SlideShare a Scribd company logo
1 of 27
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
SCS4001 Individual Project Proposal
Opportunistic Persistent Data Storage
Weerasooriya W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe D.N.
University of Colombo School of Computing
May 07,2015
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Persistent Data Storage
1 Introduction
2 Our Aim
3 Research Questions
4 Our Study
5 Evaluation
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Networks
Theorem (Definition)
OppNets are highly dynamic, composed of mobile and
static nodes (i.e.devices) and take advantages of
opportunistic time- varying contacts among users
carrying them to exchange information.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Networks Cont.
The base of the modern opportunistic network is the
Interplanetary Internet research project led by Vint
Cerf in 1998 at NASA.
This idea has grown rapidly and today a person with
a mobile device can be considered as a node in
opportunistic network which exhibits social network
properties.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Networks Cont.
People are very keen to retrieve/provide information
today.
Portable communication devices becoming popular
day by day-ex:laptops,smart phones,tablets.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Networks Cont.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Networks Cont.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Social Network Properties
Opportunistic networks exhibit social network
properties.
There are some nodes which have a large number of
connections while others have few.
Popularity of those nodes is very high.
Finding such nodes in a network is beneficial to
deliver data as well as to store data.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Persistent Data Storage
1 Introduction
2 Our Aim
3 Research Questions
4 Our Study
5 Evaluation
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Persistent Data Storage
Many studies on opportunistic routing,content
distribution have been done.
But it is very hard to find studies on persistently
storing data in opportunistic networks.
Our focus is to implement a persistent data storage
on opportunistic network efficiently with the help of
social network properties.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Persistent Data Storage
1 Introduction
2 Our Aim
3 Research Questions
4 Our Study
5 Evaluation
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Research Questions
How can we implement a Storage
protocol(read/write/take) efficiently using social
network properties.
While doing that replicas should be kept and
handled energy efficiently with less overhead in the
opportunistic environment.
Extending the tasks in to streaming data.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Persistent Data Storage
1 Introduction
2 Our Aim
3 Research Questions
4 Our Study
5 Evaluation
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Our Study
After going through enough literature we have some
basic idea on how to do that.
We could find few implementations on reliable
storages in Mobile Ad-Hoc.
We have to study and find efficient way of using
social network properties to increase the reliability.
Figure : Storage model
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Our Study Continued
In the network we have to select a set of nodes as
servers and other nodes become clients.
We can use social network properties when
determining the server nodes.
Clients can interact with one of the server
nodes.(Agent)
There should be some storage to store messages in
each server
We should not write to all the sever nodes.Selected
servers may be used(write quorum)
Same thing for the read-(read quorum)
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Our Study Continued
More read activities than write.We can reduce the
size of the read quorum
Figure : Storage model-Luo,Hubaux,Eugster(2003)
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Our Study Continued
Replicas are there to increase the availability of the
data.
Due to high mobility in opportunistic networks,
some hot data may be kept more than one places.
When using replicas the other important factor is
the correctness of the replicated data i.e. ”Is this
the latest data? or it’s an old replication?”
There should be a mechanism to handle this.
We can have a some unique identifiers for messages
mid (source id, object id,version id) and each node
can keep the mid list.
Older id’s can be replaced with new ones.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Our Study Continued
There should be an intersection in read quorum and
write quorum to spread a given update.Thus
increase the correctness of the replicated data.
Figure : Luo,Hubaux,Eugster(2003)
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Our Study-Summery
We should use social network properties that can be
seen in opportunistic networks to improve the
performance of storage protocol as well as the
replication mechanism.
It may be beneficial to know the most popular node
set in the opportunistic network.They may be
potential candidates for servers.
There are few matrices to find popular nodes in an
opportunistic network.Ex:Betweenness Centrality.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Persistent Data Storage
1 Introduction
2 Our Aim
3 Research Questions
4 Our Study
5 Evaluation
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Evaluation
Handling real world traces for opportunistic network
evaluations is very costly.
We have to cover large geographic are, have to find
some people (atleast 50).
Finding devices, place are other problems.
Therefore we opted to synthetic traces.
Finding a proper simulator for human
behaviour/opportunistic networks was very difficult.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
ONE simulator
This has been designed specially for Opportunistic
Networks.Developed using JAVA1
The mobility model that we use here is very close to
human behaviour in opportunistic networks(Working
Day Movement Model).
We can add our own mobility model or modify any
mobility model as we want.
There are six routing protocols.What we focus to
use is MaxPop.Like mobility models we can use our
own routing algorithm.
Capable of providing post processing reports.It will
be beneficial when analysing results.
1
http://www.netlab.tkk.fi/tutkimus/dtn/theone/
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Opportunistic Networking Environment
Figure : GUI view-Taken from official website of ONE
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Assumptions
We do not consider security as an issue when
sharing contents over the mobile devices.
No specific hardware or software restrictions for the
communication other than the things that are
considered in the project.
No peer failures occur during the communication.
Number of members in the opportunistic network
are fixed.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
Our Approach
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
References
Luo,J.,Hubaux,J.-P., Eugster, P. T. (2003). PAN:
Providing Reliable Storage in Mobile Ad Hoc
Networks with Probabilistic Quorum Systems. the
4th ACM MobiHoc, 1–12.
Pongthawornkamol, T., Nahrstedt, K., Wang, G.
(2007). The Analysis of Publish/Subscribe Systems
over Mobile Wireless Ad Hoc Networks. Mobile and
Ubiquitous Systems: Networking Services, 2007.
MobiQuitous 2007. Fourth Annual International
Conference on, 1–8.
Nanda, S., Kotz, D. (2008). Q. Bridging Centrality.
Proceedings - International Conference on Computer
Communications and Networks, ICCCN, 62–67.
Opportunistic
Persistent Data
Storage
Weerasooriya
W.A.A.C.P.
Index:11002192
Supervised by:
Dr. Ranasinghe
D.N.
Introduction
Our Aim
Research
Questions
Our Study
Evaluation
References
Ker¨anen, A. (2009). R. ONE simulator. Proceedings
of the Second International ICST Conference on
Simulation Tools and Techniques, 55.
Padmanabhan, P., Gruenwald, L., Vallur, A.,
Atiquzzaman, M. (2008). A survey of data
replication techniques for mobile ad hoc network
databases. The VLDB Journal.

More Related Content

What's hot

Analyzing Perturbed Co-Expression Networks in Cancer Using a Graph Database
Analyzing Perturbed Co-Expression Networks in Cancer Using a Graph DatabaseAnalyzing Perturbed Co-Expression Networks in Cancer Using a Graph Database
Analyzing Perturbed Co-Expression Networks in Cancer Using a Graph DatabaseNeo4j
 
CuttingEEG - Open Science, Open Data and BIDS for EEG
CuttingEEG - Open Science, Open Data and BIDS for EEGCuttingEEG - Open Science, Open Data and BIDS for EEG
CuttingEEG - Open Science, Open Data and BIDS for EEGRobert Oostenveld
 
Share and Reuse: how data sharing can take your research to the next level
Share and Reuse: how data sharing can take your research to the next levelShare and Reuse: how data sharing can take your research to the next level
Share and Reuse: how data sharing can take your research to the next levelKrzysztof Gorgolewski
 
Dataset Citation and Identification
Dataset Citation and IdentificationDataset Citation and Identification
Dataset Citation and Identificationguest453b14
 
Genome sharing projects around the world nijmegen oct 29 - 2015
Genome sharing projects around the world   nijmegen oct 29 - 2015Genome sharing projects around the world   nijmegen oct 29 - 2015
Genome sharing projects around the world nijmegen oct 29 - 2015Fiona Nielsen
 
Addressing the New Challenges in Data Sharing: Large-Scale Data and Sensitive...
Addressing the New Challenges in Data Sharing: Large-Scale Data and Sensitive...Addressing the New Challenges in Data Sharing: Large-Scale Data and Sensitive...
Addressing the New Challenges in Data Sharing: Large-Scale Data and Sensitive...Merce Crosas
 
Open Source Tools Facilitating Sharing/Protecting Privacy: Dataverse and Data...
Open Source Tools Facilitating Sharing/Protecting Privacy: Dataverse and Data...Open Source Tools Facilitating Sharing/Protecting Privacy: Dataverse and Data...
Open Source Tools Facilitating Sharing/Protecting Privacy: Dataverse and Data...Merce Crosas
 
Answer extraction and passage retrieval for
Answer extraction and passage retrieval forAnswer extraction and passage retrieval for
Answer extraction and passage retrieval forWaheeb Ahmed
 
Brain Imaging Data Structure and Center for Reproducible Neuroscince
Brain Imaging Data Structure and Center for Reproducible NeuroscinceBrain Imaging Data Structure and Center for Reproducible Neuroscince
Brain Imaging Data Structure and Center for Reproducible NeuroscinceKrzysztof Gorgolewski
 
Data reuse and scholarly reward: understanding practice and building infrastr...
Data reuse and scholarly reward: understanding practice and building infrastr...Data reuse and scholarly reward: understanding practice and building infrastr...
Data reuse and scholarly reward: understanding practice and building infrastr...Todd Vision
 
Research methods group accelarating impact by sharing data
Research methods group  accelarating impact by sharing dataResearch methods group  accelarating impact by sharing data
Research methods group accelarating impact by sharing dataWorld Agroforestry (ICRAF)
 
Research data and scholarly publications: going from casual acquaintances to ...
Research data and scholarly publications: going from casual acquaintances to ...Research data and scholarly publications: going from casual acquaintances to ...
Research data and scholarly publications: going from casual acquaintances to ...Todd Vision
 
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016Jisc
 
Scott Edmunds ISMB talk on Big Data Publishing
Scott Edmunds ISMB talk on Big Data PublishingScott Edmunds ISMB talk on Big Data Publishing
Scott Edmunds ISMB talk on Big Data PublishingGigaScience, BGI Hong Kong
 

What's hot (18)

Contrast Pattern Aided Regression and Classification
Contrast Pattern Aided Regression and ClassificationContrast Pattern Aided Regression and Classification
Contrast Pattern Aided Regression and Classification
 
Analyzing Perturbed Co-Expression Networks in Cancer Using a Graph Database
Analyzing Perturbed Co-Expression Networks in Cancer Using a Graph DatabaseAnalyzing Perturbed Co-Expression Networks in Cancer Using a Graph Database
Analyzing Perturbed Co-Expression Networks in Cancer Using a Graph Database
 
CuttingEEG - Open Science, Open Data and BIDS for EEG
CuttingEEG - Open Science, Open Data and BIDS for EEGCuttingEEG - Open Science, Open Data and BIDS for EEG
CuttingEEG - Open Science, Open Data and BIDS for EEG
 
Share and Reuse: how data sharing can take your research to the next level
Share and Reuse: how data sharing can take your research to the next levelShare and Reuse: how data sharing can take your research to the next level
Share and Reuse: how data sharing can take your research to the next level
 
Dataset Citation and Identification
Dataset Citation and IdentificationDataset Citation and Identification
Dataset Citation and Identification
 
Text mining meets neural nets
Text mining meets neural netsText mining meets neural nets
Text mining meets neural nets
 
Genome sharing projects around the world nijmegen oct 29 - 2015
Genome sharing projects around the world   nijmegen oct 29 - 2015Genome sharing projects around the world   nijmegen oct 29 - 2015
Genome sharing projects around the world nijmegen oct 29 - 2015
 
Addressing the New Challenges in Data Sharing: Large-Scale Data and Sensitive...
Addressing the New Challenges in Data Sharing: Large-Scale Data and Sensitive...Addressing the New Challenges in Data Sharing: Large-Scale Data and Sensitive...
Addressing the New Challenges in Data Sharing: Large-Scale Data and Sensitive...
 
Open Source Tools Facilitating Sharing/Protecting Privacy: Dataverse and Data...
Open Source Tools Facilitating Sharing/Protecting Privacy: Dataverse and Data...Open Source Tools Facilitating Sharing/Protecting Privacy: Dataverse and Data...
Open Source Tools Facilitating Sharing/Protecting Privacy: Dataverse and Data...
 
Answer extraction and passage retrieval for
Answer extraction and passage retrieval forAnswer extraction and passage retrieval for
Answer extraction and passage retrieval for
 
Brain Imaging Data Structure and Center for Reproducible Neuroscince
Brain Imaging Data Structure and Center for Reproducible NeuroscinceBrain Imaging Data Structure and Center for Reproducible Neuroscince
Brain Imaging Data Structure and Center for Reproducible Neuroscince
 
2016 davis-plantbio
2016 davis-plantbio2016 davis-plantbio
2016 davis-plantbio
 
Data reuse and scholarly reward: understanding practice and building infrastr...
Data reuse and scholarly reward: understanding practice and building infrastr...Data reuse and scholarly reward: understanding practice and building infrastr...
Data reuse and scholarly reward: understanding practice and building infrastr...
 
Research methods group accelarating impact by sharing data
Research methods group  accelarating impact by sharing dataResearch methods group  accelarating impact by sharing data
Research methods group accelarating impact by sharing data
 
Research data and scholarly publications: going from casual acquaintances to ...
Research data and scholarly publications: going from casual acquaintances to ...Research data and scholarly publications: going from casual acquaintances to ...
Research data and scholarly publications: going from casual acquaintances to ...
 
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016
The fourth paradigm: data intensive scientific discovery - Jisc Digifest 2016
 
Scott Edmunds ISMB talk on Big Data Publishing
Scott Edmunds ISMB talk on Big Data PublishingScott Edmunds ISMB talk on Big Data Publishing
Scott Edmunds ISMB talk on Big Data Publishing
 
Satya Sahoo Thesis Defense
Satya Sahoo Thesis DefenseSatya Sahoo Thesis Defense
Satya Sahoo Thesis Defense
 

Viewers also liked

Safety and secure methods while remodeling the house
Safety and secure methods while remodeling the houseSafety and secure methods while remodeling the house
Safety and secure methods while remodeling the houselee shin
 
Izrada monitoring plana u funkciji procene uticaja.... Tim B
Izrada monitoring plana u funkciji procene uticaja.... Tim BIzrada monitoring plana u funkciji procene uticaja.... Tim B
Izrada monitoring plana u funkciji procene uticaja.... Tim BMarija Vukovic
 
09. Балты на тэрыторыі Беларусі
09. Балты на тэрыторыі Беларусі09. Балты на тэрыторыі Беларусі
09. Балты на тэрыторыі БеларусіAnastasiyaF
 
Jan Martinek: Jak se správně stydět za váš web
Jan Martinek: Jak se správně stydět za váš webJan Martinek: Jak se správně stydět za váš web
Jan Martinek: Jak se správně stydět za váš webLibdesign
 
Work Sample-Cornelli Glass
Work Sample-Cornelli GlassWork Sample-Cornelli Glass
Work Sample-Cornelli GlassFrance Jie Lin
 
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Com...
 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Com... A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Com...
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Com...nexgentechnology
 
03. Першабытныя жывёлаводы і земляробы ў бронзавым і жалезным
03. Першабытныя жывёлаводы і земляробы ў бронзавым і жалезным03. Першабытныя жывёлаводы і земляробы ў бронзавым і жалезным
03. Першабытныя жывёлаводы і земляробы ў бронзавым і жалезнымAnastasiyaF
 
Каталог "Сандер-Логистик" 2015
Каталог "Сандер-Логистик" 2015Каталог "Сандер-Логистик" 2015
Каталог "Сандер-Логистик" 2015Dmitry Doroshenko
 
13. Япония в 1918-1945 гг.
13. Япония в 1918-1945 гг.13. Япония в 1918-1945 гг.
13. Япония в 1918-1945 гг.AnastasiyaF
 
The Best Restaurants in Denver
The Best Restaurants in DenverThe Best Restaurants in Denver
The Best Restaurants in Denver49ThingstoDo
 
Quality contamination in agile scrum teams and the remedies - The QA Strategy
Quality contamination in agile scrum teams and the remedies - The QA StrategyQuality contamination in agile scrum teams and the remedies - The QA Strategy
Quality contamination in agile scrum teams and the remedies - The QA StrategySumeet Gupta, CSP, SAFe Agilist (SA)
 
Art Reach 20th Anniversary Annual Report
Art Reach 20th Anniversary Annual ReportArt Reach 20th Anniversary Annual Report
Art Reach 20th Anniversary Annual ReportPamela Shropshire
 
Fanny Lim Bee Teng_Nov 2014
Fanny Lim Bee Teng_Nov 2014Fanny Lim Bee Teng_Nov 2014
Fanny Lim Bee Teng_Nov 2014Fanny Lim
 
京町家における居住文化に対応した断熱改修手法に関する研究
京町家における居住文化に対応した断熱改修手法に関する研究京町家における居住文化に対応した断熱改修手法に関する研究
京町家における居住文化に対応した断熱改修手法に関する研究Shushi Doi
 

Viewers also liked (18)

Safety and secure methods while remodeling the house
Safety and secure methods while remodeling the houseSafety and secure methods while remodeling the house
Safety and secure methods while remodeling the house
 
Izrada monitoring plana u funkciji procene uticaja.... Tim B
Izrada monitoring plana u funkciji procene uticaja.... Tim BIzrada monitoring plana u funkciji procene uticaja.... Tim B
Izrada monitoring plana u funkciji procene uticaja.... Tim B
 
09. Балты на тэрыторыі Беларусі
09. Балты на тэрыторыі Беларусі09. Балты на тэрыторыі Беларусі
09. Балты на тэрыторыі Беларусі
 
Jan Martinek: Jak se správně stydět za váš web
Jan Martinek: Jak se správně stydět za váš webJan Martinek: Jak se správně stydět za váš web
Jan Martinek: Jak se správně stydět za váš web
 
Work Sample-Cornelli Glass
Work Sample-Cornelli GlassWork Sample-Cornelli Glass
Work Sample-Cornelli Glass
 
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Com...
 A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Com... A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Com...
A Profit Maximization Scheme with Guaranteed Quality of Service in Cloud Com...
 
DBHS55-PSR-P_LR
DBHS55-PSR-P_LRDBHS55-PSR-P_LR
DBHS55-PSR-P_LR
 
Dstu b v.2 7-37-95
Dstu b v.2 7-37-95Dstu b v.2 7-37-95
Dstu b v.2 7-37-95
 
03. Першабытныя жывёлаводы і земляробы ў бронзавым і жалезным
03. Першабытныя жывёлаводы і земляробы ў бронзавым і жалезным03. Першабытныя жывёлаводы і земляробы ў бронзавым і жалезным
03. Першабытныя жывёлаводы і земляробы ў бронзавым і жалезным
 
BROCHURE ENGLISH_VERSION_pdf
BROCHURE ENGLISH_VERSION_pdfBROCHURE ENGLISH_VERSION_pdf
BROCHURE ENGLISH_VERSION_pdf
 
Каталог "Сандер-Логистик" 2015
Каталог "Сандер-Логистик" 2015Каталог "Сандер-Логистик" 2015
Каталог "Сандер-Логистик" 2015
 
13. Япония в 1918-1945 гг.
13. Япония в 1918-1945 гг.13. Япония в 1918-1945 гг.
13. Япония в 1918-1945 гг.
 
The Best Restaurants in Denver
The Best Restaurants in DenverThe Best Restaurants in Denver
The Best Restaurants in Denver
 
Quality contamination in agile scrum teams and the remedies - The QA Strategy
Quality contamination in agile scrum teams and the remedies - The QA StrategyQuality contamination in agile scrum teams and the remedies - The QA Strategy
Quality contamination in agile scrum teams and the remedies - The QA Strategy
 
Art Reach 20th Anniversary Annual Report
Art Reach 20th Anniversary Annual ReportArt Reach 20th Anniversary Annual Report
Art Reach 20th Anniversary Annual Report
 
Fanny Lim Bee Teng_Nov 2014
Fanny Lim Bee Teng_Nov 2014Fanny Lim Bee Teng_Nov 2014
Fanny Lim Bee Teng_Nov 2014
 
Presentation1
Presentation1Presentation1
Presentation1
 
京町家における居住文化に対応した断熱改修手法に関する研究
京町家における居住文化に対応した断熱改修手法に関する研究京町家における居住文化に対応した断熱改修手法に関する研究
京町家における居住文化に対応した断熱改修手法に関する研究
 

Similar to Opportunistic Persistent Data Storage

Talk at OHSU, September 25, 2013
Talk at OHSU, September 25, 2013Talk at OHSU, September 25, 2013
Talk at OHSU, September 25, 2013Anita de Waard
 
Some Ideas on Making Research Data: "It's the Metadata, stupid!"
Some Ideas on Making Research Data: "It's the Metadata, stupid!"Some Ideas on Making Research Data: "It's the Metadata, stupid!"
Some Ideas on Making Research Data: "It's the Metadata, stupid!"Anita de Waard
 
Engaging Information Professionals in the Process of Authoritative Interlinki...
Engaging Information Professionals in the Process of Authoritative Interlinki...Engaging Information Professionals in the Process of Authoritative Interlinki...
Engaging Information Professionals in the Process of Authoritative Interlinki...Lucy McKenna
 
Looking for Data: Finding New Science
Looking for Data: Finding New ScienceLooking for Data: Finding New Science
Looking for Data: Finding New ScienceAnita de Waard
 
Sarah Jones RDM from a disciplinary perspective
Sarah Jones RDM from a disciplinary perspectiveSarah Jones RDM from a disciplinary perspective
Sarah Jones RDM from a disciplinary perspectiveJisc
 
Rots RDAP11 Data Archives in Federal Agencies
Rots RDAP11 Data Archives in Federal AgenciesRots RDAP11 Data Archives in Federal Agencies
Rots RDAP11 Data Archives in Federal AgenciesASIS&T
 
From bioinformatics scientist to entrepreneur - Women in Omics - ICG11 - 2016
From bioinformatics scientist to entrepreneur - Women in Omics - ICG11 - 2016From bioinformatics scientist to entrepreneur - Women in Omics - ICG11 - 2016
From bioinformatics scientist to entrepreneur - Women in Omics - ICG11 - 2016Fiona Nielsen
 
Standard Datasets in Information Retrieval
Standard Datasets in Information Retrieval Standard Datasets in Information Retrieval
Standard Datasets in Information Retrieval Jean Brenda
 
JISC repositories and preservation programme: Plenary presentation 2009
JISC repositories and preservation programme: Plenary presentation 2009JISC repositories and preservation programme: Plenary presentation 2009
JISC repositories and preservation programme: Plenary presentation 2009Kevin Ashley
 
ANDS and Data Management
ANDS and Data ManagementANDS and Data Management
ANDS and Data ManagementJulia Gross
 
Low Resource Domain Subjective Context Feature Extraction via Thematic Meta-l...
Low Resource Domain Subjective Context Feature Extraction via Thematic Meta-l...Low Resource Domain Subjective Context Feature Extraction via Thematic Meta-l...
Low Resource Domain Subjective Context Feature Extraction via Thematic Meta-l...AI Publications
 
Enriching Scholarship 2014 Beyond the Journal Article: Publishing and Citing ...
Enriching Scholarship 2014 Beyond the Journal Article: Publishing and Citing ...Enriching Scholarship 2014 Beyond the Journal Article: Publishing and Citing ...
Enriching Scholarship 2014 Beyond the Journal Article: Publishing and Citing ...Natsuko Nicholls
 
Improving RDM through closer integration of electronic lab notebooks and data...
Improving RDM through closer integration of electronic lab notebooks and data...Improving RDM through closer integration of electronic lab notebooks and data...
Improving RDM through closer integration of electronic lab notebooks and data...rmacneil88
 
Accelerating Data-driven Discovery in Energy Science
Accelerating Data-driven Discovery in Energy ScienceAccelerating Data-driven Discovery in Energy Science
Accelerating Data-driven Discovery in Energy ScienceIan Foster
 
Data publication: Discover, Explore, Visualise
Data publication: Discover, Explore, VisualiseData publication: Discover, Explore, Visualise
Data publication: Discover, Explore, VisualiseAlejandra Gonzalez-Beltran
 
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...Reproducibility in human cognitive neuroimaging: a community-­driven data sha...
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...Nolan Nichols
 
Realizing the Potential of Research Data by Carole L. Palmer
Realizing the Potential of Research Data by Carole L. Palmer Realizing the Potential of Research Data by Carole L. Palmer
Realizing the Potential of Research Data by Carole L. Palmer carolelynnpalmer
 

Similar to Opportunistic Persistent Data Storage (20)

Talk at OHSU, September 25, 2013
Talk at OHSU, September 25, 2013Talk at OHSU, September 25, 2013
Talk at OHSU, September 25, 2013
 
Some Ideas on Making Research Data: "It's the Metadata, stupid!"
Some Ideas on Making Research Data: "It's the Metadata, stupid!"Some Ideas on Making Research Data: "It's the Metadata, stupid!"
Some Ideas on Making Research Data: "It's the Metadata, stupid!"
 
Engaging Information Professionals in the Process of Authoritative Interlinki...
Engaging Information Professionals in the Process of Authoritative Interlinki...Engaging Information Professionals in the Process of Authoritative Interlinki...
Engaging Information Professionals in the Process of Authoritative Interlinki...
 
Looking for Data: Finding New Science
Looking for Data: Finding New ScienceLooking for Data: Finding New Science
Looking for Data: Finding New Science
 
Sarah Jones RDM from a disciplinary perspective
Sarah Jones RDM from a disciplinary perspectiveSarah Jones RDM from a disciplinary perspective
Sarah Jones RDM from a disciplinary perspective
 
Rots RDAP11 Data Archives in Federal Agencies
Rots RDAP11 Data Archives in Federal AgenciesRots RDAP11 Data Archives in Federal Agencies
Rots RDAP11 Data Archives in Federal Agencies
 
From bioinformatics scientist to entrepreneur - Women in Omics - ICG11 - 2016
From bioinformatics scientist to entrepreneur - Women in Omics - ICG11 - 2016From bioinformatics scientist to entrepreneur - Women in Omics - ICG11 - 2016
From bioinformatics scientist to entrepreneur - Women in Omics - ICG11 - 2016
 
Standard Datasets in Information Retrieval
Standard Datasets in Information Retrieval Standard Datasets in Information Retrieval
Standard Datasets in Information Retrieval
 
JISC repositories and preservation programme: Plenary presentation 2009
JISC repositories and preservation programme: Plenary presentation 2009JISC repositories and preservation programme: Plenary presentation 2009
JISC repositories and preservation programme: Plenary presentation 2009
 
ANDS and Data Management
ANDS and Data ManagementANDS and Data Management
ANDS and Data Management
 
Low Resource Domain Subjective Context Feature Extraction via Thematic Meta-l...
Low Resource Domain Subjective Context Feature Extraction via Thematic Meta-l...Low Resource Domain Subjective Context Feature Extraction via Thematic Meta-l...
Low Resource Domain Subjective Context Feature Extraction via Thematic Meta-l...
 
Reproducibility 1
Reproducibility 1Reproducibility 1
Reproducibility 1
 
Enriching Scholarship 2014 Beyond the Journal Article: Publishing and Citing ...
Enriching Scholarship 2014 Beyond the Journal Article: Publishing and Citing ...Enriching Scholarship 2014 Beyond the Journal Article: Publishing and Citing ...
Enriching Scholarship 2014 Beyond the Journal Article: Publishing and Citing ...
 
Improving RDM through closer integration of electronic lab notebooks and data...
Improving RDM through closer integration of electronic lab notebooks and data...Improving RDM through closer integration of electronic lab notebooks and data...
Improving RDM through closer integration of electronic lab notebooks and data...
 
Accelerating Data-driven Discovery in Energy Science
Accelerating Data-driven Discovery in Energy ScienceAccelerating Data-driven Discovery in Energy Science
Accelerating Data-driven Discovery in Energy Science
 
2014 aus-agta
2014 aus-agta2014 aus-agta
2014 aus-agta
 
British Library Datasets Programme Feb 2011
British Library Datasets Programme Feb 2011British Library Datasets Programme Feb 2011
British Library Datasets Programme Feb 2011
 
Data publication: Discover, Explore, Visualise
Data publication: Discover, Explore, VisualiseData publication: Discover, Explore, Visualise
Data publication: Discover, Explore, Visualise
 
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...Reproducibility in human cognitive neuroimaging: a community-­driven data sha...
Reproducibility in human cognitive neuroimaging: a community-­driven data sha...
 
Realizing the Potential of Research Data by Carole L. Palmer
Realizing the Potential of Research Data by Carole L. Palmer Realizing the Potential of Research Data by Carole L. Palmer
Realizing the Potential of Research Data by Carole L. Palmer
 

Recently uploaded

Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odishasmiwainfosol
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentationvaddepallysandeep122
 

Recently uploaded (20)

Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company OdishaBalasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
Balasore Best It Company|| Top 10 IT Company || Balasore Software company Odisha
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
PREDICTING RIVER WATER QUALITY ppt presentation
PREDICTING  RIVER  WATER QUALITY  ppt presentationPREDICTING  RIVER  WATER QUALITY  ppt presentation
PREDICTING RIVER WATER QUALITY ppt presentation
 

Opportunistic Persistent Data Storage