ABSTRACT In this paper, we discuss the application of high-availability computing systems to intr... more ABSTRACT In this paper, we discuss the application of high-availability computing systems to intrusion containment. Intrusion Management Systems (IMS) serve to protect complex computer systems from unauthorized intrusions. The traditional IMS approaches rely on intrusion ...
We develop a unified model of a hierarchical video-on-demand (VoD) system by integrating the stor... more We develop a unified model of a hierarchical video-on-demand (VoD) system by integrating the storage and the network subsystems. Rather than restricting the analysis to an isolated subsystem the performance of the VoD system is analyzed as an end-to-end system. On a system-wide basis, request handling and admission control policies are designed to minimize global performance metrics. Through our simulation, we compare different request handling policies and show that a hierarchical VoD architecture with request handling that allows retrials at more than one resource will minimize overall blocking
In this paper we provide an end-to-end analysis of a dis-tributed Video-on-Demand system consisti... more In this paper we provide an end-to-end analysis of a dis-tributed Video-on-Demand system consisting of a hierarchy of server clusters and networks. We develop an analyti-cal framework for remote service by combining two crit-ical subsystems, the storage and the network subsystems. ...
In this paper, we analyze the effects of delay jitter on receiver buffer requirements in distribu... more In this paper, we analyze the effects of delay jitter on receiver buffer requirements in distributed Video-on-Demand systems. We use a general purpose real-time producer-consumer model to describe the dis-tributed architecture of a Video-on-Demand system. We prove a ...
ABSTRACT In this paper, we discuss the application of high-availability computing systems to intr... more ABSTRACT In this paper, we discuss the application of high-availability computing systems to intrusion containment. Intrusion Management Systems (IMS) serve to protect complex computer systems from unauthorized intrusions. The traditional IMS approaches rely on intrusion ...
We develop a unified model of a hierarchical video-on-demand (VoD) system by integrating the stor... more We develop a unified model of a hierarchical video-on-demand (VoD) system by integrating the storage and the network subsystems. Rather than restricting the analysis to an isolated subsystem the performance of the VoD system is analyzed as an end-to-end system. On a system-wide basis, request handling and admission control policies are designed to minimize global performance metrics. Through our simulation, we compare different request handling policies and show that a hierarchical VoD architecture with request handling that allows retrials at more than one resource will minimize overall blocking
In this paper we provide an end-to-end analysis of a dis-tributed Video-on-Demand system consisti... more In this paper we provide an end-to-end analysis of a dis-tributed Video-on-Demand system consisting of a hierarchy of server clusters and networks. We develop an analyti-cal framework for remote service by combining two crit-ical subsystems, the storage and the network subsystems. ...
In this paper, we analyze the effects of delay jitter on receiver buffer requirements in distribu... more In this paper, we analyze the effects of delay jitter on receiver buffer requirements in distributed Video-on-Demand systems. We use a general purpose real-time producer-consumer model to describe the dis-tributed architecture of a Video-on-Demand system. We prove a ...
Uploads