Development and performance analysis of real-world applications for distributed and parallel architectures

2001 ◽  
Vol 13 (10) ◽  
pp. 841-868
Author(s):  
T. Fahringer ◽  
P. Blaha ◽  
A. Hössinger ◽  
J. Luitz ◽  
E. Mehofer ◽  
...  
2012 ◽  
Vol 5 (4) ◽  
pp. 308-316 ◽  
Author(s):  
François Quitin ◽  
Claude Oestges ◽  
Ali Panahandeh ◽  
François Horlin ◽  
Philippe De Doncker

2021 ◽  
pp. 73-82
Author(s):  
Dorina Bano ◽  
Tom Lichtenstein ◽  
Finn Klessascheck ◽  
Mathias Weske

Process mining is widely adopted in organizations to gain deep insights about running business processes. This can be achieved by applying different process mining techniques like discovery, conformance checking, and performance analysis. These techniques are applied on event logs, which need to be extracted from the organization’s databases beforehand. This not only implies access to databases, but also detailed knowledge about the database schema, which is often not available. In many real-world scenarios, however, process execution data is available as redo logs. Such logs are used to bring a database into a consistent state in case of a system failure. This paper proposes a semi-automatic approach to extract an event log from redo logs alone. It does not require access to the database or knowledge of the databaseschema. The feasibility of the proposed approach is evaluated on two synthetic redo logs.


2019 ◽  
Vol 46 (9) ◽  
pp. 796-809 ◽  
Author(s):  
Mohammed A. Zaki ◽  
Hayder A. Rasheed

Utilizing fiber reinforced polymer (FRP) anchors can enhance the strength and delay the debonding of flexural FRP in strengthened reinforced concrete (RC) beams. In this study, two different techniques are used for applying carbon FRP (CFRP) spike anchors to improve the performance of RC beams strengthened with CFRP sheets. These two techniques are compared with respect to the ease of application, time spent, size of installation team, and performance. The first technique involved applying the CFRP anchors to begin with, then installing CFRP sheets by separating the fibers at the location of anchors. The second technique applied the CFRP sheets first to the beam soffit right after drilling the holes. This was followed by inserting CFRP anchors through the sheets into the prepared holes. The conclusion indicates that the second technique is easier, faster, and more practical in real-world applications. In addition, the use of distributed CFRP anchors increased the flexural capacity of the strengthened beams.


2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Wenting Shen ◽  
Jing Qin ◽  
Jixin Ma

Cloud storage auditing allows the users to store their data to the cloud with a guarantee that the data integrity can be efficiently checked. In order to release the user from the burden of generating data signatures, the proxy with a valid warrant is introduced to help the user process data in lightweight cloud storage auditing schemes. However, the proxy might be revoked or the proxy’s warrant might expire. These problems are common and essential in real-world applications, but they are not considered and solved in existing lightweight cloud storage auditing schemes. In this paper, we propose a lightweight identity-based cloud storage auditing scheme supporting proxy update, which not only reduces the user’s computation overhead but also makes the revoked proxy or the expired proxy unable to process data on behalf of the user any more. The signatures generated by the revoked proxy or the expired proxy can still be used to verify data integrity. Furthermore, our scheme also supports workload-based payment for the proxy. The security proof and the performance analysis indicate that our scheme is secure and efficient.


2013 ◽  
Vol 8 (4) ◽  
pp. 35-44 ◽  
Author(s):  
Veronika Shivaldova ◽  
Andreas Winkelbauer ◽  
Christoph F. Mecklenbrauker

2005 ◽  
Vol 12 (18) ◽  
Author(s):  
Peter Bogetoft ◽  
Ivan B. Damgård ◽  
Thomas Jakobsen ◽  
Kurt Nielsen ◽  
Jakob Pagter ◽  
...  

In this paper we consider the problem of constructing secure auctions based on techniques from modern cryptography. We combine knowledge from economics, cryptography and security engineering and develop and implement secure auctions for practical real-world problems.<br /> <br />In essence this paper is an overview of the research project SCET--Secure Computing, Economy, and Trust-- which attempts to build auctions for real applications using secure multiparty computation.<br /> <br />The main contributions of this project are: A generic setup for secure evaluation of integer arithmetic including comparisons; general double auctions expressed by such operations; a real world double auction tailored to the complexity and performance of the basic primitives '+' and '<='; and finally evidence that our approach is practically feasible based on experiments with prototypes.


2019 ◽  
Vol 13 (2) ◽  
pp. 122-130
Author(s):  
Dian ayunita Nugraheni nurmala Dewi

Objectives of this study were analyze fish auction participant satisfaction to auction services in TPI Morodemak, analyze attributes effect, services that fit to service quality measurement, and analyzed fish auction participants perception to performance and importance for fish auction house Morodemak services. Used descriptive method and purposive sampling with 49 respondents consists of commercial fishmongers, traditional fishmongers, purse seine owners, and boat lift net owners as fish auction participant. Satisfication measurement used Customer Satisfication Index (CSI), Importance and Performance Analysis (IPA) and gap analysis. Results from this study were value CSI 20% (0.2) indicate the auction participants dissatisfied with the services provided, IPA show there are four attributes should be develop, two elements have not been completed based on measurement requirements of service satisfaction, gap value average -0.05 means the auction participants were not satisfied with the performance of TPI services because the performance value was lower than the importance value.


2018 ◽  
Vol 2 (01) ◽  
pp. 14
Author(s):  
Eddy Supardi

The Tax Payer obidience in fulfiling their taxation obligation will be influenced a lot by the satisfaction level toward the service fiscus. The aim of this observation is to know the response of Tax Payer toward service quality through importance and performance. The population which become the object of this observation is the personal Tax Payer registered in Bogor Tax Service Office and the number of respondents taken as the sample are 100 respondents with Slovin formula. The analysis method used is descriptive analysis and importance-performance analysis.   The result of this observation will be able to be used as one of the input to Bogor Tax Service Office in improving the quality service and for the following observation, especially those who take the same object as the observation in order to improve the quality service to the Tax Payer based on the service of its working way which is felt less. Otherwise it is important for The Tax Payer, maintaining the good work or balancing the service quality based on the working way which is evaluated less important by The Taxe Payer, but has been done reasonably well or very well by The Service Office


Sign in / Sign up

Export Citation Format

Share Document