3225 Chapters
Medium 9781601322456

Multi-objective Evolutionary Optimization of Cloud Service Provider Selection Problems

Hamid R. Arabnia; Ray R. Hashemi; George Jandieri; Ashu M. G. Solo; and Fernando G. Tinetti (Editors) Mercury Learning and Information PDF

Int'l Conf. Genetic and Evolutionary Methods | GEM'13 |

135

Multi-objective Evolutionary Optimization of Cloud

Service Provider Selection Problems

Cheng-Yuan Lin

Jian-Hung Chen*

Dept of Computer Science and Information Engineering

Chung-Hua University

Hsin-Chu, Taiwan m09902021@chu.edu.tw

Dept of Computer Science and Information Engineering

Chung-Hua University

Hsin-Chu, Taiwan jh.chen@ieee.org*

Abstract—This paper describes a multi-objective evolutionary approach for solving cloud computing service provider selection problems with dynamic demands. In this investigated problem, not only the service purchase costs and transmission costs of service providers are different, but the demands of service requests also change over the given periods. The objective of this problem is to select a number of cloud service provider while optimizing the total service distance, the total number of serviced demand points, the total service purchase costs, and total transmission costs simultaneously in the given continuous time periods. A multi-objective genetic approach with an inheritance mechanism is proposed to solve the investigated problems. Four trail benchmark problems are designed and solved using the proposed multi-objective evolutionary algorithm. The results indicate that the proposed approach is capable of obtaining a number of non-dominated solutions for decision makers.

See All Chapters
Medium 9781601323279

An Interoperability Framework for Security Policy Languages

Kevin Daimi, Hamid R. Arabnia, Samiha Ayed, Michael R. Grimaila, Hanen Idoudi, George Markowsky, and Ashu M. G. Solo CSREA Press PDF

Int'l Conf. Security and Management | SAM'14 |

283

An Interoperability Framework for Security Policy Languages

Amir Aryanpour, Edmond Parkash, University of Bedfordshire, UK

Andrew Harmel-Law , Scott Davies , Technology Service, Capgemini UK

Abstract— In today’s economy, whilst corporations are looking to control costs and still driving productivity, the cost of acquiring and maintaining a company’s software is under the spotlight. IT departments are under pressure to deliver more services, in shorter amounts of time, and with ever decreasing budgets; hence, IT departments are willing to invest in and choose technologies that provide more business value at a lower cost. Taking these facts into account, and bearing in mind that a number of security policy languages available and the majority of scenarios covered by them are similar, this paper proposes a framework that understands security domains and provides users with an abstract security policy language, which can be translated into the desired policy language as per framework’s configuration.

See All Chapters
Medium 9781683921912

Science, Technology, Engineering and Mathematics- STEM Education and Computational Science

Edited by Hamid R. Arabnia, Leonidas Deligiannidis, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Frontiers in Education: CS and CE | FECS'17 |

SESSION

SCIENCE, TECHNOLOGY, ENGINEERING AND

MATHEMATICS - STEM EDUCATION AND

COMPUTATIONAL SCIENCE

Chair(s)

TBA

ISBN: 1-60132-457-X, CSREA Press ©

1

2

Int'l Conf. Frontiers in Education: CS and CE | FECS'17 |

ISBN: 1-60132-457-X, CSREA Press ©

Int'l Conf. Frontiers in Education: CS and CE | FECS'17 |

3

Increasing Awareness and Participation in Computer

Science Education

David Hicks

Electrical Engineering and Computer Science

Frank H. Dotterweich College of Engineering

Texas A&M University-Kingsville david.hicks@tamuk.edu

Abstract - This paper reports on an ongoing project that focuses on increasing awareness of and interest in computer science among students at a high school in a South Texas community. An important activity of the project has been teaching a computer science course to the high school students. The information learned during the course helps students in preparing for a popular interscholastic computer science competition, and has served as an effective student incentive during the project. The scores received by students in the competition are analyzed to compare their performance before and after having taken the computer science course.

See All Chapters
Medium 9789381159057

Ch-8

Anoop Chaturvedi ; B.L. Rai Laxmi Publications PDF

70

U NIX

AND

S HELL P ROGRAMMING

Chapter

STRUCTURE

OF A

8

P ROCESS

The Kernel contains a process table with an entry that describes the state of every active process in the system. The u-area contains additional information that controls the operation of a process. The process table entry and the u-area are part of the context of a process. The aspect of the process context that most visibly distinguishes it from the context of another process is of course, the contents of its address space.

8.1 PROCESS STATES AND TRANSITIONS

The following list contains the complete set of process states.

(i)

The process is executing in user mode.

(ii)

The process is executing in Kernel mode.

(iii)

The process is not executing but is ready to run as soon as the Kernel schedules it.

(iv)

The process is sleeping and resides in main memory.

(v)

The process is ready to run, but the swapper (schedule process O) must swap the process into main memory before the Kernel can schedule it to execute.

(vi)

The process is sleeping and the swapper has swapped the process to secondary storage to make room for other processes in main memory.

See All Chapters
Medium 9781601323613

SESSION Cluster and Distributed Computing + Supercomputing

Hamid Arabnia, Ashu M. G. Solo, Fernando G. Tinetti CSREA Press PDF

Int'l Conf. Grid, Cloud, & Cluster Computing | GCC'16 |

33

SESSION

CLUSTER AND DISTRIBUTED COMPUTING +

SUPERCOMPUTING

Chair(s)

TBA

ISBN: 1-60132-436-7, CSREA Press ©

34

Int'l Conf. Grid, Cloud, & Cluster Computing | GCC'16 |

ISBN: 1-60132-436-7, CSREA Press ©

Int'l Conf. Grid, Cloud, & Cluster Computing | GCC'16 |

35

Distributed� Collaborative� Caching�

Wardwell, Steven

Contact Author

Department of Computer Science,

Rochester Institute of Technology,

70-3005 102 Lomb Memorial Drive,

Rochester New York, 14623 United States sjw1579@rit.edu

Bischof, Hans-Peter

Department of Computer Science,

Center for Computational Relativity and Gravitation,

Rochester Institute of Technology,

Rochester New York, 14623 United States hpb@cs.rit.edu

Abstract— In this paper we explore distributed collaborative caching. Caching in distributive networks can improve data access performance and reduce dense communication between the client and the server. Collaborative caching can improve caching by allowing clients to share and organize

See All Chapters

See All Chapters