Social-Aware Video Multicast Based on Device-to-Device Communications Abstract? Social-Aware Video Multicast Based on Device-to-Device Communications. To meet the explosive demand on delivering high-de?nition video steams over cellular networks, we design a Social-aware video multiCast < SoCast > system leveraging device-to-device (D2D) communications. One salient feature of SoCast is to stimulate effective cooperation among mobile users…
Space Shuffle: A Scalable, Flexible, and High-Performance Data Center Network Abstract?The increasing need of cloud and big data applications requires data center networks to be scalable and bandwidth-rich. Current data center network architectures often use rigid topologies to increase network bandwidth. A major limitation is that they can hardly support incremental network growth. < final...
SWIPER: EXPLOITING VIRTUAL MACHINE VULNERABILITY IN THIRD-PARTY CLOUDS WITH COMPETITION FOR I/O RESOURCES Abstract?SWIPER: EXPLOITING VIRTUAL MACHINE VULNERABILITY IN THIRD-PARTY CLOUDS WITH COMPETITION FOR I/O RESOURCES. The emerging paradigm of cloud computing, e.g., Amazon Elastic Compute Cloud (EC2), promises a highly flexible yet robust environment for large-scale applications. Ideally, while multiple virtual machines (VM) share…
Swiper: Exploiting Virtual Machine Vulnerability In Third-Party Clouds with Competition for I/O Resources Abstract? Swiper: Exploiting Virtual Machine Vulnerability In Third-Party Clouds with Competition for I/O Resources. The emerging paradigm of cloud computing, e.g., Amazon Elastic Compute Cloud (EC2), promises a highly ?exible yet robust environment for large-scale applications. Ideally, while multiple virtual machines (VM)…
Temporal Load Balancing with Service Delay Guarantee for Energy Cost Optimization in Internet Data Centers Abstract? Temporal Load Balancing with Service Delay Guarantee for Energy Cost Optimization in Internet Data Centers. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…
Towards Differential Query Services in Cost-Efficient Clouds Abstract?Cloud computing as an emerging technology trend is expected to reshape the advances in information technology. In a cost-efficient cloud environment, a user can tolerate a certain degree of delay while retrieving information from the cloud to reduce costs.< Final Year Projects > In this paper, we…
Towards Distributed Optimal Movement Strategy for Data Gathering in Wireless Sensor Networks Abstract? We address how to design a distributed movement strategy for mobile collectors, which can be either physical mobile agents or query/collector packets periodically launched by the sink, to achieve successful data gathering in wireless sensor networks. Formulating the problem as general random…
Towards Information Diffusion in Mobile Social Networks Abstract? Towards Information Diffusion in Mobile Social Networks. The emerging of mobile social networks opens opportunities for viral marketing. However, before fully utilizing mobile social networks as a platform for viral marketing, many challenges have to be addressed. In this paper, we address the < Final Year Projects...
Towards the Scheduling of Access Requests In Cloud Storage Abstract?In recent years, cloud computing has emerged as an enabling technology, in which virtual machine migration and dynamic resource allocation is one of the hot issues. During the migration of virtual machine, access requests from end users coming constantly. So how to schedule these requests to…
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds Abstract?Recent research has provided evidence indicating how a malicious user could perform coresidence profiling and public-to-private IP mapping to target and exploit customers which share physical resources. The attacks rely on two steps: resource placement on the target?s physical machine and…
Virtual machine power measuring technique with bounded error in cloud environments Abstract? Virtual machine power measuring technique with bounded error in cloud environments. Several fields of science have traditionally demanded large-scale workflow support, which requires thousands of CPU cores or more. In this paper, we investigate ways to support these scientific workflows in a…