Marta Beltrán

Marta Beltrán
King Juan Carlos University | URJC · Computers Architecture and Technology and Computational Sciences and Artificial Intelligence

Associate Professor

About

47
Publications
7,735
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
263
Citations
Citations since 2017
13 Research Items
144 Citations
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
2017201820192020202120222023010203040
Introduction
I am an Associate Professor (Profesor Titular de Universidad) at the Computer Architecture area in the Rey Juan Carlos University (Spain). My research interests are related to HPC architectures and HPC applications. These last years I have been working mostly with distributed systems (clusters, Grid and Cloud) and I have focused on monitoring and prediction of performance and on solving load balancing/scheduling/provisioning problems.

Publications

Publications (47)
Article
The scientific and business communities are proposing new authentication methods more robust than traditional solutions relying on a single security point such as passwords (i.e. “something you know”). User and Entity Behavior Analysis (UEBA) has postulated as an excellent solution to improve authentication systems by performing continuous authenti...
Article
Full-text available
Significant research has been carried out in the field of User Behavior Analysis, focused on understanding, modeling and predicting past, present and future behaviors of users. However, the heterogeneity of the approaches makes their comprehension very complicated. Thus, domain and Machine Learning experts have to work together to achieve their obj...
Article
User and Entity Behaviour Analytics (UEBA) mechanisms rely on statistical techniques and Machine Learning to determine when a significant deviation from patterns or trends established as a standard for users and entities is occurring. These mechanisms are beneficial within cybersecurity contexts because they allow managers and administrators to hav...
Article
Full-text available
Radio Frequency IDentification (RFID) and related technologies such as Near Field Communication (NFC) are becoming essential in industrial contexts thanks to their ability to perform contactless data exchange, either device-to-device or tag-to-device. One of the three main operation modes of NFC, called read/write mode, makes use of the latter type...
Article
Access management poses a significant challenge within the Internet of Things (IoT) given the constrained capabilities in terms of computing, memory, storage, bandwidth and energy available for most of the low-cost devices and things embedded in the physical world. In this scenario, Edge Computing can be considered a powerful opportunity to solve a...
Article
Federated Identity Management (FIM) specifications have been massively adopted in web, cloud and mobile environments during the last years. Facebook, Google, Twitter, Linkedin, Amazon, Microsoft or Salesforce, to mention only some significant examples, are actively supporting standards such as OAuth or OpenID Connect, becoming in many cases identit...
Article
Smart objects connected within the Internet of Things (IoT) are often poorly physically protected, low-cost and simple embedded systems connected using Machine to Machine (M2M) and Machine to Cloud (M2C) lightweight communication protocols. These protocols guarantee basic data confidentiality and integrity, securing communication channels using cry...
Conference Paper
La Gestión de Identidades y Accesos permite resolver la Identificación, Autenticación, Autorización y Auditoría de usuarios (IAAA) en escenarios tan variados, heterogéneos y complejos como los que aparecen en contextos de Internet, Cloud, Mobile o Internet of Things, por poner solo algunos ejemplos. En este momento, los esquemas federados parecen l...
Conference Paper
Full-text available
Elasticity is a key property of cloud computing environments and one of the features which distinguishes this paradigm from other ones. An elasticity metric could be used to define and to monitor Service Level Agreements (SLAs), to compare and to benchmark different cloud providers or to improve provisioning and management decisions in real time if...
Article
Elasticity is a key property of cloud computing but there is a lack of standard elasticity metrics or analysis procedures to easily quantify this performance figure of cloud services. This absence of a unique general elasticity metric makes difficult to consider elasticity as a service level objective in Service Level Agreements, to benchmark cloud...
Chapter
Professionals with deep knowledge about cloud computing are in high demand in the industry these days. This knowledge should comprehend concepts related to models, technologies, techniques, frameworks, interfaces and tools needed to design, develop, deploy, integrate and manage cloud-based architectures. Universities are trying to offer different u...
Conference Paper
Full-text available
In recent years the research community and most of cloud users are trying to propose flexible and general mechanisms to determine how much virtual resources need to be allocated to each tier of the applications executed on cloud infrastructures. The objective of this virtual provisioning is twofold: minimizing resources consumption and meeting the...
Article
Provisioning of multi-tier applications in cloud environments raises new challenges not addressed by prior work on provisioning single-tier applications, on dynamic balancing or on resource allocation in other types of distributed systems. Flexible and general automatic mechanisms are needed to determine how much virtual resources need to be alloca...
Book
This book constitutes the refereed proceedings of the 12th European Workshop on Computer Performance Engineering, EPEW 2015, held in Madrid, Spain, in August/September 2015. The 19 papers presented in this volume were carefully reviewed and selected from 39 submissions. They were organized in topical sections named: applications; modelling techniqu...
Conference Paper
The application of simulation techniques in the military and security forces are numerous and in most cases their purpose is the training of staff. Virtual reality techniques have been incorporated to these simulators to enrich the trained professionals' experience. And with this kind of virtual training arises the need of designing avatars represe...
Conference Paper
The recent expansion of the cloud computing paradigm has motivated educators to include cloud-related topics in computer science and computer engineering curricula. While programming and algorithm topics have been covered in different undergraduate and graduate courses, cloud architecture/system topics are still not usually studied in academic cont...
Conference Paper
The Infrastructure as a Service (IaaS) paradigm allows service providers and/or end-users to outsource the computing resources they need. Cloud providers offer the infrastructure as a utility with a pay-per-use model, relying on virtualization technologies to provide hardware resources to the cloud consumers. IaaS can potentially bring obvious adva...
Conference Paper
Lean Manufacturing initiatives try to understand where the sources of waste are in a manufacturing process in order to minimize or avoid them and to add value to the stakeholders. The improvement actions related to lean methods are always incremental, fast and easy; mainly based on people's experience and on simple tools. For example, a Value Strea...
Article
New high performance architectures combining high and low level design techniques are widely used today, and FPGA platforms offer excellent solutions for this kind of system. There are a lot of multiprocessor systems implemented on FPGAs but the performance metrics usually considered with the traditional multiprocessors have not been adapted for sy...
Conference Paper
The definition of the High Level Architecture (HLA) some years ago made possible interoperability for a wide range of simulation systems and applications. However, as there are different possible ways to use HLA for performing the same task; real and easy interoperability is still not a reality. HLA was born as a military standard, but it soon beca...
Conference Paper
The concept of Zero Latency Enterprise (ZLE) has received considerable attention through the last years. Many companies and organizationswant to see the value of this kind of strategy before changing their IT infrastructure to implement ZLE solution. This paper proposes a new project methodology defining five main steps that should be followed to s...
Article
The problem of computing a large set of different tasks on a set of heterogeneous resources connected by a network is very common nowadays in very different environments and load balancing is indispensable for achieving high performance and high throughput in systems such as clusters. Cluster heterogeneity increases the difficulty of balancing the...
Article
Full-text available
The workload on a cluster system can be highly variable, increasing the difficulty of balancing the load across its nodes. The general rule is that high variability leads to wrong load balancing decisions taken with out-of-date information and difficult to correct in real-time during applications execution. In this work the workload variability is...
Article
Full-text available
The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract,...
Conference Paper
New high performance architectures combining high and low level techniques are widely used today, and FPGA-based designs offer excellent platforms for this kind of systems. This paper describes the HIPAOC (high performance architecture on chip) system, a general purpose and reconfigurable high performance architecture implemented on a single FPGA....
Conference Paper
Full-text available
The increase in the number of databases accessed only by some applications has made code injection attacks an important threat to almost any current system. If one of these applications accepts inputs from a client and executes these inputs without first validating them, the attackers are free to execute their own queries and therefore, to extract,...
Article
The success of different computing models, performance analysis and load balancing and algorithms depends on the processor availability information because there is a strong relationship between a process response time and the processor time available for its execution. Therefore, predicting the processor availability for a new process or task in a...
Conference Paper
New high performance architectures combining high and low level techniques are widely used today, and FPGA-based designs offer excellent platforms for this kind of systems. There are a lot of multiprocessor systems implemented on FPGApsilas but they are very often application and platform specific. This paper describes the HIPAOC (high performance...
Conference Paper
The workload on a cluster system can be highly variable, increasing the difficulty of balancing the load across its nodes. And the general rule is that high variability leads to wrong load balancing decisions taken with out-of-date information and difficult to correct in real-time during applications execution.In this work the workload variability...
Conference Paper
Full-text available
Cluster heterogeneity increases the difficulty of balancing the load across the system nodes. Although the relationship between heterogeneity and load balancing is difficult to describe analytically, in this paper an exhaustive analysis of the effects of this system feature on load balancing algorithms performance is presented. Considering the perf...
Conference Paper
The initiation rule of a load balancing algorithm determines when to begin a new load balancing operation. Therefore, it is critical to achieve the desired system performance. This paper proposes a generalized procedure for deriving initiation mechanisms or rules based on different objectives for the load balancing algorithm. A new metric, the init...
Conference Paper
The next generation of earth observation satellites will exceed their downlink capability making essential to compress images on-board the satellites. Due to the limited download bandwidth, the limited contact time between the satellite and the ground systems and the huge data volume captured by the new high resolution sensors, efficient image comp...
Conference Paper
Dynamic load balancing decisions on cluster or grid computing systems are always based on some kind of knowledge about the system nodes state. Therefore, to balance the computational workload among the different system nodes, a local or global information exchange is needed. The information policy determines how and when this exchange is performed....
Conference Paper
Grid computing allows large-scale sharing of resources. The resource management system (RMS) is one of the most important Grid components because it provides the mechanism to manage all the available resources in an efficient way. Due to the large size of current Grid systems, the RMS is usually a federation of several cooperating RMS’s. This coope...
Conference Paper
Heterogeneous clusters are becoming very popular for providing flexible, scalable and cost-effective solutions for high performance computing. An efficient resources utilization can significantly enhance cluster performance, specially in heterogeneous environments. So, load balancing is critical for achieving high performance in this systems. In th...
Conference Paper
Full-text available
The task of finding the least loaded node on a cluster or Grid computing system is necessary in load balancing and scheduling algorithms. Therefore, the lint step in these algorithms is usually a prediction of the CPU assignment or availability for a new task on each system node (inversely related to its workload). This paper presents the DYPAP mon...
Conference Paper
Full-text available
In this paper the problem of making predictions of incoming tasks response times in a cluster node is focused. These predictions have a significant effect in areas such as dynamic load balancing, scalability analysis or parallel systems modelling. This paper presents two new response time prediction models. The first one is a mixed model based on t...

Network

Cited By