Search results for "Distributed computing"

showing 10 items of 622 documents

A Hybrid Architecture for Tiered Storage with Fuzzy Logic and AutoML

2020

The explosion of storage needs pauses a multifaceted challenge for organizations, not only it exerts a large pressure on precious resources, but also creates a sub-optimal data environment where the noise level may overwhelm the actual signal. However, despite the economies of scale achieved by major cloud platforms, the fundamental issue of storage optimization did not go away.

050101 languages & linguisticsComputer sciencebusiness.industryDistributed computing05 social sciencesSIGNAL (programming language)Cloud computing02 engineering and technologyFuzzy logicEconomies of scaleFuzzy logic controller0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing0501 psychology and cognitive sciencesNoise levelArchitecturebusinessCloud storage
researchProduct

Retrieving Monitoring and Accounting Information from Constrained Devices in Internet-of-Things Applications

2013

Part 6: Monitoring Mechanisms; International audience; Internet-of-Things (IoT) is envisioned to provide connectivity to a vast number of sensing or actuating devices with limited computational and communication capabilities. For the organizations that manage these constrained devices, the monitoring of each device’s operational status and performance level as well as the accounting of their resource usage are of great importance. However, monitoring and accounting support is lacking in today’s IoT platforms. Hence, this paper studies the applicability of the Constrained Application Protocol (CoAP), a lightweight transfer protocol under development by IETF, for efficiently retrieving monito…

10009 Department of InformaticsComputer scienceDistributed computingInternet of ThingsReal-time computingMonitoring and Accounting Infrastructure020206 networking & telecommunications02 engineering and technology000 Computer science knowledge & systemsSimple Network Management ProtocolConstrained Application ProtocolSecurity Assertion Markup Language[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Resource (project management)CoAPAccounting information system0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]esineiden internet020201 artificial intelligence & image processing1700 General Computer Science2614 Theoretical Computer ScienceWireless sensor networkProtocol (object-oriented programming)
researchProduct

Designing the 5G network infrastructure: a flexible and reconfigurable architecture based on context and content information

2018

5G networks will have to offer extremely high volumes of content, compared to those of today’s. Moreover, they will have to support heterogeneous traffics, including machine-to-machine, generated by a massive volume of Internet-of-Things devices. Traffic demands will be variable in time and space. In this work, we argue that all this can be achieved in a cost-effective way if the network is flexible and reconfigurable. We present the Flex5Gware network architecture, designed to meet the above requirements. Moreover, we discuss the links between flexibility and reconfigurability, on the one side, and context awareness and content awareness, on the other; we show how two of the building…

5G networkingStandardizationFlexible HW/SW platformComputer Networks and CommunicationsComputer scienceContext-awareneDistributed computinglcsh:TK7800-8360050801 communication & media studies02 engineering and technologylcsh:Telecommunication0508 media and communicationslcsh:TK5101-6720flexible HW/SW platforms 5G networking context-awareness; content-awareness; reconfigurability0202 electrical engineering electronic engineering information engineeringContext awarenessArchitecturecontent-awarenessNetwork architectureAccess networklcsh:Electronicsflexible HW/SW platforms05 social sciencescontext-awarenessReconfigurabilityControl reconfigurationComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsComputer Science ApplicationsContent-awareneSignal Processingreconfigurability5GEURASIP Journal on Wireless Communications and Networking
researchProduct

Distributed channel prediction for multi-agent systems

2017

Los sistemas multiagente (MAS) se comunican a través de una red inalámbrica para coordinar sus acciones e informar sobre el estado de su misión. La conectividad y el rendimiento del sistema pueden mejorarse mediante la predicción de la ganancia del canal. Presentamos un esquema basado en regresión de procesos gaussianos (GPR) distribuidos para predecir el canal inalámbrico en términos de la potencia recibida en el MAS. El esquema combina una máquina de comité bayesiano con un esquema de consenso medio, distribuyendo así no sólo la memoria sino también la carga computacional y de comunicación. A través de simulaciones de Monte Carlo, demostramos el rendimiento del GPR propuesto. RACHEL TEC20…

:CIENCIAS TECNOLÓGICAS [UNESCO]Wireless networkComputer sciencebusiness.industryDistributed computingMulti-agent systemMonte Carlo method020206 networking & telecommunicationsBayesian committee machine02 engineering and technologyUNESCO::CIENCIAS TECNOLÓGICASKriging0202 electrical engineering electronic engineering information engineeringWireless020201 artificial intelligence & image processingmulti-agent systemsbusinessgaussian process regressionSimulationCommunication channelaverage consensus scheme
researchProduct

MDP-Based Resource Allocation Scheme Towards a Vehicular Fog Computing with Energy Constraints

2018

As mobile applications deliver increasingly complex functionalities, the demands for even more intensive computation would quickly transcend energy capability of mobile devices. On one hand and in an attempt to address such issues, fog computing paradigm is introduced to mitigate the limited energy and computation resources available within constrained mobile devices, by moving computation resources closer to their users at the edge of the access network. On another hand, most of electric vehicles (EVs), with increasing computation, storage and energy capabilities, spend more than 90% of time on parking lots. In this paper, we conceive the basic idea of using the underutilized computation r…

Access network0203 mechanical engineeringComputer scienceDistributed computing020208 electrical & electronic engineering0202 electrical engineering electronic engineering information engineeringResource allocation020302 automobile design & engineering02 engineering and technologyEnhanced Data Rates for GSM EvolutionMarkov decision processMobile device2018 IEEE Global Communications Conference (GLOBECOM)
researchProduct

Middleware with QoS Support to Control Intelligent Systems

2008

This paper presents the architecture of a middleware for control component-based distributed systems. The fundamental idea underlying this architecture is the use of a hierarchical communications structure called "logical namespace tree" and a structured set of control processes interconnected, called "logical sensors graph". This architecture is named frame sensor adapter control (FSA-Ctrl). The aim of FSA-Ctrl is to provide a simple interface to specify the control actions and ensure a communication with some specified QoS parameters restrictions. In this architecture both systems, communication and control, manages the QoS policies. The communication system is based on the data distribut…

Adapter (computing)Computer sciencebusiness.industryQuality of serviceControl systemDistributed computingIntelligent decision support systemData Distribution ServiceNamespaceSoftware architecturebusinessCommunications systemComputer network2008 The Second International Conference on Advanced Engineering Computing and Applications in Sciences
researchProduct

An efficient adaptive strategy for searching in peer-to-peer networks

2005

One of the main technical challenges in Peer-to-Peer (P2P) networks is how to efficiently locate desired resources. Although structured systems, based on distributed hash tables, can achieve fair effectiveness, they are not suitable for widely deployed Internet applications. In fact, this kind of systems shows many severe limitations, such as ignoring the autonomous nature of peers, and supporting only weakly semantic functions. Unstructured P2P networks are more attractive for real applications, since they can avoid both the limitations of centralized systems, and the drawbacks of structured approaches. However, their search algorithms are usually based on inefficient flooding schemes, tha…

Adaptive strategiesGeneral Computer ScienceExploitbusiness.industryComputer scienceDistributed computingPeer-to-peercomputer.software_genreNetwork topologyHash tableFlooding (computer networking)Search algorithmThe InternetbusinesscomputerMultiagent and Grid Systems
researchProduct

A Novel Deep Learning Stack for APT Detection

2019

We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat (APT) attacks. This model is based on a theoretical approach where an APT is observed as a multi-vector multi-stage attack with a continuous strategic campaign. To capture these attacks, the entire network flow and particularly raw data must be used as an input for the detection process. By combining different types of tailored DL-methods, it is possible to capture certain types of anomalies and behaviour. Our method essentially breaks down a bigger problem into smaller tasks, tries to solve these sequentially and finally returns a conclusive result. This concept paper outlines, for example, the problems an…

Advanced persistent threatProcess (engineering)Computer science020209 energyDistributed computing02 engineering and technologylcsh:Technologylcsh:ChemistryStack (abstract data type)020204 information systemsAdvanced Persistent Thread (APT)0202 electrical engineering electronic engineering information engineeringGeneral Materials Sciencetietoturvalcsh:QH301-705.5Instrumentationta113Fluid Flow and Transfer Processeslcsh:Tbusiness.industryProcess Chemistry and TechnologyDeep learningGeneral EngineeringFlow networklcsh:QC1-999Computer Science Applicationsnetwork anomaly detectionkoneoppiminenlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Deep Learning (DL)Artificial intelligencelcsh:Engineering (General). Civil engineering (General)Raw databusinessverkkohyökkäyksetlcsh:Physics
researchProduct

A Bio-Inspired Cognitive Agent for Autonomous Urban Vehicles Routing Optimization

2017

Autonomous urban vehicle prototypes are expected to be efficient even in not explicitly planned circumstances and dynamic environments. The development of autonomous vehicles for urban driving needs real-time information from vehicles and road network to optimize traffic flows. In traffic agent-based models, each vehicle is an agent, while the road network is the environment. Cognitive agents are able to reason on the perceived data, to evaluate the information obtained by reasoning, and to learn and respond, preserving their self-sufficiency, independency, self-determination, and self-reliance. In this paper, a bio-inspired cognitive agent for autonomous urban vehicles routing optimization…

Agent behaviorComputer scienceProcess (engineering)Functional featuresDistributed computingMetabolic network020206 networking & telecommunications02 engineering and technologyvehicular ad hoc networks (VANETs)Urban roadCognitive agentArtificial IntelligenceAutonomous urban vehicles routing optimization0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingRouting (electronic design automation)cellular metabolismSoftwareSimulationCell survivalcognitive agentIEEE Transactions on Cognitive and Developmental Systems
researchProduct

Ensuring High Performance of Consensus-Based Estimation by Lifetime Maximization in WSNs

2015

The estimation of a parameter corrupted by noise is a common tasks in wireless sensor networks, where the deployed nodes cooperate in order to improve their own inaccurate observations. This cooperation usually involves successive data exchanges and local information updates until a global consensus value is reached. The quality of the final estimator depends on the amount of collected observations, hence the number of active nodes. Moreover, the inherent iterative nature of the consensus process involves a certain energy consumption. Since the devices composing the network are usually battery powered, nodes becoming inactive due to battery depletion emerges as a serious problem. In this wo…

Algebraic connectivityComputer scienceDistributed computingTopology optimizationProcess (computing)EstimatorMaximizationEnergy consumptionNetwork topologyWireless sensor network2015 International Conference on Distributed Computing in Sensor Systems
researchProduct