Search For:

Displaying 1-19 out of 19 total
Bag-of-Tasks applications scheduling on volunteer desktop grids with adaptive information dissemination
Found in: Local Computer Networks, Annual IEEE Conference on
By Kwan, Shun Kit Kwan, Jogesh, K. Muppala Jogesh
Issue Date:October 2010
pp. 544-551
In this paper, we explore the problem of scheduling multiple concurrent Bag-of-Tasks (BoT) applications in unstructured peer-to-peer (P2P) volunteer desktop grids built around a super-peer framework. Resource availability information is exchanged among the...
 
Defects per Million (DPM) Evaluation for a Cloud Dealing with VM Failures Using Checkpointing
Found in: 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Subrota K. Mondal,Jogesh K. Muppala
Issue Date:June 2014
pp. 672-677
In cloud computing systems, a user request goes through several cloud service provider specific processing steps from the instant it is submitted until the service is completed. In this paper, we use service-oriented metrics to characterize the dependabili...
 
Distributed Packet Buffers for High-Bandwidth Switches and Routers
Found in: IEEE Transactions on Parallel and Distributed Systems
By Dong Lin,Mounir Hamdi,Jogesh K. Muppala
Issue Date:July 2012
pp. 1178-1192
High-speed routers rely on well-designed packet buffers that support multiple queues, provide large capacity and short response times. Some researchers suggested combined SRAM/DRAM hierarchical buffer architectures to meet these challenges. However, these ...
 
The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013
Found in: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Jogesh K. Muppala,Matti Hiltunen,Roy Campbell,Paulo Verissimo
Issue Date:June 2013
pp. 1-2
The Third International Workshop on Dependability of Clouds, Data Centers, and Virtual Machine Technology (DCDV 2013) features papers covering various aspects of dependability and security in Clouds and Data Centers. Four sessions covering Cloud and Data C...
 
E2VT: An Effective and Efficient VM-Transparent Mechanism for Preventing TPVM OS Boot Failure
Found in: 2012 IEEE Asia-Pacific Services Computing Conference (APSCC)
By Xiaolin Chang,Bin Xing,Jogesh K. Muppala
Issue Date:December 2012
pp. 341-344
Integrating system-level virtualization technology with Trusted Computing technology can significantly improve system security. The open-source virtual TPM facility, shipped with the open-source hyper visor Xen, aims to provide the illusion of a physical T...
 
The First International Workshop on Dependability of Clouds, data centers and Virtual Computing Environments
Found in: Dependable Systems and Networks, International Conference on
By Jogesh K. Muppala,Matti Hiltunen,Robert Stroud,Ji Wang
Issue Date:June 2011
pp. 590-591
Cloud computing can be characterized as the culmination of the integration of computing and data infrastructures to provide a scalable, agile and cost-effective approach to support the ever-growing critical IT needs (in terms of computation and storage) of...
 
The first international workshop on dependability of clouds, data centers and virtual computing environments: DCDV 2011
Found in: Dependable Systems and Networks Workshops
By Jogesh K. Muppala,Matti Hiltunen,Robert Stroud,Ji Wang
Issue Date:June 2011
pp. 97-98
Cloud computing can be characterized as the culmination of the integration of computing and data infrastructures to provide a scalable, agile and cost-effective approach to support the ever-growing critical IT needs (in terms of computation and storage) of...
 
Discovering Free-Riders Before Trading: A Simple Approach
Found in: Parallel and Distributed Systems, International Conference on
By Raymond Lei Xia, Jogesh K. Muppala
Issue Date:December 2010
pp. 806-811
Free-riding is one of the most serious problems encountered in Peer-to-peer (P2P) systems like Bit Torrent. Incentive mechanisms, including those based on reputation have been proposed to deal with this problem, but are still not effective in preventing fr...
 
Defeating TCG TOCTOU Attacks in Trusted HVM
Found in: Multimedia Information Networking and Security, International Conference on
By Xiaolin Chang, Han Zhen, JiQiang Liu, Bin Xing, Jogesh K. Muppala
Issue Date:November 2010
pp. 598-602
Virtualization technologies have been explored to mitigate the vulnerabilities in the current TCG architecture. But only a small number of efforts address the handling of the detected TCG TOCTOU attacks. This paper aims to defeat TCG TOCTOU attacks occurri...
 
Resource Discovery and Scheduling in Unstructured Peer-to-Peer Desktop Grids
Found in: Parallel Processing Workshops, International Conference on
By Shun Kit Kwan, Jogesh K. Muppala
Issue Date:September 2010
pp. 303-312
In this paper, we explore resource discovery and scheduling issues that arise in unstructured peer-to-peer (P2P) desktop grids. We examine the use of a super-peer based approach to address these issues. The super-peers form a resource information tracking ...
 
Message from APESER organization committee
Found in: Parallel and Distributed Systems, International Conference on
By Shiao-Li Tsao, Tai-Yi Huang, John Kar-kin Zao, Jogesh K. Muppala, Chi-Sheng Shih
Issue Date:December 2007
pp. 1
No summary available.
   
Teaching embedded systems software: The HKUST experience
Found in: Parallel and Distributed Systems, International Conference on
By Jogesh K. Muppala, Zonghua Gu, S.C. Cheung
Issue Date:December 2007
pp. 1-6
Recent trends in embedded systems indicate a growing importance of the software component of these systems, and the concomitant increase in the importance of formal design and development of embedded software. In this paper we share our experience with des...
 
A Robust Device Hybrid Scheme to Improve System Performance in Gigabit Ethernet Networks
Found in: Local Computer Networks, Annual IEEE Conference on
By Xiaolin Chang, Jogesh K. Muppala, Pengcheng Zou, Xiangkai Li
Issue Date:October 2007
pp. 444-454
Studies of the performance of interrupt-driven operating systems in high-speed networks have brought forth the problem of receive livelock. Device hybrid interrupt-polling and interrupt coalescing are two common techniques used in general-purpose operating...
 
Exploiting Proximity in Cooperative Download of Large Files in Peer-to-Peer Networks
Found in: Internet and Web Applications and Services, International Conference on
By Lei Zhang, Jogesh K. Muppala, Wanqing Tu
Issue Date:May 2007
pp. 1
Peer-to-peer networks have long being used for file-sharing among the connected peers. Recently, the popular BitTorrent tool has permitted the exchange of large sized files by dividing it into fragments, and enabling the peers to exchange the fragments amo...
 
VQ-RED: An Efficient Virtual Queue Management Approach to Improve Fairness in Infrastructure WLAN
Found in: Local Computer Networks, Annual IEEE Conference on
By Xiaoyang Lin, Xiaolin Chang, Jogesh K. Muppala
Issue Date:November 2005
pp. 632-638
<p>In this paper, we consider two fairness problems (downlink/uplink fairness and fairness among flows in the same direction) that arise in the infrastructure WLAN. We propose a virtual queue management approach, named VQ-RED to address the fairness ...
 
VoIP Performance on Differentiated Services Enabled Network
Found in: Networks, IEEE International Conference on
By Jogesh K. Muppala, Terdsak Bancherdvanich, Anurag Tyagi
Issue Date:September 2000
pp. 419
In this paper, we study the performance of Voice over Internet Protocol (VoIP) traffic aggregates over Differentiated Services (Diffserv) enabled network using Expedited Forwarding (EF) per hop behavior (PHB). We compare the delay and jitter performance of...
 
A Performance Model for ATM Switches with Multiple Input Queues
Found in: Computer Communications and Networks, International Conference on
By Ge Nong, Jogesh K. Muppala, Mounir Hamdi
Issue Date:September 1997
pp. 222
An analytical model for the performance analysis of a novel input access scheme for an ATM switch is developed and presented in this paper. The interconnection network of the ATM switch is internally nonblocking and each input port maintains a separate que...
 
Defects Per Million (DPM) Computation in Service-Oriented Environments
Found in: IEEE Transactions on Services Computing
By Subrota K. Mondal,Xiaoyan Yin,Jogesh K. Muppala,Javier Alonso,Kishor S. Trivedi
Issue Date:November 2013
pp. 1
Traditional system-oriented dependability metrics like reliability and availability do not fully reflect the impact of system failure-repair behavior in service-oriented environments. The telecommunication systems community prefers to use Defects Per Milli...
 
Teaching embedded software concepts using Android
Found in: Proceedings of the 6th Workshop on Embedded Systems Education (WESE '11)
By Jogesh K. Muppala
Issue Date:October 2011
pp. 32-37
Does smartphone application development provide an opportunity to explore various aspects of embedded software? This question is the primary motivator behind the ideas explored in this paper. We cannot deny the ubiquitous nature of smartphones. Leveraging ...
     
 1