On the Design of a Demand-Based Network-Computing System: The Purdue University Network-Computing Hub
نویسندگان
چکیده
Many of the systems that currently allow computing on the web target speciic tools. Such solutions tend to be non-reusable in spite of the fact that they involve a signiicant amount of duplicated eeort. This paper describes the issues involved in the design of a demand-based network-computing system, and presents an operational prototype (the Purdue University Network-Computing Hubs, or PUNCH) that allows users to access and run existing software tools via standard worldwide web browsers. The tools do not have to be written in any particular language, and access to source-code is not required. The PUNCH infrastructure can be distributed in a manner that allows tools to be (user-transparently) executed wherever they reside. Currently , PUNCH contains over thirty tools from eight universities and four vendors, and serves more than 500 users. During the past three years, PUNCH users have logged more than 860,000 hits and have performed over 54,000 simulations.
منابع مشابه
Design of a Bi-Objective Capacitated Single-Allocation Incomplete Hub Network Considering an Elastic Demand
This paper presents a bi-objective capacitated hub arc location problem with single assignment for designing a metro network with an elastic demand. In the literature, it is widely supposed that the network created with the hub nodes is complete. In this paper, this assumption is relaxed. Moreover, in most hub location problems, the demand is assumed to be static and independent of the location...
متن کاملA Hybrid Solution Method for Hub-and-Spoke Network Design under Uncertainty
Supply chain is an integrated system of facilities and activities. Gaining the optimum design of demand satisfaction network is one of the most important live issues in the decision making problems category. Most of previous studies considered unreal assumptions such as the lack of capacity constraints to satisfy demand in the network and in hubs. By considering the nature of the case that have...
متن کاملDevelopment of a Model for Predicting Heart Attack Based on Fog Computing
Introduction: Various studies have demonstrated the benefits of using distributed fog computing for the Internet of Things (IoT). Fog computing has brought cloud computing capabilities such as computing, storage, and processing closer to IoT nodes. The new model of fog and edge computing, compared to cloud computing, provides less latency for data processing by bringing resources closer to user...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملAssessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing
Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1998