scispace - formally typeset
Search or ask a question
Topic

Shared resource

About: Shared resource is a research topic. Over the lifetime, 7536 publications have been published within this topic receiving 123491 citations. The topic is also known as: network share.


Papers
More filters
Proceedings ArticleDOI
25 Jun 2017
TL;DR: Zenith is proposed, a novel model for allocating computing resources in an edge computing platform that allows service providers to establish resource sharing contracts with edge infrastructure providers apriori and employs a latency-aware scheduling and resource provisioning algorithm.
Abstract: In the Internet of Things(IoT) era, the demands for low-latency computing for time-sensitive applications (e.g., location-based augmented reality games, real-time smart grid management, real-time navigation using wearables) has been growing rapidly. Edge Computing provides an additional layer of infrastructure to fill latency gaps between the IoT devices and the back-end computing infrastructure. In the edge computing model, small-scale micro-datacenters that represent ad-hoc and distributed collection of computing infrastructure pose new challenges in terms of management and effective resource sharing to achieve a globally efficient resource allocation. In this paper, we propose Zenith, a novel model for allocating computing resources in an edge computing platform that allows service providers to establish resource sharing contracts with edge infrastructure providers apriori. Based on the established contracts, service providers employ a latency-aware scheduling and resource provisioning algorithm that enables tasks to complete and meet their latency requirements. The proposed techniques are evaluated through extensive experiments that demonstrate the effectiveness, scalability and performance efficiency of the proposed model.

153 citations

Posted Content
TL;DR: A graph-matching-based optimal task assignment policy is proposed, and further evaluate its performance through extensive numerical study, which shows superior performance of more than 50 percent energy consumption reduction over the case of local task executions.
Abstract: In this article we propose a novel Device-to-Device (D2D) Crowd framework for 5G mobile edge computing, where a massive crowd of devices at the network edge leverage the network-assisted D2D collaboration for computation and communication resource sharing among each other. A key objective of this framework is to achieve energy-efficient collaborative task executions at network-edge for mobile users. Specifically, we first introduce the D2D Crowd system model in details, and then formulate the energy-efficient D2D Crowd task assignment problem by taking into account the necessary constraints. We next propose a graph matching based optimal task assignment policy, and further evaluate its performance through extensive numerical study, which shows a superior performance of more than 50% energy consumption reduction over the case of local task executions. Finally, we also discuss the directions of extending the D2D Crowd framework by taking into variety of application factors.

151 citations

Journal ArticleDOI
TL;DR: In this paper, the authors present a comprehensive literature review on applications of economic and pricing models for resource management in cloud networking, which can lead to desirable performance in terms of social welfare, fairness, truthfulness, profit, user satisfaction, and resource utilization.
Abstract: This paper presents a comprehensive literature review on applications of economic and pricing models for resource management in cloud networking. To achieve sustainable profit advantage, cost reduction, and flexibility in provisioning of cloud resources, resource management in cloud networking requires adaptive and robust designs to address many issues, e.g., resource allocation, bandwidth reservation, request allocation, and workload allocation. Economic and pricing models have received a lot of attention as they can lead to desirable performance in terms of social welfare, fairness, truthfulness, profit, user satisfaction, and resource utilization. This paper reviews applications of the economic and pricing models to develop adaptive algorithms and protocols for resource management in cloud networking. Besides, we survey a variety of incentive mechanisms using the pricing strategies in sharing resources in edge computing. In addition, we consider using pricing models in cloud-based software defined wireless networking. Finally, we highlight important challenges, open issues and future research directions of applying economic and pricing models to cloud networking.

151 citations

Patent
03 Aug 2001
TL;DR: In this article, a file-sharing system over a wide-area network is described. But the file sharing is not limited to a single file, but instead includes a plurality of files, each of which is stored on a different host.
Abstract: A network-based file-sharing system includes a first host computer and a plurality of other host computers, each host computer having a processing unit and a storage. The first host computer is programmed to generate from the plurality of other host computers a list of other host computers where a user-selected file is stored. The first host computer is further programmed to select a second host computer from the list of other host computers based on an indication of a transfer time from the second host computer to the first host computer and to retrieve at least a portion of the particular file from the second host computer using User Datagram Protocol data packets. Files may be shared over a wide-area network by connecting a plurality of hosts over the wide-area network; coupling a registry server independent of the hosts to the wide-area network for maintaining a registry containing, for each of a plurality of files, a message digest uniquely identifying the file and an indication of restriction status of the file; and providing a first host having a processing unit, a storage, and a first set of machine instructions storable in the storage and executable by the processing unit for retrieving a user-selected file from at least one of the hosts coupled to the first host via the wide-area network. Access to the file by the first host from the plurality of hosts is based on the indication in the registry of restriction status of the user-selected file.

149 citations

Patent
Adi Ofer1
28 Nov 2000
TL;DR: In this paper, the authors propose a cooperative lock override procedure for managing a shared resource in a data processing system, where the detecting processor confirms that the failing processor is the lockholder and passes the lock to the next requestor in the queue.
Abstract: Queued lock services for managing a shared resource in a data processing system include a cooperative lock override procedure. On detecting a protocol failure by another processor, the detecting processor confirms that the failing processor is the lockholder and passes the lock to the next requestor in the queue.

148 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
84% related
Information system
107.5K papers, 1.8M citations
83% related
Software
130.5K papers, 2M citations
80% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202381
2022194
2021223
2020298
2019381
2018373