Search results for "Overhead"

showing 10 items of 101 documents

Fault-Tolerant Network-on-Chip Design for Mesh-of-Tree Topology Using Particle Swarm Optimization

2018

As the size of the chip is scaling down the density of Intellectual Property (IP) cores integrated on a chip has been increased rapidly. The communication between these IP cores on a chip is highly challenging. To overcome this issue, Network-on-Chip (NoC) has been proposed to provide an efficient and a scalable communication architecture. In the deep sub-micron level NoCs are prone to faults which can occur in any component of NoC. To build a reliable and robust systems, it is necessary to apply efficient fault-tolerant techniques. In this paper, we present a flexible spare core placement in Mesh-of-Tree (MoT) topology using Particle Swarm Optimization (PSO) by considering IP core failures…

020203 distributed computingComputer scienceDistributed computingParticle swarm optimizationTopology (electrical circuits)Fault toleranceHardware_PERFORMANCEANDRELIABILITY02 engineering and technologyNetwork topologyChip020204 information systemsScalabilityHardware_INTEGRATEDCIRCUITS0202 electrical engineering electronic engineering information engineeringBenchmark (computing)Overhead (computing)TENCON 2018 - 2018 IEEE Region 10 Conference
researchProduct

A Sequential Game Approach for Computation-Offloading in an UAV Network

2017

International audience; Small drones are currently emerging as versatile nascent technology that can be used in exploration and surveillance missions. However, most of the underlying applications require very often complex and time-consuming calculations. Although, the limited resources available onboard the small drones, their mobility, the computation delays and energy consumption make the operation of these applications very challenging. Nevertheless, computation-offloading solutions provide feasible resolves to mitigate the issues facing these constrained devices. In this context, we address in this paper the problem of offloading highly intensive computation tasks, performed by a fleet…

020203 distributed computingSequential gameComputer scienceDistributed computingBase stations020206 networking & telecommunicationsContext (language use)Computational modelingServers02 engineering and technologyEnergy consumptionBase stationsymbols.namesake[SPI]Engineering Sciences [physics]Nash equilibriumServer0202 electrical engineering electronic engineering information engineeringsymbolsOverhead (computing)Computation offloadingDelaysGamesDrones
researchProduct

Estimation of Sway-angle Based on Hybrid State Observer Using Continuous and Discrete Sensing

2019

A hybrid state observer design is presented herein to estimate sway-angle and angular velocity in trolley systems with pendulum. In general, anti-sway control for trolley systems with pendulum such as overhead cranes are designed based on sway-angle signals detected by angular sensors. Opposed to that, a state observer without those sensors is proposed to estimate the sway-angle of the pendulum. A standard linear continuous feedback observer causes estimation error owing to the system nonlinearity and modeling error. This paper proposes a hybrid state observer incorporating discrete sensor signals. In the hybrid state observer, the estimation performance is improved by correcting the state …

0209 industrial biotechnologyObserver (quantum physics)OscillationComputer science020208 electrical & electronic engineeringPendulumAngular velocity02 engineering and technologyServomotorNonlinear system020901 industrial engineering & automationControl theory0202 electrical engineering electronic engineering information engineeringOverhead (computing)State (computer science)State observerIECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society
researchProduct

A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks

2018

International audience; Unmanned aerial vehicles (UAVs) networks have not yet received considerable research attention. Specifically, security issues are a major concern because such networks, which carry vital information, are prone to various attacks. In this paper, we design and implement a novel intrusion detection and response scheme, which operates at the UAV and ground station levels, to detect malicious anomalies that threaten the network. In this scheme, a set of detection and response techniques are proposed to monitor the UAV behaviors and categorize them into the appropriate list (normal, abnormal, suspect, and malicious) according to the detected cyber-attack. We focus on the m…

Ad hoc networksMonitoringAnomaly-based intrusion detection systemWireless ad hoc networkComputer science[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]UAVMobile computing[ INFO.INFO-CR ] Computer Science [cs]/Cryptography and Security [cs.CR]JammingComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyIntrusion detection systemAnomaly detection and rules-based intrusion detection techniquesIDSBlack hole (networking)Computer securitycomputer.software_genreMobile communicationUnmanned aerial vehicles[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR][INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]0202 electrical engineering electronic engineering information engineeringFalse positive paradoxOverhead (computing)Intrusion detectionElectrical and Electronic Engineering020206 networking & telecommunicationsComputer Science ApplicationsHuman-Computer InteractionControl and Systems Engineeringintrusion detection system020201 artificial intelligence & image processingcyber-attacksIntrusion prevention systemcomputerSoftware
researchProduct

Service discovery protocols in D2D-enabled cellular networks: Reactive versus proactive

2014

Device-to-Device (D2D) communication, which allows access services offered by nearby devices bypassing the base station, has been regarded as an essential component of the emerging 5G mobile networks. Many advantages can be provided by this direct communication paradigm such as high data rate, traffic offloading, range extension, as well as proximity services and social networking. In such a context, service discovery approaches need to be investigated. In this paper, we propose two protocols for service discovery, namely, reactive (pull) discovery and proactive (push) discovery in infrastructure-coordinated D2D networks. The protocol overhead is calculated and numerical results are provide…

Base stationProtocol overheadSocial networkbusiness.industryComputer scienceComponent (UML)Service discoveryCellular networkContext (language use)businessProtocol (object-oriented programming)5GComputer network2014 IEEE Globecom Workshops (GC Wkshps)
researchProduct

Robust Transmission for Reconfigurable Intelligent Surface Aided Millimeter Wave Vehicular Communications With Statistical CSI

2022

The integration of reconfigurable intelligent surface (RIS) into millimeter wave (mmWave) vehicular communications offers the possibility to unleash the potential of future proliferating vehicular applications. However, the high-mobility-induced rapidly varying channel state information (CSI) has been making it challenging to obtain the accurate instantaneous CSI (I-CSI) and to cope with the incurable high signaling overhead. The situation may become worse when the RIS with a large number of passive reflecting elements is deployed. To overcome this challenge, we investigate in this paper a robust transmission scheme for the time-varying RIS-aided mmWave vehicular communications, in which, s…

Base stationTransmission (telecommunications)Computer scienceChannel state informationRobustness (computer science)Applied MathematicsTelecommunications linkReal-time computingOverhead (computing)Resource allocationElectrical and Electronic EngineeringComputer Science ApplicationsCommunication channelIEEE Transactions on Wireless Communications
researchProduct

Detecting faulty wireless sensor nodes through Stochastic classification

2011

In many distributed systems, the possibility to adapt the behavior of the involved resources in response to unforeseen failures is an important requirement in order to significantly reduce the costs of management. Autonomous detection of faulty entities, however, is often a challenging task, especially when no direct human intervention is possible, as is the case for many scenarios involving Wireless Sensor Networks (WSNs), which usually operate in inaccessible and hostile environments. This paper presents an unsupervised approach for identifying faulty sensor nodes within a WSN. The proposed algorithm uses a probabilistic approach based on Markov Random Fields, requiring exclusively an ana…

Brooks–Iyengar algorithmComputer scienceDistributed computingReal-time computingProbabilistic logicMarkov processMarkov Random Fieldsymbols.namesakeKey distribution in wireless sensor networksWireless Sensor Networks.Autonomic ComputingSensor nodesymbolsOverhead (computing)Algorithm designWireless sensor network2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)
researchProduct

Gossip

2019

Nowadays, a growing number of servers and workstations feature an increasing number of GPUs. However, slow communication among GPUs can lead to poor application performance. Thus, there is a latent demand for efficient multi-GPU communication primitives on such systems. This paper focuses on the gather, scatter and all-to-all collectives, which are important operations for various algorithms including parallel sorting and distributed hashing. We present two distinct communication strategies (ring-based and flow-oriented) to generate transfer plans for their topology-aware implementation on NVLink-connected multi-GPU systems. We achieve a throughput of up to 526 GB/s for all-to-all and 148 G…

CUDAComputer scienceGossipDistributed computingTransfer (computing)ServerHash functionOverhead (computing)Throughput (business)Proceedings of the 48th International Conference on Parallel Processing
researchProduct

Molecular biology, China and the West

2000

More than 15 years ago, in November 1985, I travelled to China for the first time. I joined a symposium on developmental biology in the Shanghai Institute of Cell Biology (CBI), organised by the Chinese Academy of Sciences and the Max‐Planck‐Gesellschaft in Germany. The symposium was meant to provide perspectives for the future of the Max Planck Guest Laboratory, just founded in the CBI. When I attended, I did not anticipate that my visit to Shanghai would initiate a long‐term commitment to China. I did not even expect to return to China in the near future. But early in 1987, my colleague Uli Schwarz from the Max Planck Institute of Developmental Biology in Tubingen, who was and still is in…

ChinaHistoryNoticeInternational Educational ExchangeLibrary scienceHistory 20th CenturyAdventureBiochemistryChinese academy of sciencesEuropeMax planck institutesymbols.namesakeGermanyOverhead projectorGeneticssymbolsHumansPlanckChinaScience & SocietyMolecular BiologyPhd studentsEMBO reports
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct