Search results for "Distributed computing"

showing 10 items of 622 documents

Two Levels SPF-Based System to Interconnect Partially Decentralized P2P File Sharing Networks

2005

Partially decentralized P2P (PDP2P) networks are a subset of P2P networks. Roles of nodes are different according to their functionality in the network. Nowadays, there are many PDP2P networks, with different characteristics. It is necessary to find a way to join those autonomous networks. We have not found any interconnection system, so in this article we present a new hierarchical system for interconnecting peers from different PDP2P networks. It will allow sharing data, content and resources between networks. It can be employed between sensor networks, P2P networks, and generally, overlay networks. Oldest superpeers or brokers with higher bandwidth in the PDP2P network will belong to hig…

Evolving networksFile sharingComputer sciencebusiness.industryInterdependent networksDistributed computingOverlay networkHierarchical control systemHierarchical network modelbusinessNetwork topologyWireless sensor networkComputer networkJoint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05)
researchProduct

Scheduling on Two Types of Resources: a Survey

2020

International audience; We study the problem of executing an application represented by a precedence task graph on a parallel machine composed of standard computing cores and accelerators. Contrary to most existing approaches, we distinguish the allocation and the scheduling phases and we mainly focus on the allocation part of the problem: choose the most appropriate type of computing unit for each task. We address both off-line and on-line settings and design generic scheduling approaches. In the first case, we establish strong lower bounds on the worst-case performance of a known approach based on Linear Programming for solving the allocation problem. Then, we refine the scheduling phase …

FOS: Computer and information sciences020203 distributed computingScheduleGeneral Computer ScienceComputer scienceDistributed computingmedia_common.quotation_subject0102 computer and information sciences02 engineering and technology01 natural sciencesTheoretical Computer ScienceScheduling (computing)Computer Science - Distributed Parallel and Cluster Computing010201 computation theory & mathematics0202 electrical engineering electronic engineering information engineeringQuality (business)Distributed Parallel and Cluster Computing (cs.DC)[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]Implementationmedia_common
researchProduct

Distributed and proximity-constrained C-means for discrete coverage control

2018

In this paper we present a novel distributed coverage control framework for a network of mobile agents, in charge of covering a finite set of points of interest (PoI), such as people in danger, geographically dispersed equipment or environmental landmarks. The proposed algorithm is inspired by C-Means, an unsupervised learning algorithm originally proposed for non-exclusive clustering and for identification of cluster centroids from a set of observations. To cope with the agents' limited sensing range and avoid infeasible coverage solutions, traditional C-Means needs to be enhanced with proximity constraints, ensuring that each agent takes into account only neighboring PoIs. The proposed co…

FOS: Computer and information sciences0209 industrial biotechnologyControl and OptimizationComputer scienceDistributed computing02 engineering and technologyIndustrial and Manufacturing EngineeringSet (abstract data type)Disaster reliefComputer Science - Robotics020901 industrial engineering & automation0202 electrical engineering electronic engineering information engineeringDecision Sciences (miscellaneous)Cluster analysisData fusion processPoints of interest(poi)Sensing rangesNon-exclusive clusteringData fusionDisaster preventionSensor fusionEuclidean distanceCoverage controlIdentification (information)Range (mathematics)Information concerningRanking020201 artificial intelligence & image processingMobile agentsRobotics (cs.RO)Cluster centroids
researchProduct

FIRST

2018

Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer scienceDistributed computingFrameworkCrowdsensing02 engineering and technologyTrustMobileComputer Science - Networking and Internet ArchitectureThe National MapInformation020204 information systems0202 electrical engineering electronic engineering information engineeringAndroid (operating system)ReputationPaceSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetworking and Internet Architecture (cs.NI)Data collectionParticipatory sensingInformation quality020206 networking & telecommunicationsQualitySoftware deploymentWireless sensor networkACM Transactions on Sensor Networks
researchProduct

Constrained Role Mining

2013

Role Based Access Control (RBAC) is a very popular access control model, for long time investigated and widely deployed in the security architecture of different enterprises. To implement RBAC, roles have to be firstly identified within the considered organization. Usually the process of (automatically) defining the roles in a bottom up way, starting from the permissions assigned to each user, is called {\it role mining}. In literature, the role mining problem has been formally analyzed and several techniques have been proposed in order to obtain a set of valid roles. Recently, the problem of defining different kind of constraints on the number and the size of the roles included in the resu…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityProcess (engineering)business.industryComputer scienceDistributed computingVertex coverAccess controlTop-down and bottom-up designEnterprise information security architecturecomputer.software_genreSet (abstract data type)Order (exchange)Role-based access controlData miningbusinessCryptography and Security (cs.CR)computer
researchProduct

Low-Power Wide-Area Networks for Sustainable IoT

2019

Low-power wide-area (LPWA) networks are attracting extensive attention because of their abilities to offer low-cost and massive connectivity to Internet of Things (IoT) devices distributed over wide geographical areas. This article provides a brief overview on the existing LPWA technologies and useful insights to aid the large-scale deployment of LPWA networks. Particularly, we first review the currently competing candidates of LPWA networks, such as narrowband IoT (NB-IoT) and long range (LoRa), in terms of technical fundamentals and large-scale deployment potential. Then we present two implementation examples on LPWA networks. By analyzing the field-test results, we identify several chall…

FOS: Computer and information sciencesComputer scienceComputer Science - Information Theory0805 Distributed Computing02 engineering and technologylaw.inventionComputer Science - Networking and Internet ArchitectureBluetoothGSMlaw1005 Communications Technologies0202 electrical engineering electronic engineering information engineeringBandwidth (computing)Resource managementElectrical and Electronic EngineeringNetworking and Internet Architecture (cs.NI)business.industryInformation Theory (cs.IT)020206 networking & telecommunicationsComputer Science ApplicationsPower (physics)0906 Electrical and Electronic EngineeringWide areaSoftware deploymentNetworking & TelecommunicationsTelecommunicationsbusinessInternet of Things
researchProduct

Capture Aware Sequential Waterfilling for LoraWAN Adaptive Data Rate

2020

LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spreading Factors (SF) to End-Devices (ED). Our design relies on three complementary approaches: i) equalize the Time-on-Air of the packets transmitted by the system's EDs in each spreading factor's group; ii) balance the spreading factors across multiple access gateways, and iii) keep into account the c…

FOS: Computer and information sciencesComputer scienceDistributed computingInternet of ThingsWireless communicationresource allocationServers02 engineering and technologyNetwork topologyspreading factorsinter-SF interferenceComputer Science - Networking and Internet Architecturechannel captureBandwidthServerLPWAN0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureElectrical and Electronic Engineeringinternet of t6hingsNetworking and Internet Architecture (cs.NI)Network packetbusiness.industryApplied MathematicsResource managementinternet of t6hings; LoRaWAN; spreading factors; resource allocation; adaptive data rate; channel capture; inter-SF interference020206 networking & telecommunicationsComputer Science ApplicationsLoRaWANadaptive data rateWide area networkScalabilityHeuristicsbusinessInterferenceUplinkCommunication channel
researchProduct

Multi-scale analysis of the European airspace using network community detection

2014

We show that the European airspace can be represented as a multi-scale traffic network whose nodes are airports, sectors, or navigation points and links are defined and weighted according to the traffic of flights between the nodes. By using a unique database of the air traffic in the European airspace, we investigate the architecture of these networks with a special emphasis on their community structure. We propose that unsupervised network community detection algorithms can be used to monitor the current use of the airspaces and improve it by guiding the design of new ones. Specifically, we compare the performance of three community detection algorithms, also by using a null model which t…

FOS: Computer and information sciencesDatabases FactualDistributed computingSocial SciencesPoison controllcsh:MedicineSociologycommunity detectionData Mininglcsh:SciencePhysicsMultidisciplinaryMathematical modelApplied MathematicsPhysicsCommunity structureComputer Science - Social and Information NetworksAir traffic controlAir TravelSocial NetworksPhysical SciencesInterdisciplinary PhysicsSocial SystemsEngineering and TechnologyFree flightInformation TechnologyNetwork AnalysisAlgorithmsResearch ArticlePhysics - Physics and SocietyComputer and Information SciencesControl (management)FOS: Physical sciencesComputerApplications_COMPUTERSINOTHERSYSTEMSPhysics and Society (physics.soc-ph)Statistical MechanicsDatabasescomplex networkHumansArchitectureNetworks network communities socio-technical system complex systems Air Traffic ManagementSocial and Information Networks (cs.SI)Null modellcsh:RModels TheoreticalSettore FIS/07 - Fisica Applicata(Beni Culturali Ambientali Biol.e Medicin)Computational SociologySignal ProcessingAir trafficlcsh:QMathematics
researchProduct

The IceProd framework: distributed data processing for the IceCube neutrino observatory

2015

IceCube is a one-gigaton instrument located at the geographic South Pole, designed to detect cosmic neutrinos, identify the particle nature of dark matter, and study high-energy neutrinos themselves. Simulation of the IceCube detector and processing of data require a significant amount of computational resources. This paper presents the first detailed description of IceProd, a lightweight distributed management system designed to meet these requirements. It is driven by a central database in order to manage mass production of simulations and analysis of data produced by the IceCube detector. IceProd runs as a separate layer on top of other middleware and can take advantage of a variety of c…

FOS: Computer and information sciencesMonitoringComputer scienceComputer Networks and CommunicationsDistributed computingData managementReal-time computingDistributed managementcomputer.software_genre01 natural sciencesData managementIceCube Neutrino ObservatoryTheoretical Computer ScienceIceCubeArtificial Intelligence0103 physical sciences010306 general physicsData processingData management; Distributed computing; Grid computing; Monitoring010308 nuclear & particles physicsbusiness.industryDistributed computingGrid computingComputer Science - Distributed Parallel and Cluster ComputingHardware and ArchitectureMiddleware (distributed applications)MiddlewareGrid computingParticleDistributed Parallel and Cluster Computing (cs.DC)Neutrinoddc:004businesscomputerSoftware
researchProduct

IncentMe: Effective Mechanism Design to Stimulate Crowdsensing Participants with Uncertain Mobility

2018

Mobile crowdsensing harnesses the sensing power of modern smartphones to collect and analyze data beyond the scale of what was previously possible with traditional sensor networks. Given the participatory nature of mobile crowdsensing, it is imperative to incentivize mobile users to provide sensing services in a timely and reliable manner. Most importantly, given sensed information is often valid for a limited period of time, the capability of smartphone users to execute sensing tasks largely depends on their mobility pattern, which is often uncertain. For this reason, in this paper, we propose IncentMe, a framework that solves this core issue by leveraging game-theoretical reverse auction …

FOS: Computer and information sciencesOptimizationMonitoringComputer Networks and CommunicationsComputer scienceDistributed computingMobile computingCrowdsensing02 engineering and technologyComputer Science - Networking and Internet ArchitectureReverse auctionSmart phoneCrowdsensingGame Theory0202 electrical engineering electronic engineering information engineeringElectrical and Electronic EngineeringSensorNetworking and Internet Architecture (cs.NI)Settore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMechanism designMobile computing020206 networking & telecommunicationsAuctionNavigationCore (game theory)RoadComputer Networks and CommunicationSensingTask analysisTask analysiParticipatoryState (computer science)MechanismSmartphoneWireless sensor networkIncentiveSoftware
researchProduct