Skip to main content

Showing 1–5 of 5 results for author: Narayana, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2103.00555  [pdf, ps, other

    cs.NI

    Online Partial Service Hosting at the Edge

    Authors: V S Ch Lakshmi Narayana, Mohit Agarwala, R Sri Prakash, Nikhil Karamchandani, Sharayu Moharir

    Abstract: We consider the problem of service hosting where an application provider can dynamically rent edge computing resources and serve user requests from the edge to deliver a better quality of service. A key novelty of this work is that we allow the service to be hosted partially at the edge which enables a fraction of the user query to be served by the edge. We model the total cost for (partially) hos… ▽ More

    Submitted 19 July, 2022; v1 submitted 28 February, 2021; originally announced March 2021.

  2. arXiv:1912.11300  [pdf, ps, other

    cs.NI eess.SY

    RetroRenting: An Online Policy for Service Caching at the Edge

    Authors: V S Ch Lakshmi Narayana, Sharayu Moharir, Nikhil Karamchandani

    Abstract: The rapid proliferation of shared edge computing platforms has enabled application service providers to deploy a wide variety of services with stringent latency and high bandwidth requirements. A key advantage of these platforms is that they provide pay-as-you-go flexibility by charging clients in proportion to their resource usage through short-term contracts. This affords the client significant… ▽ More

    Submitted 17 May, 2021; v1 submitted 24 December, 2019; originally announced December 2019.

  3. arXiv:1809.01510  [pdf

    cs.SE

    On the Need of Preserving Order of Data When Validating Within-Project Defect Classifiers

    Authors: Davide Falessi, Jacky Huang, Likhita Narayana, Jennifer Fong Thai, Burak Turhan

    Abstract: [Context] The use of defect prediction models, such as classifiers, can support testing resource allocations by using data of the previous releases of the same project for predicting which software components are likely to be defective. A validation technique, hereinafter technique defines a specific way to split available data in training and test sets to measure a classifier accuracy. Time-serie… ▽ More

    Submitted 31 July, 2020; v1 submitted 5 September, 2018; originally announced September 2018.

  4. arXiv:1603.06297  [pdf

    cs.CR

    Notes on "An Effective ECC based User Access Control Scheme with Attribute based Encryption for WSN"

    Authors: Mrudula S, ChandraMouli Reddy, Lakshmi Narayana, JayaPrakash, Chandra Sekhar Vorugunti

    Abstract: The rapid growth of networking and communication technologies results in amalgamation of 'Internet of Things' and 'Wireless sensor networks' to form WSNIT. WSNIT facilitates the WSN to connect dynamically to Internet and exchange the data with the external world. The critical data stored in sensor nodes related to patient health, environment can be accessed by attackers via insecure internet. To c… ▽ More

    Submitted 18 March, 2016; originally announced March 2016.

    Comments: AIMOC 2016 Jadavpur university

  5. arXiv:1004.1794  [pdf

    cs.AI

    Probabilistic Semantic Web Mining Using Artificial Neural Analysis

    Authors: T. Krishna Kishore, T. Sasi Vardhan, N. Lakshmi Narayana

    Abstract: Most of the web user's requirements are search or navigation time and getting correctly matched result. These constrains can be satisfied with some additional modules attached to the existing search engines and web servers. This paper proposes that powerful architecture for search engines with the title of Probabilistic Semantic Web Mining named from the methods used. With the increase of larger a… ▽ More

    Submitted 11 April, 2010; originally announced April 2010.

    Comments: IEEE Publication format, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Journal ref: IJCSIS, Vol. 7 No. 3, March 2010, 294-304