The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed Denial of Service (DDoS) attacks serve to diminish the ability of the network to perform its intended function over time. The paper presents the design, implementation and analysis of a protocol based upon a technique for address agility called DDoS Resistant Multicast (DRM). After describing the our architecture and implementation we show an analysis that quantifies the overhead on network...
In this work, we implement and demonstrate differential amplify-and-forward (DAF) cooperative relaying as a novel diversity technique to combat bit errors and outages common in airborne environments. By using differential modulation and demodulation, we reduce the system complexity by avoiding channel estimation which is often unreliable or computationally costly in dynamic environments with mobile...
Porting sequential applications to heterogeneous HPC systems requires extensive software and hardware expertise to estimate the potential speedup and to efficiently use the available compute resources in such systems. To streamline this daunting process, researchers have proposed several “black-box” performance prediction approaches that rely on the performance of a training set of parallel applications...
The perfect relationship between deployment costs and systems availability is one of the primary goals of companies that wish to provide some computer environment or service through the Internet. The question that everyone wants to know the answer is: How much may I save and still improve the availability of my system avoiding financial losses with an SLA contract breach? This paper attempts to respond...
In this paper authors present the results of the effectiveness comparison between the variants of the Radix-2 Deci-mation in Time (DIT) Fast Fourier Transform (FFT) algorithm's implementations on graphics processing units (GPUs) which differ in the way the calculations are distributed among GPUs computational resources. The conducted experiments show that the partitioning of the FFT computational...
Centralized e-Learning technology has dominated the learning ecosystem that brings a lot of potential usage on media rich learning materials. However, the centralized architecture has their own constraint to support large number of users for accessing large size of learning contents. On the other hand, Content Delivery Network (CDN) solution which relies on distributed architecture provides an alternative...
Multi-user applications can be complex to develop due to their large or intricate nature. Many of the issues encountered are related to performance and security. These issues are exacerbated when the scale of the application increases. This paper introduces a novel distributed architecture called OpenGL|D (OpenGL Distributed). This technology enables an application to pass through the graphical calls...
Virtual Environments have become a compelling tool for various applications beyond gaming and Virtual Worlds, for example for education, collaborative engineering, or simulation and visualization. In the emerging field of smart environments, like Smart Cities and Smart Factories for industry or agriculture, a digital counterpart of a real world site, driven by hundreds of Internet of Things (IoT)...
A central processing unit (CPU) and peripheral devices are discussed for which all data processing and data transfer is uniquely time tagged using a timestamp generated by the embedded processing system master clock. The Time Aware Processor (TAP) introduces time into the processor computing language to relate data to temporal events, including the processors own internal functions.
With its ability to detect, identify and, if applicable, recover from occurred faults, online-diagnosis can help achieving fault-tolerant systems. A sound decision on an occurred fault is the foundation for fault-specific recovery actions. For this, typically a large amount of data has to be analyzed and evaluated. A diagnostic process implemented on a distributed system needs to communicate all those...
Artificial Endocrine Systems is the study of nature's highly evolved and advanced resource management system that sustains life. The basic units of the endocrine system are the chemical messengers, otherwise known as hormones, which in enough numbers produce cascading effects in the host organism that promotes growth, maintains metabolism and much more. This behaviour is in effect a living metaphor...
This paper deals with the problem of properly simulating the Internet of Things (loT). Simulating an loT allows evaluating strategies that can be employed to deploy smart services over different kinds of territories. However, the heterogeneity of scenarios seriously complicates this task. This imposes the use of sophisticated modeling and simulation techniques. We discuss novel approaches for the...
With the rapid development of the UHV power grid, the data interaction between the dispatching agencies has increased significantly, and the inter-agency integration features have become increasingly obvious. However, at present, the service bus in the dispatching control system is mainly for a single scheduling mechanism, only to achieve wide area sharing of specific application services and not...
In this paper, we present an optimized framework that can efficiently perform massive spatial queries on the current GPUs. To benefit the widely adopted filter-and-verify paradigm from GPUs, the skewed workloads are first associated with certain cells in a scaled spatial grid, such that the following range verification cost against the massive spatial objects can be significantly reduced. Particularly...
Quantum key distribution (QKD) is a novel technology that can be seen as a synchronized source of symmetric keys in two separated domains that is immune to any algorithmic cryptanalysis. This technology makes impossible to copy the quantum states exchanged between two endpoints. Therefore, if implemented properly, QKD generates keys of the highest security based on the fundamental laws of quantum...
In recent past, the exponential growth in data rate demands have led to network operators constantly upgrading their network infrastructure in order to keep up with the demand. While the trends for data rate requirements are expected to continue in the future, mobile networks as part of evolution towards fifth generation (5G) are also expected to support new services, use cases and industry verticals,...
The CloudBus protocol is one of the methods which is used for data exchange and concurrent process synchronization in the distributed embedded systems. It realizes decentralized (distributed) control method, where each node is equal to each other. This communication model allows the significant savings in the amount of transmitted data between end modules. However, there are many distributed embedded...
A huge upheaval emerges from the transition to autonomous vehicles in the domain of road vehicles, ongoing with a change in the vehicle architecture. Many sensors and Electronic Control Units are added to the current vehicle architecture and further safety requirements like reliability become even more necessary. In this paper we present a potential evolution of the Electrical/Electronic-Architecture,...
New waveforms are considered by the fifth generation (5G) of cellular networks to exploit the underutilized fragmented spectrum. FBMC is one possibility as it provides better adjacent channel leakage. This paper brings a first estimate of silicon area for FBMC in comparison to OFDM assuming a CMOS 65nm technology. The paper concludes that the silicon area overhead introduced by much more complex waveforms...
Multi-resource arbitration is used where interchangeable resources need to be assigned among a number of client users. An efficient arbiter is thus critical to manage these shared resources. There has been only limited prior research on efficient asynchronous solutions, which have mainly focused on serial approaches. In this paper, a new high-throughput multi-resource arbiter is proposed, based on...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.