Individualized Pricing for a Cloud Provider Hosting Interactive Applications

2019 ◽  
Author(s):  
Hossein Jahandideh ◽  
Kevin F. McCardle ◽  
Julie Drew ◽  
Filippo Balestrieri
2020 ◽  
Vol 12 (4) ◽  
pp. 130-147
Author(s):  
Hossein Jahandideh ◽  
Julie Ward Drew ◽  
Filippo Balestrieri ◽  
Kevin McCardle

We consider a cloud provider that hosts interactive applications, such as mobile apps and online games. Depending on the traffic of users for an application, the provider commits a subset of its resources (hardware capacity) to serve the application. The provider must choose a dynamic pricing mechanism to indirectly select the applications hosted and maximize revenue. We model the provider’s pricing problem as a large-scale stochastic dynamic program. To approach this problem, we propose a tractable approach to enable decomposing the multidimensional stochastic dynamic program into single-dimensional subproblems. We then extend the proposed framework to define an individualized dynamic pricing mechanism for the cloud provider. We present novel upper bounds on the optimal revenue to evaluate the performance of our pricing mechanism. The computational results show that a contract-based model of selling interactive cloud services achieves significantly greater revenue than the prevalent alternative and that our pricing scheme attains near-optimal revenue.


2012 ◽  
Author(s):  
Vitor Balbio da Silva ◽  
Alexandre da Costa Sena ◽  
Anselmo Antunes Montenegro

2012 ◽  
Author(s):  
Bruno Moreira ◽  
Mauricio Kischinhevsky ◽  
Marcelo Zamith ◽  
Esteban Clua ◽  
Diego Brandao

2019 ◽  
Vol 13 (4) ◽  
pp. 325-333
Author(s):  
Xu Liu ◽  
Xiaoqiang Di ◽  
Jinqing Li ◽  
Huamin Yang ◽  
Ligang Cong ◽  
...  

Background: User behavior models have been widely used to simulate attack behaviors in the security domain. We revised all patents related to response to attack behavior models. How to decide the protected target against multiple models of attack behaviors is studied. Methods: We utilize one perfect rational and three bounded rational behavior models to simulate attack behaviors in cloud computing, and then investigate cloud provider’s response based on Stackelberg game. The cloud provider plays the role of defender and it is assumed to be intelligent enough to predict the attack behavior model. Based on the prediction accuracy, two schemes are built in two situations. Results: If the defender can predict the attack behavior model accurately, a single-objective game model is built to find the optimal protection strategy; otherwise, a multi-objective game model is built to find the optimal protection strategy. Conclusion: The numerical results prove that the game theoretic model performs better in the corresponding situation.


2021 ◽  
Vol 10 (2) ◽  
pp. 34
Author(s):  
Alessio Botta ◽  
Jonathan Cacace ◽  
Riccardo De Vivo ◽  
Bruno Siciliano ◽  
Giorgio Ventre

With the advances in networking technologies, robots can use the almost unlimited resources of large data centers, overcoming the severe limitations imposed by onboard resources: this is the vision of Cloud Robotics. In this context, we present DewROS, a framework based on the Robot Operating System (ROS) which embodies the three-layer, Dew-Robotics architecture, where computation and storage can be distributed among the robot, the network devices close to it, and the Cloud. After presenting the design and implementation of DewROS, we show its application in a real use-case called SHERPA, which foresees a mixed ground and aerial robotic platform for search and rescue in an alpine environment. We used DewROS to analyze the video acquired by the drones in the Cloud and quickly spot signs of human beings in danger. We perform a wide experimental evaluation using different network technologies and Cloud services from Google and Amazon. We evaluated the impact of several variables on the performance of the system. Our results show that, for example, the video length has a minimal impact on the response time with respect to the video size. In addition, we show that the response time depends on the Round Trip Time (RTT) of the network connection when the video is already loaded into the Cloud provider side. Finally, we present a model of the annotation time that considers the RTT of the connection used to reach the Cloud, discussing results and insights into how to improve current Cloud Robotics applications.


Author(s):  
Kyle Singer ◽  
Noah Goldstein ◽  
Stefan K. Muller ◽  
Kunal Agrawal ◽  
I-Ting Angelina Lee ◽  
...  

2020 ◽  
Vol 10 (24) ◽  
pp. 9148
Author(s):  
Germán Moltó ◽  
Diana M. Naranjo ◽  
J. Damian Segrelles

Cloud computing instruction requires hands-on experience with a myriad of distributed computing services from a public cloud provider. Tracking the progress of the students, especially for online courses, requires one to automatically gather evidence and produce learning analytics in order to further determine the behavior and performance of students. With this aim, this paper describes the experience from an online course in cloud computing with Amazon Web Services on the creation of an open-source data processing tool to systematically obtain learning analytics related to the hands-on activities carried out throughout the course. These data, combined with the data obtained from the learning management system, have allowed the better characterization of the behavior of students in the course. Insights from a population of more than 420 online students through three academic years have been assessed, the dataset has been released for increased reproducibility. The results corroborate that course length has an impact on online students dropout. In addition, a gender analysis pointed out that there are no statistically significant differences in the final marks between genders, but women show an increased degree of commitment with the activities planned in the course.


2021 ◽  
Vol 51 (2) ◽  
pp. 2-9
Author(s):  
Rachee Singh ◽  
Muqeet Mukhtar ◽  
Ashay Krishna ◽  
Aniruddha Parkhi ◽  
Jitendra Padhye ◽  
...  

Switch failures can hamper access to client services, cause link congestion and blackhole network traffic. In this study, we examine the nature of switch failures in the datacenters of a large commercial cloud provider through the lens of survival theory. We study a cohort of over 180,000 switches with a variety of hardware and software configurations and find that datacenter switches have a 98% likelihood of functioning uninterrupted for over 3 months since deployment in production. However, there is significant heterogeneity in switch survival rates with respect to their hardware and software: the switches of one vendor are twice as likely to fail compared to the others. We attribute the majority of switch failures to hardware impairments and unplanned power losses. We find that the in-house switch operating system, SONiC, boosts the survival likelihood of switches in datacenters by 1% by eliminating switch failures caused by software bugs in vendor switch OSes.


Sign in / Sign up

Export Citation Format

Share Document