Search results for "cloud computing."
showing 10 items of 325 documents
Mobility and Spatio-Temporal Exposure Control
2013
Modern risk assessment methods cover many issues and encompass both risk analysis and corresponding prevention/mitigation measures.However, there is still room for improvement and one aspect that may benefit from more work is “exposure control”.The “exposure” an asset experiences plays an important part in the risks facing the asset.Amongst the aspects that all too regularly get exposed is user identities and user location information,and in a context with mobile subscriber and mobility in the service hosting (VM migration/mobility) the problems associated with lost identity/location privacy becomes urgent.In this paper we look at “exposure control” as a way for analyzing and protecting use…
Examining business models of Software-as-a-Service companies
2013
Software-as-a-Service Revenue Models
2013
When should software providers maintain their traditional licensing model versus offering software as a service, and which SaaS model is more profitable: rental or pay per use? For customers, what are the trade-offs between traditional licensing, renting, and paying per use? peerReviewed
Superparameterised cloud effects in the EMAC general circulation model (v2.50) – influences of model configuration
2020
A new module has been implemented in the fifth generation of the ECMWF/Hamburg (ECHAM5)/Modular Earth Submodel System (MESSy) Atmospheric Chemistry (EMAC) model that simulates cloud-related processes on a much smaller grid. This so-called superparameterisation acts as a replacement for the convection parameterisation and large-scale cloud scheme. The concept of embedding a cloud-resolving model (CRM) inside of each grid box of a general circulation model leads to an explicit representation of cloud dynamics. The new model component is evaluated against observations and the conventional usage of EMAC using a convection parameterisation. In particular, effects of applying different configurat…
Towards a mean body for apparel design
2016
This paper focuses on shape average with applications to the apparel industry. Apparel industry uses a consensus sizing system; its major concern is to fit most of the population into it. Since anthropometric measures do not grow linearly, it is important to find prototypes to accurately represent each size. This is done using random compact mean sets, obtained from a cloud of 3D points given by a scanner and applying to the sample a previous definition of mean set. Additionally, two approaches to define confidence sets are introduced. The methodology is applied to data obtained from a real anthropometric survey. This paper has been partially supported by the following grants: TIN2009-14392…
Adaptive SDN-based architecture using QoE metrics in live video streaming on Cloud Mobile Media
2017
The increasing adoption of smart phones, the increased access to mobile broadband networks and the availability of public cloud infrastructures are aligning to the next generation of truly ubiquitous multimedia services, known as Cloud Mobile Media (CMM) services. Nevertheless, due to an inherit higher and variable end to end delay mainly as a result of the virtualization process, new challenges appear in particular for live video streaming applications in order to keep a good Quality of Experience of the delivered video. Thus, to keep client's satisfaction at good levels in terms of Mean Opinion Score (MOS), we propose an adaptive Software Defined Networking (SDN)-based architecture runnin…
Algorithmic differentiation for cloud schemes (IFS Cy43r3) using CoDiPack (v1.8.1)
2019
Abstract. Numerical models in atmospheric sciences not only need to approximate the flow equations on a suitable computational grid, they also need to include subgrid effects of many non-resolved physical processes. Among others, the formation and evolution of cloud particles is an example of such subgrid processes. Moreover, to date there is no universal mathematical description of a cloud, hence many cloud schemes have been proposed and these schemes typically contain several uncertain parameters. In this study, we propose the use of algorithmic differentiation (AD) as a method to identify parameters within the cloud scheme, to which the output of the cloud scheme is most sensitive. We il…
Algorithmic Differentiation for Cloud Schemes
2019
<p>Numerical models in atmospheric sciences do not only need to approximate the flow equations on a suitable computational grid, they also need to include subgrid effects of many non-resolved physical processes. Among others, the formation and evolution of cloud particles is an example of such subgrid processes. Moreover, to date there is no universal mathematical description of a cloud, hence many cloud schemes were proposed and these schemes typically contain several uncertain parameters. In this study, we propose the use of algorithmic differentiation (AD) as a method to identify parameters within the cloud scheme, to which the output of the cloud scheme is most sensitive.…
Multi-cloud privacy preserving schemes for linear data mining
2015
This paper presents an approach to privacy-preserving data mining that relies upon a relatively simple secret sharing scheme. Its main feature is that users, sensitive data owners, are engaged in the secret sharing operations that protect their privacy. They are grouped in independent clouds connected to a central unit, the data miner, that only manages the aggregated data of each cloud, therefore avoiding the disclosure of information belonging to single nodes. We propose two privacy preserving schemes, with different privacy levels and communication costs. When designing them, we assume that some users' data might become inaccessible during the operation of the privacy preserving protocol…
Analysis of dynamic service oriented systems for security related problems detection
2017
The paper presents an approach to solve some problems arising in the management process of IT security. Our motivation of this research is to study in every detail the context of service oriented systems, which can be defined as considerable heterogeneous, dynamic and flexible configuration of the hardware and software system resources. The fundamental difference between security management systems with traditional centralized and monolithic architecture and service oriented systems is discussed. We propose a multilayered-reference model for service-oriented systems aimed predominantly at principal objectives related to IT based systems security working in dynamic environments. Likewise, co…