Search results for "cloud computing"
showing 10 items of 327 documents
GSaaS: A Service to Cloudify and Schedule GPUs
2018
Cloud technology is an attractive infrastructure solution that provides customers with an almost unlimited on-demand computational capacity using a pay-per-use approach, and allows data centers to increase their energy and economic savings by adopting a virtualized resource sharing model. However, resources such as graphics processing units (GPUs), have not been fully adapted to this model. Although, general-purpose computing on graphics processing units (GPGPU) is becoming more and more popular, cloud providers lack of flexibility to manage accelerators, because of the extended use of peripheral component interconnect (PCI) passthrough techniques to attach GPUs to virtual machines (VMs). F…
Ontology-based annotation and retrieval of services in the cloud
2014
Cloud computing is a technological paradigm that permits computing services to be offered over the Internet. This new service model is closely related to previous well-known distributed computing initiatives such as Web services and grid computing. In the current socio-economic climate, the affordability of cloud computing has made it one of the most popular recent innovations. This has led to the availability of more and more cloud services, as a consequence of which it is becoming increasingly difficult for service consumers to find and access those cloud services that fulfil their requirements. In this paper, we present a semantically-enhanced platform that will assist in the process of …
Convolutional Neural Networks for Multispectral Image Cloud Masking
2020
Convolutional neural networks (CNN) have proven to be state of the art methods for many image classification tasks and their use is rapidly increasing in remote sensing problems. One of their major strengths is that, when enough data is available, CNN perform an end-to-end learning without the need of custom feature extraction methods. In this work, we study the use of different CNN architectures for cloud masking of Proba-V multispectral images. We compare such methods with the more classical machine learning approach based on feature extraction plus supervised classification. Experimental results suggest that CNN are a promising alternative for solving cloud masking problems.
A Comprehensive Utility Function for Resource Allocation in Mobile Edge Computing
2020
In mobile edge computing (MEC), one of the important challenges is how much resources of which mobile edge server (MES) should be allocated to which user equipment (UE). The existing resource allocation schemes only consider CPU as the requested resource and assume utility for MESs as either a random variable or dependent on the requested CPU only. This paper presents a novel comprehensive utility function for resource allocation in MEC. The utility function considers the heterogeneous nature of applications that a UE offloads to MES. The proposed utility function considers all important parameters, including CPU, RAM, hard disk space, required time, and distance, to calculate a more realis…
Essential Enabling Technologies
2016
The previous chapter contained presentations of several relevant collaboration methods. Section 3.1 indicated that the evolution in e-collaboration was associated with a number of technological breakthroughs.
Optimal temporal resolution for detailed studies of cloud-enhanced sunlight (Overirradiance)
2013
Enhancement of sunlight by clouds can lead to irradiance peaks much exceeding the extraterrestrial levels - close to 2 suns near the Equator and at least 1.5 suns at latitudes of about 60°. Some extreme overirradiance events can last many minutes, but durations in the order of 1 second are also possible. The present paper reports the shortest bursts recorded in Southern Norway in the years 2012 and 2013. Our records of 10-millisecond resolution from 2012 show that the optimal instantaneous irradiance sampling interval is less than 0.15 s at the present test site, while the optimal averaging time is less than 0.13 s. We propose simple equations for deriving these times in an arbitrary geogra…
Using Cloud Computing to Implement a Security Overlay Network
2012
This article proposes and analyzes a general cloud-based security overlay network that can be used as a transparent overlay network to provide services such as intrusion detection systems, antivirus and antispam software, and distributed denial-of-service prevention. The authors analyze each of these in-cloud security services in terms of resiliency, effectiveness, performance, flexibility, control, and cost.
Advantages of Public Cloud Infrastructure in Different Technology Adoption Lifecycle Stages
2012
Independent software vendors (ISV) utilize cloud infrastructure for different reasons. We hypothesize that the motivation to adopt cloud infrastructure-as-a-service (IaaS) changes as the ISV’s product is getting adopted by the market. In this paper we consider how the infrastructure needs of ISVs change along the stages of ISV product’s adoption lifecycle, and analyze the potential benefits of utilizing IaaS in different stages. The analysis is illustrated with the cases of ISV firms with documented use of IaaS. These cases support the hypothesis that different benefits of IaaS are gaining importance along the adoption lifecycle.
Together We Stand, Divided We Fall : Analyzing Information Systems Acquisition as Service
2016
Information systems (IS) acquisition is not a widely studied topic in the literature. In particular, although the role and participation of different stakeholders such as business people, IT people, and external vendors and consultants is acknowledged, little is known about how they cooperate in an IS acquisition project. In this paper, we will apply a value co-creation framework taken from service research as a lens to study an IS acquisition project in an organization. The case organization intends to acquire their new IS as a cloud service. This approach is novel to all stakeholders, so they have to intensively cooperate for example under tight time constraints. The analysis reveals that…
Cloud Sourcing and Paradigm Shift in IT Governance: Evidence from the Financial Sector
2020
In the digital age, organizations are increasingly shifting their applications, services and infrastructures to the cloud to enhance business agility and reduce IT-related costs. However, in moving applications and data to cloud resources organizations face new risks of privacy violations. To manage this risk, organizations need to be fully aware of threats and vulnerabilities affecting their digital re-sources in cloud. Although some previous studies have focused on the emerging challenges of cloud adoption to governance and control, we know little regarding the paradigm shifts in IT governance processes and practices. To address this gap, we conducted an exploratory case study in two larg…