The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Scientific HPC applications along with the emerging class of Big Data and Machine Learning workloads are rapidly driving the fabric scale both on premises and in the cloud. Achieving high aggregate fabric throughput is paramount to the overall performance of the application. However, achieving high fabric throughput at scale can be challenging - that is, the application communication pattern will...
Protecting control planes in networking hardware from high rate packets is a critical issue for networks under operation. One common approach for conventional networking hardware is to offload expensive functions onto hard-wired offload engines as ASICs. OpenFlow networks are expected to provide greater network control flexibility by an open interface to the packet-forwarding plane and by centralized...
Code identity is a fundamental concept for authenticated operations in Trusted Computing. In today's approach, the overhead of assigning an identity to a protected service increases linearly with the service code size. In addition, service code size continues to grow to accommodate richer services. This trend negatively impacts either the security or the efficiency of current protocols for trusted...
Integration issues are still one of the main concerns regarding hospital information systems (HIS). Hospitals need integration engines capable of guaranteeing that messages are properly dealt with, use standards properly (eg. IHE), are secure, promote integration of legacy systems, enable auditing, monitor failures, evolve to include new standards, have balancing capabilities and are able to compensate...
Aiming at the deficiency in the field of marine engineers training at present, an entire virtual training system for marine engineers has been designed and developed, which is composed of the full mission marine engine room simulator module and three-dimensional virtual marine engine room module, respectively aiming at cultivating the operating ability for marine engine room system and marine engine...
The use of Network Function Virtualization to run network services in software enables Software Defined Networks to create a largely software-based network. We envision a dynamic and flexible network that can support a smarter data plane than just simple switches that forward packets. This network architecture needs to support complex stateful routing of flows where processing by network functions...
In Multi-Agent Systems, first-class interaction protocols are the ones which implementations are decoupled from the agents. This paper introduces and establishes the contribution of RPI.Idiom which is a high-level language for specifying such protocols. RPI.Idiom interaction protocols satisfy several properties. They are role-based which means that they are abstract in regard of the agents. They can...
Malware can spread uncontrollably if left unchecked and can cause significant damage to the Advanced Metering Infrastructure (AMI) and ultimately to the underlying power grid. Application layer protocols used in the AMI are capable of carrying large payloads which could be potentially used to hide malware. Fortunately, application layer traffic in the AMI is not expected to contain executable content...
The increasing demand for air transport, as being forecasted for the next decade, and the difficulties associated with the expansion of existing infrastructures, have fostered the interest towards market-based mechanisms aimed at a more efficient use of available resources. Such mechanisms nevertheless require stakeholders to disclose private information, which can be used to recover key elements...
The SmartNIC is a User-Programmable 10GE NIC designed around industry standards to meet the demands of high performance networking in HPC and datacenter communities. The SmartNIC enables application-specific offload engines to be developed. Application developers can implementation application-aware offload engines, network developers can test and develop network protocol offload engines, and researchers...
Modern car engine has a control unit that serves to control all aspects of the car known as the Engine Control Unit (ECU). The control unit was developed by the manufacturer to assist in optimizing engine performance, and has proven to be very useful Unfortunately, the existence of ECU means independent repair shops can't do engine repair and maintenance without help from manufacturer. This paper...
This paper covers the first steps in creating a Software Defined Open Architecture Modem (SDOAM). Potentially useful operating environments, platforms and approaches are reviewed as well as relevant work on underwater digital communications at CMRE, including JANUS. A high-level architectural structure, based on a generalisation of the classic OSI communications stack, is proposed, identifying the...
Traffics produced by P2P system such as BitTorrent, Skype, etc, has been the primary networking traffic. Peer-to-peer systems can be very large and highly dynamic. Therefore, testing a new algorithm for P2P computing in real Internet is impractical and expensive. Simulation is another feasible approach to test new algorithms or investigate P2P system behaviors. Many P2P-oriented simulators have been...
Symbolic Execution based defect discovery techniques for binary programs are now widely applied. However, because of the path explosion problem, it's still not applicable for security analysis on large programs. A great many infeasible paths in the target program also reduce the performance. To fast generate test cases reaching the potentially vulnerable program points, this paper introduces constraints...
This article gives a tutorial about some critical milestones regarding the journey of tactical radios from legacy systems to cognitive radios. Although tactical radios have been in use for over 100 years, this tutorial focuses on the post- Vietnam War radios and uses examples from the U.S. Department of Defense major acquisition programs. The article considers legacy radios to be the generation of...
High Performance Computing usually leverages messaging libraries such as MPI orGASNet in order to exchange data among processes in large-scale clusters. Furthermore, these libraries make use of specialized low-level networking layers in order to retrieve as much performance as possible from hardware interconnects such as Infini Band or Myrinet, for example. EXTOLL is another emerging technology targeted...
Cloud computing increases the level of connectivity between software applications. IT management applications delivered as a service may need to connect to tens of thousands of endpoint systems. In order to validate the application's reliability and performance at these very large scales, its scalability needs to be tested before being deployed in the cloud. We use an emulation approach, whereby endpoints...
This demonstration presents our NASS (Network Aware Supervisory System) framework prototype for medical device integration systems. The NASS framework interconnects medical devices over wireless for convenience, seamlessness and sanitation, and provides safety-guaranteed supervision. Our prototype was developed in Sun Java Real-time Environment. Real-time Java provides well-formed convenience of dynamically...
The status of vehicle fault diagnosis protocols applied in the market is analyzed, and also are the problems of the hand-held diagnosis instruments. Through the way of combination of PC-style diagnosis software and Vehicle Communication Interface (VCI), the popular type of vehicle fault diagnosis system based on both K-line and Controller Area Network (CAN) is developed. The diagnosis system is divided...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.