Search results for "SCALABILITY"

showing 10 items of 221 documents

File system scalability with highly decentralized metadata on independent storage devices

2016

This paper discusses using hard drives that integrate a key-value interface and network access in the actual drive hardware (Kinetic storage platform) to supply file system functionality in a large scale environment. Taking advantage of higher-level functionality to handle metadata on the drives themselves, a serverless system architecture is proposed. Skipping path component traversal during the lookup operation is the key technique discussed in this paper to avoid performance degradation with highly decentralized metadata. Scalability implications are reviewed based on a fuse file system implementation. Peer Reviewed

Information storage and retrieval systemsComputer scienceDistributed computingInterface (computing)Key-value storages02 engineering and technologycomputer.software_genreObject storagesLookupsComputer clusterServerData_FILES0202 electrical engineering electronic engineering information engineering:Informàtica::Arquitectura de computadors [Àrees temàtiques de la UPC]Virtual storageFile systemMetadataFile organizationScalability020206 networking & telecommunications020207 software engineeringFile systemsObject storageMetadataKineticsInformació -- Sistemes d'emmagatzematge i recuperacióScalabilityGrid computingSystems architecturecomputerCluster computing
researchProduct

GekkoFS — A Temporary Burst Buffer File System for HPC Applications

2020

Many scientific fields increasingly use high-performance computing (HPC) to process and analyze massive amounts of experimental data while storage systems in today’s HPC environments have to cope with new access patterns. These patterns include many metadata operations, small I/O requests, or randomized file I/O, while general-purpose parallel file systems have been optimized for sequential shared access to large files. Burst buffer file systems create a separate file system that applications can use to store temporary data. They aggregate node-local storage available within the compute nodes or use dedicated SSD clusters and offer a peak bandwidth higher than that of the backend parallel f…

Information storage and retrieval systemsPOSIXFile systemBurst buffersComputer scienceProcess (computing)computer.software_genreDistributed file systemsComputer Science ApplicationsTheoretical Computer ScienceMetadataInformació -- Sistemes d'emmagatzematge i recuperacióComputational Theory and MathematicsHardware and ArchitecturePOSIXHPC:Informàtica::Sistemes d'informació::Emmagatzematge i recuperació de la informació [Àrees temàtiques de la UPC]ScalabilityOperating systemBandwidth (computing)High performance computingIsolation (database systems)Càlcul intensiu (Informàtica)computerSoftwareJournal of Computer Science and Technology
researchProduct

Spectral evolution simulation on leading multi-socket, multicore platforms

2011

Spectral evolution simulations based on the observed Very Long Baseline Interferometry (VLBI) radio-maps are of paramount importance to understand the nature of extragalactic objects in astrophysics. This work analyzes the performance and scaling of a spectral evolution algorithm on three leading multi-socket, multi-core architectures. We evaluate three parallel models with different levels of data-sharing: a sharing approach, a privatizing approach and a hybrid approach. Our experiments show that the data-privatizing model is reasonably efficient on medium scale multi-socket, multi-core systems (up to 48 cores) while regardless algorithmic and scheduling optimizations, sharing approach is …

Instruction setMulti-core processorSpectral evolutionComputer scienceDistributed computingScalabilityVery-long-baseline interferometryScalingScheduling (computing)2011 18th International Conference on High Performance Computing
researchProduct

2020

The growth of cloud-based services is mainly supported by the core networking infrastructures of large-scale data centers, while the scalability of these services is influenced by the performance and dependability characteristics of data centers. Hence, the data center network must be agile and reconfigurable in order to respond quickly to the ever-changing application demands and service requirements. The network must also be able to interconnect the big number of nodes, and provide an efficient and fault-tolerant routing service to upper-layer applications. In response to these challenges, the research community began exploring novel interconnect topologies, namely: Flecube, DCell, Ficonn…

InterconnectionComputer Networks and CommunicationsNetwork packetbusiness.industryComputer scienceQuality of service020206 networking & telecommunicationsCloud computing02 engineering and technologyTopologyNetwork topologyAverage path lengthBottleneckComputer Science ApplicationsScalabilityNode (computer science)0202 electrical engineering electronic engineering information engineeringDependabilityData centerElectrical and Electronic EngineeringbusinessSoftwareIEEE/ACM Transactions on Networking
researchProduct

Exploratory approach for network behavior clustering in LoRaWAN

2021

AbstractThe interest in the Internet of Things (IoT) is increasing both as for research and market perspectives. Worldwide, we are witnessing the deployment of several IoT networks for different applications, spanning from home automation to smart cities. The majority of these IoT deployments were quickly set up with the aim of providing connectivity without deeply engineering the infrastructure to optimize the network efficiency and scalability. The interest is now moving towards the analysis of the behavior of such systems in order to characterize and improve their functionality. In these IoT systems, many data related to device and human interactions are stored in databases, as well as I…

IoTGeneral Computer ScienceComputer sciencek-meansReliability (computer networking)02 engineering and technologyLoRaMachine LearningHome automation0202 electrical engineering electronic engineering information engineeringCluster AnalysisWirelessCluster analysisIoT LoRa LoRaWAN Machine Learning k-means Anomaly Detection Cluster AnalysisNetwork packetbusiness.industry020206 networking & telecommunicationsIoT; LoRa; LoRaWAN; Machine Learning; k-means; Anomaly Detection; Cluster AnalysisLoRaWANWireless network interface controllerScalabilityAnomaly Detection020201 artificial intelligence & image processingAnomaly detectionbusinessComputer networkJournal of Ambient Intelligence and Humanized Computing
researchProduct

A FAST Method to Achieve Flexible Production Programming Systems

2008

One of the main critical problems in manufacturing system domains is the production scheduling process, because an agile and reactive production planning and scheduling system is essential in manufacturing. The production scheduling process is a complex problem in which finding a suitable production scheduling can greatly increase the effectiveness of highly flexible production processes. Nevertheless, this high flexibility makes the production scheduling and acquisition of relevant data quite complicated. Therefore, there is a strong demand for a universal and flexible tool for production scheduling capable of increasing the utilization of resources and that supports a decision-making proc…

Job shop schedulingComputer scienceDistributed computingReal-time computingFlexible manufacturing systemScheduling (production processes)Dynamic priority schedulingFair-share schedulingComputer Science ApplicationsScheduling (computing)Human-Computer InteractionProduction planningControl and Systems EngineeringGenetic algorithm schedulingTwo-level schedulingScalabilityResource managementElectrical and Electronic EngineeringSoftwareInformation SystemsIEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)
researchProduct

An Efficient, Robust, and Scalable Trust Management Scheme for Unattended Wireless Sensor Networks

2012

Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between visits by the sink. The absence of an online trusted third party, i.e., an on-site sink, makes existing trust management schemes used in legacy wireless sensor networks not applicable to UWSNs directly. In this paper, we propose a trust management scheme for UWSNs to provide efficient, robust and scalable trust data storage. For trust data storage, we employ geographic hash table to efficiently identify data storage nodes and to significantly reduce storage cost. We demonstrate, through detailed analyses and extensive simulations, that the proposed…

Key distribution in wireless sensor networksComputer sciencebusiness.industryRobustness (computer science)Wireless ad hoc networkDistributed computingComputer data storageScalabilityTrusted ComputingTrusted third partybusinessWireless sensor networkComputer network2012 IEEE 13th International Conference on Mobile Data Management
researchProduct

Making the most of information technology & systems usage: A literature review, framework and future research agenda

2015

Literature review on information technology & systems (IT/S) from January 2000 to December 2014.Total 152 relevant articles were found and classified into four main domains.Literature on IT/S continuous usage lacks a clear roadmap and agenda.Most research conducted in East Asia and North America.Technology acceptance model (TAM) the most used theory. This detailed literature review has considered a relatively large quantity (152 total) of scholarly empirical publications, conference proceedings, books and popular market reports published over the last 15years, i.e., from January 2000 to December 2014, in the field of human continuous usage behavior and in the context of information technolo…

Literature reviewInformation technology/systemsFlexibility (engineering)Knowledge managementHuman–computer interactionComputer sciencebusiness.industryInformation technologyContext (language use)Business modelTechnology acceptance modelHuman-Computer InteractionArts and Humanities (miscellaneous)ScalabilityInformation systemRelevance (information retrieval)Technology acceptance modelHuman behavioral intention to usebusinessGeneral PsychologyComputers in Human Behavior
researchProduct

Performance and Implementation Modeling of Gated Linear Networks on FPGA for Lossless Image Compression

2020

Over recent years, imaging systems have seen explosive increase in resolution. These trends present a challenge for resource-constrained embedded imaging devices. Efficient image compression is essential to reduce bandwidth consumption and to increase the capability of on-board storage. Especially, for imaging systems where information loss is not allowed, for example, in medical, military and remote sensing imaging systems. This paper explores the use of Gated Linear Networks (GLNs) for development of embedded lossless compression systems. GLNs have proved themselves via PAQ archiver series, that have been ranked among the top across several lossless compression benchmarks. We propose an a…

Lossless compressionbusiness.industryComputer scienceEmphasis (telecommunications)02 engineering and technologyInformation loss020202 computer hardware & architecture020204 information systemsScalability0202 electrical engineering electronic engineering information engineeringBandwidth (computing)businessField-programmable gate arrayThroughput (business)Computer hardwareImage compression2020 9th Mediterranean Conference on Embedded Computing (MECO)
researchProduct

Consumers in Information Technology Enabled Service Encounters: Perceptions and Tradeoffs in Multi-Channel Interactions

2015

This study examines information technology enabled, multi-channel service context from the end-user's perspective and, more specifically, from the perspective of a consumer, in particular the extent to which the multi-channel interaction experience results in consumer satisfaction and any tradeoffs that consumers make in the evaluation of the context of service. Empirical results from our online survey with mobile consumers indicate that the variables included in the model have a direct impact on consumer satisfaction when considered individually. There are, however, tradeoffs between variables (e.g., problem-handling and record accuracy; scalability and usability of service) when considere…

MarketingService (business)ta113Knowledge managementComputer Networks and Communicationsbusiness.industryEnd userComputer scienceService delivery frameworkStrategy and Managementmulti-channel interactionconsumer satisfactionInformation technologyUsabilityContext (language use)Computer Science ApplicationsManagement Information Systemsservice encountersScalabilityService guaranteebusinessInternational Journal of E-Services and Mobile Applications (IJESMA)
researchProduct