SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Tutschku Kurt) "

Sökning: WFRF:(Tutschku Kurt)

  • Resultat 1-10 av 53
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Stezenbach, David, et al. (författare)
  • A Performance Evaluation Metric for NFV Elements on Multiple Timescales
  • 2013
  • Ingår i: Proceeding of the Global Communications Conference 2013 (GLOBECOM 2013)..
  • Konferensbidrag (refereegranskat)abstract
    • Todays virtualization technologies are manifold and a comparison is hardly achievable. Thus, a metric independent from the virtualization technology is required to compare different systems. The metric is measurable in a passive way, hence, no artificial traffic has to be generated, and the virtualization system needs not to be modified. It evaluates the throughput of events on different time slices. This methodology, in contrast to existing jitter evaluations, enables the identification of critical timescales in the virtualization system. In this demonstration a proof-of-concept for a performance metric for NFV elements on multiple timescales is presented. In a reduced environment consisting of a single virtual router host the influences of hardware resource sharing and other impact factors (e.g. cpu, memory or disc load) are made visible. The demonstration gives an example of a performance degrease on smaller timescales, which can not be identified by a common throughput measurement over time. Thus, the presented metric enables to identify critical system conditions and can be used to optimize the scheduling of NFV, to compare different virtualization technologies, or to grade the performance for specific applications.
  •  
3.
  • Tutschku, Kurt Tutschku, 1966-, et al. (författare)
  • Network Virtualization: Implementation Steps Towards the Future Internet.
  • 2009
  • Ingår i: Workshop on Overlay and Network Virtualization at KIVS 2009.
  • Konferensbidrag (refereegranskat)abstract
    • In this paper we will investigate why and how Network Virtualization (NV) can overcome the shortfalls of the current system and how it paves the way for the Future Internet. Therefore, we will first discuss some major deficiencies and achievements of today’s Internet. Afterwards, we identify three major building blocks of NV: a) the use of application-specific routing overlays, b) the safe consolidation of resources by OS virtualization on a generic infrastructure, and c) the exploitation of the network diversity for performance enhancements and for new business models, such as the provisioning of intermediate nodes or path oracles. Subsequently, we discuss an implementation scheme for network virtualization or routing overlays based on one-hop source routers (OSRs). The capabilities of the combination of NV and OSRs are demonstrated by a concurrent multipath transmission (CMP) mechanism (also known as stripping) for obtaining high throughput transmission pipes. The suggested stripping mechanism constitutes a first instance of a refinement of the concept of NV, the idea of transport system virtualization.
  •  
4.
  • Tutschku, Kurt Tutschku, 1966-, et al. (författare)
  • Towards Multi-layer Resource Management in Cloud Networking and NFV Infrastructures
  • 2016
  • Konferensbidrag (refereegranskat)abstract
    • Cloud Networking (CN) and related conceptsoffer appealing novelties to Cloud Computing (CC) customers.They can do a one-stop-shopping for network-enhanced cloudservices. In addition, the costs of such services might below due to multiple customers sharing the infrastructures.Moreover, telecommunication network operators are adopt-ing the CN in theirNetwork Functions Virtualisation (NFV)framework for reducing costs and increasing the flexibility oftheir networks. The technical appeal of CN comes from thetight integration of CC and smart networks. The economicalattractiveness results from avoiding dedicated hardware, shar-ing of resources, and simplified resource management (RM) asseen by the users respectively by the applications. The visionof cheap and integrated CN services is obviously attractive,but it is also evident that it will require more complex RMprocedures for efficiently balancing the usage of all resources.In this contribution, we suggest an initial architecture forintegrated and practical RM in CN and NFV systems. TheRM concept aims at locating and analysing performancebottlenecks, efficiency problems, and eventually discover un-used resources. The suggested architecture is based on alayered view on the system. Moreover, we detail difficultiesin practical resources usage monitoring which, in turn, definerequirements for a RM architecture. The requirement analysisis based on measurements in a CN infrastructure.
  •  
5.
  • van der Mei, Rob, et al. (författare)
  • State of the Art and Research Challenges in the Area of Autonomous Control for a Reliable Internet of Services
  • 2018
  • Ingår i: Autonomous Control for a Reliable Internet of Services. - Cham : Springer Publishing Company. ; , s. 1-22
  • Bokkapitel (refereegranskat)abstract
    • The explosive growth of the Internet has fundamentally changed the global society. The emergence of concepts like service-oriented architecture (SOA), Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), Network as a Service (NaaS) and Cloud Computing in general has catalyzed the migration from the information-oriented Internet into an Internet of Services (IoS). This has opened up virtually unbounded possibilities for the creation of new and innovative services that facilitate business processes and improve the quality of life. However, this also calls for new approaches to ensuring quality and reliability of these services. The goal of this book chapter is to first analyze the state-of-the-art in the area of autonomous control for a reliable IoS and then to identify the main research challenges within it. A general background and high-level description of the current state of knowledge is presented. Then, for each of the three subareas, namely the autonomous management and real-time control, methods and tools for monitoring and service prediction, and smart pricing and competition in multi-domain systems, a brief general introduction and background are presented, and a list of key research challenges is formulated.
  •  
6.
  • Ahmadi Mehri, Vida, et al. (författare)
  • Designing a Secure IoT System Architecture from a Virtual Premise for a Collaborative AI Lab
  • 2019
  • Konferensbidrag (refereegranskat)abstract
    • IoT systems are increasingly composed out of flexible, programmable, virtualised, and arbitrarily chained IoT elements and services using portable code. Moreover, they might be sliced, i.e. allowing multiple logical IoT systems (network + application) to run on top of a shared physical network and compute infrastructure. However, implementing and designing particularly security mechanisms for such IoT systems is challenging since a) promising technologies are still maturing, and b) the relationships among the many requirements, technologies and components are difficult to model a-priori.The aim of the paper is to define design cues for the security architecture and mechanisms of future, virtualised, arbitrarily chained, and eventually sliced IoT systems. Hereby, our focus is laid on the authorisation and authentication of user, host, and code integrity in these virtualised systems. The design cues are derived from the design and implementation of a secure virtual environment for distributed and collaborative AI system engineering using so called AI pipelines. The pipelines apply chained virtual elements and services and facilitate the slicing of the system. The virtual environment is denoted for short as the virtual premise (VP). The use-case of the VP for AI design provides insight into the complex interactions in the architecture, leading us to believe that the VP concept can be generalised to the IoT systems mentioned above. In addition, the use-case permits to derive, implement, and test solutions. This paper describes the flexible architecture of the VP and the design and implementation of access and execution control in virtual and containerised environments. 
  •  
7.
  • Ahmadi Mehri, Vida, et al. (författare)
  • Flexible Privacy and High Trust in the Next Generation Internet : The Use Case of a Cloud-based Marketplace for AI
  • 2017
  • Konferensbidrag (refereegranskat)abstract
    • Cloudified architectures facilitate resource ac-cess and sharing which is independent from physical lo-cations. They permit high availability of resources at lowoperational costs. These advantages, however, do not comefor free. End users might fear that they lose control overthe location of their data and, thus, of their autonomy indeciding to whom the data is communicate to. Thus, strongprivacy and trust concerns arise for end users.In this work we will review and investigate privacy andtrust requirements for Cloud systems in general and for acloud-based marketplace (CMP) for AI in particular. We willinvestigate whether and how the current privacy and trustdimensions can be applied to Clouds and for the design ofa CMP. We also propose the concept of a "virtual premise"for enabling "Privacy-by-Design" [1] in Clouds. The ideaof a "virtual premise" might probably not be a universalsolution for any privacy requirement. However, we expectthat it provides flexibility in designing privacy in Cloudsand thus leading to higher trust.
  •  
8.
  • Ahmadi Mehri, Vida, et al. (författare)
  • Privacy and DRM Requirements for Collaborative Development of AI Application
  • 2019
  • Ingår i: ACM International Conference Proceeding Series. - New York, NY, USA : Association for Computing Machinery (ACM). - 9781450364485
  • Konferensbidrag (refereegranskat)abstract
    • The use of data is essential for the capabilities of Data-driven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. This data usage, however, raises intrinsically the concerns on data privacy. In addition, supporting collaborative development of AI applications across organisations has become a major need in AI system design. Digital Rights Management (DRM) is required to protect intellectual property in such collaboration. As a consequence of DRM, privacy threats and privacy-enforcing mechanisms will interact with each other.This paper describes the privacy and DRM requirements in collaborative AI system design using AI pipelines. It describes the relationships between DRM and privacy and outlines the threats against these non-functional features. Finally, the paper provides first security architecture to protect against the threats on DRM and privacy in collaborative AI design using AI pipelines. 
  •  
9.
  • Ahmadi Mehri, Vida, et al. (författare)
  • Privacy and trust in cloud-based marketplaces for AI and data resources
  • 2017
  • Ingår i: IFIP Advances in Information and Communication Technology. - Cham : Springer New York LLC. - 9783319591704 ; , s. 223-225
  • Konferensbidrag (refereegranskat)abstract
    • The processing of the huge amounts of information from the Internet of Things (IoT) has become challenging. Artificial Intelligence (AI) techniques have been developed to handle this task efficiently. However, they require annotated data sets for training, while manual preprocessing of the data sets is costly. The H2020 project “Bonseyes” has suggested a “Market Place for AI”, where the stakeholders can engage trustfully in business around AI resources and data sets. The MP permits trading of resources that have high privacy requirements (e.g. data sets containing patient medical information) as well as ones with low requirements (e.g. fuel consumption of cars) for the sake of its generality. In this abstract we review trust and privacy definitions and provide a first requirement analysis for them with regards to Cloud-based Market Places (CMPs). The comparison of definitions and requirements allows for the identification of the research gap that will be addressed by the main authors PhD project. © IFIP International Federation for Information Processing 2017.
  •  
10.
  • Ahmadi Mehri, Vida, et al. (författare)
  • Towards Privacy Requirements for Collaborative Development of AI Applications
  • 2018
  • Ingår i: 14th Swedish National Computer Networking Workshop (SNCNW).
  • Konferensbidrag (refereegranskat)abstract
    • The use of data is essential for the capabilities of Data- driven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. The use of data, however, raises intrinsically the concern of the data privacy, in particular for the individuals that provide data. Hence, data privacy is considered as one of the main non-functional features of the Next Generation Internet. This paper describes the privacy challenges and requirements for collaborative AI application development. We investigate the constraints of using digital right management for supporting collaboration to address the privacy requirements in the regulation.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 53
Typ av publikation
konferensbidrag (37)
tidskriftsartikel (8)
licentiatavhandling (3)
bok (1)
proceedings (redaktörskap) (1)
annan publikation (1)
visa fler...
doktorsavhandling (1)
bokkapitel (1)
visa färre...
Typ av innehåll
refereegranskat (40)
övrigt vetenskapligt/konstnärligt (12)
populärvet., debatt m.m. (1)
Författare/redaktör
Tutschku, Kurt, 1966 ... (27)
Tutschku, Kurt (18)
Ilie, Dragos (13)
Fiedler, Markus (12)
Ahmadi Mehri, Vida (7)
Binzenhöfer, Andreas (7)
visa fler...
Robert, Remi (5)
Kebande, Victor R. (4)
Arlos, Patrik (3)
Carlsson, Anders (2)
Tutschku, Kurt, Prof ... (2)
Nilsson, Arne A. (2)
Fricker, Samuel (2)
Carlsson, Patrik (2)
Hock, David (2)
Biernacki, Arkadiusz (2)
Tacca, Marco (2)
Graben, Björn auf de ... (2)
Momen, Nurul, 1988- (2)
Brunström, Anna, 196 ... (1)
Grinnemo, Karl-Johan ... (1)
Abghari, Shahrooz (1)
Boeva, Veselka, Prof ... (1)
Grahn, Håkan (1)
Casalicchio, Emilian ... (1)
Zhang, Yang (1)
Wang, Lei (1)
Taheri, Javid (1)
Wac, Katarzyna (1)
Leitner, Peter (1)
Isaksson, Lennart (1)
Chu, Thi My Chinh (1)
Zepernick, Hans-Juer ... (1)
Ahmadi Mehri, Vida, ... (1)
Ilie, Dragos, Associ ... (1)
Fischer-Hübner, Simo ... (1)
Cheddad, Abbas (1)
Arvidsson, Åke (1)
Hu, Yan, 1985- (1)
Lassila, Pasi (1)
Goswami, Prashant, 1 ... (1)
Lundberg, Lars, 1962 ... (1)
Liberal, Fidel (1)
Mendes, Emilia (1)
Zinner, Thomas (1)
Razo, Miguel (1)
Fumagalli, Andrea (1)
Schlosser, Daniel (1)
Cerroni, Walter (1)
Burakowski, Wojciech (1)
visa färre...
Lärosäte
Blekinge Tekniska Högskola (52)
Högskolan Kristianstad (1)
Chalmers tekniska högskola (1)
Karlstads universitet (1)
Språk
Engelska (53)
Forskningsämne (UKÄ/SCB)
Teknik (38)
Naturvetenskap (22)
Samhällsvetenskap (1)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy