scispace - formally typeset
Search or ask a question

Showing papers on "Service provider published in 2010"


Book ChapterDOI
25 Jan 2010
TL;DR: This work considers the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer and describes several architectures that combine recent and non-standard cryptographic primitives to achieve this goal.
Abstract: We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer We describe, at a high level, several architectures that combine recent and non-standard cryptographic primitives in order to achieve our goal We survey the benefits such an architecture would provide to both customers and service providers and give an overview of recent advances in cryptography motivated specifically by cloud storage

1,333 citations


Proceedings ArticleDOI
14 Mar 2010
TL;DR: The results show that even though the data center network is lightly utilized, virtualization can still cause significant throughput instability and abnormal delay variations.
Abstract: Cloud computing services allow users to lease computing resources from large scale data centers operated by service providers. Using cloud services, users can deploy a wide variety of applications dynamically and on-demand. Most cloud service providers use machine virtualization to provide flexible and cost-effective resource sharing. However, few studies have investigated the impact of machine virtualization in the cloud on networking performance. In this paper, we present a measurement study to characterize the impact of virtualization on the networking performance of the Amazon Elastic Cloud Computing (EC2) data center. We measure the processor sharing, packet delay, TCP/UDP throughput and packet loss among Amazon EC2 virtual machines. Our results show that even though the data center network is lightly utilized, virtualization can still cause significant throughput instability and abnormal delay variations. We discuss the implications of our findings on several classes of applications.

720 citations


Patent
19 May 2010
TL;DR: In this paper, the authors present a framework for delivery of video, audio, data, etc. over a content delivery network, in which the content is packetized using an Internet Protocol (IP) and delivered by a service provider over both managed and unmanaged networks to subscribers of the provider, so as to provide delivery at any time, at any location, and via any designated user device.
Abstract: Methods and apparatus for delivery of packetized content (e.g., video, audio, data, etc.) over a content delivery network. In one embodiment, the content is packetized using an Internet Protocol (IP), and delivered by a service provider over both managed and unmanaged networks to subscribers of the provider, so as to provide delivery at any time, at any location, and via any designated user device. The delivered content may originate from the service provider, third-party content sources (e.g., networks or studios), the subscriber(s) themselves, or other sources including the Internet. Use of a common control and service functions within the network afford the ability to integrate or blend services together, thereby affording the service provider and subscriber new service and economic opportunities. Content delivery sessions may also be migrated from one device to another. A network-based user interface infrastructure, and gateway-based client-side architecture, are also disclosed.

646 citations


Journal ArticleDOI
TL;DR: Co-teaching as discussed by the authors is the sharing of instruction by a general education teacher and a special education teacher or another specialist in general education class that includes students with disabilities, is a relatively recent application.
Abstract: Although collaboration among service providers has been a hallmark of special education almost since its inception, co-teaching, the sharing of instruction by a general education teacher and a special education teacher or another specialist in a general education class that includes students with disabilities, is a relatively recent application. As a result of recent federal legislation and related policy changes, co-teaching has evolved rapidly as a strategy for ensuring that these students have access to the same curriculum as other students while still receiving the specialized instruction to which they are entitled. Despite considerable enthusiasm expressed by those who write about co-teaching and those who implement it, co-teaching illustrates the complexity of conceptualizing and studying collaboration in special education. Most inquiry on co-teaching has emphasized co-teachers' roles and relationships or program logistics rather than demonstrating its impact on student achievement and other key out...

549 citations


Proceedings ArticleDOI
14 Mar 2010
TL;DR: This paper model the problem of minimizing the total electricity cost under multiple electricity markets environment while guaranteeing quality of service geared to the location diversity and time diversity of electricity price as a constrained mixed-integer programming and propose an efficient solution method.
Abstract: The study of Cyber-Physical System (CPS) has been an active area of research. Internet Data Center (IDC) is an important emerging Cyber-Physical System. As the demand on Internet services drastically increases in recent years, the power used by IDCs has been skyrocketing. While most existing research focuses on reducing power consumptions of IDCs, the power management problem for minimizing the total electricity cost has been overlooked. This is an important problem faced by service providers, especially in the current multi-electricity market, where the price of electricity may exhibit time and location diversities. Further, for these service providers, guaranteeing quality of service (i.e. service level objectives-SLO) such as service delay guarantees to the end users is of paramount importance. This paper studies the problem of minimizing the total electricity cost under multiple electricity markets environment while guaranteeing quality of service geared to the location diversity and time diversity of electricity price. We model the problem as a constrained mixed-integer programming and propose an efficient solution method. Extensive evaluations based on real-life electricity price data for multiple IDC locations illustrate the efficiency and efficacy of our approach.

545 citations


Journal ArticleDOI
TL;DR: A conceptual model is proposed that delineates the determinants of consumers’ perceived security and perceived trust, as well as the effects of perceived safety and trust on the use of e-payment systems.

459 citations


Journal ArticleDOI
01 Apr 2010-Energy
TL;DR: In this article, the authors summarized the existing contribution of demand response resources in U.S. electric power markets and showed that DR resources do offer a viable, cost-effective alternative to supply-side investments.

412 citations


Journal ArticleDOI
Tuncay Ercan1
TL;DR: What the cloud computing infrastructure will provide in the educational arena, especially in the universities where the use of computers are more intensive and what can be done to increase the benefits of common applications for students and teachers are reviewed.

392 citations


Journal ArticleDOI
TL;DR: In this paper, the authors describe and evaluate the potential approaches to introduce rapid manufacturing (RM) in the spare parts supply chain and illustrate the potential benefits in terms of simultaneously improved service and reduced inventory.
Abstract: Purpose – The purpose of this paper is to describe and evaluate the potential approaches to introduce rapid manufacturing (RM) in the spare parts supply chain.Design/methodology/approach – Alternative conceptual designs for deploying RM technology in the spare parts supply chain were proposed. The potential benefits are illustrated for the aircraft industry. The general feasibility was discussed based on literature.Findings – The potential supply chain benefits in terms of simultaneously improved service and reduced inventory makes the distributed deployment of RM very interesting for spare parts supply. However, considering the trade‐offs affecting deployment it is proposed that most feasible is centralized deployment by original equipment manufacturers (OEMs), or deployment close to the point of use by generalist service providers of RM.Research limitations/implications – The limited part range that is currently possible to produce using the technology means that a RM‐based service supply chain is feasi...

378 citations


Proceedings ArticleDOI
17 May 2010
TL;DR: In this article, the authors analyzed 10-month MapReduce logs from the M45 supercomputing cluster which Yahoo! made freely available to select universities for academic research to characterize resource utilization patterns, job patterns, and sources of failures.
Abstract: MapReduce is a programming paradigm for parallel processing that is increasingly being used for data-intensive applications in cloud computing environments. An understanding of the characteristics of workloads running in MapReduce environments benefits both the service providers in the cloud and users: the service provider can use this knowledge to make better scheduling decisions, while the user can learn what aspects of their jobs impact performance. This paper analyzes 10-months of MapReduce logs from the M45 supercomputing cluster which Yahoo! made freely available to select universities for academic research. We characterize resource utilization patterns, job patterns, and sources of failures. We use an instance-based learning technique that exploits temporal locality to predict job completion times from historical data and identify potential performance problems in our dataset.

348 citations


Journal ArticleDOI
TL;DR: The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners.
Abstract: Trust and security have prevented businesses from fully accepting cloud platforms. To protect clouds, providers must first secure virtualized data center resources, uphold user privacy, and preserve data integrity. The authors suggest using a trust-overlay network over multiple data centers to implement a reputation system for establishing trust between service providers and data owners. Data coloring and software watermarking techniques protect shared data objects and massively distributed software modules. These techniques safeguard multi-way authentications, enable single sign-on in the cloud, and tighten access control for sensitive data in both public and private clouds.

Journal ArticleDOI
TL;DR: In this article, the authors explore the histories of 47 functionally novel and important commercial and retail banking services and find that, in 85% of these cases, users self-provided the service before any bank offered it.
Abstract: Many services can be self-provided. An individual user or a user firm can, for example, choose to do its own accounting – choose to self-provide that service – instead of hiring an accounting firm to provide it. Since users can ‘serve themselves’ in many cases, it is also possible for users to innovate with respect to the services they self-provide. In this paper, we explore the histories of 47 functionally novel and important commercial and retail banking services. We find that, in 85% of these cases, users self-provided the service before any bank offered it. Our empirical findings differ significantly from prevalent producer-centered views of service development. We speculate that the patterns we have observed in banking with respect to the dominant role of users in service development will prove to be quite general. If so, this will be an important matter: on the order of 75% of GDP in advanced economies today is derived from services. We discuss the implications of our findings for research and practice in service development.

Journal ArticleDOI
TL;DR: A new trend seems to be emerging for multinational manufacturing companies to make a strategic reorientation into becoming service providers as discussed by the authors, which can be seen as a continuation of the trend of outsourcing.
Abstract: A new trend seems to be emerging for multinational manufacturing companies to make a strategic reorientation into becoming service providers. For some companies, such as Kone and IBM, the revenues ...

Proceedings ArticleDOI
24 Sep 2010
TL;DR: This work investigates the target-set selection problem for information delivery in the emerging Mobile Social Networks (MoSoNets), and proposes three algorithms, called Greedy, Heuristic, and Random, to exploit opportunistic communications to facilitate the information dissemination and thus reduce the amount of cellular traffic.
Abstract: Due to the increasing popularity of various applications for smartphones, 3G networks are currently overloaded by mobile data traffic. Offloading cellular traffic through opportunistic communications is a promising solution to partially solve this problem, because there is no monetary cost for it. As a case study, we investigate the target-set selection problem for information delivery in the emerging Mobile Social Networks (MoSoNets). We propose to exploit opportunistic communications to facilitate the information dissemination and thus reduce the amount of cellular traffic. In particular, we study how to select the target set with only k users, such that we can minimize the cellular data traffic.In this scenario, initially the content service providers deliver information over cellular networks to only users in the target set. Then through opportunistic communications, target-users will further propagate the information among all the subscribed users. Finally, service providers will send the information to users who fail to receive it before the delivery deadline (i.e., delay-tolerance threshold). We propose three algorithms, called Greedy, Heuristic, and Random, for this problem and evaluate their performance through an extensive trace-driven simulation study. The simulation results verify the efficiency of these algorithms for both synthetic and real-world mobility traces. For example, the Heuristic algorithm can offload cellular traffic by up to 73.66% for a real-world mobility trace.


Proceedings ArticleDOI
08 Oct 2010
TL;DR: It is shown how new primitives in attribute-based cryptography can be used to construct a secure and privacy-preserving EHR system that enables patients to share their data among healthcare providers in a flexible, dynamic and scalable manner.
Abstract: Secure management of Electronic Health Records (EHR) in a distributed computing environment such as cloud computing where computing resources including storage is provided by a third party service provider is a challenging task. In this paper, we explore techniques which guarantees security and privacy of medical data stored in the cloud. We show how new primitives in attribute-based cryptography can be used to construct a secure and privacy-preserving EHR system that enables patients to share their data among healthcare providers in a flexible, dynamic and scalable manner.

Journal ArticleDOI
TL;DR: HIV/AIDS service providers are inadequately addressing the high smoking rate among PLWHA, despite being uniquely suited to do so, and efforts are needed to educate providers about the need for, and interest in, tobacco cessation.
Abstract: Tobacco use presents unique health risks for persons living with HIV/AIDS (PLWHA). There is an urgent need to characterize tobacco use among PLWHA, and to assess the capacity of HIV/AIDS service providers to deliver smoking cessation interventions. Questionnaires were administered to PLWHA in care in New York State (n = 1,094) and to State-funded HIV/AIDS service providers (n = 173) from 2005 to 2007. Current PLWHA smoking prevalence was 59%, three times the general population rate. Over 50% of current smokers were moderately or highly dependent on nicotine. Three-quarters of smokers indicated an interest in quitting, and 64% reported a least one quit attempt during the past year. Less than half of HIV/AIDS service providers reported always assessing tobacco use status, history, dependence, or interest in quitting at intake. Medical care providers were more likely to conduct assessments and provide services. Although 94% of providers indicated a willingness to incorporate tobacco cessation services, 65% perceived client resistance as a barrier to services. HIV/AIDS service providers are inadequately addressing the high smoking rate among PLWHA, despite being uniquely suited to do so. Efforts are needed to educate providers about the need for, and interest in, tobacco cessation.

Journal ArticleDOI
TL;DR: In this article, the authors look into the scope and equity implications of applying payments for environmental services (PES) as a REDD implementation mechanism in the Brazilian Amazon and establish a set of economic and institutional preconditions for PES to become a feasible and cost-effective conservation mechanism.

Journal ArticleDOI
TL;DR: This article proposes the application of the Resources Via Web Services framework (RVWS) to offer higher level abstraction of clouds in the form of a new technology that makes possible the provision of service publication, discovery and selection based on dynamic attributes which express the current state and characteristics of cloud services and resources.

Proceedings ArticleDOI
13 Apr 2010
TL;DR: This paper presents the main criteria which should be considered at the stage of designing the SLA in cloud computing, and investigates the negotiation strategies between cloud provider and cloud consumer and proposes the method to maintain the trust and reliability between each of the parties involved in the negotiation process.
Abstract: Cloud computing has been a hot topic in the research community since 2007. In cloud computing, the online services are conducted to be pay-as-you-use. Service customers need not be in a long term contract with service providers. Service level agreements (SLAs) are agreements signed between a service provider and another party such as a service consumer, broker agent, or monitoring agent. Because cloud computing is a recent technology providing many services for critical business applications, reliable and flexible mechanisms to manage online contracts are very important. This paper presents the main criteria which should be considered at the stage of designing the SLA in cloud computing. Also, we investigate the negotiation strategies between cloud provider and cloud consumer and propose our method to maintain the trust and reliability between each of the parties involved in the negotiation process.

Journal ArticleDOI
TL;DR: In this article, the authors identify strategic logistics resources acquired and bundled by logistics service providers (LSPs) to achieve competitive advantage based on a theoretical framework derived from the resource-based view theory.

Journal ArticleDOI
TL;DR: Claudia, a service management system that implements a new abstraction layer closer to the lifecycle of services that allows for their automatic deployment and escalation depending on the service status, and the results of the deployment of a grid service on such system.

Proceedings ArticleDOI
20 Sep 2010
TL;DR: As this paper advocates, a wrong architectural choice might entail that multi-tenancy becomes a maintenance nightmare, making the technology attractive for service providers targeting small and medium enterprises (SME).
Abstract: Multi-tenancy is a relatively new software architecture principle in the realm of the Software as a Service (SaaS) business model. It allows to make full use of the economy of scale, as multiple customers - "tenants" - share the same application and database instance. All the while, the tenants enjoy a highly configurable application, making it appear that the application is deployed on a dedicated server. The major benefits of multi-tenancy are increased utilization of hardware resources and improved ease of maintenance, in particular on the deployment side. These benefits should result in lower overall application costs, making the technology attractive for service providers targeting small and medium enterprises (SME). However, as this paper advocates, a wrong architectural choice might entail that multi-tenancy becomes a maintenance nightmare.

Journal ArticleDOI
TL;DR: The market and technological perspectives for SONs are introduced and a self-booting mechanism for a newly added evolved NodeB without a dedicated backhaul interface is illustrated, and mobility load balancing as one of the most important selfoptimization issues for Long Term Evolution networks is discussed.
Abstract: With the rapid growth of mobile communications, deployment and maintenance of cellular mobile networks are becoming more and more complex, time consuming, and expensive. In order to meet the requirements of network operators and service providers, the telecommunication industry and international standardization bodies have recently paid intensive attention to the research and development of self-organizing networks. In this article we first introduce both the market and technological perspectives for SONs. Then we focus on the self-configuration procedure and illustrate a self-booting mechanism for a newly added evolved NodeB without a dedicated backhaul interface. Finally, mobility load balancing as one of the most important selfoptimization issues for Long Term Evolution networks is discussed, and a distributed MLB algorithm with low handover cost is proposed and evaluated.

Journal ArticleDOI
TL;DR: Methods and important fields of action regarding the systematization of services – service engineering (SE) – as well as the integration of products and services – industrial product-service systems (PSS) – are presented.
Abstract: The growing demand for innovative services forces traditional product-oriented companies to perceive the potentials and strategic importance of services. Innovative services enable these companies to ensure their market positions and to achieve economical success. Due to this, it becomes necessary to systemize service design, development and management processes as well as to tightly integrate products and services. In this paper, methods and important fields of action regarding the systematization of services – service engineering (SE) – as well as the integration of products and services – industrial product-service systems (PSS) – are presented.

Patent
Rod Rigole1
16 Mar 2010
TL;DR: An interchange party computer system (IPCS) is a means for presenting user interfaces to consumer computer systems and capturing data input through the user interfaces, the IPCS being associated with at least one database holding data representing a plurality of consumer profiles as discussed by the authors.
Abstract: An interchange party computer system (IPCS) having means for presenting user interfaces to consumer computer systems and capturing data input through the user interfaces, the IPCS being associated with at least one database holding data representing a plurality of consumer profiles, the profiles including consumer profiles expressing service selection attributes for a plurality of service sectors, and at least one database holding data for a plurality of service programs under a plurality of service sectors, each sector being represented by service programs from a plurality of service providers, the IPCS including (a) a Service Comparison/Selection; (b) a Automatic Bill Payment Module; (c) an Automated Services Monitoring Module; (d) an Automated Best Services Selection Module; (e) a Services Search Module; (f) an Incentive Program Module; (g) a Data Mining Module; and/or (h) a Pooling Module.

Patent
10 May 2010
TL;DR: Disclosed as discussed by the authors is a management service that enables a user to establish, monitor, and control cloud computing sessions offered via third-party service providers, such as Amazon EC2.
Abstract: Disclosed is a management service that enables a user to establish, monitor, and control cloud computing sessions offered via third-party service providers. In some instances, the management service establishes a market space that allows a user to establish a customized cloud computing session based on computing resources offered by third-party service providers. In some instances, the management service instantiates monitoring mechanisms within the virtual servers of the cloud computing sessions to be able to monitor, assess, and provide reports and alerts pertaining to performance metrics of the various virtual servers. In some instances, the management service also allows a user to remotely transfer services from a first cloud computing session to a second cloud computing session.

Patent
30 Aug 2010
TL;DR: In this paper, the authors present a system for recommending items to users based on a history of user activities associated with a first entity that has a relationship with an inventory of recommendable items, and a specification of the selected first set items for presentation to the user during the user interaction with the second entity.
Abstract: Systems and methods for recommending items to users include maintaining a database of user-related information including user profiles, each including at least a history of user activities associated with a first entity that has a relationship with an inventory of recommendable items; obtaining information about an identity of a user interacting with a second entity different from the first entity and different from the service provider; associating the identity of the user interacting with the second entity with a corresponding user profile; selecting a first set of items from the inventory for presentation to the user based at least on an analysis of a history of user activities associated with the first entity; and forming a specification of the selected first set items for presentation to the user during the user's interaction with the second entity.

Journal ArticleDOI
TL;DR: In this article, the authors analyzed the effects of net neutrality regulation on investment incentives for Internet service providers (ISPs) and content providers (CPs), and their implications for social welfare, showing that the ISP's decision on the introduction of discrimination across content depends on a potential trade-off between network access fee and the revenue from the trade of the first priority.
Abstract: This paper analyzes the effects of net neutrality regulation on investment incentives for Internet service providers (ISPs) and content providers (CPs), and their implications for social welfare. We show that the ISP's decision on the introduction of discrimination across content depends on a potential trade-off between network access fee and the revenue from the trade of the first-priority. Concerning the ISP's investment incentives, we find that capacity expansion affects the sale price of the priority right under the discriminatory regime. Because the relative merit of the first priority, and thus its value, becomes relatively small for higher capacity levels, the ISP's incentive to invest on capacity under a discriminatory network can be smaller than that under a neutral regime where such rent extraction effects do not exist. Contrary to ISPs' claims that net neutrality regulations would have a chilling effect on their incentive to invest, we cannot dismiss the possibility of the opposite. Classification-JEL: D4, L12, L4, L43, L51, L52

Journal ArticleDOI
TL;DR: In this article, a logistics service model based on the advancement of the Multi-Temperature Joint Distribution System (MTJD) is proposed for the food cold chain, which provides a new scheme for continuously temperature-controlled logistics, which can jointly deliver and store multi-temperature goods.