Risk Assessment and Monitoring in Intelligent Data-Centric Systems
暂无分享,去创建一个
[1] Chunming Qiao,et al. An incrementally deployable network architecture to support both data-centric and host-centric services , 2014, IEEE Network.
[2] Samuel Kounev,et al. Analysis of the Performance-Influencing Factors of Virtualization Platforms , 2010, OTM Conferences.
[3] Andrea Bianco,et al. Power comparison of cloud data center architectures , 2016, 2016 IEEE International Conference on Communications (ICC).
[4] Albert Y. Zomaya,et al. Performance and Energy Efficiency Metrics for Communication Systems of Cloud Computing Data Centers , 2017, IEEE Transactions on Cloud Computing.
[5] Bedir Tekinerdogan,et al. Obstacles in Data Distribution Service Middleware: A Systematic Review , 2017, Future Gener. Comput. Syst..
[6] Hong Liu,et al. Jupiter Rising: A Decade of Clos Topologies and Centralized Control in Google's Datacenter Network , 2015, Comput. Commun. Rev..
[7] Alfredo De Santis,et al. A Cluster-Based Data-Centric Model for Network-Aware Task Scheduling in Distributed Systems , 2013, International Journal of Parallel Programming.
[8] Antonio Puliafito,et al. Information dependability in distributed systems: The dependable distributed storage system , 2014, Integr. Comput. Aided Eng..
[9] Daniel A. Menascé,et al. Virtualization: Concepts, Applications, and Performance Modeling , 2005, Int. CMG Conference.
[10] Amin Vahdat,et al. A scalable, commodity data center network architecture , 2008, SIGCOMM '08.
[11] Iman Saleh,et al. Specification and Verification of Data-Centric Web Services , 2010, 2010 6th World Congress on Services.
[12] Mauro Iacono,et al. Evaluating the impact of eDoS attacks to cloud facilities , 2016, EAI Endorsed Trans. Security Safety.
[13] Mauro Iacono,et al. Modeling Replication and Erasure Coding in Large Scale Distributed Storage Systems Based on CEPH , 2016 .
[14] Kaliappa Nadar Ravindran. Agent-based QoS negotiation in data-centric clouds , 2015, 2015 IEEE 4th International Conference on Cloud Networking (CloudNet).
[15] Mauro Iacono,et al. Exploiting mean field analysis to model performances of big data architectures , 2014, Future Gener. Comput. Syst..
[16] Fereidoon Shams Aliee,et al. Enterprise information security, a review of architectures and frameworks from interoperability perspective , 2011, WCIT.
[17] Marco Gribaudo,et al. Exploiting Bayesian Networks for the Analysis of Combined Attack Trees , 2015, PASM.
[18] Miseon Han,et al. Server system modeling for data-centric computing: In terms of server specifications, benchmarks, and simulators , 2016, 2016 International Conference on Electronics, Information, and Communications (ICEIC).
[19] Shafique Ahmad Chaudhry,et al. On implementation of DCTCP on three-tier and fat-tree data center network topologies , 2016, SpringerPlus.
[20] Mauro Iacono,et al. Improving reliability and performances in large scale distributed applications with erasure codes and replication , 2016, Future Gener. Comput. Syst..
[21] Manish Marwah,et al. Probabilistic performance modeling of virtualized resource allocation , 2010, ICAC '10.
[22] Wei Chen,et al. On the Impact of Replica Placement to the Reliability of Distributed Brick Storage Systems , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[23] Shuaiwen Song,et al. Fault-tolerant communication runtime support for data-centric programming models , 2010, 2010 International Conference on High Performance Computing.
[24] N. C. Debnath,et al. A Novel and Flexible Cloud Architecture for Data-Centric Applications , 2013, 2013 IEEE International Conference on Industrial Technology (ICIT).
[25] Virgílio A. F. Almeida,et al. Performance Models for Virtualized Applications , 2006, ISPA Workshops.
[26] Jichuan Chang,et al. (Re)Designing Data-Centric Data Centers , 2012, IEEE Micro.
[27] Robert J. Stroud,et al. Security-Informed Safety: If It's Not Secure, It's Not Safe , 2013, SERENE.
[28] Albert G. Greenberg,et al. VL2: a scalable and flexible data center network , 2009, SIGCOMM '09.
[29] Stefano Marrone,et al. Enabling the usage of UML in the verification of railway systems: The DAM-rail approach , 2013, Reliab. Eng. Syst. Saf..
[30] Alastair R. Ruddle,et al. Threat Analysis and Risk Assessment in Automotive Cyber Security , 2013 .
[31] Iman Saleh,et al. Formal Methods for Data-centric Web Services: From Model to Implementation , 2013, 2013 IEEE 20th International Conference on Web Services.
[32] Parthasarathy Ranganathan,et al. From Microprocessors to Nanostores: Rethinking Data-Centric Systems , 2011, Computer.
[33] Marco Gribaudo,et al. Performance evaluation of peering-agreements among autonomous systems subject to peer-to-peer traffic , 2014, Perform. Evaluation.
[34] Alma Riska,et al. Fast Eventual Consistency with Performance Guarantees for Distributed Storage , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[35] Francesco Palmieri,et al. GRASP-based resource re-optimization for effective big data access in federated clouds , 2016, Future Gener. Comput. Syst..
[36] Saurabh Gupta,et al. Best Practices and Lessons Learned from Deploying and Operating Large-Scale Data-Centric Parallel File Systems , 2014, SC14: International Conference for High Performance Computing, Networking, Storage and Analysis.
[37] Andreas L. Opdahl,et al. Enhancing CHASSIS: A Method for Combining Safety and Security , 2013, 2013 International Conference on Availability, Reliability and Security.
[38] Eric Armengaud,et al. Threat and Risk Assessment Methodologies in the Automotive Domain , 2016, ANT/SEIT.
[39] Albert Y. Zomaya,et al. Quantitative comparisons of the state‐of‐the‐art data center architectures , 2013, Concurr. Comput. Pract. Exp..
[40] Mauro Iacono,et al. An Introduction to Multiformalism Modeling , 2014 .
[41] Valentin Cristea,et al. Resource-aware hybrid scheduling algorithm in heterogeneous distributed computing , 2015, Future Gener. Comput. Syst..
[42] Mauro Iacono,et al. Performance Modeling of Big Data-Oriented Architectures , 2016, Resource Management for Big Data Platforms.
[43] George Varghese,et al. CONGA: distributed congestion-aware load balancing for datacenters , 2015, SIGCOMM.
[44] Luigi Portinale,et al. Improving the analysis of dependable systems by mapping fault trees into Bayesian networks , 2001, Reliab. Eng. Syst. Saf..
[45] Mauro Iacono,et al. Modeling performances of concurrent big data applications , 2015, Softw. Pract. Exp..
[46] Mauro Iacono,et al. Three Layers Network Influence On Cloud Data Center Performances , 2016, ECMS.
[47] Mauro Iacono,et al. Power Consumption Analysis of Replicated Virtual Applications in Heterogeneous Architectures , 2016 .
[48] Zhou Huachun,et al. Topology-based data dissemination approaches for large scale data centric networking architecture , 2013, China Communications.
[49] Naoaki Yamanaka,et al. Energy efficient Data-centric Network on the optical network virtualization platform , 2014, 2014 12th International Conference on Optical Internet 2014 (COIN).
[50] Mauro Iacono,et al. Modeling and Evaluating the Effects of Big Data Storage Resource Allocation in Global Scale Cloud Architectures , 2016, Int. J. Data Warehous. Min..
[51] Peng Liu,et al. Using Bayesian networks for cyber security analysis , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[52] Florin Pop,et al. Asymptotic scheduling for many task computing in Big Data platforms , 2015, Inf. Sci..
[53] B. Kosko. Fuzzy Thinking: The New Science of Fuzzy Logic , 1993 .
[54] Joobin Choobineh,et al. Enterprise information security strategies , 2008, Comput. Secur..
[55] Kaliappa Nadar Ravindran,et al. SLA evaluation in cloud-based data-centric distributed services , 2014, 2014 23rd International Conference on Computer Communication and Networks (ICCCN).
[56] Roberto Nardone,et al. Vulnerability modeling and analysis for critical infrastructure protection applications , 2013, Int. J. Crit. Infrastructure Prot..
[57] Philippe Robert,et al. Scattering and Placing Data Replicas to Enhance Long-Term Durability , 2015, 2015 IEEE 14th International Symposium on Network Computing and Applications.
[58] Daniel Deutch,et al. Analyzing data-centric applications: Why, what-if, and how-to , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).
[59] Christian E. Hopps,et al. Analysis of an Equal-Cost Multi-Path Algorithm , 2000, RFC.
[60] Ahmad Khonsari,et al. A flexible and high-performance data center network topology , 2017, The Journal of Supercomputing.
[61] Pietro Piazzolla,et al. Consolidation and Replication of VMs Matching Performance Objectives , 2012, ASMTA.
[62] Ahmed Karmouch,et al. Mobile software agents: an overview , 1998, IEEE Commun. Mag..
[63] Iman Saleh,et al. Demystifying Data-Centric Web Services , 2009, IEEE Internet Computing.
[64] Stefano Secci,et al. Reliability and Survivability Analysis of Data Center Network Topologies , 2015, Journal of Network and Systems Management.
[65] Gregory R. Ganger,et al. Agility and Performance in Elastic Distributed Storage , 2014, TOS.