A Stochastic Model to Evaluate The Performance of An IAAS Cloud System
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 10
Abstract
Cloud systems are different from usual distributed systems.First of all; they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation assessment of cloud computing infrastructures is necessary to forecast and count the cost-benefit of a plan collection and the matching quality of service (QoS) knowledgeable by users. Such analysess is not practicable by simulation or on-the-field experimentation, due to the huge number of stricture that has to be look into. In this paper, we present an investigative model, based on stochastic recompense nets (SRNs) that is both scalable to replica systems calm of thousands of capital and supple to stand for dissimilar rule and cloud-specific plan.
Authors and Affiliations
Bolla V. V. S. N. Murty, K. Rajesh
Cybernetic Technology Utility: Scrupulous Heroes v. Unscrupulous Individuals – Ending Corruption in SA
Corruption on South African (SA) roads is so overwhelming that it has reached such proportions where some motorists now see it as the only way to go. On the contrary, things seem to have started turning the other way...
VHDL Implementation of High Speed Fault Injection Tool for testing FPGA based designs
Fault injection is mainly used to test and evaluate the fault-tolerance based designs. In current VLSI technology fault injection has become a popular technique for experimentally determining dependability parameters...
Detection and management of SPIT calls in VoiceOver-IP Services
Voice over IP (VoIP) technology has become a key role in the development for providing telephony services at a lower cost with a higher flexibility. VoIP services are faced with several security issues and threats such...
Proficient Algorithms for Mining Elevated Service Item Sets Commencing Transactional Databases
Association rule mining is used to stumble on the patronize item sets in substantial database. In the data mining field, utility mining materialize as an essential topic that to excavation the high value item sets fr...
Access Control And Privacy Preserving Mechanisms On Sensitive Data
The privacy preserving module anonymizes the data to convene privacy requirements and sketchiness constraints on predicates set by the access control device. We make this communication as the problem of k-anonymous....