scispace - formally typeset
Search or ask a question
Topic

Shared resource

About: Shared resource is a research topic. Over the lifetime, 7536 publications have been published within this topic receiving 123491 citations. The topic is also known as: network share.


Papers
More filters
Journal ArticleDOI
TL;DR: This study employs game theoretic approaches to model the problem of minimizing energy consumption as a Stackelberg game among decentralized scheduler agents as they compete with one another in the sharing resources.
Abstract: Data centers hosting distributed computing systems consume huge amounts of electrical energy, contributing to high operational costs, whereas the utilization of data centers continues to be very low. Moreover, a data center generally consists of heterogeneous servers with different performance and energy. Failure to fully consider the heterogeneity of servers will lead to both sub-optimal energy saving and performance. In this study, we employ game theoretic approaches to model the problem of minimizing energy consumption as a Stackelberg game. In our model, the system monitor, who plays the role of the leader, can maximize profit by adjusting resource provisioning, whereas scheduler agents, who act as followers, can select resources to obtain optimal performance. In addition, we model the problem of minimizing average response time of tasks as a noncooperative game among decentralized scheduler agents as they compete with one another in the sharing resources. Several algorithms are presented to implement the game models. Simulation results demonstrate that the proposed technique has immense potential to improve energy efficiency under dynamic work scenarios without compromising service level agreements.

63 citations

Patent
09 Jan 1997
TL;DR: In this article, a method and architecture for sharing data items using a resource sharing facility with a medium level cache accessible to all of the computers which are to share and connected to the computers by fast intersystem links is presented.
Abstract: A method and architecture for sharing data items using a resource sharing facility with a medium level cache accessible to all of the computers which are to share and connected to the computers by fast intersystem links. The resource sharing facility also acts as an ordinary secondary storage controller and in the resource sharing facility the control information and logic is provided which is needed for the mapping of cache data to the secondary storage and vice versa.

63 citations

Journal ArticleDOI
TL;DR: A bandwidth-centric job communication model that captures the interaction and impact of simultaneously co-allocating jobs across multiple clusters is presented and the performance of multi-cluster scheduling algorithms that focus not only on node resource allocation, but also on shared inter-clusters network bandwidth is evaluated.
Abstract: In this paper, we present a bandwidth-centric job communication model that captures the interaction and impact of simultaneously co-allocating jobs across multiple clusters. We compare our dynamic model with previous research that utilizes a fixed execution time penalty for co-allocated jobs. We explore the interaction of simultaneously co-allocated jobs and the contention they often create in the network infrastructure of a dedicated computational multi-cluster. We also present several bandwidth-aware co-allocating meta-schedulers. These schedulers take inter-cluster network utilization into account as a means by which to mitigate degraded job run-time performance. We make use of a bandwidth-centric parallel job communication model that captures the time-varying utilization of shared inter-cluster network resources. By doing so, we are able to evaluate the performance of multi-cluster scheduling algorithms that focus not only on node resource allocation, but also on shared inter-cluster network bandwidth.

63 citations

Book ChapterDOI
06 Apr 2005
TL;DR: A distributed solution for access control, making use of the autonomy and cooperation capability of the devices, since in open dynamic environments is very difficult to depend on central server.
Abstract: Alice first meets Bob in an entertainment shop, then, they wish to share multimedia content, but Do they know what are trustworthy users? How do they share such information in a secure way? How do they establish the permissions? Pervasive computing environments originate this kind of scenario, users with their personal devices interacting without need of wires, by forming ad-hoc networks. Such devices considered pervasive are having increasingly faster processors, larger memories and wider communication capabilities, which allows certain autonomy for collaborating and sharing resources. So, they require a suitable access control in order to avoid unauthorised access, or disclosure/modification of relevant information; in general, to protect the data that are usually confidential and the resources. This paper presents a distributed solution for access control, making use of the autonomy and cooperation capability of the devices, since in open dynamic environments is very difficult to depend on central server. The access control is based on a pervasive trust management model from which trust degrees are dynamically obtained. We present the TrustAC reference and functional model, as well as a prototype implementation using XACML-compliant policies.

62 citations

Patent
03 Apr 2009
TL;DR: In this article, a one-to-one association is established between a client and a host in a wireless network, such as a wireless local area network or a wireless personal communication network.
Abstract: In embodiments, a one-to-one association is established between a client and a host in a wireless network, such as a wireless local area network or a wireless personal communication network. The client may be a display device. The host may be a cellular telephone. Active association corresponds to the host exclusively using a shared resource of the client. When the association is solid, requests from other hosts to establish an active association are denied. When the association is fragile, such requests are granted. In the case of a semi-solid association, a request from another host to establish an active association causes the client to generate a query to the host currently owning the active association. If the host currently owning the association grants a release, a new active association is established between the requesting host and the client. Otherwise, the request from the other host is denied.

62 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
84% related
Information system
107.5K papers, 1.8M citations
83% related
Software
130.5K papers, 2M citations
80% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202381
2022194
2021223
2020298
2019381
2018373