37 results on '"Kosta, Sokol"'
Search Results
2. An efficient pattern-based approach for workflow supporting large-scale science: The DagOnStar experience
- Author
-
Domizzi Sánchez-Gallegos, Dante, Di Luccio, Diana, Kosta, Sokol, Gonzalez-Compean, J.L., and Montella, Raffaele
- Published
- 2021
- Full Text
- View/download PDF
3. Leveraging Large Language Models to Support Authoring Gamified Programming Exercises †.
- Author
-
Montella, Raffaele, De Vita, Ciro Giuseppe, Mellone, Gennaro, Ciricillo, Tullio, Caramiello, Dario, Di Luccio, Diana, Kosta, Sokol, Damaševičius, Robertas, Maskeliūnas, Rytis, Queirós, Ricardo, and Swacha, Jakub
- Subjects
LANGUAGE models ,ARTIFICIAL intelligence ,NATURAL languages ,GAMIFICATION ,SUPPLY & demand - Abstract
Featured Application: The presented solution can be applied to simplify and hasten the development of gamified programming exercises conforming to the Framework for Gamified Programming Education (FGPE) standard. Skilled programmers are in high demand, and a critical obstacle to satisfying this demand is the difficulty of acquiring programming skills. This issue can be addressed with automated assessment, which gives fast feedback to students trying to code, and gamification, which motivates them to intensify their learning efforts. Although some collections of gamified programming exercises are available, producing new ones is very demanding. This paper presents GAMAI, an AI-powered exercise gamifier, enriching the Framework for Gamified Programming Education (FGPE) ecosystem. Leveraging large language models, GAMAI enables teachers to effortlessly apply storytelling to describe a gamified scenario, as GAMAI decorates natural language text with the sentences needed by OpenAI APIs to contextualize the prompt. Once a gamified scenario has been generated, GAMAI automatically produces exercise files in a FGPE-compatible format. According to the presented evaluation results, most gamified exercises generated with AI support were ready to be used, with no or minimum human effort, and were positively assessed by students. The usability of the software was also assessed as high by the users. Our research paves the way for a more efficient and interactive approach to programming education, leveraging the capabilities of advanced language models in conjunction with gamification principles. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. Workflow-based automatic processing for Internet of Floating Things crowdsourced data
- Author
-
Montella, Raffaele, Di Luccio, Diana, Marcellino, Livia, Galletti, Ardelio, Kosta, Sokol, Giunta, Giulio, and Foster, Ian
- Published
- 2019
- Full Text
- View/download PDF
5. The impact of decision tools during oncological consultation with lung cancer patients: A systematic review within the I3LUNG project.
- Author
-
Sebri, Valeria, Marzorati, Chiara, Dorangricchia, Patrizia, Monzani, Dario, Grasso, Roberto, Prelaj, Arsela, Provenzano, Leonardo, Mazzeo, Laura, Dumitrascu, Andra Diana, Sonnek, Jana, Szewczyk, Marlen, Watermann, Iris, Trovò, Francesco, Dollis, Nina, Sarris, Evangelos, Garassino, Marina Chiara, Bestvina, Christine M., Pedrocchi, Alessandra, Ambrosini, Emilia, and Kosta, Sokol
- Subjects
LUNG cancer ,CANCER patients ,PATIENT autonomy ,MEDICAL consultation ,MEDICAL communication ,NON-small-cell lung carcinoma ,CONSULTATION-liaison psychiatry - Abstract
Introduction: To date, lung cancer is one of the most lethal diagnoses worldwide. A variety of lung cancer treatments and modalities are available, which are generally presented during the patient and doctor consultation. The implementation of decision tools to facilitate patient's decision‐making and the management of their healthcare process during medical consultation is fundamental. Studies have demonstrated that decision tools are helpful to promote health management and decision‐making of lung cancer patients during consultations. The main aim of the present work within the I3LUNG project is to systematically review the implementation of decision tools to facilitate medical consultation about oncological treatments for lung cancer patients. Methods: In the present study, we conducted a systematic review following the PRISMA guidelines. We used an electronic computer‐based search involving three databases, as follows: Embase, PubMed, and Scopus. 10 articles met the inclusion criteria and were included. They explicitly refer to decision tools in the oncological context, with lung cancer patients. Results: The discussion highlights the most encouraging results about the positive role of decision aids during medical consultations about oncological treatments, especially regarding anxiety, decision‐making, and patient knowledge. However, no one main decision aid tool emerged as essential. Opting for a more recent timeframe to select eligible articles might shed light on the current array of decision aid tools available. Conclusion: Future review efforts could utilize alternative search strategies to explore other lung cancer‐specific outcomes during medical consultations for treatment decisions and the implementation of decision aid tools. Engaging with experts in the fields of oncology, patient decision‐making, or health communication could provide valuable insights and recommendations for relevant literature or research directions that may not be readily accessible through traditional search methods. The development of guidelines for future research were provided with the aim to promote decision aids focused on patients' needs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. A virtualized software based on the NVIDIA cuFFT library for image denoising: performance analysis
- Author
-
Galletti, Ardelio, Marcellino, Livia, Montella, Raffaele, Santopietro, Vincenzo, and Kosta, Sokol
- Published
- 2017
- Full Text
- View/download PDF
7. Performance prediction for supporting mobile applications’ offloading
- Author
-
da Silva Pinheiro, Thiago Felipe, Silva, Francisco Airton, Fé, Iure, Kosta, Sokol, and Maciel, Paulo
- Published
- 2018
- Full Text
- View/download PDF
8. Heterogeneous Secure Multi-level Remote Acceleration Service for Low-power Integrated Systems and Devices
- Author
-
López, Lara, Nieto, Francisco Javier, Velivassaki, Terpsichori-Helen, Kosta, Sokol, Hong, Cheol-Ho, Montella, Raffaele, Mavroidis, Iakovos, and Fernández, Carles
- Published
- 2016
- Full Text
- View/download PDF
9. The EU-funded I3LUNG Project: Integrative Science, Intelligent Data Platform for Individualized LUNG Cancer Care With Immunotherapy
- Author
-
Prelaj, Arsela, Ganzinelli, Monica, Trovo’, Francesco, Roisman, Laila C., Pedrocchi, Alessandra Laura Giulia, Kosta, Sokol, Restelli, Marcello, Ambrosini, Emilia, Broggini, Massimo, Pravettoni, Gabriella, Monzani, Dario, Nuara, Alessandro, Amat, Ramon, Spathas, Nikos, Willis, Michael, Pearson, Alexander, Dolezal, James, Mazzeo, Laura, Sangaletti, Sabina, Correa, Ana Maria, Aguaron, Alfonso, Watermann, Iris, Popa, Crina, Raimondi, Giulia, Triulzi, Tiziana, Steurer, Stefan, Lo Russo, Giuseppe, Linardou, Helena, Peled, Nir, Felip, Enriqueta, Reck, Martin, and Garassino, Marina Chiara
- Published
- 2023
- Full Text
- View/download PDF
10. Real-world data to build explainable trustworthy artificial intelligence models for prediction of immunotherapy efficacy in NSCLC patients
- Author
-
Prelaj, Arsela, Galli, Edoardo Gregorio, Miskovic, Vanja, Pesenti, Mattia, Viscardi, Giuseppe, Pedica, Benedetta, Mazzeo, Laura, Bottiglieri, Achille, Provenzano, Leonardo, Spagnoletti, Andrea, Marinacci, Roberto, De Toma, Alessandro, Proto, Claudia, Ferrara, Roberto, Brambilla, Marta, Occhipinti, Mario, Manglaviti, Sara, Galli, Giulia, Signorelli, Diego, Giani, Claudia, Beninato, Teresa, Pircher, Chiara Carlotta, Rametta, Alessandro, Kosta, Sokol, Zanitti, Michele, Di Mauro, Maria Rosa, Rinaldi, Arturo, Di Gregorio, Settimio, Antonia, Martinetti, Garassino, Marina Chiara, de Braud, Filippo G.M., Restelli, Marcello, Lo Russo, Giuseppe, Ganzinelli, Monica, Trovò, Francesco, and Pedrocchi, Alessandra Laura Giulia
- Subjects
Cancer Research ,machine learning ,explainable artificial intelligence ,treatment ,Oncology ,immunotherapy ,non-small cell lung cancer - Abstract
IntroductionArtificial Intelligence (AI) methods are being increasingly investigated as a means to generate predictive models applicable in the clinical practice. In this study, we developed a model to predict the efficacy of immunotherapy (IO) in patients with advanced non-small cell lung cancer (NSCLC) using eXplainable AI (XAI) Machine Learning (ML) methods.MethodsWe prospectively collected real-world data from patients with an advanced NSCLC condition receiving immune-checkpoint inhibitors (ICIs) either as a single agent or in combination with chemotherapy. With regards to six different outcomes - Disease Control Rate (DCR), Objective Response Rate (ORR), 6 and 24-month Overall Survival (OS6 and OS24), 3-months Progression-Free Survival (PFS3) and Time to Treatment Failure (TTF3) - we evaluated five different classification ML models: CatBoost (CB), Logistic Regression (LR), Neural Network (NN), Random Forest (RF) and Support Vector Machine (SVM). We used the Shapley Additive Explanation (SHAP) values to explain model predictions.ResultsOf 480 patients included in the study 407 received immunotherapy and 73 chemo- and immunotherapy. From all the ML models, CB performed the best for OS6 and TTF3, (accuracy 0.83 and 0.81, respectively). CB and LR reached accuracy of 0.75 and 0.73 for the outcome DCR. SHAP for CB demonstrated that the feature that strongly influences models’ prediction for all three outcomes was Neutrophil to Lymphocyte Ratio (NLR). Performance Status (ECOG-PS) was an important feature for the outcomes OS6 and TTF3, while PD-L1, Line of IO and chemo-immunotherapy appeared to be more important in predicting DCR.ConclusionsIn this study we developed a ML algorithm based on real-world data, explained by SHAP techniques, and able to accurately predict the efficacy of immunotherapy in sets of NSCLC patients.
- Published
- 2023
- Full Text
- View/download PDF
11. FGPE Gamification Service:A GraphQL Service to Gamify Online Education
- Author
-
Paiva, José Carlos, Haraszczuk, Alicja, Queirós, Ricardo, Leal, José Paulo, Swacha, Jakub, Kosta, Sokol, Rocha, Álvaro, Adeli, Hojjat, Dzemyda, Gintautas, Moreira, Fernando, and Correia, Ana Maria Ramalho
- Subjects
Programming education ,Gamification service ,Gamification ,SDG 4 - Quality Education - Abstract
Keeping students engaged while learning programming is becoming more and more imperative. Of the several proposed techniques, gamification is presumably the most widely studied and has already proven as an effective means to engage students. However, there is a complete lack of public and customizable solutions to gamified programming education that can be reused with personalized rules and learning material. FGPE Gamification Service (FGPE GS) is an open-source GraphQL service that transforms a package containing the gamification layer – adhering to a dedicated open-source language, GEdIL – into a game. The game provides students with a gamified experience leveraging on the automatically-assessable activities referenced by the challenges. This paper presents FGPE GS, its architecture, data model, and validation.
- Published
- 2021
- Full Text
- View/download PDF
12. Load balancing in Hybrid Clouds through Process Mining Monitoring
- Author
-
Azumah, Kenneth Kwame, Kosta, Sokol, Sørensen, Lene Tolstrup, Montella, Raffaele, Ciaramella, Angelo, Fortino, Giancarlo, Guerrieri, Antonio, and Liotta, Antonio
- Subjects
Hybrid cloud ,Process mining ,OpenStack Octavia ,Event calculus - Abstract
An increasing number of organisations are harnessing the benefits of hybrid cloud adoption to support their business goals and achieving privacy and control in a private cloud whilst enjoying the on-demand scalability of the public cloud. However the complexity introduced by the combination of the public and private clouds worsens visibility in cloud monitoring with regards compliance to given business constraints. Load balancing as a technique for evenly distributing workloads can be leveraged together with processing mining to help ease the monitoring challenge. In this paper we propose a load balancing approach to distribute workloads in order to minimise violations to specified business constraints. The scenario of a hospital consultation process is employed as a use case in monitoring and controlling Octavia load balancing-as-a-service in OpenStack. The results show a co-occurrence of constraint violations and Octavia L7 Policy creation, indicating a successful application of process mining monitoring in load balancing.
- Published
- 2019
- Full Text
- View/download PDF
13. A User Experience Model for Privacy and Context Aware Over-the-Top (OTT) TV Recommendations
- Author
-
Servizi, Valentino, Kosta, Sokol, Hammershoj, Allan, and Olesen, Henning
- Abstract
Conventional recommender systems provide personalized recommendations by collecting and retaining user data, relying on a centralized architecture. Hence, user privacy is undermined by the volume of information required to support the personalized experience. In this work, we propose a User Experience model which allows the privacy of a user to be preserved by means of a decentralized architecture, enabling the Service Provider to offer recommendations without the need of storing individual user data. We advance the current state of the art by: i) Proposing a model of User Experience (UEx) suitable for Persona-based recommendations; ii) Presenting a UEx collection model which enhances the user privacy towards the service provider while keeping the quality of her preferences predictions; and iii) Assessing the existence of the Persona profiles, which are needed for generating and addressing the recommendations. We perform several experiments using a real-world complete dataset from a medium-sized service provider, composed of more than 14,000 unique users and 33,000 content titles collected over a period of two years. We show that our architecture, in combination with our UEx model, achieves the same or better results, compared to state-of-the-art systems, in terms of rating prediction accuracy, without sacrificing user’s privacy.
- Published
- 2019
14. SmartExchange:Decentralised Trustless Cryptocurrency Exchange
- Author
-
Adamik, Filip, Kosta, Sokol, Abramowicz, Witold, and Paschke, Adrian
- Subjects
Cryptocurrency ,Distributed ,Ethereum ,Blockchain ,Smart contract ,Exchange ,Oracle ,Bitcoin - Abstract
Trading cryptocurrency on current digital exchange platforms is a trust-based process, where the parties involved in the exchange have to fully trust the service provider. As it has been proven several times, this could lead to funds being stolen, either due to malicious service providers that simply disappear or due to hacks that these platforms might suffer. In this work, we propose and develop a decentralised exchange solution based on smart contracts running on the Ethereum network that is open, verifiable, and does not require trust. The platform enables two parties to trade different currencies, limited to Ethereum and Bitcoin in the current status of the system. A smart contract, deployed on the Ethereum blockchain, functions as an escrow, which holds a user’s funds until a verified transaction has been made by the other party. To make the smart contract able to detect a Bitcoin transfer, we implement our solution by utilising an oracle. We define the system architecture and implement a working platform, which we test in a model scenario, successfully exchanging Bitcoin and Ether on the blockchain test networks. We conclude the paper identifying possible challenges and threats to such a system.
- Published
- 2019
- Full Text
- View/download PDF
15. Accelerating Linux and Android applications on low-power devices through remote GPGPU offloading
- Author
-
Montella, Raffaele, Kosta, Sokol, Oro, David, Vera, Javier, Fernã¡ndez, Carles, Palmieri, Carlo, DI LUCCIO, Diana, Giunta, Giulio, Lapegna, Marco, Laccetti, Giuliano, Montella, Raffaele, Kosta, Sokol, Oro, David, Vera, Javier, Fernández, Carle, Palmieri, Carlo, Di , Luccio, Diana, Giunta, Giulio, Lapegna, Marco, Laccetti, Giuliano, and Universitat Politècnica de Catalunya. Doctorat en Teoria del Senyal i Comunicacions
- Subjects
Android ,CUDA ,GPGPU ,Mobile cloud computing ,Offloading ,Virtualization ,Theoretical Computer Science ,Software ,Computer Science Applications1707 Computer Vision and Pattern Recognition ,Computer Networks and Communications ,Computational Theory and Mathematics ,mobile cloud computing ,virtualization ,Computer Networks and Communication ,Computer Science Applications ,Computer Vision and Pattern Recognition ,Distributed operating systems (Computers) ,offloading ,Informàtica::Sistemes operatius::Linux [Àrees temàtiques de la UPC] ,Android, CUDA, GPGPU, mobile cloud computing, offloading, virtualization ,Informàtica::Sistemes operatius::Altres sistemes operatius [Àrees temàtiques de la UPC] ,Sistemes operatius distribuïts (Ordinadors) - Abstract
Low-power devices are usually highly constrained in terms of CPU computing power, memory, and GPGPU resources for real-time applications to run. In this paper, we describe RAPID, a complete framework suite for computation offloading to help low-powered devices overcome these limitations. RAPID supports CPU and GPGPU computation offloading on Linux and Android devices. Moreover, the framework implements lightweight secure data transmission of the offloading operations. We present the architecture of the framework, showing the integration of the CPU and GPGPU offloading modules. We show by extensive experiments that the overhead introduced by the security layer is negligible. We present the first benchmark results showing that Java/Android GPGPU code offloading is possible. Finally, we show the adoption of the GPGPU offloading into BioSurveillance , a commercial real-time face recognition application. The results show that, thanks to RAPID, BioSurveillance is being successfully adapted to run on low-power devices. The proposed framework is highly modular and exposes a rich application programming interface to developers, making it highly versatile while hiding the complexity of the underlying networking layer.
- Published
- 2017
- Full Text
- View/download PDF
16. Special Issue on High‐end Heterogeneous Architectures, Methodologies, and Algorithms (HHAMA20).
- Author
-
Kosta, Sokol, Laccetti, Giuliano, Lapegna, Marco, Mele, Valeria, and Montella, Raffaele
- Subjects
ALGORITHMS ,HETEROGENEOUS computing ,DISTRIBUTED computing ,APPLIED mathematics ,COVID-19 pandemic ,SOLIDIFICATION - Published
- 2021
- Full Text
- View/download PDF
17. Process mining‐constrained scheduling in the hybrid cloud.
- Author
-
Azumah, Kenneth K., Sørensen, Lene T., Montella, Raffaele, and Kosta, Sokol
- Subjects
HYBRID cloud computing ,PROCESS mining ,CLOUD computing ,ELECTRONIC data processing ,SCHEDULING - Abstract
Summary: Hybrid cloud, typically a combination of public and private cloud deployment models, is a rising paradigm due to the benefits it offers: full control of data and applications in the private cloud and elastic computing resource availability in the public cloud. This combination however brings an extra layer of complexity that can potentially erode the benefits and present serious challenges if not managed well. Among the challenges, ensuring business constraint compliance across the combination of cloud deployment models is a growing concern. Our article brings a sensitive, data‐ and process‐aware framework to bear on task scheduling in hybrid clouds with compliance to business constraints. Our proposed approach utilizes data from a real hybrid cloud‐based hospital billing system that is governed by complex and dynamic data processing rules. Our system successfully employs a process mining controlled algorithm to schedule tasks in the hybrid cloud to comply with the given set of business constraints. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
18. Vessel to shore data movement through the Internet of Floating Things: A microservice platform at the edge.
- Author
-
Di Luccio, Diana, Kosta, Sokol, Castiglione, Aniello, Maratea, Antonio, and Montella, Raffaele
- Subjects
INTERNET of things ,SCIENTISTS ,URBAN ecology (Sociology) ,DATA security ,CROWDSOURCING - Abstract
Summary: The rise of the Internet of Things has generated high expectations about the improvement in people's lifestyles. In the last decade, we saw several examples of instrumented cities where different types of data were gathered, processed, and made available to inspire the next generation of scientists and engineers. In this framework, sensors and actuators became leading actors of technologically pervasive urban environments. However, in coastal areas, marine data crowdsourcing is difficult to apply due to the challenging operational conditions, extremely unstable network connectivity, and security issues in data movement. To fill this gap, we present a novel version of our DYNAMO transfer protocol (DTP), a platform‐independent data mover framework where data collected on board of vessels are stored locally and then moved from the edge to the cloud when the operating conditions are favorable. We evaluate the performance of DTP in a controlled environment with a private cloud by measuring the time it takes for the clouds ide to process and store a fixed amount of data while varying the number of microservice instances. We show that the time decreases exponentially when the number of microservice instances goes from 1 to 16 and it remains constant above that number. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
19. Models, algorithms, and tools for highly heterogeneous computing environments
- Author
-
Laccetti, Giuliano, Lapegna, Marco, Montella, Raffaele, and Kosta, Sokol
- Subjects
Computational Theory and Mathematics ,Computer Networks and Communications ,Computer Science Applications1707 Computer Vision and Pattern Recognition ,Software ,Theoretical Computer Science - Published
- 2018
20. Offloading Computations to Mobile Devices and Cloudlets via an Upgraded NFC Communication Protocol.
- Author
-
Chatzopoulos, Dimitris, Bermejo, Carlos, Kosta, Sokol, and Hui, Pan
- Subjects
NEAR field communication ,MOBILE computing ,MOBILE apps ,DOWNLOADING ,ENERGY consumption ,CLOUD computing - Abstract
The increasing complexity of smartphone applications and services necessitate high battery consumption, but the growth of smartphones’ battery capacity is not keeping pace with these increasing power demands. To overcome this problem, researchers gave birth to the Mobile Cloud Computing (MCC) research area. In this paper, we advance on previous ideas, proposing and implementing a Near Field Communication (NFC)-based computation offloading framework. This research is motivated by the advantages of NFC's short distance communication, its better security, and its low battery consumption characteristics. We design a new NFC communication protocol that overcomes the limitations of the default NFC protocol; removing the need for constant user interaction, the one–way communication restraint, and the limit on low data size transfer. Via the implemented framework, parts of mobile applications can be offloaded to other mobile devices or cloudlets equipped with an NFC reader. We present experimental results of the energy consumption and the time duration of computationally and data intensive representative applications: (i) RSA key generation and encryption, (ii) gaming/puzzles, (iii) face detection, (iv) media download from the Internet, and (v) data transferring between the mobile and the cloudlet. We show that when the helper device is more powerful than the device offloading the computations, the execution time of the tasks is reduced. Finally, we show that devices that offload application parts considerably reduce their energy consumption due to the low–power NFC interface and the benefits of offloading. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
21. MOBILITY MODELS, MOBILE CODE OFFLOADING, AND P2P NETWORKS OF SMARTPHONES ON THE CLOUD
- Author
-
Kosta, Sokol, Mancini, Luigi Vincenzo, and Petrioli, Chiara
- Subjects
P2P ,Offloading ,Clone ,Settori Disciplinari MIUR::Scienze matematiche e informatiche::INFORMATICA ,Human mobility model ,SWIM ,Thinkair ,Network ,Mobile Cloud Computing ,Distributed ,Networking ,Mobile programming ,Security ,Programming ,Scienze matematiche e informatiche::INFORMATICA [Settori Disciplinari MIUR] ,Smartphone ,Cloud ,Simulation - Abstract
It was just a few years ago when I bought my first smartphone. And now, (almost) all of my friends possess at least one of these powerful devices. International Data Corporation (IDC) reports that smartphone sales showed strong growth worldwide in 2011, with 491.4 million units sold – up to 61.3 percent from 2010. Furthermore, IDC predicts that 686 million smartphones will be sold in 2012, 38.4 percent of all handsets shipped. Silently, we are becoming part of a big mobile smartphone network, and it is amazing how the perception of the world is changing thanks to these small devices. If many years ago the birth of Internet enabled the possibility to be online, smartphones nowadays allow to be online all the time. Today we use smartphones to do many of the tasks we used to do on desktops, and many new ones. We browse the Internet, watch videos, upload data on social networks, use online banking, find our way by using GPS and online maps, and communicate in revolutionary ways. Along with these benefits, these fancy and exciting devices brought many challenges to the research area of mobile and distributed systems. One of the first problems that captured our attention was the study of the network that potentially could be created by interconnecting all the smartphones together. Typically, these devices are able to communicate with each other in short distances by using com- munication technologies such as Bluetooth or WiFi. The network paradigm that rises from this intermittent communication, also known as Pocket Switched Network (PSN) or Opportunistic Network ([10, 11]), is seen as a key technology to provide innovative services to the users without the need of any fixed infrastructure. In PSNs nodes are short range communicating devices carried by humans. Wireless communication links are created and dropped in time, depending on the physical distance of the device holders. From one side, social relations among humans yield recurrent movement patterns that help researchers design and build protocols that efficiently deliver messages to destinations ([12, 13, 14] among others). The complexity of these social relations, from the other side, makes it difficult to build simple mobility models, that in an efficient way, generate large synthetic mobility traces that look real. Traces that would be very valuable in protocol validation and that would replace the limited experimentally gathered data available so far. Traces that would serve as a common benchmark to researchers worldwide on which to validate existing and yet to be designed protocols. With this in mind we start our study with re-designing SWIM [15], an already exist- ing mobility model shown to generate traces with similar properties of that of existing real ones. We make SWIM able to easily generate large (small)-scale scenarios, starting from known small (large)-scale ones. To the best of our knowledge, this is the first such study. In addition, we study the social aspects of SWIM-generated traces. We show how to SWIM-generate a scenario in which a specific community structure of nodes is required. Finally, exploiting the scaling properties of SWIM, we present the first analysis of the scal- ing capabilities of several forwarding protocols such as Epidemic [16], Delegation [13], Spray&Wait [14], and BUBBLE [12]. The first results of these works appeared in [1], and, at the time of writing, [2] is accepted with minor revision. Next, we take into account the fact that in PSNs cannot be assumed full cooperation and fairness among nodes. Selfish behavior of individuals has to be considered, since it is an inherent aspect of humans, the device holders (see [17], [18]). We design a market-based mathematical framework that enables heterogeneous mobile users in an opportunistic mobile network to compromise optimally and efficiently on their QoS 3 demands. The goal of the framework is to satisfy each user with its achieved (lesser) QoS, and at the same time maximize the social welfare of users in the network. We base our study on the consideration that, in practice, users are generally tolerant on accepting lesser QoS guarantees than what they demand, with the degree of tolerance varying from user to user. This study is described in details in Chapter 2 of this dissertation, and is included in [3]. In general, QoS could be parameters such as response time, number of computations per unit time, allocated bandwidth, etc. Along the way toward our study of the smartphone-world, there was the big advent of mobile cloud computing—smartphones getting help from cloud-enabled services. Many researchers started believing that the cloud could help solving a crucial problem regarding smartphones: improve battery life. New generation apps are becoming very complex — gaming, navigation, video editing, augmented reality, speech recognition, etc., — which require considerable amount of power and energy, and as a result, smartphones suffer short battery lifetime. Unfortunately, as a consequence, mobile users have to continually upgrade their hardware to keep pace with increasing performance requirements but still experience battery problems. Many recent works have focused on building frameworks that enable mobile computation offloading to software clones of smartphones on the cloud (see [19, 20] among others), as well as to backup systems for data and applications stored in our devices [21, 22, 23]. However, none of these address dynamic and scalability features of execution on the cloud. These are very important problems, since users may request different computational power or backup space based on their workload and deadline for tasks. Considering this and advancing on previous works, we design, build, and implement the ThinkAir framework, which focuses on the elasticity and scalability of the server side and enhances the power of mobile cloud computing by parallelizing method execution using multiple Virtual Machine (VM) images. We evaluate the system using a range of benchmarks starting from simple micro-benchmarks to more complex applications. First, we show that the execution time and energy consumption decrease two orders of magnitude for the N-queens puzzle and one order of magnitude for a face detection and a virus scan application, using cloud offloading. We then show that a parallelizable application can invoke multiple VMs to execute in the cloud in a seamless and on-demand manner such as to achieve greater reduction on execution time and energy consumption. Finally, we use a memory-hungry image combiner tool to demonstrate that applications can dynamically request VMs with more computational power in order to meet their computational requirements. The details of the ThinkAir framework and its evaluation are described in Chapter 4, and are included in [6, 5]. Later on, we push the smartphone-cloud paradigm to a further level: We develop Clone2Clone (C2C), a distributed platform for cloud clones of smartphones. Along the way toward C2C, we study the performance of device-clones hosted in various virtualization environments in both private (local servers) and public (Amazon EC2) clouds. We build the first Amazon Customized Image (AMI) for Android-OS—a key tool to get reliable performance measures of mobile cloud systems—and show how it boosts up performance of Android images on the Amazon cloud service. We then design, build, and implement Clone2Clone, which associates a software clone on the cloud to every smartphone and in- terconnects the clones in a p2p fashion exploiting the networking service within the cloud. On top of C2C we build CloneDoc, a secure real-time collaboration system for smartphone users. We measure the performance of CloneDoc on a testbed of 16 Android smartphones and clones hosted on both private and public cloud services and show that C2C makes it possible to implement distributed execution of advanced p2p services in a network of mobile smartphones. The design and implementation of the Clone2Clone platform is included in [7], recently submitted to an international conference. We believe that Clone2Clone not only enables the execution of p2p applications in a network of smartphones, but it can also serve as a tool to solve critical security problems. In particular, we consider the problem of computing an efficient patching strategy to stop worm spreading between smartphones. We assume that the worm infects the devices and spreads by using bluetooth connections, emails, or any other form of communication used by the smartphones. The C2C network is used to compute the best strategy to patch the smartphones in such a way that the number of devices to patch is low (to reduce the load on the cellular infrastructure) and that the worm is stopped quickly. We consider two well defined worms, one spreading between the devices and one attacking the cloud before moving to the real smartphones. We describe CloudShield [8], a suite of protocols running on the peer-to-peer network of clones; and show by experiments with two different datasets (Facebook and LiveJournal) that CloudShield outperforms state-of-the-art worm-containment mechanisms for mobile wireless networks. This work is done in collaboration with Marco Valerio Barbera, PhD colleague in the same department, who contributed mainly in the implementation and testing of the malware spreading and patching strategies on the different datasets. The communication between the real devices and the cloud, necessary for mobile com- putation offloading and smartphone data backup, does certainly not come for free. To the best of our knowledge, none of the works related to mobile cloud computing explicitly studies the actual overhead in terms of bandwidth and energy to achieve full backup of both data/applications of a smartphone, as well as to keep, on the cloud, up-to-date clones of smartphones for mobile computation offload purposes. In the last work during my PhD—again, in collaboration with Marco Valerio Barbera—we studied the feasibility of both mobile computation offloading and mobile software/data backup in real-life scenarios. This joint work resulted in a recent publication [9] but is not included in this thesis. As in C2C, we assume an architecture where each real device is associated to a software clone on the cloud. We define two types of clones: The off-clone, whose purpose is to support computation offloading, and the back-clone, which comes to use when a restore of user’s data and apps is needed. We measure the bandwidth and energy consumption incurred in the real device as a result of the synchronization with the off-clone or the back-clone. The evaluation is performed through an experiment with 11 Android smartphones and an equal number of clones running on Amazon EC2. We study the data communication overhead that is necessary to achieve different levels of synchronization (once every 5min, 30min, 1h, etc.) between devices and clones in both the off-clone and back-clone case, and report on the costs in terms of energy incurred by each of these synchronization frequencies as well as by the respective communication overhead. My contribution in this work is focused mainly on the experimental setup, deployment, and data collection.
- Published
- 2013
22. Demo abstract: Supporting interoperability of things in IoT systems
- Author
-
Mattiacci, Daniele, Kosta, Sokol, Mei, Alessandro, and Stefa, Julinda
- Subjects
Computer Networks and Communications ,Information Systems - Published
- 2013
23. Clone2Clone (C2C): Peer-to-Peer Networking of Smartphones on the Cloud *
- Author
-
Kosta, Sokol, Vasile, Claudiu, Perta, Stefa, Julinda, Hui, Pan, and Mei, Alessandro
- Published
- 2013
- Full Text
- View/download PDF
24. Unleashing the Power of Mobile Cloud Computing using ThinkAir
- Author
-
Kosta, Sokol, Aucinas, Andrius, Hui, Pan, Mortier, Richard, and Zhang, Xinwen
- Subjects
Networking and Internet Architecture (cs.NI) ,FOS: Computer and information sciences ,Computer Science - Networking and Internet Architecture ,Computer Science - Operating Systems ,Computer Science - Distributed, Parallel, and Cluster Computing ,Operating Systems (cs.OS) ,Distributed, Parallel, and Cluster Computing (cs.DC) - Abstract
Smartphones have exploded in popularity in recent years, becoming ever more sophisticated and capable. As a result, developers worldwide are building increasingly complex applications that require ever increasing amounts of computational power and energy. In this paper we propose ThinkAir, a framework that makes it simple for developers to migrate their smartphone applications to the cloud. ThinkAir exploits the concept of smartphone virtualization in the cloud and provides method level computation offloading. Advancing on previous works, it focuses on the elasticity and scalability of the server side and enhances the power of mobile cloud computing by parallelizing method execution using multiple Virtual Machine (VM) images. We evaluate the system using a range of benchmarks starting from simple micro-benchmarks to more complex applications. First, we show that the execution time and energy consumption decrease two orders of magnitude for the N-queens puzzle and one order of magnitude for a face detection and a virus scan application, using cloud offloading. We then show that if a task is parallelizable, the user can request more than one VM to execute it, and these VMs will be provided dynamically. In fact, by exploiting parallelization, we achieve a greater reduction on the execution time and energy consumption for the previous applications. Finally, we use a memory-hungry image combiner tool to demonstrate that applications can dynamically request VMs with more computational power in order to meet their computational requirements., 17 pages
- Published
- 2011
25. Have you asked your neighbors? A Hidden Market approach for device-to-device offloading.
- Author
-
Chatzopoulos, Dimitris, Ahmadi, Mahdieh, Kosta, Sokol, and Hui, Pan
- Published
- 2016
- Full Text
- View/download PDF
26. Enabling Android-Based Devices to High-End GPGPUs.
- Author
-
Montella, Raffaele, Ferraro, Carmine, Kosta, Sokol, Pelliccia, Valentina, and Giunta, Giulio
- Published
- 2016
- Full Text
- View/download PDF
27. OPENRP: a reputation middleware for opportunistic crowd computing.
- Author
-
Chatzopoulos, Dimitris, Ahmadi, Mahdieh, Kosta, Sokol, and Hui, Pan
- Subjects
MIDDLEWARE ,DISTRIBUTED computing ,PROFITABILITY ,COMPUTER simulation ,CROWDSOURCING ,COMPUTER software - Abstract
The concepts of wisdom of crowd and collective intelligence have been utilized by mobile application developers to achieve large-scale distributed computation, known as crowd computing. The profitability of this method heavily depends on users' social interactions and their willingness to share resources. Thus, different crowd computing applications need to adopt mechanisms that motivate peers to collaborate and defray the costs of participating ones who share their resources. In this article, we propose OPENRP, a novel, lightweight, and scalable system middleware that provides a unified interface to crowd computing and opportunistic networking applications. When an application wants to perform a device-to-device task, it delegates the task to the middleware, which takes care of choosing the best peers with whom to collaborate and sending the task to these peers. OPENRP evaluates and updates the reputation of participating peers based on their mutual opportunistic interactions. To show the benefits of the middleware, we simulated the behavior of two representative crowdsourcing applications: message forwarding and task offloading. Through extensive simulations on real human mobility traces, we show that the traffic generated by the applications is lower compared to two benchmark strategies. As a consequence, we show that when using our middleware, the energy consumed by the nodes is reduced. Finally, we show that when dividing the nodes into selfish and altruistic, the reputation scores of the altruistic peers increase with time, while those of the selfish ones decrease. [ABSTRACT FROM PUBLISHER]
- Published
- 2016
- Full Text
- View/download PDF
28. Planning Mobile Cloud Infrastructures Using Stochastic Petri Nets and Graphic Processing Units.
- Author
-
Silva, Francisco Airton, Rodrigues, Matheus, Maciel, Paulo, Kosta, Sokol, and Mei, Alessandro
- Published
- 2015
- Full Text
- View/download PDF
29. Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system.
- Author
-
Barbera, Marco V., Kosta, Sokol, Mei, Alessandro, Perta, Vasile C., and Stefa, Julinda
- Published
- 2014
- Full Text
- View/download PDF
30. To offload or not to offload? The bandwidth and energy costs of mobile cloud computing.
- Author
-
Barbera, Marco V., Kosta, Sokol, Mei, Alessandro, and Stefa, Julinda
- Published
- 2013
- Full Text
- View/download PDF
31. ThinkAir: Dynamic resource allocation and parallel execution in the cloud for mobile code offloading.
- Author
-
Kosta, Sokol, Aucinas, Andrius, Pan Hui, Mortier, Richard, and Xinwen Zhang
- Abstract
Smartphones have exploded in popularity in recent years, becoming ever more sophisticated and capable. As a result, developers worldwide are building increasingly complex applications that require ever increasing amounts of computational power and energy. In this paper we propose ThinkAir, a framework that makes it simple for developers to migrate their smartphone applications to the cloud. ThinkAir exploits the concept of smartphone virtualization in the cloud and provides method-level computation offloading. Advancing on previous work, it focuses on the elasticity and scalability of the cloud and enhances the power of mobile cloud computing by parallelizing method execution using multiple virtual machine (VM) images. We implement ThinkAir and evaluate it with a range of benchmarks starting from simple micro-benchmarks to more complex applications. First, we show that the execution time and energy consumption decrease two orders of magnitude for a N-queens puzzle application and one order of magnitude for a face detection and a virus scan application. We then show that a parallelizable application can invoke multiple VMs to execute in the cloud in a seamless and on-demand manner such as to achieve greater reduction on execution time and energy consumption. We finally use a memory-hungry image combiner tool to demonstrate that applications can dynamically request VMs with more computational power in order to meet their computational requirements. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
32. CloudShield: Efficient anti-malware smartphone patching with a P2P network on the cloud.
- Author
-
Barbera, Marco V., Kosta, Sokol, Stefa, Julinda, Hui, Pan, and Mei, Alessandro
- Abstract
The battery limits of today smartphones require a solution. In the scientific community it is believed that a promising way of prolonging battery life is to offload mobile computation to the cloud. State of the art offloading architectures consists of virtual copies of real smartphones (the clones) that run on the cloud, are synchronized with the corresponding devices, and help alleviate the computational burden on the real smartphones. Recently, it has been proposed to organize the clones in a peer-to-peer network in order to facilitate content sharing among the mobile smartphones. We believe that P2P network of clones, aside from content sharing, can be a useful tool to solve critical security problems on the mobile network of smartphones. In particular, we consider the problem of computing an efficient patching strategy to stop worm spreading between smartphones. The peer-to-peer network of clones is used to compute the best strategy to patch the smartphones in such a way that the number of devices to patch is low (to reduce the load on the cellular infrastructure) and that the worm is stopped quickly. We consider two well defined worms, one spreading between the devices and one attacking the cloud before moving to the real smartphones; we describe CloudShield, a suite of protocols running on the peer-to-peer network of clones; and we show by experiments that CloudShield outperforms state-of-the-art worm-containment mechanisms for mobile wireless networks. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
33. Large-Scale Synthetic Social Mobile Networks with SWIM.
- Author
-
Kosta, Sokol, Mei, Alessandro, and Stefa, Julinda
- Subjects
LARGE scale systems ,ONLINE social networks ,AD hoc computer networks ,POWER law (Mathematics) ,MATHEMATICAL models ,MOBILE computing ,MOBILE communication systems - Abstract
This paper presents small world in motion (SWIM), a new mobility model for ad hoc networking. SWIM is relatively simple, is easily tuned by setting just a few parameters, and generates traces that look real--synthetic traces have the same statistical properties of real traces in terms of intercontact times, contact duration, and frequency among node couples. Furthermore, it generates social behavior among nodes and models networks with complex social communities as the ones observed in the real traces. SWIM shows experimentally and theoretically the presence of the power-law and exponential decay dichotomy of intercontact times, and, most importantly, our experiments show that predicts very accurately the performance of forwarding protocols for PSNs like Epidemic, Delegation, Spray&Wait, and more complex, social-based ones like BUBBLE. Moreover, we propose a methodology to assess protocols on model with a large number of nodes. To the best of our knowledge, this is the first such study. Scaling of mobility models is a fundamental issue, yet never considered in the literature. Thanks to SWIM, here we present the first analysis of the scaling capabilities of Epidemic Forwarding, Delegation Forwarding, Spray&Wait, and BUBBLE. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
34. StreamSmart: P2P video streaming for smartphones through the cloud.
- Author
-
Gaeta, Alessandro, Kosta, Sokol, Stefa, Julinda, and Mei, Alessandro
- Published
- 2013
- Full Text
- View/download PDF
35. GEdIL—Gamified Education Interoperability Language.
- Author
-
Swacha, Jakub, Paiva, José Carlos, Leal, José Paulo, Queirós, Ricardo, Montella, Raffaele, and Kosta, Sokol
- Subjects
EDUCATIONAL objectives ,GAMIFICATION - Abstract
The paper introduces Gamified Education Interoperability Language (GEdIL), designed as a means to represent the set of gamification concepts and rules applied to courses and exercises separately from their actual educational content. This way, GEdIL allows not only for an easy yet effective specification of gamification schemes for educational purposes, but also sharing them among instructors and reusing in various courses. GEdIL is published as an open format, independent from any commercial vendor, and supported with dedicated open-source software. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
36. Marine bathymetry processing through GPGPU virtualization in high performance cloud computing.
- Author
-
Montella, Raffaele, Marcellino, Livia, Galletti, Ardelio, Di Luccio, Diana, Kosta, Sokol, Laccetti, Giuliano, and Giunta, Giulio
- Subjects
INTERNET of things ,BATHYMETRY ,MARINE geophysics ,UNDERWATER depth measurements ,DETECTORS - Abstract
Summary: Fast technology development has influenced the widespread use of low‐power devices in different scientific, environmental, and everyday life areas, giving birth to the Internet of Things. In this paper, we focus on the context of marine studies, addressing the problem of marine bathymetry data processing and analysis via pervasive and Internet‐connected sensors and low‐power distributed devices. Pervasive and Internet‐connected low‐power devices (as the components involved in the sensing and processing actions) made diverse and different "things" as a worldwide‐distributed system. Given the high complexity of the algorithms involved in these studies, which usually involve general‐purpose graphic processing unit (GPGPU) computation, it is impossible for the limited devices to perform the required calculations. To overcome these limitations, in this paper, we propose and implement a vertical application of GVirtuS, the open‐source GPGPU virtualization and remoting service, for achieving high performance geographical data interpolation in a high performance cloud computing scenario. We present an innovative implementation by comparing, in terms of performance and accuracy, the inverse distance weighting and kriging interpolation methods in their parallel implementations leveraging on CUDA‐enabled GPGPUs. We present a real‐world use case related to high‐resolution bathymetry interpolation in a crowdsource data context in the Bay of Pozzuoli, Italy. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
37. Marine bathymetry processing through GPGPU virtualization in high performance cloud computing
- Author
-
Giuliano Laccetti, Ardelio Galletti, Diana Di Luccio, Raffaele Montella, Sokol Kosta, Giulio Giunta, Livia Marcellino, Montella, Raffaele, Marcellino, Livia, Galletti, Ardelio, Di Luccio, Diana, Kosta, Sokol, Laccetti, Giuliano, and Giunta, Giulio
- Subjects
Computer science ,Computer Networks and Communications ,Cloud computing ,02 engineering and technology ,computer.software_genre ,Computational science ,Theoretical Computer Science ,Kriging ,0202 electrical engineering, electronic engineering, information engineering ,IDW ,geographic data interpolation ,GPGPU virtualization ,high performance computing ,kriging ,Software ,Computer Science Applications1707 Computer Vision and Pattern Recognition ,Computational Theory and Mathematics ,Bathymetry ,business.industry ,020206 networking & telecommunications ,Virtualization ,Supercomputer ,Computer Science Applications ,020201 artificial intelligence & image processing ,General-purpose computing on graphics processing units ,business ,computer ,geographic data interpolation, GPGPU virtualization, high performance computing, IDW, kriging - Abstract
Summary Fast technology development has influenced the widespread use of low-power devices in different scientific, environmental, and everyday life areas, giving birth to the Internet of Things. In this paper, we focus on the context of marine studies, addressing the problem of marine bathymetry data processing and analysis via pervasive and Internet-connected sensors and low-power distributed devices. Pervasive and Internet-connected low-power devices (as the components involved in the sensing and processing actions) made diverse and different ?things? as a worldwide-distributed system. Given the high complexity of the algorithms involved in these studies, which usually involve general-purpose graphic processing unit (GPGPU) computation, it is impossible for the limited devices to perform the required calculations. To overcome these limitations, in this paper, we propose and implement a vertical application of GVirtuS, the open-source GPGPU virtualization and remoting service, for achieving high performance geographical data interpolation in a high performance cloud computing scenario. We present an innovative implementation by comparing, in terms of performance and accuracy, the inverse distance weighting and kriging interpolation methods in their parallel implementations leveraging on CUDA-enabled GPGPUs. We present a real-world use case related to high-resolution bathymetry interpolation in a crowdsource data context in the Bay of Pozzuoli, Italy.
- Published
- 2018
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.