Search results for "Distributed computing"

showing 10 items of 622 documents

Joint Sub-Carrier and Power Allocation for Efficient Communication of Cellular UAVs

2020

| openaire: EC/H2020/857031/EU//5G!Drones Cellular networks are expected to be the main communication infrastructure to support the expanding applications of Unmanned Aerial Vehicles (UAVs). As these networks are deployed to serve ground User Equipment (UEs), several issues need to be addressed to enhance cellular UAVs’ services. In this paper, we propose a realistic communication model on the downlink, and we show that the Quality of Service (QoS) for the users is affected by the number of interfering BSs and the impact they cause. The joint problem of sub-carrier and power allocation is therefore addressed. Given its complexity, which is known to be NP-hard, we introduce a solution based …

game theorySignal Processing (eess.SP)FOS: Computer and information sciencescellular networksComputer scienceDistributed computing02 engineering and technologyComputer Science - Networking and Internet ArchitectureTelecommunications linkFOS: Electrical engineering electronic engineering information engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical Engineering and Systems Science - Signal ProcessingElectrical and Electronic EngineeringUnmanned aerial vehicles (UAVs)Networking and Internet Architecture (cs.NI)business.industryApplied MathematicsQuality of serviceMatching game020206 networking & telecommunicationsdownlink communicationComputer Science ApplicationsModels of communicationCellular networkbusinessGame theoryIEEE Transactions on Wireless Communications
researchProduct

Migrating from a Centralized Data Warehouse to a Decentralized Data Platform Architecture

2021

To an increasing degree, data is a driving force for digitization, and hence also a key asset for numerous companies. In many businesses, various sources of data exist, which are isolated from one another in different domains, across a heterogeneous application landscape. Well-known centralized solution technologies, such as data warehouses and data lakes, exist to integrate data into one system, but they do not always scale well. Therefore, robust and decentralized ways to manage data can provide the companies with better value give companies a competitive edge over a single central repository. In this paper, we address why and when a monolithic data storage should be decentralized for imp…

hajautetut järjestelmätComputer scienceDistributed computingtietovarastotData platform architectureDistributed data management02 engineering and technologydata warehousingAsset (computer security)Competitive advantageDecentralizationdistributed data managementkeskittäminen020204 information systems0202 electrical engineering electronic engineering information engineeringDigitizationtietojärjestelmäthajautusbusiness.industrytiedonhallinta020207 software engineeringData decentralizationtiedonhallintajärjestelmät113 Computer and information sciencesData warehousedata decentralizationyrityksetData warehousingdatadata platform architectureComputer data storageScalabilitytietohallintoKey (cryptography)business
researchProduct

Elements of Sustainability for Public Sector Software : Mosaic Enterprise Architecture, Macroservices, and Low-Code

2021

Public sector is a large consumer for software. In countries such as Finland, many of the systems are made to order by consultancy companies that participate in public tenders. These tenders initiated by the state, cities, and other public sector organizations. Furthermore, as public sector tasks are often decomposed to various actors, each and every one of them makes their purchase based on their own needs. In this paper, we argue that to maintain software sustainability in this context, there is a need for three key elements. Firstly, there is a need for an enterprise architecture where independent services from various vendors are can be easily deployed and integrated. Secondly, these se…

järjestelmäarkkitehtuurikestävä käyttö0209 industrial biotechnologyProcess managementMosaic architectureBuild to ordersoftware sustainabilityEnterprise architectureContext (language use)02 engineering and technologypublic sector software020901 industrial engineering & automationSoftware0202 electrical engineering electronic engineering information engineeringMacroservicesmacroservicestietojärjestelmät020203 distributed computingCall for bidsbusiness.industryPublic sectorohjelmistot (taiteet)Software sustainability113 Computer and information sciencesjulkinen sektorimosaic architectureSoftware deploymentSustainabilityPublic sector softwarebusiness
researchProduct

A Novel Bio-Inspired Approach for High-Performance Management in Service-Oriented Networks

2021

Service-continuity in distributed computing can be enhanced by designing self-organized systems, with a non-fixed structure, able to modify their structure and organization, as well as adaptively react to internal and external environment changes. In this paper, an architecture exploiting a bio-inspired management approach, i.e., the functioning of cell metabolism, for specialized computing environments in Service-Oriented Networks (SONs) is proposed. Similar to the processes acting in metabolic networks, the nodes communicate to each other by means of stimulation or suppression chains giving rise to emergent behaviors to defend against foreign invaders, attacks, and malfunctioning. The mai…

maximum intensity projectionPerformance managementComputer sciencebio-inspired networksDistributed computingbio-inspired networks FPGA technology high-performance management Service-oriented networksbio-inspired networks; biomedical imaging; cerebral vascular tree reconstruction; FPGA technology; high-performance management; magnetic resonance angiography; maximum intensity projection; Service-oriented networksSoftwareGate arrayRobustness (computer science)Factor (programming language)Computer Science (miscellaneous)ArchitectureField-programmable gate arrayhigh-performance managementcomputer.programming_languagebusiness.industrymagnetic resonance angiographyComputer Science ApplicationsHuman-Computer InteractionTree (data structure)FPGA technologycerebral vascular tree reconstructionbiomedical imagingService-oriented networksbusinesscomputerInformation SystemsIEEE Transactions on Emerging Topics in Computing
researchProduct

Energy efficient resource allocation in heterogeneous software defined network: A reverse combinatorial auction approach

2015

In this paper, resource allocation for energy effi- ciency in heterogeneous Software Defined Network (SDN) with multiple network service providers (NSPs) is studied. The considered problem is modeled as a reverse combinatorial auction game, which takes different quality of service (QoS) requirements into account. The heterogeneous network selection associated with power allocation problem is optimized by maximizing the energy efficiency of data transmission. By exploiting the properties of fractional programming, the resulting non-convex Winner Determination Problem (WDP) is transformed into an equivalent subtractive convex optimization problem. The proposed reverse combinatorial auction ga…

network service providersComputer Science::Computer Science and Game TheoryMathematical optimizationenergiatehokkuusComputer scienceDistributed computingQuality of serviceSoftware Defined NetworksAuction algorithmSDNCombinatorial auctionResource allocationSoftware-defined networkingHeterogeneous networkEfficient energy use2015 IEEE/CIC International Conference on Communications in China (ICCC)
researchProduct

Optimal Resource Allocation in Multi-Hop Networks: Contention vs. Scheduling

2014

CSMA/CA (Carrier Sense Multiple Access/Collision Avoidance) is actually the most used method in ad-hoc networks for transmitting on a contending medium, even if it shows poor performance in presence of hidden nodes. To increase performance, we propose an algorithm that combines CSMA and TDMA (Time Division Multiple Access) approaches. The adopted solution consists of grouping contending nodes in non-interfering subsets and granting a different numbers of time slots to different groups, while using the CSMA to manage medium access among nodes belonging to the same subset. An optimization procedure to assign the time slots to each subset of nodes and to find an equilibrium between contention …

resource allocation; multi hop neworksSettore ING-INF/03 - TelecomunicazioniComputer sciencebusiness.industryDistributed computingMulti-frequency time division multiple accessComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessresource allocationComputer Science Applications1707 Computer Vision and Pattern Recognitionmulti hop neworksHop (networking)Carrier-sense multiple accessScheduling (computing)resource allocation multi hop neworksComputer Networks and CommunicationSettore ING-INF/04 - AutomaticaControl and Systems EngineeringChannel access methodbusinessInformation SystemsComputer network
researchProduct

On the use of composite indicators for mobile communications network management in smart sustainable cities

2020

Beyond 5G networks will be fundamental towards enabling sustainable mobile communication networks. One of the most challenging scenarios will be met in ultra-dense networks that are deployed in densely populated areas. In this particular case, mobile network operators should benefit from new assessment metrics and data science tools to ensure an effective management of their networks. In fact, incorporating architectures allowing a cognitive network management framework could simplify processes and enhance the network&rsquo

smart citiesComputer scienceDistributed computing02 engineering and technologylcsh:Technologylcsh:Chemistrycognitive management0202 electrical engineering electronic engineering information engineeringDesenvolupament sostenibleGeneral Materials ScienceUMTSInstrumentationlcsh:QH301-705.5Comunicació i tecnologiaFluid Flow and Transfer Processesbusiness.industrylcsh:TProcess Chemistry and TechnologyGeneral Engineering020206 networking & telecommunicationsCognitive networksustainable development goalslcsh:QC1-999Computer Science ApplicationsLTENetwork managementlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040HSPACellular network020201 artificial intelligence & image processingMobile telephonyMetric (unit)Performance indicatorbusinesslcsh:Engineering (General). Civil engineering (General)composite indicators5GUMTS frequency bandslcsh:Physics
researchProduct

Performance Improvements of EventIndex Distributed System at CERN

2023

El trabajo de esta tesis se enmarca dentro del proyecto EventIndex del experimento ATLAS, un gran detector de partı́culas del LHC (Gran Colisionador de Hadrones) en el CERN. El objetivo del proyecto es catalogar todas las colisiones de partı́culas, o eventos, registrados en el detector ATLAS y también simulados a lo largo de sus años de funcionamiento. Con este catálogo se pueden caracterizar los datos a nivel de evento para su búsqueda y localización por parte de los usuarios finales. También se pueden realizar comprobaciones en la cadena de registro y reprocesado de los datos, para comprobar su corrección y optimizar futuros procesos. Debido al incremento en las tasas y volumen de datos e…

storagedistributed computingUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología de los ordenadores ::Dispositivos de almacenamientobig dataDetectors and Experimental TechniquesgridUNESCO::CIENCIAS TECNOLÓGICAS::Tecnología de los ordenadores ::Arquitectura de ordenadoresComputing and Computers
researchProduct

Remote Attestation of Software and Execution-Environment in Modern Machines

2015

The research on network security concentrates mainly on securing the communication channels between two endpoints, which is insufficient if the authenticity of one of the endpoints cannot be determined with certainty. Previously presented methods that allow one endpoint, the authentication authority, to authenticate another remote machine. These methods are inadequate for modern machines that have multiple processors, introduce virtualization extensions, have a greater variety of side effects, and suffer from nondeterminism. This paper addresses the advances of modern machines with respect to the method presented by Kennell. The authors describe how a remote attestation procedure, involving…

ta113AuthenticationMulti-core processorNetwork securitybusiness.industryComputer sciencesoftwaremedia_common.quotation_subjectDistributed computingTrusted ComputingCertaintyComputer securitycomputer.software_genreVirtualizationVariety (cybernetics)remote attestationSoftwarenetwork securitybusinesscomputermedia_commonexecution-environment
researchProduct

Cognitive self-healing system for future mobile networks

2015

This paper introduces a framework and implementation of a cognitive self-healing system for fault detection and compensation in future mobile networks. Performance monitoring for failure identification is based on anomaly analysis, which is a combination of the nearest neighbor anomaly scoring and statistical profiling. Case-based reasoning algorithm is used for cognitive self-healing of the detected faulty cells. Validation environment is Long Term Evolution (LTE) mobile system simulated with Network Simulator 3 (ns-3) [1, 2]. Results demonstrate that cognitive approach is efficient for compensation of cell outages and is capable to improve network coverage. Anomaly analysis can be used fo…

ta113cognitionta213Performance managementComputer sciencebusiness.industryDistributed computingCognitiondata miningcomputer.software_genreAutomationanomaly detectionFault detection and isolation5G networksNetwork simulationcompensationcell outageRobustness (computer science)self-healingAnomaly detectionData miningbusinesscomputer5G2015 International Wireless Communications and Mobile Computing Conference (IWCMC)
researchProduct