Ändra sökning
Avgränsa sökresultatet
1 - 29 av 29
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Ahmadi Mehri, Vida
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik. Blekinge Institute of technology.
    Ilie, Dragos
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Privacy and DRM Requirements for Collaborative Development of AI Application2018Ingår i: ACM International Conference Proceeding Series, Association for Computing Machinery (ACM), 2018, artikel-id 3233268Konferensbidrag (Refereegranskat)
    Abstract [en]

    The use of data is essential for the capabilities of Data-driven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. This data usage, however, raises intrinsically the concerns on data privacy. In addition, supporting collaborative development of AI applications across organisations has become a major need in AI system design. Digital Rights Management (DRM) is required to protect intellectual property in such collaboration. As a consequence of DRM, privacy threats and privacy-enforcing mechanisms will interact with each other.

    This paper describes the privacy and DRM requirements in collaborative AI system design using AI pipelines. It describes the relationships between DRM and privacy and outlines the threats against these non-functional features. Finally, the paper provides first security architecture to protect against the threats on DRM and privacy in collaborative AI design using AI pipelines. 

  • 2.
    Ahmadi Mehri, Vida
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Ilie, Dragos
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Tutschku, Kurt
    Towards Privacy Requirements for Collaborative Development of AI Applications2018Ingår i: 14th Swedish National Computer Networking Workshop (SNCNW), 2018Konferensbidrag (Refereegranskat)
    Abstract [en]

    The use of data is essential for the capabilities of Data- driven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. The use of data, however, raises intrinsically the concern of the data privacy, in particular for the individuals that provide data. Hence, data privacy is considered as one of the main non-functional features of the Next Generation Internet. This paper describes the privacy challenges and requirements for collaborative AI application development. We investigate the constraints of using digital right management for supporting collaboration to address the privacy requirements in the regulation.

  • 3. Biernacki, Arkadiusz
    et al.
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Comparative Performance Study of LTE Downlink Schedulers2014Ingår i: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 7, nr 2, s. 585-599Artikel i tidskrift (Refereegranskat)
    Abstract [sv]

    Open access article

  • 4. Biernacki, Arkadiusz
    et al.
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Performance of HTTP Video Streaming Under Different Network Conditions2014Ingår i: Multimedia tools and applications, ISSN 1380-7501, E-ISSN 1573-7721, Vol. 72, nr 2, s. 1143-1166Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The Internet video sharing services have been gaining importance and increasing their share in the multimedia market. In order to compete effectively and provide broadcast television with a comparable level of quality, the Internet video should fulfil stringent quality of service (QoS) constraints. However, as the Internet video is based on packet transmission, it is influenced by delays, transmission errors, data losses and bandwidth limitations which can have a devastating influence on the perceived quality of the multimedia content. There are many works which describe the impact of network impairments on the Internet video. Nevertheless, little is known about how network conditions influence the video streamed by the currently popular services such as YouTube, where video is transmitted over reliable TCP/HTTP protocols. Therefore using a network simulator, we conducted an experimental evaluation of theHTTP based video transmission analysing how the network impairments mentioned above influence the streamed video. The experiments were validated against a network emulator supplied with real network traces. As a result of this work, we can state that the buffering strategies implemented by a video player are in many cases able to mitigate unfavourable network conditions what allow to play the streamed video smoothly. The results may serve Internet Service Providers so that they could tune their network characteristics in order to match the demand from HTTP video.

  • 5. Binzenhöfer, Andreas
    et al.
    Tutschku, Kurt
    Graben, Björn auf dem
    Fiedler, Markus
    Arlos, Patrik
    A P2P-based framework for distributed network management2006Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper we present a novel framework supporting distributed network management using a self-organizing peer-to-peer overlay network. The overlay consists of several Distributed Network Agents which can perform distributed tests and distributed monitoring for fault and performance management. In that way, the concept is able to overcome disadvantages that come along with a central management unit, like lack of scalability and reliability. So far, little attention has been payed to the quality of service experienced by the end user. Our self-organizing management overlay provides a reliable and scalable basis for distributed tests that incorporate the end user. The use of a distributed, self-organizing software will also reduce capital and operational expenditures of the operator since fewer entities have to be installed and operated.

  • 6. Binzenhöfer, Andreas
    et al.
    Tutschku, Kurt
    Graben, Björn auf dem
    Fiedler, Markus
    Arlos, Patrik
    DNA, a P2P-based framework for distributed network management2005Konferensbidrag (Refereegranskat)
    Abstract [sv]

    Beskriver en ny management infrastruktur för övervakningen av end-till-end tjänstekvalitet.

  • 7. Carlsson, Patrik
    et al.
    Fiedler, Markus
    Tutschku, Kurt
    Chevul, Stefan
    Nilsson, Arne A.
    Obtaining Reliable Bit Rate Measurements in SNMP-Managed Networks2002Konferensbidrag (Refereegranskat)
    Abstract [sv]

    Vi undersöker vilka problem som kan finnas när man använder SNMP för att mäta prestanda i ett nätverk.

  • 8. Fiedler, Markus
    et al.
    Chevul, Stefan
    Isaksson, Lennart
    Tutschku, Kurt
    Binzenhöfer, Andreas
    The Throughput Utility Function: Assessing network impact on mobile services2005Konferensbidrag (Refereegranskat)
    Abstract [sv]

    Ett nytt sätt att uttrycka nätverkets inflytande på tjänstekvaliten (skala från 0 till 100) för mobila tjänster.

  • 9. Fiedler, Markus
    et al.
    Chevul, Stefan
    Radtke, Olaf
    Tutschku, Kurt
    Binzenhöfer, Andreas
    The Network Utility Function: A practicable concept for assessing network impact on distributed services2005Konferensbidrag (Refereegranskat)
    Abstract [sv]

    Ett nytt sätt att uttrycka nätverkets inflytande på tjänstekvaliten (skala från 0 till 100). Undersökt scenario: trace-driven OPNET simulering av videokonferenser och TCP strömmar via flaskhalsar (t ex ADSL länkar).

  • 10. Fiedler, Markus
    et al.
    Tutschku, Kurt
    Application of the stochastic fluid flow model for bottleneck identification and classification2003Konferensbidrag (Refereegranskat)
    Abstract [sv]

    Den (inom teletrafikteorin välkända) flödesmodellen används för att beskriva konsekvenserna av en flaskhals på dataströmmar som passerar den: hastighetsstatistiken förändras beroende på typen av flaskhalsen och tvärtrafik. Flödesmodellen visar sig vara mycket lämpligt att bekriva fenomenerna. Nyckelord: Internet, flaskhals, flödesmodell, prestanda, management, hastighetsstatistik

  • 11. Fiedler, Markus
    et al.
    Tutschku, Kurt
    Carlsson, Patrik
    Nilsson, Arne A.
    Identification of performance degradation in IP networks using throughput statistics2003Konferensbidrag (Refereegranskat)
    Abstract [sv]

    En flaskhalsindikator som bygger på att ta differensen på hastighets-/genomströmningshistogram efter och framför en flaskhals introduceras. Den tillämpas på en videokonferens som störs på kontrollerat sätt av annan trafik. Nyckelord: Internet, flaskhals, flödesmodell, hastighetsstatistik

  • 12. Hossfeld, Tobias
    et al.
    Binzenhöfer, Andreas
    Fiedler, Markus
    Tutschku, Kurt
    Measurement and Analysis of Skype VoIP Traffic in 3G UMTS Systems2006Konferensbidrag (Refereegranskat)
    Abstract [sv]

    En studie om talkvaliten av Skype via UMTS med konkreta värden som demonstrerar priset för mobilitetn samt skillnaden mellan upp- och nedlänken. VoIP, Skype, UMTS, mätningar, Network Utility Function

  • 13. Hossfeld, Tobias
    et al.
    Hock, David
    Tran-Gia, Phuoc
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Fiedler, Markus
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Testing the IQX Hypothesis for Exponential Interdependency between QoS and QoE of Voice Codecs iLBC and G.7112008Konferensbidrag (Refereegranskat)
    Abstract [sv]

    Pappret belyser den exponentiella påverkan av tjänstekvalitetsstörningar (såsom dataförlust, fördröjningar och reordering) på upplevt tjänstekvalitet, fokusserat på populära röst-kodningsalgoritmer såsom G.711 och iLBC (som används av Skype). QoS, QoE, upplevt tjänstekvalitet, mätningar, nätverksemulering

  • 14. Infuehr, Johannes
    et al.
    Stezenbach, David
    Hartmann, Mathias
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Raidl, Guenther
    Using Optimized Virtual Network Embedding for Network Dimensioning2013Konferensbidrag (Refereegranskat)
    Abstract [en]

    Virtual Network Embedding will be one of the key concepts of the Future Internet. For an ISP it is important to know how many additional Virtual Networks (VNs) of a specific application (e.g. web, streaming, P2P, and VoIP) are mappable into the current resource substrate with a certain probability. In this work we calculate this probability with our embedding algorithm which enables us to consider side effects based on remapping of VNs (e.g. due to reduced link delay). Our results show that minimal extra resources can significantly increase embedding probability of additional VNs.

  • 15.
    Llewellyn, Tim
    et al.
    nVISO SA, CHE.
    Milagro Fernández Carrobles, María del
    University of Castilla-La Mancha, ESP.
    Deniz, Oscar
    University of Castilla-La Mancha, ESP.
    Fricker, Samuel
    i4Ds Centre for Requirements Engineering, CHE.
    Storkey, Amos
    University of Edinburgh, GBR.
    Pazos, Nuria
    Haute Ecole Specialisee de Suisse, CHE.
    Velikic, Gordana
    RT-RK, SRB.
    Leufgen, Kirsten
    SCIPROM SARL, CHE.
    Dahyot, Rozenn
    Trinity College Dublin, IRL.
    Koller, Sebastian
    Technical University Munich, DEU.
    Goumas, Georgios
    Technical University of Athens, GRC.
    Leitner, Peter
    SYNYO GmbH, AUT.
    Dasika, Ganesh
    ARM Ltd., GBR.
    Wang, Lei
    ZF Friedrichshafen AG, DEU.
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    BONSEYES: Platform for Open Development of Systems of Artificial Intelligence2017Konferensbidrag (Övrigt vetenskapligt)
    Abstract [en]

    The Bonseyes EU H2020 collaborative project aims to develop a platform consisting of a Data Marketplace, a Deep Learning Toolbox, and Developer Reference Platforms for organizations wanting to adopt Artificial Intelligence. The project will be focused on using artificial intelligence in low power Internet of Things (IoT) devices ("edge computing"), embedded computing systems, and data center servers ("cloud computing"). It will bring about orders of magnitude improvements in efficiency, performance, reliability, security, and productivity in the design and programming of systems of artificial intelligence that incorporate Smart Cyber-Physical Systems (CPS). In addition, it will solve a causality problem for organizations who lack access to Data and Models. Its open software architecture will facilitate adoption of the whole concept on a wider scale. To evaluate the effectiveness, technical feasibility, and to quantify the real-world improvements in efficiency, security, performance, effort and cost of adding AI to products and services using the Bonseyes platform, four complementary demonstrators will be built. Bonseyes platform capabilities are aimed at being aligned with the European FI-PPP activities and take advantage of its flagship project FIWARE. This paper provides a description of the project motivation, goals and preliminary work.

  • 16.
    Maksimov, Yuliyan
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datavetenskap. FHNW University of Applied Sciences and Arts Northwestern Switzerland, CHE.
    Fricker, Samuel
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för programvaruteknik.
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Artifact Compatibility for Enabling Collaboration in the Artificial Intelligence Ecosystem2018Ingår i: Lecture Notes in Business Information Processing, Springer, 2018, Vol. 336, s. 56-71Konferensbidrag (Refereegranskat)
    Abstract [en]

    Different types of software components and data have to be combined to solve an artificial intelligence challenge. An emerging marketplace for these components will allow for their exchange and distribution. To facilitate and boost the collaboration on the marketplace a solution for finding compatible artifacts is needed. We propose a concept to define compatibility on such a marketplace and suggest appropriate scenarios on how users can interact with it to support the different types of required compatibility. We also propose an initial architecture that derives from and implements the compatibility principles and makes the scenarios feasible. We matured our concept in focus group workshops and interviews with potential marketplace users from industry and academia. The results demonstrate the applicability of the concept in a real-world scenario.

  • 17.
    Mehri, Vida. A.
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Ilie, Dragos
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Designing a Secure IoT System Architecture from a Virtual Premise for a Collaborative AI Lab2019Konferensbidrag (Refereegranskat)
    Abstract [en]

    IoT systems are increasingly composed out of flexible, programmable, virtualised, and arbitrarily chained IoT elements and services using portable code. Moreover, they might be sliced, i.e. allowing multiple logical IoT systems (network + application) to run on top of a shared physical network and compute infrastructure. However, implementing and designing particularly security mechanisms for such IoT systems is challenging since a) promising technologies are still maturing, and b) the relationships among the many requirements, technologies and components are difficult to model a-priori.

    The aim of the paper is to define design cues for the security architecture and mechanisms of future, virtualised, arbitrarily chained, and eventually sliced IoT systems. Hereby, our focus is laid on the authorisation and authentication of user, host, and code integrity in these virtualised systems. The design cues are derived from the design and implementation of a secure virtual environment for distributed and collaborative AI system engineering using so called AI pipelines. The pipelines apply chained virtual elements and services and facilitate the slicing of the system. The virtual environment is denoted for short as the virtual premise (VP). The use-case of the VP for AI design provides insight into the complex interactions in the architecture, leading us to believe that the VP concept can be generalised to the IoT systems mentioned above. In addition, the use-case permits to derive, implement, and test solutions. This paper describes the flexible architecture of the VP and the design and implementation of access and execution control in virtual and containerised environments. 

  • 18.
    Mehri, Vida. A.
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Flexible Privacy and High Trust in the Next Generation Internet: The Use Case of a Cloud-based Marketplace for AI2017Konferensbidrag (Refereegranskat)
    Abstract [en]

    Cloudified architectures facilitate resource ac-cess and sharing which is independent from physical lo-cations. They permit high availability of resources at lowoperational costs. These advantages, however, do not comefor free. End users might fear that they lose control overthe location of their data and, thus, of their autonomy indeciding to whom the data is communicate to. Thus, strongprivacy and trust concerns arise for end users.In this work we will review and investigate privacy andtrust requirements for Cloud systems in general and for acloud-based marketplace (CMP) for AI in particular. We willinvestigate whether and how the current privacy and trustdimensions can be applied to Clouds and for the design ofa CMP. We also propose the concept of a "virtual premise"for enabling "Privacy-by-Design" [1] in Clouds. The ideaof a "virtual premise" might probably not be a universalsolution for any privacy requirement. However, we expectthat it provides flexibility in designing privacy in Cloudsand thus leading to higher trust.

  • 19.
    Mehri, Vida. A.
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Privacy and trust in cloud-based marketplaces for AI and data resources2017Ingår i: IFIP Advances in Information and Communication Technology, Springer New York LLC , 2017, Vol. 505, s. 223-225Konferensbidrag (Refereegranskat)
    Abstract [en]

    The processing of the huge amounts of information from the Internet of Things (IoT) has become challenging. Artificial Intelligence (AI) techniques have been developed to handle this task efficiently. However, they require annotated data sets for training, while manual preprocessing of the data sets is costly. The H2020 project “Bonseyes” has suggested a “Market Place for AI”, where the stakeholders can engage trustfully in business around AI resources and data sets. The MP permits trading of resources that have high privacy requirements (e.g. data sets containing patient medical information) as well as ones with low requirements (e.g. fuel consumption of cars) for the sake of its generality. In this abstract we review trust and privacy definitions and provide a first requirement analysis for them with regards to Cloud-based Market Places (CMPs). The comparison of definitions and requirements allows for the identification of the research gap that will be addressed by the main authors PhD project. © IFIP International Federation for Information Processing 2017.

  • 20. Metzger, Florian
    et al.
    Rafetseder, Albert
    Romirer-Maierhofer, Peter
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Exploratory Analysis of a GGSN’s PDP Context Signaling Load2014Ingår i: Journal of Computer Networks and Communications, ISSN 2090-7141, E-ISSN 2090-715X, Vol. 2014Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    This paper takes an exploratory look on control plane signaling in a mobile cellular core network. In contrast to most contributions in this field, our focus does not lie on the wireless or user-oriented parts of the network, but on signaling in the core network. In an investigation of core network data we take a look at statistics related to GTP tunnels and their signaling. Based on the results thereof we propose a definition of load at the GGSN and create an initial load queuingmodel.We find signs of user devices putting burden on the core network through their behavior

  • 21. Michel, Oliver
    et al.
    Stezenbach, David
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Multihoming and Adaptive Multipath Transmission Using Off-the-shelf Components in Preclinical Medical Care2013Konferensbidrag (Refereegranskat)
  • 22. Rafetseder, Albert
    et al.
    Metzger, Florian
    Puehringer, Lukas
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Zhuang, Yanyan
    Cappos, Justin
    Sensorium – A Generic Sensor Framework2013Ingår i: PIK - Praxis der Informationsverarbeitung und Kommunikation, ISSN 1865-8342, Vol. 36, nr 1Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Modern computing devices, including smartphones, laptops, and tablet computers, are equipped with a number of sensors and data sources, ranging from accelerometers to 3G radio information. But different platforms (eg Android or iOS) use different interfaces for sensors access. There is no common way to access this data. Privacy is another issue hardly tackled on any platform, other than in a crude allow or deny way.

  • 23.
    Stezenbach, David
    et al.
    University of Vienna, AUT.
    Tutschku, Kurt Tutschku
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    A Performance Evaluation Metric for NFV Elements on Multiple Timescales2013Ingår i: Proceeding of the Global Communications Conference 2013 (GLOBECOM 2013)., 2013Konferensbidrag (Refereegranskat)
    Abstract [en]

    Todays virtualization technologies are manifold and a comparison is hardly achievable. Thus, a metric independent from the virtualization technology is required to compare different systems. The metric is measurable in a passive way, hence, no artificial traffic has to be generated, and the virtualization system needs not to be modified. It evaluates the throughput of events on different time slices. This methodology, in contrast to existing jitter evaluations, enables the identification of critical timescales in the virtualization system. In this demonstration a proof-of-concept for a performance metric for NFV elements on multiple timescales is presented. In a reduced environment consisting of a single virtual router host the influences of hardware resource sharing and other impact factors (e.g. cpu, memory or disc load) are made visible. The demonstration gives an example of a performance degrease on smaller timescales, which can not be identified by a common throughput measurement over time. Thus, the presented metric enables to identify critical system conditions and can be used to optimize the scheduling of NFV, to compare different virtualization technologies, or to grade the performance for specific applications.

  • 24.
    Tkachuk, Roman-Valentyn
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datavetenskap.
    Ilie, Dragos
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datavetenskap.
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datavetenskap.
    Orchestrating Future Service Chains in the Next Generation of Clouds2019Ingår i: Proceedings of SNCNW 2019: The 15th Swedish National Computer Networking Workshop, Luleå, 2019, s. 18-22Konferensbidrag (Refereegranskat)
    Abstract [en]

    Service Chains have developed into an important concept in service provisioning in today’s and future Clouds. Cloud systems, e.g., Amazon Web Services (AWS), permit the implementation and deployment of new applications, services and service chains rapidly and flexibly. They employ the idea of Infrastructure as Code (IaC), which is the process of managing and provisioning computing infrastructure and its configuration through machine-processable definition files.

    In this paper, we first detail future service chains with particular focus on Network Function Virtualization (NFV) and machine learning in AI. Afterwards, we analyze and summarize the capabilities of today’s IaC tools for orchestrating Cloud infrastructures and service chains. We compare the functionality of the major five IaC tools: Puppet, Chef, SaltStack, Ansible, and Terraform. In addition, we demonstrate how to analyze the functional capabilities of one of the tools. Finally, we give an outlook on future research issues on using IaC tools across multiple operators, data center domains, and different stockholders that collaborate on service chains.

  • 25.
    Tutschku, Kurt
    Institute of Computer ScienceUniversity of Würzburg, DEU.
    A Measurement-based Traffic Profile of the eDonkey Filesharing Service2004Konferensbidrag (Refereegranskat)
    Abstract [en]

    Peer-to-peer file sharing applications have evolved to one of the major traffic sources in the Internet. In particular, the eDonkey file sharing system and its derivatives are causing high amounts of traffic volume in today’s networks. The eDonkey system is typically used for exchanging very large files like audio/video CDs or even DVD images. In this report we provide a measurement based traffic profile of the eDonkey service. Furthermore, we discuss how this type of service increases the ”mice and elephants” phenomenon in the Internet traffic characteristics.

  • 26.
    Tutschku, Kurt
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Ahmadi Mehri, Vida
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Carlsson, Anders
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Chivukula, Krishna Varaynya
    CityNetwork Webbhotell AB.
    Johan, Christenson
    CityNetwork Webbhotell AB.
    On Resource Description Capabilities of On-Board Tools for Resource Management in Cloud Networking and NFV Infrastructures2016Ingår i: 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2016, s. 442-447Konferensbidrag (Refereegranskat)
    Abstract [en]

    The rapid adoption of networks that are based on "cloudification" and Network Function Virtualisation (NFV) comes from the anticipated high cost savings of up to 70% in their build and operation. The high savings are founded in the use of general standard servers, instead of single-purpose hardware, and by efficiency resource sharing through virtualisation concepts. In this paper, we discuss the capabilities of resource description of "on-board" tools, i.e. using standard Linux commands, to enable OPEX savings. We put a focus on monitoring resources on small time-scales and on the variation observed on such scales. We introduce a QoE-based comparative concept that relates guest and host views on "utilisation" and "load" for the analysis of the variations. We describe the order of variations in "utilisation" and "load" by measurement and by graphical analysis of the measurements. We do these evaluations for different host operating systems and monitoring tools.

  • 27.
    Tutschku, Kurt Tutschku
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Ahmadi Mehri, Vida
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Carlsson, Anders
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Towards Multi-layer Resource Management in Cloud Networking and NFV Infrastructures2016Konferensbidrag (Refereegranskat)
    Abstract [en]

    Cloud Networking (CN) and related conceptsoffer appealing novelties to Cloud Computing (CC) customers.They can do a one-stop-shopping for network-enhanced cloudservices. In addition, the costs of such services might below due to multiple customers sharing the infrastructures.Moreover, telecommunication network operators are adopt-ing the CN in theirNetwork Functions Virtualisation (NFV)framework for reducing costs and increasing the flexibility oftheir networks. The technical appeal of CN comes from thetight integration of CC and smart networks. The economicalattractiveness results from avoiding dedicated hardware, shar-ing of resources, and simplified resource management (RM) asseen by the users respectively by the applications. The visionof cheap and integrated CN services is obviously attractive,but it is also evident that it will require more complex RMprocedures for efficiently balancing the usage of all resources.In this contribution, we suggest an initial architecture forintegrated and practical RM in CN and NFV systems. TheRM concept aims at locating and analysing performancebottlenecks, efficiency problems, and eventually discover un-used resources. The suggested architecture is based on alayered view on the system. Moreover, we detail difficultiesin practical resources usage monitoring which, in turn, definerequirements for a RM architecture. The requirement analysisis based on measurements in a CN infrastructure.

  • 28.
    Tutschku, Kurt Tutschku
    et al.
    Universität Wien, AUT.
    Zinner, Thomas
    University of Wuerzburg.
    Nakao, Akihiro
    University of Tokyo.
    Tran-Gia, Phuoc
    University of Wuerzburg.
    Network Virtualization: Implementation Steps Towards the Future Internet.2009Ingår i: Workshop on Overlay and Network Virtualization at KIVS 2009, 2009Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper we will investigate why and how Network Virtualization (NV) can overcome the shortfalls of the current system and how it paves the way for the Future Internet. Therefore, we will first discuss some major deficiencies and achievements of today’s Internet. Afterwards, we identify three major building blocks of NV: a) the use of application-specific routing overlays, b) the safe consolidation of resources by OS virtualization on a generic infrastructure, and c) the exploitation of the network diversity for performance enhancements and for new business models, such as the provisioning of intermediate nodes or path oracles. Subsequently, we discuss an implementation scheme for network virtualization or routing overlays based on one-hop source routers (OSRs). The capabilities of the combination of NV and OSRs are demonstrated by a concurrent multipath transmission (CMP) mechanism (also known as stripping) for obtaining high throughput transmission pipes. The suggested stripping mechanism constitutes a first instance of a refinement of the concept of NV, the idea of transport system virtualization.

  • 29.
    van der Mei, Rob
    et al.
    Centrum Wiskunde and Informatica (CWI), NLD.
    van den Berg, Hans
    TNO, NLD.
    Ganchev, Ivan
    University of Limerick, IRE.
    Tutschku, Kurt Tutschku
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Leitner, Philipp
    University of Zurich, CHE.
    Lassila, Pasi
    Aalto University, FIN.
    Burakowski, Wojciech
    Warsaw University of Technology, POL.
    Liberal, Fidel
    University of the Basque Country (UPV/EHU), ESP.
    Arvidsson, Åke
    Kristianstad University, SWE.
    Hoßfeld, Tobias
    lInstitute of Computer Science and Business Information Systems (ICB), DEU.
    Wac, Katarzyna
    University of Geneva, CHE.
    Melvin, Hugh
    National University of Ireland, IRE.
    Galinac Grbac, Tihana
    University of Rijeka, HRV.
    Haddad, Yoram
    JCT-Lev Academic Center, ISR.
    Key, Peter
    Microsoft Research Ltd., GBR.
    State of the Art and Research Challenges in the Area of Autonomous Control for a Reliable Internet of Services2018Ingår i: Autonomous Control for a Reliable Internet of Services: Methods, Models, Approaches, Techniques, Algorithms, and Tools / [ed] Ganchev, Ivan, van der Mei, Robert D., van den Berg, J.L., Springer Publishing Company, 2018Kapitel i bok, del av antologi (Refereegranskat)
    Abstract [en]

    The explosive growth of the Internet has fundamentally changed the global society. The emergence of concepts like service-oriented architecture (SOA), Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Network as a Service (NaaS) and Cloud Computing in general has catalyzed the migration from the information-oriented Internet into an Internet of Services (IoS). This has opened up virtually unbounded possibilities for the creation of new and innovative services that facilitate business processes and improve the quality of life. However, this also calls for new approaches to ensuring quality and reliability of these services. The goal of this book chapter is to first analyze the state-of-the-art in the area of autonomous control for a reliable IoS and then to identify the main research challenges within it. A general background and high-level description of the current state of knowledge is presented. Then, for each of the three subareas, namely the autonomous management and real-time control, methods and tools for monitoring and service prediction, and smart pricing and competition in multi-domain systems, a brief general introduction and background are presented, and a list of key research challenges is formulated.

1 - 29 av 29
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf