Search results for "distributed"
showing 10 items of 1260 documents
Exploring NoC Virtualization Alternatives in CMPs
2012
Chip Multiprocessor systems (CMPs) contain more and more cores in every new generation. However, applications for these systems do not scale at the same pace. Thus, in order to obtain a good utilization several applications will need to coexist in the system and in those cases virtualization of the CMP system will become mandatory. In this paper we analyze two virtualization strategies at NoC-level aiming to isolate the traffic generated by each application to reduce or even eliminate interferences among messages belonging to different applications. The first model handles most interferences among messages with a virtual-channels (VCs) implementation minimizing both execution time and netwo…
DSMAV: An improved solution for multi-attribute search based on load capacities
2016
DHT (Distributed Hash Table) such as CHORD or PARTRY facilitates information searching in scalable systems. Two popular DHT-based approaches for range or multi-attribute search are to rely on attribute-value tree and a combination of attributes and values. However, tradeoff between a load balancing mechanism and query efficiency is a challenging task for such information searching systems. In this paper, we propose improved algorithms for a system called DSMAV in which information resources are distributed fairly among nodes and found based on multi-attribute queries in a small number of hop counts. Our system creates identifiers from resource names, each of which is a combination of attrib…
Energy market segmentation for distributed energy resources implementation purposes
2007
The new power market scene has made its actors aware of the importance of offering customers a set of products according to their specific needs. At the same time, a desirable massive deployment of distributed energy resources would require that the products be designed for specific purposes for each type of customer. For these reasons, it is essential to identify the energy behaviour of different customer segments existing in the electricity market. This paper presents a segmentation methodology that allows the identification of different types of customers in accordance with their energy use. This segmentation is conceptually different from the one that is currently performed by the utili…
A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs
2010
Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accident…
Enhanced islanding detection in smart interface protection systems of distributed generation
2021
The widespread presence of distributed generators (DGs) and storage systems (DSSs) in electricity grids has increased the risk of islanding occurrence. This phenomenon must be suitably managed by Distribution System Operators (DSO), in order to avoid adverse situations, in terms of grid-protection problems, equipment damage, safety hazards, power quality problems and so on. Currently anti-islanding protection functions are handled by interface protection systems (IPSs), which are built in accordance with relevant standards for DGs and DSSs connection to power systems. However, some problems may occur in case of operation within the so-called non detection zone (NDZ). This paper presents an …
UbiRoad: Semantic Middleware for Context-Aware Smart Road Environments
2010
A smart road environment is such a traffic environment that is equipped with all necessary facilities to enable seamless mobile service provisioning to the users. However, advanced sensors and network architectures deployed within the traffic environment are insufficient to make mobile service provisioning autonomous and proactive, thus minimizing drivers’ distraction during their presence in the environment. For that, an Intelligent Transportation System, which is operating on top of numerous sensor and access networks and governing the process of mobile services provisioning to the users in self-managed and proactive way, must be deployed. Specifically, such system should provide solution…
Multilevel system optimisation via nonlinearity management
2006
Nonlinearity management is explored as a multilevel tool to obtain maximum transmission reach in a WDM system. A technique for the fast calculation of the optimal dispersion pre-compensation in systems with distributed amplification is proposed.
P2PStudio - Monitoring, Controlling and Visualization Tool for Peer-to-Peer Networks Research
2006
Peer-to-Peer Studio has been developed as a monitoring, controlling and visualization tool for peer-to-peer networks. It uses a centralized architecture to gather events from a peer-to-peer network and can be used to visualize network topology and to send different commands to individual peer-to-peer nodes. The tool has been used with Chedar Peer-to-Peer network to study the behavior of different peer-to-peer resource discovery and topology management algorithms and for visualizing the results of NeuroSearch resource discovery algorithm produced by the Peer-to-Peer Realm network simulator. This paper presents the features, the architecture and the protocols of Peer-to-Peer Studio and the ex…
Evaluation of SLA-based decision strategies for VM scheduling in cloud data centers
2016
Service level agreements (SLAs) gain more and more importance in the area of cloud computing. An SLA is a contract between a customer and a cloud service provider (CSP) in which the CSP guarantees functional and non-functional quality of service parameters for cloud services. Since CSPs have to pay for the hardware used as well as penalties for violating SLAs, they are eager to fulfill these agreements while at the same time optimizing the utilization of their resources.In this paper we examine SLA-aware VM scheduling strategies for cloud data centers. The service level objectives considered are resource usage and availability. The sample resources are CPU and RAM. They can be overprovision…
A new autonomous data transmission reduction method for wireless sensors networks
2018
International audience; The inherent limitation in energy resources and computational power for sensor nodes in a Wireless Sensor Network, poses the challenge of extending the lifetime of these networks. Since radio communication is the dominant energy consuming activity, most presented approaches focused on reducing the number of data transmitted to the central workstation. This can be achieved by deploying both on the workstation and the sensor node a synchronized prediction model capable of forecasting future values. Thus, enabling the sensor node to transmit only the values that surpasses a predefined error threshold. This mechanism offers a decrease in the cost of transmission energy f…