Search results for "Rating system"

showing 10 items of 139 documents

FIRST

2018

Thanks to the collective action of participating smartphone users, mobile crowdsensing allows data collection at a scale and pace that was once impossible. The biggest challenge to overcome in mobile crowdsensing is that participants may exhibit malicious or unreliable behavior, thus compromising the accuracy of the data collection process. Therefore, it becomes imperative to design algorithms to accurately classify between reliable and unreliable sensing reports. To address this crucial issue, we propose a novel Framework for optimizing Information Reliability in Smartphone-based participaTory sensing (FIRST) that leverages mobile trusted participants (MTPs) to securely assess the reliabil…

FOS: Computer and information sciencesComputer Networks and CommunicationsComputer scienceDistributed computingFrameworkCrowdsensing02 engineering and technologyTrustMobileComputer Science - Networking and Internet ArchitectureThe National MapInformation020204 information systems0202 electrical engineering electronic engineering information engineeringAndroid (operating system)ReputationPaceSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniNetworking and Internet Architecture (cs.NI)Data collectionParticipatory sensingInformation quality020206 networking & telecommunicationsQualitySoftware deploymentWireless sensor networkACM Transactions on Sensor Networks
researchProduct

Quantum algorithms for formula evaluation

2010

We survey the recent sequence of algorithms for evaluating Boolean formulas consisting of NAND gates.

FOS: Computer and information sciencesQuantum PhysicsHardware_MEMORYSTRUCTURESFOS: Physical sciencesComputational Complexity (cs.CC)Computer Science::PerformanceComputer Science::Hardware ArchitectureComputer Science - Computational ComplexityComputer Science::Emerging TechnologiesComputer Science - Data Structures and AlgorithmsData Structures and Algorithms (cs.DS)Hardware_ARITHMETICANDLOGICSTRUCTURESQuantum Physics (quant-ph)Computer Science::Operating SystemsHardware_LOGICDESIGN
researchProduct

An Alternative Derivation of Johannisson's Regular Perturbation Model

2012

We provide here an alternative derivation of the generalization of the nonlinear Turin model for dispersion unmanaged coherent optical links provided in Johannisson's report [arXiv:1205.2193]

FOS: Physical sciencesComputer Science::Operating SystemsPhysics - OpticsOptics (physics.optics)
researchProduct

GekkoFS - A Temporary Distributed File System for HPC Applications

2018

We present GekkoFS, a temporary, highly-scalable burst buffer file system which has been specifically optimized for new access patterns of data-intensive High-Performance Computing (HPC) applications. The file system provides relaxed POSIX semantics, only offering features which are actually required by most (not all) applications. It is able to provide scalable I/O performance and reaches millions of metadata operations already for a small number of nodes, significantly outperforming the capabilities of general-purpose parallel file systems. The work has been funded by the German Research Foundation (DFG) through the ADA-FS project as part of the Priority Programme 1648. It is also support…

File system020203 distributed computingBurst buffersParallel processing (Electronic computers)Computer scienceProcessament en paral·lel (Ordinadors)020207 software engineering02 engineering and technologyBuffer storage (Computer science)computer.software_genreData structureDistributed file systemsMetadataParallel processing (DSP implementation)POSIXServerScalabilityHPC0202 electrical engineering electronic engineering information engineeringOperating systemHigh performance computingDistributed File System:Informàtica::Arquitectura de computadors::Arquitectures paral·leles [Àrees temàtiques de la UPC]computerCàlcul intensiu (Informàtica)2018 IEEE International Conference on Cluster Computing (CLUSTER)
researchProduct

LPCC

2019

Most high-performance computing (HPC) clusters use a global parallel file system to enable high data throughput. The parallel file system is typically centralized and its storage media are physically separated from the compute cluster. Compute nodes as clients of the parallel file system are often additionally equipped with SSDs. The node internal storage media are rarely well-integrated into the I/O and compute workflows. How to make full and flexible use of these storage media is therefore a valuable research question. In this paper, we propose a hierarchical Persistent Client Caching (LPCC) mechanism for the Lustre file system. LPCC provides two modes: RW-PCC builds a read-write cache on…

File systemComputer scienceComputer clusterHierarchical storage management0202 electrical engineering electronic engineering information engineeringOperating system020206 networking & telecommunications020207 software engineeringLustre (file system)02 engineering and technologyCachecomputer.software_genrecomputerProceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis
researchProduct

A configurable rule based classful token bucket filter network request scheduler for the lustre file system

2017

HPC file systems today work in a best-effort manner where individual applications can flood the file system with requests, effectively leading to a denial of service for all other tasks. This paper presents a classful Token Bucket Filter (TBF) policy for the Lustre file system. The TBF enforces Remote Procedure Call (RPC) rate limitations based on (potentially complex) Quality of Service (QoS) rules. The QoS rules are enforced in Lustre's Object Storage Servers, where each request is assigned to an automatically created QoS class.The proposed QoS implementation for Lustre enables various features for each class including the support for high-priority and real-time requests even under heavy …

File systemComputer scienceQuality of service020206 networking & telecommunications020207 software engineeringDenial-of-service attackRule-based system02 engineering and technologycomputer.software_genreObject storageRemote procedure callServer0202 electrical engineering electronic engineering information engineeringOperating systemLustre (file system)computerProceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis
researchProduct

Direct lookup and hash-based metadata placement for local file systems

2013

New challenges to file systems' metadata performance are imposed by the continuously growing number of files existing in file systems. The total amount of metadata can become too big to be cached, potentially leading to multiple storage device accesses for a single metadata lookup operation. This paper takes a look at the limitations of traditional file system designs and discusses an alternative metadata handling approach, using hash-based concepts already established for metadata and data placement in distributed storage systems. Furthermore, a POSIX compliant prototype implementation based on these concepts is introduced and benchmarked. A variety of file system metadata and data operati…

File systemData elementDatabaseComputer scienceFitxers informàtics -- OganitzacióComputer fileFile organization (Computer science)Meta Data Servicescomputer.file_formatMetadata placementRandomizationcomputer.software_genreMetadata repositoryTorrent fileMetadataFile system designDirect lookupHashingOperating systemData_FILESVersioning file systemMetadata performancecomputer:Informàtica::Sistemes operatius [Àrees temàtiques de la UPC]
researchProduct

MERCURY: A Transparent Guided I/O Framework for High Performance I/O Stacks

2017

The performance gap between processors and I/O represents a serious scalability limitation for applications running on computing clusters. Parallel file systems often provide mechanisms that allow programmers to disclose their I/O pattern knowledge to the lower layers of the I/O stack through a hints API. This information can be used by the file system to boost the application performance. Unfortunately, programmers rarely make use of these features, missing the opportunity to exploit the full potential of the storage system. In this paper we propose MERCURY, a transparent guided I/O framework able to optimize file I/O patterns in scientific applications, allowing users to control the I/O b…

File systemPOSIXComputer scienceScalabilityNon-blocking I/OOperating systemNetwork File SystemAsynchronous I/OLinux kernelLustre (file system)computer.software_genrecomputer2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP)
researchProduct

ESB: Ext2 Split Block Device

2012

Solid State Disks (SSDs) start to replace rotating media (hard disks, HDD) in many areas, but are still not as cost efficient concerning capacity to completely replace them. One approach to use their superior performance properties is to use them as a cache for magnetic disks to speed up overall storage operations. In this paper, we present and evaluate a file system level optimization based on ext2. We split metadata and data and store the metadata on a SDD while the data remains on a common HDD. We evaluate our system with filebench under a file server, web server, and web proxy scenario and compare the results with flashcache. We find that many of the scenarios do not contain enough meta…

File systemWeb serverHardware_MEMORYSTRUCTURESComputer scienceComputer fileDevice filecomputer.software_genreMetadataFile serverData_FILESOperating systemFlashcacheCachecomputer2012 IEEE 18th International Conference on Parallel and Distributed Systems
researchProduct

Usability analysis of a novel biometric authentication approach for android-based mobile devices

2014

Mobile devices are widely replacing the standard personal computers thanks to their small size and user-friendly use. As a consequence, the amount of information, often confidential, exchanged through these devices is raising. This makes them potential targets of malicious network hackers. The use of simple passwords or PIN are not sufficient to provide a suitable security level for those applications requiring high protection levels on data and services. In this paper a biometric authentication system, as a running Android application, has been developed and implemented on a real mobile device. A system test on real users has been also carried out in order to evaluate the human-machine int…

Fingerprints authenticationOperating systemComputer Networks and CommunicationMobile device securityUsabilityElectrical and Electronic Engineering
researchProduct