating Distributions and Transient Probabilities by Matrix Exponential Distributions and Functions5.1 Introduction; 5.2 Phase Type and Matrix Exponential Distributions; 5.3 Bernstein Polynomials and Expolynomials; 5.4 Application of BEs to Distribution Fitting; 5.5 Application of BEs to Transient Probabilities; 5.6 Conclusions; References; 6 Worst-Case Analysis of Tandem Queueing Systems Using Network Calculus; 6.1 Introduction; 6.2 Basic Network Calculus Modeling: Per-fl ow Scheduling; 6.2.1 Service Curve; 6.2.2 Arrival Curve; 6.2.3 Delay and Backlog Bounds; 6.2.4 Numerical Examples 6.3 Advanced Network Calculus Modeling: Aggregate Multiplexing6.3.1 Aggregate-multiplexing Schemes; 6.4 Tandem Systems Traversed by Several Flows; 6.4.1 Model; 6.4.2 Loss of the Tightness; 6.4.3 Separated-flow Analysis; 6.5 Mathematical Programming Approach; 6.5.1 Blind Multiplexing; 6.5.2 FIFO Multiplexing; 6.6 Related Work; 6.7 Numerical Results; 6.8 Conclusions; References; 7 Cloud Evaluation: Benchmarking and Monitoring; 7.1 Introduction; 7.2 Benchmarking; 7.2.1 Benchamrking State of Art; 7.2.2 Benchmarking Big Data Services; 7.3 Benchmarking with mOSAIC; 7.4 Monitoring 7.4.1 Monitoring Problem Scenarios |
Record Nr. | UNINA-9910809546503321 |
Salem, Massachusetts ; ; Hoboken, New Jersey : , : Scrivener Publishing : , : Wiley, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|