Search For:

Displaying 1-11 out of 11 total
Distributed Systems: An Algorithmic Approach
Found in: IEEE Distributed Systems Online
By Shrisha Rao
Issue Date:November 2008
pp. 3
A review of <em>Distributed Systems: An Algorithmic Approach</em>, by Sukumar Ghosh
A Mechanism Design Approach to Resource Procurement in Cloud Computing
Found in: IEEE Transactions on Computers
By Abhinandan S. Prasad,Shrisha Rao
Issue Date:January 2014
pp. 17-30
We present a cloud resource procurement approach which not only automates the selection of an appropriate cloud vendor but also implements dynamic pricing. Three possible mechanisms are suggested for cloud resource procurement: cloud-dominant strategy ince...
Enhancement of Hadoop Clusters with Virtualization Using the Capacity Scheduler
Found in: 2012 Third International Conference on Services in Emerging Markets (ICSEM)
By Aparna Raj,Kamaldeep Kaur,Uddipan Dutta,V Venkat Sandeep,Shrisha Rao
Issue Date:December 2012
pp. 50-57
We present a virtualized setup of a Hadoop cluster that provides greater computing capacity with lesser resources, since a virtualized cluster requires fewer physical machines. The master node of the cluster is set up on a physical machine, and slave nodes...
Hadoop Compatible Framework for Discovering Network Topology and Detecting Hardware Failures
Found in: 2012 Third International Conference on Services in Emerging Markets (ICSEM)
By Anusha Ventrapragada,Sheeba Samuel,Varsha Raja Vidya,Prabha Satya Manepalli V,Shwetha Muralidharan,Shrisha Rao
Issue Date:December 2012
pp. 58-64
We have implemented a Hadoop compatible framework that helps in detection of suspected hardware failures in DataNodes within a Hadoop cluster and in signalling the nodes accordingly. Based on the status of the various hardware components of the DataNodes, ...
Cloudlet-Based Multi-lingual Dictionaries
Found in: 2012 Third International Conference on Services in Emerging Markets (ICSEM)
By Vamsi Subhash Achanta,Nishanth Talanki Sureshbabu,Veena Thomas,M Lakshmi Sahitya,Shrisha Rao
Issue Date:December 2012
pp. 30-36
Multilingual dictionaries on mobile devices with voice inputs generally require Internet connectivity, and such an application is resource intensive as well. The proposed cloudlet-based dictionary solution uses a system design where a nearby computer is us...
CloudSpider: Combining Replication with Scheduling for Optimizing Live Migration of Virtual Machines across Wide Area Networks
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Sumit Kumar Bose, Scott Brock, Ronald Skeoch, Shrisha Rao
Issue Date:May 2011
pp. 13-22
A virtual machine (VM), during its lifecycle, can be scheduled for execution at geographically disparate cloud locations depending upon the cost of computation and the load at these locations. However, trans-locating a live VM across high-latency low-bandw...
Content-Split Based Effective String-Matching for Multi-Core Based Intrusion Detection Systems
Found in: Computational Intelligence, Communication Systems and Networks, International Conference on
By Subramanian Neelakantan, Shrisha Rao
Issue Date:July 2009
pp. 296-301
We present a Content Split Approach (CSA), tailored specifically for signature-based network intrusion detection. This algorithm logically partition the content of IP Packets into three parts and internally uses boyer-moorehorspool algorithm to carry out s...
Topology Control in Wireless Sensor Networks
Found in: Sensor Technologies and Applications, International Conference on
By Nitin Choubey, Shrisha Rao
Issue Date:June 2009
pp. 339-345
The main goal of topology control in wireless sensor networks is to reduce interference between competing signals and thus extend the battery life of sensor devices by minimizing retransmission of data. This paper proposes an algorithm, Low Bounded Interfe...
A Threat-Aware Signature Based Intrusion-Detection Approach for Obtaining Network-Specific Useful Alarms
Found in: Internet Monitoring and Protection, International Conference on
By Subramanian Neelakantan, Shrisha Rao
Issue Date:July 2008
pp. 80-85
We present a model and architecture that enhances the traditional signature based intrusion detection engine with threat-awareness capability. Signature based network intrusion detection systems use a set of signatures S to evaluate captured network traffi...
Power-Aware Cloud Metering
Found in: IEEE Transactions on Services Computing
By Akshay Narayan,Shrisha Rao
Issue Date:March 2013
pp. 1
The cost of electricity contributes significantly to the operating expense incurred in hosting cloud services. It is necessary to consider this cost while charging the consumers for their service utilization. In this work, we arrive at a metering mechanism...
Meta-learning based architectural and algorithmic optimization for achieving green-ness in predictive workload analytics
Found in: Proceedings of the 28th Annual ACM Symposium on Applied Computing (SAC '13)
By Nidhi Singh, Shrisha Rao
Issue Date:March 2013
pp. 1169-1176
Predictive workload analytics for server systems has been the focus of recent research in energy-aware computing, with many algorithmic and architectural techniques proposed to analyze, predict, and optimize server workloads in order to build energy-aware ...