Search results for "distributed"

showing 10 items of 1260 documents

Exploring NoC Virtualization Alternatives in CMPs

2012

Chip Multiprocessor systems (CMPs) contain more and more cores in every new generation. However, applications for these systems do not scale at the same pace. Thus, in order to obtain a good utilization several applications will need to coexist in the system and in those cases virtualization of the CMP system will become mandatory. In this paper we analyze two virtualization strategies at NoC-level aiming to isolate the traffic generated by each application to reduce or even eliminate interferences among messages belonging to different applications. The first model handles most interferences among messages with a virtual-channels (VCs) implementation minimizing both execution time and netwo…

Computer sciencebusiness.industryDistributed computingMultiprocessingVirtualizationcomputer.software_genreChipNetwork on a chipResource (project management)ServerEmbedded systemOverhead (computing)businessSpace partitioningcomputer2012 20th Euromicro International Conference on Parallel, Distributed and Network-based Processing
researchProduct

DSMAV: An improved solution for multi-attribute search based on load capacities

2016

DHT (Distributed Hash Table) such as CHORD or PARTRY facilitates information searching in scalable systems. Two popular DHT-based approaches for range or multi-attribute search are to rely on attribute-value tree and a combination of attributes and values. However, tradeoff between a load balancing mechanism and query efficiency is a challenging task for such information searching systems. In this paper, we propose improved algorithms for a system called DSMAV in which information resources are distributed fairly among nodes and found based on multi-attribute queries in a small number of hop counts. Our system creates identifiers from resource names, each of which is a combination of attrib…

Computer sciencebusiness.industryDistributed computingScalability0202 electrical engineering electronic engineering information engineering020206 networking & telecommunications020201 artificial intelligence & image processing02 engineering and technologyLoad balancing (computing)Chord (peer-to-peer)businessComputer networkDistributed hash table2016 IEEE Sixth International Conference on Communications and Electronics (ICCE)
researchProduct

Energy market segmentation for distributed energy resources implementation purposes

2007

The new power market scene has made its actors aware of the importance of offering customers a set of products according to their specific needs. At the same time, a desirable massive deployment of distributed energy resources would require that the products be designed for specific purposes for each type of customer. For these reasons, it is essential to identify the energy behaviour of different customer segments existing in the electricity market. This paper presents a segmentation methodology that allows the identification of different types of customers in accordance with their energy use. This segmentation is conceptually different from the one that is currently performed by the utili…

Computer sciencebusiness.industryEnergy Engineering and Power TechnologySet (abstract data type)Identification (information)Risk analysis (engineering)Control and Systems EngineeringSoftware deploymentDistributed generationElectricity marketSegmentationEnergy marketElectrical and Electronic EngineeringbusinessEnergy (signal processing)IET Generation, Transmission & Distribution
researchProduct

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs

2010

Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…

Computer sciencebusiness.industryForward secrecyReliability (computer networking)Node (networking)SecrecyDistributed data storeProbabilistic logicData securitybusinessWireless sensor networkComputer network2010 IEEE Global Telecommunications Conference GLOBECOM 2010
researchProduct

Enhanced islanding detection in smart interface protection systems of distributed generation

2021

The widespread presence of distributed generators (DGs) and storage systems (DSSs) in electricity grids has increased the risk of islanding occurrence. This phenomenon must be suitably managed by Distribution System Operators (DSO), in order to avoid adverse situations, in terms of grid-protection problems, equipment damage, safety hazards, power quality problems and so on. Currently anti-islanding protection functions are handled by interface protection systems (IPSs), which are built in accordance with relevant standards for DGs and DSSs connection to power systems. However, some problems may occur in case of operation within the so-called non detection zone (NDZ). This paper presents an …

Computer sciencebusiness.industryInterface (computing)distributed generation distribution network Interface protection systems islanding detection power system communications power system measurement smart gridsDirect-sequence spread spectrumProtection systemReliability engineeringSpread spectrumElectric power systemDistributed generationIslandingElectricitybusinessSettore ING-INF/07 - Misure Elettriche E Elettroniche2021 3rd Global Power, Energy and Communication Conference (GPECOM)
researchProduct

UbiRoad: Semantic Middleware for Context-Aware Smart Road Environments

2010

A smart road environment is such a traffic environment that is equipped with all necessary facilities to enable seamless mobile service provisioning to the users. However, advanced sensors and network architectures deployed within the traffic environment are insufficient to make mobile service provisioning autonomous and proactive, thus minimizing drivers’ distraction during their presence in the environment. For that, an Intelligent Transportation System, which is operating on top of numerous sensor and access networks and governing the process of mobile services provisioning to the users in self-managed and proactive way, must be deployed. Specifically, such system should provide solution…

Computer sciencebusiness.industryInteroperabilityProvisioningComputer securitycomputer.software_genreAdvanced Traffic Management SystemInteroperationIntelligent NetworkMiddleware (distributed applications)Semantic technologybusinesscomputerMobile serviceComputer network2010 Fifth International Conference on Internet and Web Applications and Services
researchProduct

Multilevel system optimisation via nonlinearity management

2006

Nonlinearity management is explored as a multilevel tool to obtain maximum transmission reach in a WDM system. A technique for the fast calculation of the optimal dispersion pre-compensation in systems with distributed amplification is proposed.

Computer sciencebusiness.industryNoise (signal processing)Distributed amplifierNonlinear optics02 engineering and technology01 natural sciences010309 opticsNonlinear system020210 optoelectronics & photonicsOpticsSignal-to-noise ratioTransmission (telecommunications)Wavelength-division multiplexing0103 physical sciencesDispersion (optics)0202 electrical engineering electronic engineering information engineeringElectronic engineeringbusinessComputingMilieux_MISCELLANEOUS
researchProduct

P2PStudio - Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research

2006

Peer-to-Peer Studio has been developed as a monitoring, controlling and visualization tool for peer-to-peer networks. It uses a centralized architecture to gather events from a peer-to-peer network and can be used to visualize network topology and to send different commands to individual peer-to-peer nodes. The tool has been used with Chedar Peer-to-Peer network to study the behavior of different peer-to-peer resource discovery and topology management algorithms and for visualizing the results of NeuroSearch resource discovery algorithm produced by the Peer-to-Peer Realm network simulator. This paper presents the features, the architecture and the protocols of Peer-to-Peer Studio and the ex…

Computer sciencebusiness.industryP2PStudioDistributed computingPeer-to-peerNetwork topologycomputer.software_genreNetwork simulationVisualizationResource (project management)vertaisverkkoArchitecturebusinesscomputervalvontatyökaluStudioNetwork management stationComputer network
researchProduct

Evaluation of SLA-based decision strategies for VM scheduling in cloud data centers

2016

Service level agreements (SLAs) gain more and more importance in the area of cloud computing. An SLA is a contract between a customer and a cloud service provider (CSP) in which the CSP guarantees functional and non-functional quality of service parameters for cloud services. Since CSPs have to pay for the hardware used as well as penalties for violating SLAs, they are eager to fulfill these agreements while at the same time optimizing the utilization of their resources.In this paper we examine SLA-aware VM scheduling strategies for cloud data centers. The service level objectives considered are resource usage and availability. The sample resources are CPU and RAM. They can be overprovision…

Computer sciencebusiness.industryQuality of serviceDistributed computingService level objective020207 software engineeringCloud computingWorkload02 engineering and technologyScheduling (computing)Service-level agreementService level0202 electrical engineering electronic engineering information engineeringLeverage (statistics)020201 artificial intelligence & image processingbusinessProceedings of the 3rd Workshop on CrossCloud Infrastructures & Platforms - CrossCloud '16
researchProduct

A new autonomous data transmission reduction method for wireless sensors networks

2018

International audience; The inherent limitation in energy resources and computational power for sensor nodes in a Wireless Sensor Network, poses the challenge of extending the lifetime of these networks. Since radio communication is the dominant energy consuming activity, most presented approaches focused on reducing the number of data transmitted to the central workstation. This can be achieved by deploying both on the workstation and the sensor node a synchronized prediction model capable of forecasting future values. Thus, enabling the sensor node to transmit only the values that surpasses a predefined error threshold. This mechanism offers a decrease in the cost of transmission energy f…

Computer sciencebusiness.industryReal-time computing020206 networking & telecommunications[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]02 engineering and technology[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation7. Clean energy[INFO.INFO-IU]Computer Science [cs]/Ubiquitous ComputingReduction (complexity)[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]Transmission (telecommunications)[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]020204 information systemsSensor node0202 electrical engineering electronic engineering information engineeringWireless[INFO.INFO-ET]Computer Science [cs]/Emerging Technologies [cs.ET][INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC]businessWireless sensor networkEnergy (signal processing)Data transmissionData reduction2018 IEEE Middle East and North Africa Communications Conference (MENACOMM)
researchProduct