Sciweavers

CNSM
2010
13 years 9 months ago
PRESS: PRedictive Elastic ReSource Scaling for cloud systems
Cloud systems require elastic resource allocation to minimize resource provisioning costs while meeting service level objectives (SLOs). In this paper, we present a novel PRedictiv...
Zhenhuan Gong, Xiaohui Gu, John Wilkes
CNSM
2010
13 years 9 months ago
Leveraging ESM platforms for continuous mission-oriented assessment of information assurance
This paper describes how information collected by enterprise system management (ESM) platforms can be utilized in a novel approach to assess the information assurance delivered by ...
Amy Fedyk, Michael Atighetchi, Partha Pratim Pal
CNSM
2010
13 years 9 months ago
Joint analysis of network incidents and intradomain routing changes
Abstract--This paper studies how intradomain routing instability relates to events in network trouble tickets for two networks: a VPN provider and the Internet2 backbone network. O...
Amelie Medem Kuatse, Renata Teixeira, Nick Feamste...
CNSM
2010
13 years 9 months ago
Near optimal demand-side energy management under real-time demand-response pricing
Abstract--In this paper, we present demand-side energy management under real-time demand-response pricing as a task scheduling problem which is NP-hard. Using minmax as the objecti...
Jin Xiao, Jae Yoon Chung, Jian Li, Raouf Boutaba, ...
CNSM
2010
13 years 9 months ago
DP+IP = design of efficient backup scheduling
Many industries experience an explosion in digital content. This explosion of electronic documents, along with new regulations and document retention rules, sets new requirements f...
Ludmila Cherkasova, Alex Zhang, Xiaozhou Li
CNSM
2010
13 years 9 months ago
Trust management for Web Services
Service-Oriented Architecture (SOA) is increasingly used in enterprise information systems, particularly in the form of Web Services. This paper describes a practical trust managem...
Scott D. Stoller
CNSM
2010
13 years 9 months ago
Gossip-based resource management for cloud environments
1 We address the problem of resource management for a large-scale cloud environment that hosts sites. Our contribution centers around outlining a distributed middleware architectur...
Fetahi Wuhib, Rolf Stadler, Mike Spreitzer
CNSM
2010
13 years 9 months ago
Decomposition techniques for policy refinement
Abstract--The automation of policy refinement, whilst promising great benefits for policy-based management, has hitherto received relatively little treatment in the literature, wit...
Robert Craven, Jorge Lobo, Emil C. Lupu, Alessandr...
CNSM
2010
13 years 9 months ago
Effective acquaintance management for Collaborative Intrusion Detection Networks
Abstract--An effective Collaborative Intrusion Detection Network (CIDN) allows distributed Intrusion Detection Systems (IDSes) to collaborate and share their knowledge and opinions...
Carol J. Fung, Jie Zhang, Raouf Boutaba
CNSM
2010
13 years 9 months ago
A performance view on DNSSEC migration
In July 2008, the Kaminsky attack showed that DNS is sensitive to cache poisoning, and DNSSEC is considered the long term solution to mitigate this attack. A lot of technical docum...
Daniel Migault, Cedric Girard, Maryline Laurent