Search results for "Distributed"

showing 10 items of 1260 documents

PROLISEAN: A New Security Protocol for Programmable Matter

2021

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive fro…

Self-reconfiguring modular robot0209 industrial biotechnologySecurity AlgorithmsComputer Networks and CommunicationsComputer scienceDistributed computingHash functionSecurity Protocol02 engineering and technology[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]EncryptionLightweight Cryptography[INFO.INFO-IU]Computer Science [cs]/Ubiquitous Computing[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]020901 industrial engineering & automationComponent (UML)0202 electrical engineering electronic engineering information engineeringModular RobotsProgrammable MatterProtocol (object-oriented programming)IOTbusiness.industry020206 networking & telecommunicationsCryptographic protocolSupercomputer[INFO.INFO-MO]Computer Science [cs]/Modeling and SimulationProgrammable matter[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA][INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET]Amoebots[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessDistributed Computing
researchProduct

Experimental Performance Evaluation of Cloud-Based Analytics-as-a-Service

2016

An increasing number of Analytics-as-a-Service solutions has recently seen the light, in the landscape of cloud-based services. These services allow flexible composition of compute and storage components, that create powerful data ingestion and processing pipelines. This work is a first attempt at an experimental evaluation of analytic application performance executed using a wide range of storage service configurations. We present an intuitive notion of data locality, that we use as a proxy to rank different service compositions in terms of expected performance. Through an empirical analysis, we dissect the performance achieved by analytic workloads and unveil problems due to the impedance…

Service (business)FOS: Computer and information sciencesDistributed databaseComputer sciencebusiness.industryReliability (computer networking)Distributed computingRank (computer programming)020206 networking & telecommunicationsCloud computing02 engineering and technologyData modelingperformance evaluationstorageComputer Science - Distributed Parallel and Cluster ComputingAnalytics0202 electrical engineering electronic engineering information engineeringDistributed Parallel and Cluster Computing (cs.DC)business
researchProduct

An Observation Framework for Multi-agent Systems

2009

Existing middleware platforms for multi-agent systems (MAS) do not provide general support for observation. On the other hand, observation is considered to be an important mechanism needed for realizing effective and efficient coordination of agents. This paper describes a framework called Agent Observable Environment (AOE) for observation-based interaction in MAS. The framework provides 1) possibility to model MAS components with RDF-based observable soft-bodies, 2) support for both query and publish/subscribe style ontology-driven observation, and 3) ability to restrict the visibility of observable information using observation rules. Additionally, we report on an implementation of the fr…

Service (systems architecture)DatabaseComputer scienceMulti-agent systemReliability (computer networking)Distributed computingVisibility (geometry)JADE (programming language)computer.file_formatcomputer.software_genreComputingMethodologies_ARTIFICIALINTELLIGENCEKernel (linear algebra)Middleware (distributed applications)RDFcomputercomputer.programming_language2009 Fifth International Conference on Autonomic and Autonomous Systems
researchProduct

Joint Radio and Computational Resource Allocation in IoT Fog Computing

2018

The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we inve…

Service (systems architecture)IoTEdge deviceComputer Networks and CommunicationsComputer scienceDistributed computingAerospace Engineeringresource allocationCloud computing02 engineering and technologyresursointiComputational resource0203 mechanical engineeringUser experience design0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineeringstudent project allocationmatching theoryta113ta213business.industry020302 automobile design & engineering020206 networking & telecommunicationsService providerAutomotive EngineeringResource allocationEnhanced Data Rates for GSM Evolutionfog computingbusinessIEEE Transactions on Vehicular Technology
researchProduct

PMG-pro: A model-driven method for the development of service-based applications in a heterogenous services environment

2010

This paper presents PMG-pro (present, model, generate and provide), a development method of service-based applications. With PMG-pro, the composition of heterogeneous pre-made services is done at model levels and thereby different executable software systems for different target platforms can be generated automatically. To illustrate the method, we present a case study of developing a service-based application in a smart home environment.

Service (systems architecture)Javabusiness.industryService delivery frameworkComputer scienceDistributed computingcomputer.file_formatcomputer.software_genreUnified Modeling LanguageHome automationEmbedded systemExecutableSoftware systemWeb servicebusinesscomputercomputer.programming_language2010 IEEE International Conference on Software Engineering and Service Sciences
researchProduct

A Web-Based Coordination Infrastructure for Grid Collective Services

2004

Virtual Organizations (VO) consisting of heterogeneous institutions and individuals that share resources dynamically and in a coordinated way to support collaborative problem-solving are emerging in many fields. Consequently, new types of distributed infrastructures known as Grids have been proposed to cope with these new sharing requirements. Grids offer sets of collective services to support collaborative tasks which are distributed in nature and need asynchronous communication. Existing approaches to this problem lack of flexibility, adaptability and are tightly bound to the collective service that is provided. We present here a generic event model to build collective services that requi…

Service (systems architecture)Javacomputer.internet_protocolComputer scienceEvent (computing)business.industryDistributed computingXSLTGridWorld Wide WebAsynchronous communicationInformation systemTuple spaceWeb applicationThe InternetbusinesscomputerXMLcomputer.programming_language
researchProduct

Mobile agents and grid computing

2004

Publisher Summary This chapter describes mobile agents as an effective solution for grid service provision. A short overview is first introduced on the grid paradigm and the most known research activities in the field. Then, mobile agents are discussed and a comparison with the remote procedure call (RPC) method is made as far as the most effective solution to minimize network overload and fault occurrences is concerned. The common feature of all grid architectures is a coordinated and controlled resource sharing between the members of a dynamic multi-institutional virtual community. Community members agree on a set of sharing rules and permissions, by which resources to be shared and membe…

Service (systems architecture)Semantic gridGrid computingComputer scienceRemote procedure callDistributed computingInteroperabilityGridcomputer.software_genreProtocol (object-oriented programming)computerShared resource
researchProduct

Integrating Variability Management in Data Center Networks

2017

International audience; Data centers have an important role in supporting cloud computing services (i.e. checking social media, sending emails, video conferencing,..). Hence, data centers topologies design became more important and must be able to respond to ever changing service requirements and application demands. An ultimate challenge in this research is the design of data center network that interconnects the massive number of servers, and provides efficient and fault-tolerant routing algorithm. Several topologies such as DCell, FlatNet and ScalNet have been proposed. However, these topologies generally seek to improve the scalability without taking into consideration the energy usage …

Service (systems architecture)[ INFO ] Computer Science [cs]Computer scienceDistributed computing0211 other engineering and technologies02 engineering and technology[INFO] Computer Science [cs]computer.software_genreNetwork topologyInfrastructure costVideoconferencingServer[INFO]Computer Science [cs]Average path lengthEnergy021103 operations researchbusiness.industryCloud computing servicesData center networkEnergy consumptionAverage path lengthaverage path lengthScalabilitydata center networkData centerbusinessinfrastructure costcomputerComputer networkenergy
researchProduct

A genetic approach for adding QoS to distributed virtual environments

2007

Distributed virtual environment (DVE) systems have been designed last years as a set of distributed servers. These systems allow a large number of remote users to share a single 3D virtual scene. In order to provide quality of service in a DVE system, clients should be properly assigned to servers taking into account system throughput and system latency. The latter one is composed of both network and computational delays. This highly complex problem is known as the quality of service (QoS) problem. In this paper, we study the implementation of a genetic algorithm (GA) for solving the QoS problem in DVE systems. Performance evaluation results show that, due to its ability of both finding goo…

Service qualityComputer Networks and CommunicationsSearch algorithmVirtual machineComputer scienceDistributed computingQuality of serviceServerReal-time computingGenetic algorithmShortest path problemcomputer.software_genrecomputerComputer Communications
researchProduct

Trust enhancement of P2PSIP communication systems

2011

Today, peer-to-peer (P2P) session initiation protocol (SIP)-based communication systems have attracted much attention from both academia and industry. The decentralised nature of P2P might provide the distributed P2P communication system without help of the traditional SIP server. However, it comes to the cost of reduced trustworthiness and may cause security problems, e.g., privacy leaks, unpredictable availability, etc. In this paper, we investigate P2PSIP security issues and propose a subjective logic-based trust model that offers trust-based security services during P2PSIP session establishment. The main issues considered in this model include opinion calculation, opinion maintenance, d…

Session Initiation ProtocolComputer Networks and CommunicationsComputer sciencecomputer.internet_protocolComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSOverlayComputer securitycomputer.software_genreCommunications systemComputer Science ApplicationsDistributed hash tableNAT traversalConfidentialitySubjective logicChord (peer-to-peer)computerInternational Journal of Internet Technology and Secured Transactions
researchProduct