Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Institution
- Keyword
-
- Access control (1)
- Assurance case (1)
- Certification (1)
- Cloud computing (1)
- Cloud-Scale Data Centers (1)
-
- Confidentiality (1)
- Cyber-physical system (1)
- Data analysis (1)
- Dempster-Shafer (1)
- Graph visualization (1)
- Heterogeneous memory (1)
- Hierarchical clustering (1)
- High-bandwidth memory (1)
- Image processing (1)
- Intertwined security and privacy (1)
- Mobile cloud computing (MCC) (1)
- Mobile computing (1)
- Performance (1)
- Physical paper document (1)
- Power Management (1)
- Program profiling (1)
- QR code (1)
- Renewable Energy (1)
- Security and privacy in MCC (1)
- Self-adaptive system (1)
- Statistical correlation (1)
Articles 1 - 6 of 6
Full-Text Articles in Systems Architecture
A Framework To Support Automatic Certification For Self-Adaptive Systems, Ioannis Nearchou
A Framework To Support Automatic Certification For Self-Adaptive Systems, Ioannis Nearchou
Masters Theses
Presently, cyber-physical systems are increasingly being integrated into societies, from the economic sector to the nuclear energy sector. Cyber-physical systems are systems that combine physical, digital, human, and other components, which operate through physical means and software. When system errors occur, the consequences of malfunction could negatively impact human life. Academic studies have relied on the MAPE-K feedback loop model to develop various system components to satisfy the self-adaptive features, such that violation of the safety requirements can be minimized. Assurance of system requirement satisfaction is argued through an industrial standard form, called an assurance case, which is usually applied …
A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri
A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri
Masters Theses
Cloud Computing is an emerging technology that provides shared processing resources and data to computers and other devices on demand. On the other hand, Mobile Computing allows transmission of data, voice and video. From these two there emerges a new concept Mobile Cloud Computing which not only overcomes the problems of Mobile Computing but also integrates Cloud Computing into Mobile Environments to overcome obstacles related to Performance, Security and Environment. This paper also provides a decent description on Security and Privacy, its related problems, threats and challenges. This paper first provides details on survey of Mobile Cloud Computing, then it …
Automated Program Profiling And Analysis For Managing Heterogeneous Memory Systems, Adam Palmer Howard
Automated Program Profiling And Analysis For Managing Heterogeneous Memory Systems, Adam Palmer Howard
Masters Theses
Many promising memory technologies, such as non-volatile, storage-class memories and high-bandwidth, on-chip RAMs, are beginning to emerge. Since each of these new technologies present tradeoffs distinct from conventional DRAMs, next-generation systems are likely to include multiple tiers of memory storage, each with their own type of devices. To efficiently utilize the available hardware, such systems will need to alter their data management strategies to consider the performance and capabilities provided by each tier.
This work explores a variety of cross-layer strategies for managing application data in heterogeneous memory systems. We propose different program profiling-based techniques to automatically partition program allocation …
Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang
Design And Implementation Of Digital Information Security For Physical Documents, Pengcheng Wang
Masters Theses
The objective of this thesis is to improve the security for physical paper documents. Providing information security has been difficult in environments that rely on physical paper documents to implement business processes. Our work presents the design of a digital information security system for paper documents, called "CryptoPaper", that uses 2-dimensional codes to represent data and its security properties on paper. A special scanner system is designed for "CryptoPaper" which uses image recognition techniques and cloud-based access control to display plaintext of encrypted and encoded data to authorized users.
Data Analytics Of University Student Records, Mark Blaise Decotes
Data Analytics Of University Student Records, Mark Blaise Decotes
Masters Theses
Understanding the proper navigation of a college curriculum is a daunting task for students, faculty, and staff. Collegiate courses offer enough intellectual challenge without the unnecessary confusion caused by course scheduling issues. Administrative faculty who execute curriculum changes need both quantitative data and empirical evidence to support their notions about which courses are cornerstone. Students require clear understanding of paths through their courses and majors that give them the optimal chance of success. In this work, we re-envision the analysis of student records from several decades by opening up these datasets to new ways of interactivity. We represent curricula through …
Power Management For Cloud-Scale Data Centers, Yanwei Zhang
Power Management For Cloud-Scale Data Centers, Yanwei Zhang
Masters Theses
Recent years have seen the rapid growth of large and geographically distributed data centers deployed by Internet service operators to support various services such as cloud computing. Consequently, high electricity bills, as well as negative environmental implications (e.g., CO2 emission and global warming) come along. In this thesis, we first propose a novel electricity bill capping algorithm that not only minimizes the electricity cost, but also enforces a cost budget on the monthly bill for cloud-scale data centers that impact the power markets. Our solution first explicitly models the impacts of the power demands induced by cloud-scale data centers on …