Economics of Grids, Clouds, Systems, and Services: 17th International Conference, GECON 2020, Izola, Slovenia, September 15–17, 2020, Revised Selected Papers

Blockchain technology is developing rapidly, andmany companies that develop and apply blockchain technology have gradually risen. Most companies choose to use the consortium blockchain. Because the consortium blockchain is for small-scale groups or institutions, identity authentication is required to join the consortium blockchains. Therefore, security can be guaranteed to a certain extent. Blockchain is often considered as a distributed accounting system. An important mechanism to ensure the stable operation of this accounting system is to ensure consistency among the distributed ledgers. The consensus mechanism in the blockchain is the algorithm that accomplishes this function. To improve throughput, many consortium blockchains use message queues as the consensus algorithm. However, the message queue consensus cannot tolerate malicious nodes. Aiming at this problem, this paper designs and implements a consensus for message queue based on Byzantine fault tolerance, which improves and combines message queue and PBFT. Moreover, it is verified through experiments that the consensus algorithm can reach the general level of TPS. The system can still operate normally when malicious nodes appear within the tolerable range, which has certain robustness and efficiency.

[1]  Zhiying Xu,et al.  A Survey of Blockchain Applications in Different Domains , 2018, ICBTA.

[2]  Kazuhiko Kato,et al.  Power-saving in storage systems for Internet hosting services with data access prediction , 2013, 2013 International Green Computing Conference Proceedings.

[3]  Yves Pigneur,et al.  Privacy-Friendly Business Models for Location-Based Mobile Services , 2011, J. Theor. Appl. Electron. Commer. Res..

[4]  Satoshi Sekiguchi,et al.  Reactive consolidation of virtual machines enabled by postcopy live migration , 2011, VTDC '11.

[5]  Jun Wang,et al.  RIMAC: a novel redundancy-based hierarchical cache architecture for energy efficient, high performance storage systems , 2006, EuroSys.

[6]  Parthasarathy Ranganathan,et al.  The Datacenter as a Computer: Designing Warehouse-Scale Machines, Third Edition , 2018, The Datacenter as a Computer.

[7]  Michaela Gläser-Zikuda,et al.  Examining student satisfaction with higher education services: using a new measurement tool , 2010 .

[8]  Diana Marculescu,et al.  Analysis of dynamic voltage/frequency scaling in chip-multiprocessors , 2007, Proceedings of the 2007 international symposium on Low power electronics and design (ISLPED '07).

[9]  Ashley A. Bush,et al.  Platform Evolution: Coevolution of Platform Architecture, Governance, and Environmental Dynamics , 2010 .

[10]  Yiying Zhang,et al.  LegoOS: A Disseminated, Distributed OS for Hardware Resource Disaggregation , 2018, OSDI.

[11]  Dirk Grunwald,et al.  Massive Arrays of Idle Disks For Storage Archives , 2002, ACM/IEEE SC 2002 Conference (SC'02).

[12]  Jian Li,et al.  Power-Performance Implications of Thread-level Parallelism on Chip Multiprocessors , 2005, IEEE International Symposium on Performance Analysis of Systems and Software, 2005. ISPASS 2005..

[13]  M. Gunal A guide for building hospital simulation models , 2012 .

[14]  Bernhard Egger,et al.  Efficient live migration of virtual machines using shared storage , 2013, VEE '13.

[15]  A. Sahasranaman,et al.  Network Structure of COVID-19 Spread and the Lacuna in India’s Testing Strategy , 2020, SSRN Electronic Journal.

[16]  R. C. Macridis A review , 1963 .

[17]  Giovanni Chiola,et al.  Distributed simulation of Petri nets , 1993, IEEE Parallel & Distributed Technology: Systems & Applications.

[18]  Paul Messina,et al.  The Exascale Computing Project , 2017, Comput. Sci. Eng..

[19]  Hilde A. M. Voorveld,et al.  Mobile Location-Based Advertising: How Information Privacy Concerns Influence Consumers' Attitude and Acceptance , 2015 .

[20]  Rosa M. Vasconcelos,et al.  Academic Expectations for Engineering Freshmen: Gender Differences , 2018, 2018 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE).

[21]  Scott Shenker,et al.  Network Requirements for Resource Disaggregation , 2016, OSDI.

[22]  Randy H. Katz,et al.  Heterogeneity and dynamicity of clouds at scale: Google trace analysis , 2012, SoCC '12.

[23]  Kartik Gopalan,et al.  Post-copy based live virtual machine migration using adaptive pre-paging and dynamic self-ballooning , 2009, VEE '09.

[24]  Daniel Hagimont,et al.  Welcome to zombieland: practical and energy-efficient memory disaggregation in a datacenter , 2018, EuroSys.

[25]  Hairong Li,et al.  Consumer Privacy Concerns and Preference for Degree of Regulatory Control , 2009 .

[26]  H. Jeff Smith,et al.  Information Privacy: Measuring Individuals' Concerns About Organizational Practices , 1996, MIS Q..

[27]  B. Stiller,et al.  Smart Contracts – Blockchains in the Wings , 2018 .

[28]  Shijun Liu,et al.  Performance Analysis of Service Clouds Serving Composite Service Application Jobs , 2018, 2018 IEEE International Conference on Web Services (ICWS).

[29]  José A. Bañares,et al.  Towards an Architecture Proposal for Federation of Distributed DES Simulators , 2019, GECON.

[30]  Nicholas R. Jennings,et al.  Software Engineering with Agents: Pitfalls and Pratfalls , 1999, IEEE Internet Comput..

[31]  Thomas F. Wenisch,et al.  PowerNap: eliminating server idle power , 2009, ASPLOS.

[32]  Peter Palensky,et al.  Demand Side Management: Demand Response, Intelligent Energy Systems, and Smart Loads , 2011, IEEE Transactions on Industrial Informatics.

[33]  Nikolas Ioannou,et al.  Phase-Based Application-Driven Hierarchical Power Management on the Single-chip Cloud Computer , 2011, 2011 International Conference on Parallel Architectures and Compilation Techniques.

[34]  Matjaž Perc,et al.  Forecasting COVID-19 , 2020, Frontiers in Physics.

[35]  Sam Lightstone,et al.  Physical Database Design: the database professional's guide to exploiting indexes, views, storage, and more , 2007 .

[36]  U. Weiser,et al.  Multiple clock and Voltage Domains for chip multi processors , 2009, 2009 42nd Annual IEEE/ACM International Symposium on Microarchitecture (MICRO).

[37]  Bernhard Egger,et al.  A machine learning approach to live migration modeling , 2017, SoCC.

[38]  Bernhard Egger,et al.  Optimizing Live Migration for Virtual Desktop Clouds , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.

[39]  Tran Le Huu Nghia The skills gap of Vietnamese graduates and final-year university students , 2018, Journal of Education and Work.

[40]  Matthew S. Eastin,et al.  Living in a big data world: Predicting mobile commerce activity through privacy concerns , 2016, Comput. Hum. Behav..

[41]  Peter Reichl,et al.  Interplay between Security Providers, Consumers, and Attackers: A Weighted Congestion Game Approach , 2011, GameSec.

[42]  Luca Benini,et al.  ANTAREX: A DSL-Based Approach to Adaptively Optimizing and Enforcing Extra-Functional Properties in High Performance Computing , 2018, 2018 21st Euromicro Conference on Digital System Design (DSD).

[43]  Thomas F. Wenisch,et al.  MultiScale: memory system DVFS with multiple memory controllers , 2012, ISLPED '12.

[44]  Ariel Rubinstein,et al.  A Course in Game Theory , 1995 .

[45]  Andreas Olofsson Epiphany-V: A 1024 processor 64-bit RISC System-On-Chip , 2016, ArXiv.

[46]  Shunjie Chen,et al.  Statistical and network analysis of 1212 COVID-19 patients in Henan, China , 2020, International Journal of Infectious Diseases.

[47]  Bernard P. Zeigler,et al.  Theory of Modeling and Simulation: Discrete Event & Iterative System Computational Foundations , 2018 .

[48]  L. Kaye,et al.  “I’d be expecting caviar in lectures”: the impact of the new fee regime on undergraduate students’ expectations of Higher Education , 2014 .

[49]  Yong-Jun Lee,et al.  Scheduling for Better Energy Efficiency on Many-Core Chips , 2015, JSSPP.

[50]  Kunle Olukotun,et al.  The Future of Microprocessors , 2005, ACM Queue.

[51]  Dong-Hee Shin,et al.  An acceptance model for smart watches: Implications for the adoption of future wearable technology , 2015, Internet Res..

[52]  Hiroshi Yamada,et al.  A Guideline for Selecting Live Migration Policies and Implementations in Clouds , 2014, 2014 IEEE 6th International Conference on Cloud Computing Technology and Science.

[53]  Fabrizio Gagliardi,et al.  The international race towards Exascale in Europe , 2019, CCF Trans. High Perform. Comput..

[54]  Vytautas Jancauskas,et al.  Patterns for High Performance Multiscale Computing , 2019, Future Gener. Comput. Syst..

[55]  Cristian Mahulea,et al.  Modular Petri net modeling of the Spanish health system , 2012, Proceedings of 2012 IEEE 17th International Conference on Emerging Technologies & Factory Automation (ETFA 2012).

[56]  Kuzman Ganchev,et al.  Nswap: A Network Swapping Module for Linux Clusters , 2003, Euro-Par.

[57]  Petter Svärd,et al.  Principles and Performance Characteristics of Algorithms for Live VM Migration , 2015, OPSR.

[58]  Dawid Weiss,et al.  Lingo: Search Results Clustering Algorithm Based on Singular Value Decomposition , 2004, Intelligent Information Systems.

[59]  Jean C. Walrand,et al.  How Bad Are Selfish Investments in Network Security? , 2011, IEEE/ACM Transactions on Networking.

[60]  Jon Iden,et al.  Using the ITIL Process Reference Model for Realizing IT Governance: An Empirical Investigation , 2014, Inf. Syst. Manag..

[61]  Richard M. Fujimoto,et al.  Research Challenges in Parallel and Distributed Simulation , 2016, ACM Trans. Model. Comput. Simul..

[62]  Arun Venkataramani,et al.  Black-box and Gray-box Strategies for Virtual Machine Migration , 2007, NSDI.

[63]  Marcos K. Aguilera,et al.  Can far memory improve job throughput? , 2020, EuroSys.

[64]  Gargi Dasgupta,et al.  Automatic problem extraction and analysis from unstructured text in IT tickets , 2017, IBM J. Res. Dev..

[65]  Burkhard Stiller,et al.  BUNKER: A Blockchain-based trUsted VNF pacKagE Repository , 2019, GECON.

[66]  Mahmut T. Kandemir,et al.  CPM in CMPs: Coordinated Power Management in Chip-Multiprocessors , 2010, 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis.

[67]  Matthieu Mastio,et al.  Distributed Agent-Based Traffic Simulations , 2018, IEEE Intelligent Transportation Systems Magazine.

[68]  Ricardo Bianchini,et al.  DeepDive: Transparently Identifying and Managing Performance Interference in Virtualized Environments , 2013, USENIX Annual Technical Conference.

[69]  Cristian Mahulea,et al.  A model-based approach for the specification and verification of clinical guidelines , 2014, Proceedings of the 2014 IEEE Emerging Technology and Factory Automation (ETFA).

[70]  Jun-Yeon Heo,et al.  Development of a scale to measure the quality of mobile location-based services , 2017 .

[71]  John B. Gilmer,et al.  Issues in event analysis for recursive simulation , 2005, Proceedings of the Winter Simulation Conference, 2005..

[72]  Przemysław Rokita,et al.  Predicting Popularity of Online Videos Using Support Vector Regression , 2017, IEEE Transactions on Multimedia.

[73]  Fabrice Bellard,et al.  QEMU, a Fast and Portable Dynamic Translator , 2005, USENIX ATC, FREENIX Track.

[74]  Huajun Chen,et al.  Learning from Ontology Streams with Semantic Concept Drift , 2017, IJCAI.

[75]  Li Shang,et al.  Multi-Optimization power management for chip multiprocessors , 2008, 2008 International Conference on Parallel Architectures and Compilation Techniques (PACT).

[76]  Bin Liu,et al.  KiloCore: A 32-nm 1000-Processor Computational Array , 2017, IEEE Journal of Solid-State Circuits.

[77]  Steve Mansfield-Devine,et al.  The growth and evolution of DDoS , 2015, Netw. Secur..

[78]  Marcos K. Aguilera,et al.  Remote regions: a simple abstraction for remote memory , 2018, USENIX ATC.

[79]  José A. Bañares,et al.  Model and Simulation Engines for Distributed Simulation of Discrete Event Systems , 2018, GECON.

[80]  Thomas F. Wenisch,et al.  DreamWeaver: architectural support for deep sleep , 2012, ASPLOS XVII.

[81]  Catherine Tucker,et al.  Social Networks, Personalized Advertising, and Privacy Controls , 2013 .

[82]  Hamish A. Carr,et al.  Jacobi Fiber Surfaces for Bivariate Reeb Space Computation , 2017, IEEE Transactions on Visualization and Computer Graphics.

[83]  Timothy W. Finin,et al.  Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.

[84]  Xiaohui Gu,et al.  CloudScale: elastic resource scaling for multi-tenant cloud systems , 2011, SoCC.

[85]  Juan Julián Merelo Guervós,et al.  Computing Minimal Siphons in Petri Net Models of Resource Allocation Systems: An Evolutionary Approach , 2014, PNSE @ Petri Nets.

[86]  Olivier Curé,et al.  Strider: A Hybrid Adaptive Distributed RDF Stream Processing Engine , 2017, International Semantic Web Conference.

[87]  Gheorghe Cosmin Silaghi,et al.  Marrying Big Data with Smart Data in Sensor Stream Processing , 2019, ISD.

[88]  G. Chowell,et al.  Transmission potential and severity of COVID-19 in South Korea , 2020, International Journal of Infectious Diseases.

[89]  Saurabh Dighe,et al.  Within-Die Variation-Aware Dynamic-Voltage-Frequency-Scaling With Optimal Core Allocation and Thread Hopping for the 80-Core TeraFLOPS Processor , 2011, IEEE Journal of Solid-State Circuits.

[90]  Rajkumar Buyya,et al.  Cost of Virtual Machine Live Migration in Clouds: A Performance Evaluation , 2009, CloudCom.

[91]  Lojini Logesparan,et al.  An introduction to future truly wearable medical devices—From application to ASIC , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.

[92]  José González,et al.  Thread shuffling: Combining DVFS and thread migration to reduce energy consumptions for multi-core systems , 2011, IEEE/ACM International Symposium on Low Power Electronics and Design.

[93]  Hock-Hai Teo,et al.  Alleviating Consumers' Privacy Concerns in Location-Based Services: A Psychological Control Perspective , 2004, ICIS.

[94]  Kang G. Shin,et al.  Efficient Memory Disaggregation with Infiniswap , 2017, NSDI.

[95]  Levent Yilmaz,et al.  Distributed Simulation: A Model Driven Engineering Approach , 2016 .

[96]  Yuanyuan Zhou,et al.  Hibernator: helping disk arrays sleep through the winter , 2005, SOSP '05.

[97]  G. Hinchliffe,et al.  Graduate identity and employability , 2011 .

[98]  Chike Okechuku,et al.  The effectiveness of Chinese print advertisements in North America. , 1988 .

[99]  Dzmitry Kliazovich,et al.  GreenCloud: a packet-level simulator of energy-aware cloud computing data centers , 2010, The Journal of Supercomputing.

[100]  C. Jason Woodard,et al.  Innovation in the Programmable Web: Characterizing the Mashup Ecosystem , 2009, ICSOC Workshops.

[101]  Haralambos Mouratidis,et al.  Recommender Systems Meeting Security: From Product Recommendation to Cyber-Attack Prediction , 2017, EANN.

[102]  Olivier Terzo,et al.  Heterogeneous Computing Architectures : Challenges and Vision , 2019 .

[103]  Mohammad Abdullah Al Faruque,et al.  Energy Management-as-a-Service Over Fog Computing Platform , 2015, IEEE Internet of Things Journal.

[104]  Shobharani Pacha,et al.  Semantic annotation of summarized sensor data stream for effective query processing , 2017, The Journal of Supercomputing.

[105]  Norman P. Jouppi,et al.  Single-ISA heterogeneous multi-core architectures for multithreaded workload performance , 2004, Proceedings. 31st Annual International Symposium on Computer Architecture, 2004..

[106]  Jiang-Xia Nan,et al.  The Method for Solving Bi-matrix Games with Intuitionistic Fuzzy Set Payoffs , 2019 .

[107]  Tomi Jaakkola,et al.  Effectiveness of learning objects in various instructional settings , 2006 .

[108]  Hai Jin,et al.  Live virtual machine migration with adaptive, memory compression , 2009, 2009 IEEE International Conference on Cluster Computing and Workshops.

[109]  Rafael Tolosana-Calasanz,et al.  Model-driven development of data intensive applications over cloud resources , 2018, Future Gener. Comput. Syst..

[110]  Hiroshi Sasaki,et al.  Power-capped DVFS and thread allocation with ANN models on modern NUMA systems , 2014, 2014 IEEE 32nd International Conference on Computer Design (ICCD).

[111]  Benjamin Letham,et al.  Forecasting at Scale , 2018, PeerJ Prepr..

[112]  Bernhard Schölkopf,et al.  A tutorial on support vector regression , 2004, Stat. Comput..

[113]  Paul Kiekens,et al.  Intelligent Textiles and Clothing for Ballistic and NBC Protection , 2012 .

[114]  Mike Butts,et al.  Synchronization through Communication in a Massively Parallel Processor Array , 2007, IEEE Micro.

[115]  Frank van Harmelen,et al.  Stream reasoning: A survey and outlook , 2017, Data Sci..

[116]  Daniel Jacobson,et al.  APIs: A Strategy Guide , 2011 .

[117]  Aaron Klein,et al.  Efficient and Robust Automated Machine Learning , 2015, NIPS.

[118]  Andrew Warfield,et al.  Live migration of virtual machines , 2005, NSDI.

[119]  Roel Wieringa,et al.  Design Science Methodology for Information Systems and Software Engineering , 2014, Springer Berlin Heidelberg.

[120]  Gul Muhammad Khan,et al.  Adaptive Resource Utilization Prediction System for Infrastructure as a Service Cloud , 2017, Comput. Intell. Neurosci..

[121]  Haoqiang Zheng,et al.  Power Aware NUMA Scheduler in VMware's ESXi Hypervisor , 2015, 2015 IEEE International Symposium on Workload Characterization.

[122]  Pierfrancesco Bellini,et al.  Performance assessment of RDF graph databases for smart city services , 2018, J. Vis. Lang. Comput..

[123]  Seung-Chan Kim,et al.  Expansion of Smartwatch Touch Interface from Touchscreen to Around Device Interface Using Infrared Line Image Sensors , 2015, Sensors.

[124]  C. Davies,et al.  Using reusable learning objects (RLOs) in wound care education: Undergraduate student nurse's evaluation of their learning gain. , 2018, Nurse education today.

[125]  Giles D'Souza,et al.  Antecedents and consequences of consumer privacy concerns: An empirical investigation , 2001 .

[126]  Bernard P. Zeigler,et al.  Modeling and simulation framework for value-based healthcare systems , 2018, Simul..

[127]  Mendel Rosenblum,et al.  It's Time for Low Latency , 2011, HotOS.

[128]  Roberto Beraldi,et al.  Distributed simulation of timed Petri nets. A modular approach using actors and Time Warp , 1999, IEEE Concurr..

[129]  Ethan L. Miller,et al.  Pergamum: Replacing Tape with Energy Efficient, Reliable, Disk-Based Archival Storage , 2008, FAST.

[130]  Vinay Kumar Reddy Chimmula,et al.  Time series forecasting of COVID-19 transmission in Canada using LSTM networks , 2020, Chaos, Solitons & Fractals.

[131]  Javier Martínez,et al.  A Petri net based deadlock prevention policy for flexible manufacturing systems , 1995, IEEE Trans. Robotics Autom..

[132]  Adrian Yanes,et al.  OpenWeather: a peer-to-peer weather data transmission protocol , 2011, ArXiv.

[133]  Nicholas Berente,et al.  Research Commentary - Data-Driven Computationally Intensive Theory Development , 2019, Inf. Syst. Res..

[134]  Yogendra Kumar Jain,et al.  Min Max Normalization Based Data Perturbation Method for Privacy Protection , 2011 .

[135]  Hock-Hai Teo,et al.  Privacy Considerations in Location-Based Advertising , 2005, Designing Ubiquitous Information Environments.

[136]  Ki Joon Kim,et al.  Shape and Size Matter for Smartwatches: Effects of Screen Shape, Screen Size, and Presentation Mode in Wearable Communication , 2017, J. Comput. Mediat. Commun..

[137]  Wes Sonnenreich,et al.  Return On Security Investment (ROSI) - A Practical Quantitative Modell , 2005, J. Res. Pract. Inf. Technol..

[138]  Petter Svärd,et al.  Evaluation of delta compression techniques for efficient live migration of large virtual machines , 2011, VEE '11.

[139]  Burkhard Stiller,et al.  MENTOR: The Design and Evaluation of a Protection Services Recommender System , 2019, 2019 15th International Conference on Network and Service Management (CNSM).

[140]  Surajit Chaudhuri,et al.  Table of Contents (pdf) , 2007, VLDB.

[141]  Paul J. Hart,et al.  PRIVACY CONCERNS AND INTERNET USE--A MODEL OF TRADE-OFF FACTORS. , 2003 .

[142]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[143]  Danh Le Phuoc,et al.  Semantic Stream Processing , 2019, Encyclopedia of Big Data Technologies.

[144]  Keqiu Li,et al.  Xen Live Migration with Slowdown Scheduling Algorithm , 2010, 2010 International Conference on Parallel and Distributed Computing, Applications and Technologies.

[145]  Lieven Eeckhout,et al.  Shared resource aware scheduling on power-constrained tiled many-core processors , 2016, J. Parallel Distributed Comput..

[146]  Suhaida Omar,et al.  Personalisation vs. Privacy: Consumer Perceptions of Location-based Advertising , 2015 .

[147]  David B. Greenberger,et al.  Development and Application of a Model of Personal Control in Organizations , 1986 .

[148]  Gu-Yeon Wei,et al.  Thread motion: fine-grained power management for multi-core systems , 2009, ISCA '09.

[149]  Junjuan Xia,et al.  Intelligent Offloading Strategy Design for Relaying Mobile Edge Computing Networks , 2020, IEEE Access.

[150]  Margaret Martonosi,et al.  An Analysis of Efficient Multi-Core Global Power Management Policies: Maximizing Performance for a Given Power Budget , 2006, 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06).

[151]  Trevor N. Mudge,et al.  Power: A First-Class Architectural Design Constraint , 2001, Computer.

[152]  Zohra Bellahsene,et al.  A survey of view selection methods , 2012, SGMD.

[153]  Burkhard Stiller,et al.  SEConomy: A Framework for the Economic Assessment of Cybersecurity , 2019, GECON.

[154]  Vlado Stankovski,et al.  QoS-Aware Orchestration of Network Intensive Software Utilities within Software Defined Data Centres , 2018, Journal of Grid Computing.

[155]  Quan Chen,et al.  PowerChief: Intelligent power allocation for multi-stage applications to improve responsiveness on power constrained CMP , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).

[156]  Philipp Haller,et al.  On the integration of the actor model in mainstream technologies: the scala perspective , 2012, AGERE! 2012.

[157]  Azzedine Boukerche,et al.  Optimized Federate Migration for Large-Scale HLA-Based Simulations , 2008, 2008 12th IEEE/ACM International Symposium on Distributed Simulation and Real-Time Applications.

[158]  Vaibhav Jain Fast Process Migration on Intel SCC using Lookup Tables (LUTs) , 2013 .

[159]  Daniel S. Kostyra,et al.  Decomposing the Effects of Online Customer Reviews on Brand, Price, and Product Attributes , 2015 .

[160]  Inderveer Chana,et al.  An intelligent regressive ensemble approach for predicting resource usage in cloud computing , 2019, J. Parallel Distributed Comput..

[161]  Kai Ma,et al.  Scalable power control for many-core architectures running multi-threaded applications , 2011, 2011 38th Annual International Symposium on Computer Architecture (ISCA).

[162]  Tao Zhou,et al.  Understanding location-based services users' privacy concern: An elaboration likelihood model perspective , 2017, Internet Res..

[163]  Michael Chapman,et al.  Control, means-ends, and agency beliefs : A new conceptualization and its measurement during childhood , 1988 .

[164]  Xavier Lorca,et al.  Entropy: a consolidation manager for clusters , 2009, VEE '09.

[165]  Tianqi Chen,et al.  XGBoost: A Scalable Tree Boosting System , 2016, KDD.

[166]  Yolande Berbers,et al.  Power-reduction techniques for data-center storage systems , 2013, CSUR.

[167]  Neha Narkhede,et al.  Kafka: The Definitive Guide: Real-Time Data and Stream Processing at Scale , 2017 .

[168]  P. Maillé,et al.  Of Threats and Costs: A Game-Theoretic Approach to Security Risk Management , 2011 .

[169]  Daniel Sánchez,et al.  Tailbench: a benchmark suite and evaluation methodology for latency-critical applications , 2016, 2016 IEEE International Symposium on Workload Characterization (IISWC).

[170]  Sai Zeng,et al.  Service Management of Blockchain Networks , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).

[171]  Anuket Bhaduri,et al.  User Controlled Privacy Protection in Location-Based Services , 2003 .

[172]  Xuemin Shen,et al.  Energy-Efficient UAV-Assisted Mobile Edge Computing: Resource Allocation and Trajectory Optimization , 2020, IEEE Transactions on Vehicular Technology.

[173]  Netsanet Haile,et al.  Value creation in software service platforms , 2016, Future Gener. Comput. Syst..

[174]  Ricardo Bianchini,et al.  Exploiting redundancy to conserve energy in storage systems , 2006, SIGMETRICS '06/Performance '06.

[175]  Panagiota Fatourou The Distributed Computing Column , 2010, Bull. EATCS.

[176]  Omer F. Rana,et al.  Characterising resource management performance in Kubernetes , 2018, Comput. Electr. Eng..

[177]  Enda Barrett,et al.  Predicting host CPU utilization in the cloud using evolutionary neural networks , 2018, Future Gener. Comput. Syst..

[178]  Gregorio Convertino,et al.  What data should I protect?: recommender and planning support for data security analysts , 2019, IUI.

[179]  Bernhard Egger,et al.  Efficiently Restoring Virtual Machines , 2013, International Journal of Parallel Programming.

[180]  B. Joseph,et al.  Concurrent validity of a measure of innovative cognitive style , 1984 .

[181]  Alena Yoke Teng Tan,et al.  The expectations gap for engineering field in Malaysia in the 21st century , 2017 .

[182]  Jörn Altmann,et al.  A Network Formation Model for Social Object Networks , 2015 .

[183]  Alain Bensoussan,et al.  Maintaining Diagnostic Knowledge-Based Systems: A Control-Theoretic Approach , 2009, Manag. Sci..

[184]  Mahmut T. Kandemir,et al.  DRPM: dynamic speed control for power management in server class disks , 2003, 30th Annual International Symposium on Computer Architecture, 2003. Proceedings..

[185]  Antonio Brogi,et al.  TOSCA in a Nutshell: Promises and Perspectives , 2014, ESOCC.

[186]  Mahdi Zargayouna,et al.  Two distribution methods for multiagent traffic simulations , 2018, Simul. Model. Pract. Theory.

[187]  Andy Hopper,et al.  Predicting the Performance of Virtual Machine Migration , 2010, 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[188]  Richard O. Sinnott,et al.  Performance Analysis of Large-Scale Distributed Stream Processing Systems on the Cloud , 2018, 2018 IEEE 11th International Conference on Cloud Computing (CLOUD).

[189]  M. R. Ferrández,et al.  Mathematical modeling of the spread of the coronavirus disease 2019 (COVID-19) taking into account the undetected infections. The case of China , 2020, Communications in Nonlinear Science and Numerical Simulation.

[190]  Coniferous softwood GENERAL TERMS , 2003 .

[191]  Danny Jones,et al.  VM Live Migration At Scale , 2018, VEE.

[192]  Tie-Yan Liu,et al.  LightGBM: A Highly Efficient Gradient Boosting Decision Tree , 2017, NIPS.

[193]  Heng Xu,et al.  Information Privacy Concerns: Linking Individual Perceptions with Institutional Privacy Assurances , 2011, J. Assoc. Inf. Syst..

[194]  Umesh Bellur,et al.  Towards a comprehensive performance model of virtual machine live migration , 2015, SoCC.

[195]  Gaël Varoquaux,et al.  Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..

[196]  Gerardo Rubino,et al.  Rare Event Analysis by Monte Carlo Techniques in Static Models , 2009, Rare Event Simulation using Monte Carlo Methods.

[197]  Umesh Bellur,et al.  On Selecting the Right Optimizations for Virtual Machine Migration , 2016, VEE.

[198]  Meeta Sharma Gupta,et al.  System level analysis of fast, per-core DVFS using on-chip switching regulators , 2008, 2008 IEEE 14th International Symposium on High Performance Computer Architecture.

[199]  Jin Qian,et al.  PARAID: A gear-shifting power-aware RAID , 2007, TOS.

[200]  Konstantinos Tserpes,et al.  Leveraging User Mobility and Mobile App Services Behavior for Optimal Edge Resource Utilization , 2019, COINS.

[201]  Albert Y. Zomaya,et al.  Energy-efficient data replication in cloud computing datacenters , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[202]  Jaehyuk Huh,et al.  Disaggregated Cloud Memory with Elastic Block Management , 2019, IEEE Transactions on Computers.

[203]  Sudarshan S. Chawathe Cost-Based Query-Rewriting for DynamoDB: Work in Progress , 2019, 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA).

[204]  Mohamed Bettaz,et al.  Performance comparison of high-level algebraic nets distributed simulation protocols , 1996, Winter Simulation Conference.

[205]  Suman Roy,et al.  A NMF-Based Learning of Topics and Clusters for IT Maintenance Tickets Aided by Heuristic , 2018, CAiSE Forum.

[206]  Rini T. Kaushik,et al.  GreenHDFS: towards an energy-conserving, storage-efficient, hybrid Hadoop compute cluster , 2010 .

[207]  Timothy Mattson,et al.  A 48-Core IA-32 message-passing processor with DVFS in 45nm CMOS , 2010, 2010 IEEE International Solid-State Circuits Conference - (ISSCC).

[208]  Danh Le Phuoc,et al.  A Native and Adaptive Approach for Unified Processing of Linked Streams and Linked Data , 2011, SEMWEB.

[209]  Luiz Fernando Bittencourt,et al.  Towards Virtual Machine Migration in Fog Computing , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[210]  Carsten Binnig,et al.  The End of Slow Networks: It's Time for a Redesign , 2015, Proc. VLDB Endow..

[211]  S. Bhatt,et al.  Report 12: The global impact of COVID-19 and strategies for mitigation and suppression , 2020 .

[212]  Thomas D. Burd,et al.  Energy efficient CMOS microprocessor design , 1995, Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences.

[213]  P. Hertog KNOWLEDGE-INTENSIVE BUSINESS SERVICES AS CO-PRODUCERS OF INNOVATION , 2000 .

[214]  Alejandro Duran,et al.  The Intel® Many Integrated Core Architecture , 2012, 2012 International Conference on High Performance Computing & Simulation (HPCS).

[215]  Reinoud Joosten,et al.  Comparing Alternatives to Measure the Impact of DDoS Attack Announcements on Target Stock Prices , 2017, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[216]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[217]  Xiaorui Wang,et al.  Utilization-Controlled Task Consolidation for Power Optimization in Multi-core Real-Time Systems , 2011, 2011 IEEE 17th International Conference on Embedded and Real-Time Computing Systems and Applications.

[218]  Dirk Grunwald,et al.  Aide de camp: asymmetric multi-core design for dynamic thermal management , 2004 .

[219]  Yong Jin Park,et al.  Personalized Ad in Your Google Glass? Wearable Technology, Hands-Off Data Collection, and New Policy Imperative , 2015, Journal of Business Ethics.

[220]  Youngsu Cho,et al.  Towards Economical Live Migration in Data Centers , 2020, GECON.