Search results for "Lability"

showing 10 items of 802 documents

Multiple UAV cooperative path planning via neuro-dynamic programming

2004

In this paper, a team of n unmanned air-vehicles (UAVs) in cooperative path planning is given the task of reaching the assigned target while i) avoiding threat zones ii) synchronizing minimum time arrivals on the target, and iii) ensuring arrivals coming from different directions. We highlight three main contributions. First we develop a novel hybrid model and suit it to the problem at hand. Second, we design consensus protocols for the management of information. Third, we synthesize local predictive controllers through a distributed, scalable and suboptimal neuro-dynamic programming (NDP) algorithm.

Information managementEngineeringbusiness.industryDistributed computingSynchronizingControl engineeringUnmanned air-vehicles (UAV)Task (project management)Dynamic programmingModel predictive controlDistributed algorithmScalabilityNeuro-dynamic programmingMotion planningbusinessNeuro-dynamic programming; Unmanned air-vehicles (UAV)
researchProduct

The Evolution of Blockchain Virtual Machine Architecture Towards an Enterprise Usage Perspective

2019

Virtualization in the context of blockchain systems represents an essential phase in the development and migration of services from public chains to enterprise logic. Most of the ongoing blockchain uses-cases are using the existing public ledgers, but for business products and services, there is a need for custom tailored solutions to ensure flexibility and security. The Ethereum Virtual Machine has opened new ways to solve problems that require a public proof by executing logic on a decentralized ecosystem. In a natural evolutive process, virtualization logic was shaped by numerous architectures and business requirements. Beside performance and scalability, enterprise virtual machines are …

Information privacyBusiness requirementsbusiness.industryComputer science020206 networking & telecommunicationsContext (language use)02 engineering and technologyVirtualizationcomputer.software_genreVirtual machineScalability0202 electrical engineering electronic engineering information engineeringBusiness logic020201 artificial intelligence & image processingSoftware engineeringbusinessFormal verificationcomputer
researchProduct

Distributed Coverage of Ego Networks in F2F Online Social Networks

2016

Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …

Information privacyComputer scienceCryptography02 engineering and technologyWorld Wide WebSet (abstract data type)Artificial IntelligenceDistributed online social networksDominating setServer0202 electrical engineering electronic engineering information engineering1707P2PSettore INF/01 - InformaticaSocial networkDistributed databasebusiness.industryFriend-to-friend networkComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsData AvailabilityDistributed Online Social NetworkDistributed Online Social Networks; P2P; Data Availability; friend-to-friend networksComputer Networks and CommunicationPrivacyDistributed algorithm020201 artificial intelligence & image processingfriend-to-friend networksbusinessComputer network2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
researchProduct

Privacy and temporal aware allocation of data in decentralized online social networks

2017

Distributed Online Social Networks (DOSNs) have recently been proposed to grant users more control over the data they share with the other users. Indeed, in contrast to centralized Online Social Networks (such as Facebook), DOSNs are not based on centralized storage services, because the contents shared by the users are stored on the devices of the users themselves. One of the main challenges in a DOSN comes from guaranteeing availability of the users' contents when the data owner disconnects from the network. In this paper, we focus our attention on data availability by proposing a distributed allocation strategy which takes into account both the privacy policies defined on the contents an…

Information privacyComputer sciencePrivacy policyControl (management)02 engineering and technologyInterval (mathematics)Computer securitycomputer.software_genreAvailability predictionTheoretical Computer ScienceSet (abstract data type)0202 electrical engineering electronic engineering information engineeringFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industry020206 networking & telecommunicationsData availabilityOrder (business)Computer ScienceDecentralized online social networkDecentralized online social networks020201 artificial intelligence & image processingbusinesscomputerData privacyComputer network
researchProduct

An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid

2021

International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …

Information privacysmart citiesComputer Networks and CommunicationsComputer scienceDistributed computingCryptography02 engineering and technologyEncryptionPaillier cryptosystem[SPI]Engineering Sciences [physics]Ciphertext0202 electrical engineering electronic engineering information engineeringAuthenticationbusiness.industry020208 electrical & electronic engineering020206 networking & telecommunicationssecurity and privacyComputer Science ApplicationsData aggregationsmart grid (SG)Smart gridHardware and ArchitectureSignal ProcessingScalabilityfog computingbusinessInformation Systems
researchProduct

File system scalability with highly decentralized metadata on independent storage devices

2016

This paper discusses using hard drives that integrate a key-value interface and network access in the actual drive hardware (Kinetic storage platform) to supply file system functionality in a large scale environment. Taking advantage of higher-level functionality to handle metadata on the drives themselves, a serverless system architecture is proposed. Skipping path component traversal during the lookup operation is the key technique discussed in this paper to avoid performance degradation with highly decentralized metadata. Scalability implications are reviewed based on a fuse file system implementation. Peer Reviewed

Information storage and retrieval systemsComputer scienceDistributed computingInterface (computing)Key-value storages02 engineering and technologycomputer.software_genreObject storagesLookupsComputer clusterServerData_FILES0202 electrical engineering electronic engineering information engineering:Informàtica::Arquitectura de computadors [Àrees temàtiques de la UPC]Virtual storageFile systemMetadataFile organizationScalability020206 networking & telecommunications020207 software engineeringFile systemsObject storageMetadataKineticsInformació -- Sistemes d'emmagatzematge i recuperacióScalabilityGrid computingSystems architecturecomputerCluster computing
researchProduct

GekkoFS — A Temporary Burst Buffer File System for HPC Applications

2020

Many scientific fields increasingly use high-performance computing (HPC) to process and analyze massive amounts of experimental data while storage systems in today’s HPC environments have to cope with new access patterns. These patterns include many metadata operations, small I/O requests, or randomized file I/O, while general-purpose parallel file systems have been optimized for sequential shared access to large files. Burst buffer file systems create a separate file system that applications can use to store temporary data. They aggregate node-local storage available within the compute nodes or use dedicated SSD clusters and offer a peak bandwidth higher than that of the backend parallel f…

Information storage and retrieval systemsPOSIXFile systemBurst buffersComputer scienceProcess (computing)computer.software_genreDistributed file systemsComputer Science ApplicationsTheoretical Computer ScienceMetadataInformació -- Sistemes d'emmagatzematge i recuperacióComputational Theory and MathematicsHardware and ArchitecturePOSIXHPC:Informàtica::Sistemes d'informació::Emmagatzematge i recuperació de la informació [Àrees temàtiques de la UPC]ScalabilityOperating systemBandwidth (computing)High performance computingIsolation (database systems)Càlcul intensiu (Informàtica)computerSoftwareJournal of Computer Science and Technology
researchProduct

Juridiskā zinātne, Nr.6 

2014

Journal “Law” of the University of Latvia is financed by the Faculty of Law of the University of Latvia

Infringement of the inviolability of the homeNotary servicesIntellectual property:LAW/JURISPRUDENCE [Research Subject Categories]New York ConventionOwnership claimPrinciple of flexicurity in European UnionProcedure of the Constitutional CourtVictims in criminal proceedings
researchProduct

Uptake and bioavailability of persistant organic pollutants by plants grown in contaminated soil

2005

This paper assesses the uptake of persistent organic pollutants (POP's) into plants. In particular, uptake of alpha-endosulfan, beta-endosulfan and endosulfan sulfate from lettuce. The lettuce plants were grown on compost that had previously been contaminated at 10 and 50 microg g(-1) per POP. The soil was slurry spiked by adding the appropriate amount of POP in acetone in an approximate ratio of 1 ratio 2, w/v soil ratio solvent. The solvent was left to evaporate at ambient temperature for 24 hours. Lettuce plants were grown under artificial daylight for 12 hours a day. The influence of soil ageing on the recovery of POP's from spiked soil samples was also assessed. The average recovery of…

InsecticidesSoil testBiological AvailabilityManagement Monitoring Policy and Lawengineering.materialModels BiologicalIntestinal absorptionSoilchemistry.chemical_compoundVegetablesSoil PollutantsEndosulfanCompostExtraction (chemistry)Public Health Environmental and Occupational HealthGeneral MedicineLettuceSoil contaminationC900BioavailabilityIntestinal AbsorptionchemistryEnvironmental chemistryengineeringSlurryDigestionEndosulfanEnvironmental Monitoring
researchProduct

Spectral evolution simulation on leading multi-socket, multicore platforms

2011

Spectral evolution simulations based on the observed Very Long Baseline Interferometry (VLBI) radio-maps are of paramount importance to understand the nature of extragalactic objects in astrophysics. This work analyzes the performance and scaling of a spectral evolution algorithm on three leading multi-socket, multi-core architectures. We evaluate three parallel models with different levels of data-sharing: a sharing approach, a privatizing approach and a hybrid approach. Our experiments show that the data-privatizing model is reasonably efficient on medium scale multi-socket, multi-core systems (up to 48 cores) while regardless algorithmic and scheduling optimizations, sharing approach is …

Instruction setMulti-core processorSpectral evolutionComputer scienceDistributed computingScalabilityVery-long-baseline interferometryScalingScheduling (computing)2011 18th International Conference on High Performance Computing
researchProduct