Search results for "Server"

showing 10 items of 586 documents

Capture Aware Sequential Waterfilling for LoraWAN Adaptive Data Rate

2020

LoRaWAN (Long Range Wide Area Network) is emerging as an attractive network infrastructure for ultra low power Internet of Things devices. Even if the technology itself is quite mature and specified, the currently deployed wireless resource allocation strategies are still coarse and based on rough heuristics. This paper proposes an innovative "sequential waterfilling" strategy for assigning Spreading Factors (SF) to End-Devices (ED). Our design relies on three complementary approaches: i) equalize the Time-on-Air of the packets transmitted by the system's EDs in each spreading factor's group; ii) balance the spreading factors across multiple access gateways, and iii) keep into account the c…

FOS: Computer and information sciencesComputer scienceDistributed computingInternet of ThingsWireless communicationresource allocationServers02 engineering and technologyNetwork topologyspreading factorsinter-SF interferenceComputer Science - Networking and Internet Architecturechannel captureBandwidthServerLPWAN0202 electrical engineering electronic engineering information engineeringWirelessComputer architectureElectrical and Electronic Engineeringinternet of t6hingsNetworking and Internet Architecture (cs.NI)Network packetbusiness.industryApplied MathematicsResource managementinternet of t6hings; LoRaWAN; spreading factors; resource allocation; adaptive data rate; channel capture; inter-SF interference020206 networking & telecommunicationsComputer Science ApplicationsLoRaWANadaptive data rateWide area networkScalabilityHeuristicsbusinessInterferenceUplinkCommunication channel
researchProduct

WarpCore: A Library for fast Hash Tables on GPUs

2020

Hash tables are ubiquitous. Properties such as an amortized constant time complexity for insertion and querying as well as a compact memory layout make them versatile associative data structures with manifold applications. The rapidly growing amount of data emerging in many fields motivated the need for accelerated hash tables designed for modern parallel architectures. In this work, we exploit the fast memory interface of modern GPUs together with a parallel hashing scheme tailored to improve global memory access patterns, to design WarpCore -- a versatile library of hash table data structures. Unique device-sided operations allow for building high performance data processing pipelines ent…

FOS: Computer and information sciencesScheme (programming language)Amortized analysisComputer scienceHash functionParallel computingData structureHash tableCUDAComputer Science - Distributed Parallel and Cluster ComputingServerDistributed Parallel and Cluster Computing (cs.DC)Throughput (business)computercomputer.programming_language2020 IEEE 27th International Conference on High Performance Computing, Data, and Analytics (HiPC)
researchProduct

Blockchain-Based Proof of Location

2016

Location-Based Services (LBSs) build upon geographic information to provide users with location-dependent functionalities. In such a context, it is particularly important that geographic locations claimed by users are trustworthy. Centralized verification approaches proposed in the last few years are not satisfactory, as they entail a high risk to the privacy of users. In this paper, we present and evaluate a novel decentralized, infrastructure-independent proof-of-location scheme based on blockchain technology. Our scheme guarantees both location trustworthiness and user privacy preservation.

FOS: Computer and information sciencesScheme (programming language)Computer Science - Cryptography and SecurityBlockchainbusiness.industryComputer science020206 networking & telecommunicationsCryptographyContext (language use)02 engineering and technologyComputer securitycomputer.software_genreUser privacyTrustworthinessComputer Science - Distributed Parallel and Cluster Computing020204 information systemsServerC.2.40202 electrical engineering electronic engineering information engineeringPeer to peer computingDistributed Parallel and Cluster Computing (cs.DC)businessCryptography and Security (cs.CR)computercomputer.programming_language2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
researchProduct

Toward Optimal LSTM Neural Networks for Detecting Algorithmically Generated Domain Names

2021

Malware detection is a problem that has become particularly challenging over the last decade. A common strategy for detecting malware is to scan network traffic for malicious connections between infected devices and their command and control (C&C) servers. However, malware developers are aware of this detection method and begin to incorporate new strategies to go unnoticed. In particular, they generate domain names instead of using static Internet Protocol addresses or regular domain names pointing to their C&C servers. By using a domain generation algorithm, the effectiveness of the blacklisting of domains is reduced, as the large number of domain names that must be blocked g…

Feature engineeringGeneral Computer ScienceArtificial neural networkComputer sciencebusiness.industrymalwareDeep learningGeneral EngineeringDeep learningdomain generation algorithmscomputer.software_genreBlacklistDomain (software engineering)TK1-9971ServerMalwareGeneral Materials ScienceNetwork performanceArtificial intelligenceData miningElectrical engineering. Electronics. Nuclear engineeringbusinessLSTMcomputerIEEE Access
researchProduct

GekkoFS - A Temporary Distributed File System for HPC Applications

2018

We present GekkoFS, a temporary, highly-scalable burst buffer file system which has been specifically optimized for new access patterns of data-intensive High-Performance Computing (HPC) applications. The file system provides relaxed POSIX semantics, only offering features which are actually required by most (not all) applications. It is able to provide scalable I/O performance and reaches millions of metadata operations already for a small number of nodes, significantly outperforming the capabilities of general-purpose parallel file systems. The work has been funded by the German Research Foundation (DFG) through the ADA-FS project as part of the Priority Programme 1648. It is also support…

File system020203 distributed computingBurst buffersParallel processing (Electronic computers)Computer scienceProcessament en paral·lel (Ordinadors)020207 software engineering02 engineering and technologyBuffer storage (Computer science)computer.software_genreData structureDistributed file systemsMetadataParallel processing (DSP implementation)POSIXServerScalabilityHPC0202 electrical engineering electronic engineering information engineeringOperating systemHigh performance computingDistributed File System:Informàtica::Arquitectura de computadors::Arquitectures paral·leles [Àrees temàtiques de la UPC]computerCàlcul intensiu (Informàtica)2018 IEEE International Conference on Cluster Computing (CLUSTER)
researchProduct

Sorted deduplication: How to process thousands of backup streams

2016

The requirements of deduplication systems have changed in the last years. Early deduplication systems had to process dozens to hundreds of backup streams at the same time while today they are able to process hundreds to thousands of them. Traditional approaches rely on stream-locality, which supports parallelism, but which easily leads to many non-contiguous disk accesses, as each stream competes with all other streams for the available resources. This paper presents a new exact deduplication approach designed for processing thousands of backup streams at the same time on the same fingerprint index. The underlying approach destroys the traditionally exploited temporal chunk locality and cre…

File system020203 distributed computingComputer scienceData domainFingerprint (computing)Search engine indexingSorting020206 networking & telecommunications02 engineering and technologyParallel computingcomputer.software_genreBackupServerData_FILES0202 electrical engineering electronic engineering information engineeringData deduplicationcomputer2016 32nd Symposium on Mass Storage Systems and Technologies (MSST)
researchProduct

A configurable rule based classful token bucket filter network request scheduler for the lustre file system

2017

HPC file systems today work in a best-effort manner where individual applications can flood the file system with requests, effectively leading to a denial of service for all other tasks. This paper presents a classful Token Bucket Filter (TBF) policy for the Lustre file system. The TBF enforces Remote Procedure Call (RPC) rate limitations based on (potentially complex) Quality of Service (QoS) rules. The QoS rules are enforced in Lustre's Object Storage Servers, where each request is assigned to an automatically created QoS class.The proposed QoS implementation for Lustre enables various features for each class including the support for high-priority and real-time requests even under heavy …

File systemComputer scienceQuality of service020206 networking & telecommunications020207 software engineeringDenial-of-service attackRule-based system02 engineering and technologycomputer.software_genreObject storageRemote procedure callServer0202 electrical engineering electronic engineering information engineeringOperating systemLustre (file system)computerProceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis
researchProduct

ESB: Ext2 Split Block Device

2012

Solid State Disks (SSDs) start to replace rotating media (hard disks, HDD) in many areas, but are still not as cost efficient concerning capacity to completely replace them. One approach to use their superior performance properties is to use them as a cache for magnetic disks to speed up overall storage operations. In this paper, we present and evaluate a file system level optimization based on ext2. We split metadata and data and store the metadata on a SDD while the data remains on a common HDD. We evaluate our system with filebench under a file server, web server, and web proxy scenario and compare the results with flashcache. We find that many of the scenarios do not contain enough meta…

File systemWeb serverHardware_MEMORYSTRUCTURESComputer scienceComputer fileDevice filecomputer.software_genreMetadataFile serverData_FILESOperating systemFlashcacheCachecomputer2012 IEEE 18th International Conference on Parallel and Distributed Systems
researchProduct

Firewall as a service in SDN OpenFlow network

2015

Protecting publicly available servers in internet today is a serious challenge, especially when encountering Distributed denial-of-service (DDoS) attacks. In traditional internet, there is narrow scope of choices one can take when ingress traffic overloads physical connection limits. This paper proposes Firewall as a service in internet service providers (ISP) networks allowing end users to request and install match-action rules in ISPs edge routers. In proposed scenario, ISP runs Software Defined Networking environment where control plane is separated from data plane utilizing OpenFlow protocol and ONOS controller. For interaction between end-users and SDN Controller author defines an Appl…

Firewall (construction)OpenFlowNetwork packetbusiness.industryComputer scienceServerComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSForwarding planeThe InternetDenial-of-service attackSoftware-defined networkingbusinessComputer network2015 IEEE 3rd Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

SMS disaster alert system programming

2008

Floods are natural phenomena that profoundly affect the development of human society, as they are the most widespread disasters in the world and they cause the greatest property and human loss. The flood warning system presented in this paper provides a reliable and effective solution, which is complementary to existing traditional warning systems; it employs information and communication technology and specialized devices.

Flood warningWarning systemInformation and Communications TechnologyComputer scienceElectronic messagingServerComputer securitycomputer.software_genrecomputerHuman societyAlert systemEffective solution2008 2nd IEEE International Conference on Digital Ecosystems and Technologies
researchProduct