Learn More
Available online xxxx Keywords: Cloud computing Elasticity Multi-tier applications Cost-aware criteria Adaptive scaling algorithm a b s t r a c t Elasticity (on-demand scaling) of applications is one of the most important features of cloud computing. This elasticity is the ability to adaptively scale resources up and down in order to meet varying(More)
BACKGROUND Urinary bladder cancer is a common malignancy worldwide, and outcomes for patients with advanced bladder cancer remain poor. Antiproliferative factor (APF) is a potent glycopeptide inhibitor of epithelial cell proliferation that was discovered in the urine of patients with interstitial cystitis, a disorder with bladder epithelial thinning and(More)
Regular expression (RegEx) matching has been widely used in various networking and security applications. Despite much effort on this important problem, it remains a fundamentally difficult problem. DFA-based solutions can achieve high throughput, but require too much memory to be executed in high speed SRAM. NFA-based solutions require small memory, but(More)
Elastic resource provisioning is a key feature of cloud computing, allowing users to scale up or down resource allocation for their applications at run-time. To date, most practical approaches to managing elasticity are based on allocation/de-allocation of the virtual machine (VM) instances to the application. This VM-level elasticity typically incurs both(More)
This paper considers set-membership filtering (SMF) when the error-bound specification is hard to determine. Improper error-bound specification could cause overbounding or underbounding, both of which can result in degraded performance for SMF algorithms. This paper introduces a novel variable error bound and presents a different SMF criterion. It is shown(More)
Application-level protocol specifications (i.e., how a protocol should behave) are helpful for network security management, including intrusion detection and intrusion prevention. The knowledge of protocol specifications is also an effective way of detecting malicious code. However, current methods for obtaining unknown protocol specifications highly rely(More)
Asymmetric distributions of activities of the protein kinases Akt and glycogen synthase kinase 3beta (GSK-3beta) are critical for the formation of neuronal polarity. However, the mechanisms underlying polarized regulation of this pathway remain unclear. In this study, we report that the instability of Akt regulated by the ubiquitin-proteasome system (UPS)(More)
— Simplifying the process of deploying applications is almost essential in the cloud. However, existing techniques can automate applications' initial deployment but have not yet adequately addressed their dynamic scaling problems. In this paper, a deployment platform to enable a novel dynamic scaling technique is introduced. This platform employs: (i) an(More)