Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jordi Torres is active.

Publication


Featured researches published by Jordi Torres.


network operations and management symposium | 2008

Utility-based placement of dynamic Web applications with fairness goals

David Carrera; Malgorzata Steinder; Ian Whalley; Jordi Torres; Eduard Ayguadé

We study the problem of dynamic resource allocation to clustered Web applications. We extend application server middleware with the ability to automatically decide the size of application clusters and their placement on physical machines. Unlike existing solutions, which focus on maximizing resource utilization and may unfairly treat some applications, the approach introduced in this paper considers the satisfaction of each application with a particular resource allocation and attempts to at least equally satisfy all applications. We model satisfaction using utility functions, mapping CPU resource allocation to the performance of an application relative to its objective. The demonstrated online placement technique aims at equalizing the utility value across all applications while also satisfying operational constraints, preventing the over-allocation of memory, and minimizing the number of placement changes. We have implemented our technique in a leading commercial middleware product. Using this real-life testbed and a simulation we demonstrate the benefit of the utility-driven technique as compared to other state-of-the-art techniques.


international conference on user modeling, adaptation, and personalization | 2007

Web Customer Modeling for Automated Session Prioritization on High Traffic Sites

Nicolas Poggi; Toni Moreno; Josep Lluis Berral; Ricard Gavaldà; Jordi Torres

In the Web environment, user identification is becoming a major challenge for admission control systems on high traffic sites. When a web server is overloaded there is a significant loss of throughput when we compare finished sessions and the number of responses per second; longer sessions are usually the ones ending in sales but also the most sensitive to load failures. Session-based admission control systems maintain a high QoS for a limited number of sessions, but does not maximize revenue as it treats all non-logged sessions the same. We present a novel method for learning to assign priorities to sessions according to the revenue that will generate. For this, we use traditional machine learning techniques and Markov-chain models. We are able to train a system to estimate the probability of the users purchasing intentions according to its early navigation clicks and other static information. The predictions can be used by admission control systems to prioritize sessions or deny them if no resources are available, thus improving sales throughput per unit of time for a given infrastructure. We test our approach on access logs obtained from a high-traffic online travel agency, with promising results.


international conference on parallel processing | 2005

Session-based adaptive overload control for secure dynamic Web applications

Jordi Guitart; David Carrera; Vincenc Beltran; Jordi Torres; Eduard Ayguadé

As dynamic Web content and security capabilities are becoming popular in current Web sites, the performance demand on application servers that host the sites is increasing, leading sometimes these servers to overload. As a result, response times may grow to unacceptable levels and the server may saturate or even crash. In this paper we present a session-based adaptive overload control mechanism based on SSL (secure socket layer) connections differentiation and admission control. The SSL connections differentiation is a key factor because the cost of establishing a new SSL connection is much greater than establishing a resumed SSL connection (it reuses an existing SSL session on server). Considering this big difference, we have implemented an admission control algorithm that prioritizes the resumed SSL connections to maximize performance on session-based environments and limits dynamically the number of new SSL connections accepted depending on the available resources and the current number of connections in the system to avoid server overload. In order to allow the differentiation of resumed SSL connections from new SSL connections we propose a possible extension of the Java Secure Sockets Extension (JSSE) API. Our evaluation on Tomcat server demonstrates the benefit of our proposal for preventing server overload.


computer and communications security | 2008

Adaptive distributed mechanism against flooding network attacks based on machine learning

Josep Lluis Berral; Nicolas Poggi; Javier Alonso; Ricard Gavaldà; Jordi Torres; Manish Parashar

Adaptive techniques based on machine learning and data mining are gaining relevance in self-management and self-defense for networks and distributed systems. In this paper, we focus on early detection and stopping of distributed flooding attacks and network abuses. We extend the framework proposed by Zhang and Parashar (2006) to cooperatively detect and react to abnormal behaviors before the target machine collapses and network performance degrades. In this framework, nodes in an intermediate network share information about their local traffic observations, improving their global traffic perspective. In our proposal, we add to each node the ability of learning independently, therefore reacting differently according to its situation in the network and local traffic conditions. In particular, this frees the administrator from having to guess and manually set the parameters distinguishing attacks from non-attacks: now such thresholds are learned and set from experience or past data. We expect that our framework provides a faster detection and more accuracy in front of distributed flooding attacks than if static filters or single-machine adaptive mechanisms are used. We show simulations where indeed we observe a high rate of stopped attacks with minimum disturbance to the legitimate users.


Computer Networks | 2007

Designing an overload control strategy for secure e-commerce applications

Jordi Guitart; David Carrera; Vicenç Beltran; Jordi Torres; Eduard Ayguadé

Uncontrolled overload can lead e-commerce applications to considerable revenue losses. For this reason, overload prevention in these applications is a critical issue. In this paper we present a complete characterization of secure e-commerce applications scalability to determine which are the bottlenecks in their performance that must be considered for an overload control strategy. With this information, we design an adaptive session-based overload control strategy based on SSL (Secure Socket Layer) connection differentiation and admission control. The SSL connection differentiation is a key factor because the cost of establishing a new SSL connection is much greater than establishing a resumed SSL connection (it reuses an existing SSL session on the server). Considering this big difference, we have implemented an admission control algorithm that prioritizes resumed SSL connections to maximize the performance in session-based environments and dynamically limits the number of new SSL connections accepted, according to the available resources and the current number of connections in the system, in order to avoid server overload. Our evaluation on a Tomcat server demonstrates the benefit of our proposal for preventing server overload.


ieee international symposium on workload characterization | 2010

Characterization of workload and resource consumption for an online travel and booking site

Nicolas Poggi; David Carrera; Ricard Gavaldà; Jordi Torres; Eduard Ayguadé

Online travel and ticket booking is one of the top E-Commerce industries. As they present a mix of products: flights, hotels, tickets, restaurants, activities and vacational packages, they rely on a wide range of technologies to support them: Javascript, AJAX, XML, B2B Web services, Caching, Search Algorithms and Affiliation; resulting in a very rich and heterogeneous workload. Moreover, visits to travel sites present a great variability depending on time of the day, season, promotions, events, and linking; creating bursty traffic, making capacity planning a challenge. It is therefore of great importance to understand how users and crawlers interact on travel sites and their effect on server resources, for devising cost effective infrastructures and improving the Quality of Service for users. In this paper we present a detailed workload and resource consumption characterization of the web site of a top national Online Travel Agency. Characterization is performed on server logs, including both HTTP data and resource consumption of the requests, as well as the server load status during the execution. From the dataset we characterize user sessions, their patterns and how response time is affected as load on Web servers increases. We provide a fine grain analysis by performing experiments differentiating: types of request, time of the day, products, and resource requirements for each. Results show that the workload is bursty, as expected, that exhibit different properties between day and night traffic in terms of request type mix, that user session length cover a wide range of durations, which response time grows proportionally to server load, and that response time of external data providers also increase on peak hours, amongst other results. Such results can be useful for optimizing infrastructure costs, improving QoS for users, and development of realistic workload generators for similar applications.


international parallel and distributed processing symposium | 2011

High-performance, power-aware computing - HPPAC

Rong Ge; Roberto Gioiosa; Frank Bellosa; Taisuke Boku; Yuan Chen; Chen Yong Cher; Marco Cesati; Bronis R. de Supinski; Xizhou Feng; Wu-chun Feng; Chung Hsing Hsu; Canturk Isci; Rob C. Knauerhase; Laurent Lefèvre; David K. Lowenthal; Hiroshi Nakashima; Ripal Nathuji; Karsten Schwan; Jordi Torres

High-performance computing is and has always been performance-oriented. However, a consequence of the push towards maximum performance is increased energy consumption, especially in datacenters and supercomputing centers. Moreover, as peak performance is rarely attained, some of this energy consumption results in little or no performance gain. In addition, large energy consumption costs datacenters and supercomputing centers a significant amount of money and wastes natural resources.


Computer Networks | 2009

Self-adaptive utility-based web session management

Nicolas Poggi; Toni Moreno; Josep Lluis Berral; Ricard Gavaldí; Jordi Torres


Large-Scale Distributed Systems and Energy Efficiency: A Holistic View | 2015

Green Data Centers

Robert Basmadjian; Pascal Bouvry; Georges Da Costa; László Gyarmati; Dzmitry Kliazovich; Sébastien Lafond; Laurent Lefèvre; Hermann de Meer; Jean Marc Pierson; Rastin Pries; Jordi Torres; Tuan Anh Trinh; Samee Ullah Khan


Archive | 2008

Distributed Learning Mechanism Against Flooding Network Attacks

Josep Lluis Berral; Javier Alonso; Nicolas Poggi; Ricard Gavaldà; Manish Parashar; Jordi Torres

Collaboration


Dive into the Jordi Torres's collaboration.

Top Co-Authors

Avatar

Nicolas Poggi

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

David Carrera

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Eduard Ayguadé

Barcelona Supercomputing Center

View shared research outputs
Top Co-Authors

Avatar

Josep Lluis Berral

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Ricard Gavaldà

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Laurent Lefèvre

École normale supérieure de Lyon

View shared research outputs
Top Co-Authors

Avatar

Javier Alonso

University of Extremadura

View shared research outputs
Top Co-Authors

Avatar

Jordi Guitart

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Toni Moreno

Polytechnic University of Catalonia

View shared research outputs
Top Co-Authors

Avatar

Frank Bellosa

Karlsruhe Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge