Filters








43,127 Hits in 4.1 sec

Edge Computing for Legacy Applications

Mahadev Satyanarayanan, Thomas Eiszler, Jan Harkes, Haithem Turki, Ziqiang Feng
2020 IEEE pervasive computing  
Edge computing was motivated by the vision of new edge-native applications that are compute-intensive, bandwidth-hungry, and latency-sensitive.  ...  We present a new capability for legacy applications called edge-based virtual desktop infrastructure (EdgeVDI), and discuss example use cases that it enables.  ...  ACKNOWLEDGMENTS The authors would like to thank the reviewers for their feedback, which helped to improve this article. This work was supported in part by the Defense Advanced Research Projects Agency  ... 
doi:10.1109/mprv.2020.3026229 fatcat:cmjdubpmkfb6rg4guty6ujkcem

Pervasive Computing at the Edge

Paramvir Victor Bahl, Ramon Caceres, Nigel Davies, Roy Want
2020 IEEE pervasive computing  
Our second article "Edge Computing for Legacy Applications" introduces a new use case for edge computing, namely supporting legacy  ...  The authors introduce OpenRTiST, an open-source application that is highly demanding in terms of computation, bandwidth, and latency requirements and thus is able to provide an ideal test for edge computing  ...  Our second article "Edge Computing for Legacy Applications" introduces a new use case for edge computing, namely supporting legacy Digital Object Identifier 10.1109/MPRV.2020.3032205 Date of current version  ... 
doi:10.1109/mprv.2020.3032205 fatcat:zn6735a6wjaztme4bazi2itx6u

Coordinating Distributed Resources for Complex Scientific Computation [chapter]

Huashan Yu, Zhuoqun Xu, Wenkui Ding
2004 Lecture Notes in Computer Science  
To address this challenge, this paper proposes a component-based architecture for managing and accessing legacy applications on the computational grid.  ...  They are distributed, heterogeneous and often too restricted in computability for oneself to satisfy the requirement of modern scientific problems.  ...  A grid application is a set services connected with each other by directed edges, and AOD provides the mechanisms for executing it on the computational grid.  ... 
doi:10.1007/978-3-540-30141-7_19 fatcat:5w4jmdkupbdmzhnj4rbyemtj6q

EdgeChain: An Edge-IoT Framework and Prototype Based on Blockchain and Smart Contracts [article]

Jianli Pan, Jianyu Wang, Austin Hester, Ismail Alqerm, Yuanni Liu, Ying Zhao
2018 arXiv   pre-print
The emerging blockchain and smart contracts technologies bring a series of new security features for IoT and edge computing.  ...  Edge computing provides a promising direction addressing the deficiency of centralized cloud computing in scaling massive number of devices.  ...  For non-legacy devices, they may send service requests for additional resources for resource-intensive applications such as Virtual Reality (VR) gaming.  ... 
arXiv:1806.06185v1 fatcat:n3sm62cc45f7po66656ktxbcwu

GenWrapper: A generic wrapper for running legacy applications on desktop grids

Attila Csaba Marosi, Zoltan Balaton, Peter Kacsuk
2009 2009 IEEE International Symposium on Parallel & Distributed Processing  
However, there are many legacy applications, that have either no source code available or would require too much effort to port. For these applications BOINC provides a wrapper.  ...  GenWrapper aims to provide a generic solution for wrapping and executing an arbitrary set of legacy applications by utilizing a POSIX like shell scripting environment to describe how the application is  ...  Acknowledgements The results presented in this paper are realized with the support of the Enabling Desktop Grids for e-Science (EDGeS) project, (co-founded by the European Commission under contract number  ... 
doi:10.1109/ipdps.2009.5161136 dblp:conf/ipps/MarosiBK09 fatcat:ql76w6p6wfd5fnpfwpn4uvkqli

The Incremental Deployability of Core–Stateless Fair Queuing [chapter]

Yannick Blanpain, Hung-Yun Hsieh, Raghupathy Sivakumar
2001 Lecture Notes in Computer Science  
We use the ns2 network simulator for the simulations. We conclude that CSFQ does not exhibit good incremental deployability.  ...  Acknowledgments We thank the Yamacraw organization (http://www.yamacraw.org) for their generous support and funding part of this work.  ...  Impact of Legacy Edge Routers While core routers are responsible for fair allocation, edge routers in core-stateless approaches are responsible for conveying to the core routers, the dynamic state used  ... 
doi:10.1007/3-540-47734-9_26 fatcat:caj7ktdrobdvndh5unamjvtuq4

Industrial Edge Computing: Architecture, Challenges, Applications

Ashwin Varghese Anthony, Soumya Koshy, Praveen P, Stephy Kuriakose, Sreenath K
2022 International Journal of Engineering Technology and Management Sciences  
Industrial edge computing, which includes industrial applications, describes the method of controlling data-handling operations using distinct data sources, such as smart edge devices.  ...  Edge computing nodes serve as intelligent gateways for assets, services, and systems, bridging the gap between the real and digital worlds.  ...  Time series databases become popular for industrial edge computing for rapid insertion and query without updating legacy data records.  ... 
doi:10.46647/ijetms.2022.v06i05.053 fatcat:3ns3ojnqyfd7hmzbsvpxqgntme

Extracting Reusable Object-Oriented Legacy Code Segments with Combined Formal Concept Analysis and Slicing Techniques for Service Integration

Zhuopeng Zhang, Hongji Yang, William Chu
2006 Proceedings - International Conference on Quality Software  
However, a service-oriented re-engineering process is still essential for legacy systems to survive in the service-oriented computing environment.  ...  Our approach produces extracted components with core legacy object-oriented code function in Web services by wrapping underlying computing models with XML.  ...  If a legacy system is selected for the application of our component-based re-engineering approach, a component mining process will be performed.  ... 
doi:10.1109/qsic.2006.29 dblp:conf/qsic/ZhangYC06 fatcat:i5a6w4l5yzggtkolfdsageceom

Incremental SDN deployment in enterprise networks

Dan Levin, Marco Canini, Stefan Schmid, Anja Feldmann
2013 Computer communication review  
For example, if a control application wants to see the first packet of a flow to know from where the packet originated, the control platform can conceal the pseudo-wire nature of the legacy network, such  ...  that-to the application-the packet appears to arrive from an end-point and not the physically neighboring legacy switch.  ... 
doi:10.1145/2534169.2491694 fatcat:z7umxklkljb3bhrzcarnprr2ea

APPLYING GRAPH TRANSFORMATIONS TO DATABASE RE-ENGINEERING [chapter]

J. H. JAHNKE, A. ZÜNDORF
1999 Handbook of Graph Grammars and Computing by Graph Transformation  
We employ Triple Graph Grammars (TGG) to generate a customizable translation mechanism between legacy data models and the conceptual data model.  ...  The Varlet environment supports analysis of legacy relational database systems, translation of the relational schema into an object-oriented conceptual schema and interactive enhancement o f the resulting  ...  We w ould also like to thank Heather Steel for editing the nal version of this chapter.  ... 
doi:10.1142/9789812815149_0006 fatcat:vubjrw6r4jfffnsliqhlvjgwcu

Market Analysis of MEC-Assisted Beyond 5G Ecosystem

Jin Nakazato, Makoto Nakamura, Tao Yu, Zongdian Li, Kazuki Maruta, Gia Khanh Tran, Kei Sakaguchi
2021 IEEE Access  
In addition to that, computing servers can be deployed to their edge to offer application services.  ...  Edge cloud as an enabler for 5G ecosystem (5G-MiEdge) [34] , European Edge Computing Consortium (EECC) [35] , Edge Computing Consortium [36] , etc., to investigate further and standardize this novel  ... 
doi:10.1109/access.2021.3068839 fatcat:xpj5rm3kcrftjkt5lbll4iqewi

Implementation of DDS Cloud Platform for Real-Time Data Acquisition of Sensors for a Legacy Machine

Min-Huang Ho, Ming-Yi Lai, Yung-Tien Liu
2022 Electronics  
application.  ...  The sensor signals were acquired using Raspberry Pi as the edge device, then published to the cloud using the DDS application, and stored in the MySQL database.  ...  Figure 1 presents a sensing process of the motion behavior for a legacy machine tool.  ... 
doi:10.3390/electronics11132096 fatcat:osakqty7d5bt3nlujzj3os2kia

Parametric Process Model Inference

Saurabh Sinha, G. Ramalingam, Raghavan Komondoor
2007 Reverse Engineering (WCRE), Working Conference on  
Legacy applications can be difficult and time-consuming to understand and update due to the lack of modern abstraction mechanisms in legacy languages, as well as the gradual deterioration of code due to  ...  We present an approach for reverse engineering process model abstractions from legacy code.  ...  Introduction Legacy applications constitute a large proportion of the application portfolio of many organizations.  ... 
doi:10.1109/wcre.2007.36 dblp:conf/wcre/SinhaRK07 fatcat:yi6lybrczrgofjl6apmcrmez3i

REVERSE ENGINEERING OF COMPUTER-BASED CONTROL SYSTEMS

LONNIE R. WELCH, GUOHUI YU, BINOY RAVINDRAN, FRANZ KURFESS, JORGE HENRIQUES, MARK WILSON, ANTONIO L. SAMUEL, MICHAEL W. MASTERS
1996 International journal of software engineering and knowledge engineering  
The intermediate representation IR for capturing features of computer-based systems during reverse engineering is presented.  ...  This article presents a process for the reengineering of computer-based control systems, and describes tools that automate portions of the process.  ...  Ongoing work includes the application of the reengineering process to increasingly complex portions of the AEGIS Weapon System, application of the process to other computer-based systems, and automation  ... 
doi:10.1142/s0218194096000223 fatcat:bunwvnrre5at3bldyznivvb33m

Leveraging Fog Computing for Scalable IoT Datacenter Using Spine-Leaf Network Topology

K. C. Okafor, Ifeyinwa E. Achumba, Gloria A. Chukwudebe, Gordon C. Ononiwu
2017 Journal of Electrical and Computer Engineering  
Consequently, a spine-leaf Fog computing network (SL-FCN) is presented for reducing latency and network congestion issues in a highly distributed and multilayer virtualized IoT datacenter environment.  ...  The perspective offered in this paper explains how low-latency and bandwidth intensive applications can transfer data to the cloud (and then back to the edge application) without impacting QoS performance  ...  Acknowledgments This research was carried out as an extended work on Distributed Cloud Computing Network for SGEMS/EETACP project commissioned by the Department of Electronic Engineering, University of  ... 
doi:10.1155/2017/2363240 fatcat:7x7xvrmuf5dm7ixlu4m33ryxta
« Previous Showing results 1 — 15 out of 43,127 results