Filters








264 Hits in 4.4 sec

The Web in 2010: Challenges and Opportunities for Database Research [chapter]

Gerhard Weikum
2001 Lecture Notes in Computer Science  
The impressive advances in global networking and information technology provide great opportunities for all kinds of Web-based information services, ranging from digital libraries and information discovery  ...  However, many of these services still exhibit rather poor quality in terms of unacceptable performance during load peaks, frequent and long outages, and unsatisfactory search results.  ...  More details on XXL can be found in [47] , but note that this approach is still in a fairly early state, especially with regard to efficient implementation techniques.  ... 
doi:10.1007/3-540-44577-3_1 fatcat:jcbayxlbkzhxdbt2hnjzam2ehq

Distributed Vehicular Computing at the Dawn of 5G: a Survey [article]

Ahmad Alhilal, Benjamin Finley, Tristan Braud, Dongzhe Su, Pan Hui
2022 arXiv   pre-print
As a major part of 5G, edge computing allows data offloading and computation at the edge of the network, ensuring low-latency and context-awareness, and 5G efficiency.  ...  These services and applications require 1) massive volumes of heterogeneous and continuous data to perceive the environment, 2) reliable and low-latency communication networks, 3) real-time data processing  ...  ACKNOWLEDGMENT This research has been supported in part by project 16214817 from the Research Grants Council of Hong Kong, and the 5GEAR and FIT projects from Academy of Finland.  ... 
arXiv:2001.07077v2 fatcat:ixgjkwdx6zdsvfcpviptpf32by

Approximation Algorithms for Energy Minimization in Cloud Service Allocation under Reliability Constraints [article]

Olivier Beaumont, Philippe Duchon
2013 arXiv   pre-print
We consider two energy consumption models based on DVFS techniques, where the clock frequency of physical resources can be changed.  ...  We consider allocation problems that arise in the context of service allocation in Clouds.  ...  In such systems, efficient data sharing is complicated by erratic node failure, unreliable network connectivity and limited bandwidth.  ... 
arXiv:1302.4414v2 fatcat:ewerkunwnzgxzl2srh6njh7l7u

Spontaneous, Self-Sampling Quorum Systems for Ad Hoc Networks

Kishori M. Konwar, Peter M. Musial, Alexander A. Shvartsman
2008 2008 International Symposium on Parallel and Distributed Computing  
Quorums have been substantially studied in static settings, however the design and analysis of quorum-based distributed services in resource-limited ad hoc networks is a relatively unexplored area.  ...  A hybrid ad-hoc network uses a combination of base stations and multi-hop data forwarding.  ...  In this paper we refer to this type of network as a multi-hop ad hoc network.  ... 
doi:10.1109/ispdc.2008.61 dblp:conf/ispdc/KonwarMS08 fatcat:3cgw3cbc5ngcbnhy2ulg3ggy5m

Am I Rare? An Intelligent Summarization Approach for Identifying Hidden Anomalies [article]

Samira Ghodratnama and Mehrdad Zakershahrak and Fariborz Sobhanmanesh
2021 arXiv   pre-print
Monitoring network traffic data to detect any hidden patterns of anomalies is a challenging and time-consuming task that requires high computing resources.  ...  Besides, selecting representatives based on cluster size keeps the same distribution as the original data in summarized data.  ...  resources.  ... 
arXiv:2012.15755v2 fatcat:zt5wzmlijjbqlbay6xqh3rbfxe

Efficient and Robust Allocation Algorithms in Clouds under Memory Constraints [article]

Olivier Beaumont, Lionel Eyraud-Dubois, Paul Renaud-Goud (INRIA Bordeaux - Sud-Ouest, LaBRI)
2013 arXiv   pre-print
Second, we propose an efficient algorithm based on rare events detection techniques in order to estimate the robustness of an allocation, a problem that has been proven to be P-complete.  ...  We consider robust resource allocation of services in Clouds.  ...  In [36] , approximation techniques to estimate the reliability of an allocation were based on the use of Chernoff [37] and Hoeffding [38] bounds.  ... 
arXiv:1310.5255v1 fatcat:4vfealziqbcl7e7hiqs6grboqe

A survey and taxonomy of program analysis for IoT platforms

Alyaa A. Hamza, Islam T. Abdel-Halim, Mohamed A. Sobh, Ayman M. Bahaa-Eldin
2021 Ain Shams Engineering Journal  
Heterogeneity in the Internet of Things (IoT) environment is a critical issue for supporting security and privacy.  ...  So, it has become essential to face security issues & challenges in IoT due to IoT applications' rapid development.  ...  The topology of the IoT multi-hop and multi-path domain is entirely different from that of the traditional Networks where service providers path and control traffic, preventing cyberattacks and protecting  ... 
doi:10.1016/j.asej.2021.03.026 fatcat:qcaa3y646fad5ls6ouczd5avha

Learning, Prediction and Mediation of Context Uncertainty in Smart Pervasive Environments [chapter]

Sajal K. Das, Nirmalya Roy
2008 Lecture Notes in Computer Science  
Finally, we describe an efficient, quality-of-inference aware context determination framework in pervasive care environments. We also present open problems in this area.  ...  First we discuss a novel game theoretic learning and prediction framework that attempts to minimize the joint location uncertainty of inhabitants in multi-inhabitant smart homes.  ...  estimation in resource constrained sensor networks [11] .  ... 
doi:10.1007/978-3-540-88875-8_107 fatcat:6urtd7vvfrh2riyfeyra2sqsfu

Enabling Technologies [chapter]

Stefano Santoni, Roberto Cigliutti, Massimo Giltrelli, Pasquale Donadio, Chris Matrakidis, Andrea Paparella, Tanya Politi, Marcello Potenza, Erwan Pincemin, Alexandros Stavdas
2010 Core and Metro Networks  
Other titles in the series: Wright: Voice over Packet Networks  ...  treatments in networking, middleware and software technologies for communications and distributed systems.  ...  Multi-Domain Interoperability In many of today's complex networks, it is impossible to engineer end-to-end efficiencies in a multi-domain environment, provision services quickly, or provide services based  ... 
doi:10.1002/9780470683576.ch4 fatcat:6e4hiwr35rbvjl7uvomrwerzb4

Localized techniques for broadcasting in wireless sensor networks

L. Orecchia, A. Panconesi, C. Petrioli, A. Vitaletti
2004 Proceedings of the 2004 joint workshop on Foundations of mobile computing - DIALM-POMC '04  
Because of the very nature of networks, broadcast protocols should be distributed, localized, reliable and, in case of networks with limited node resources, they should also be resource-efficient.  ...  Asymptotic analytical results are provided which assess the reliability of the Irrigator and Fireworks techniques.  ...  Related Works In this section we review the major solutions that have been proposed in the literature for broadcasting in multi-hop wireless ad hoc networks.  ... 
doi:10.1145/1022630.1022638 dblp:conf/dialm/OrecchiaPPV04 fatcat:bnyo4lg47zbrjhgjp2swbv2f6a

Localized Techniques for Broadcasting in Wireless Sensor Networks

Devdatt Dubhashi, Olle Häggström, Lorenzo Orecchia, Alessandro Panconesi, Chiara Petrioli, Andrea Vitaletti
2007 Algorithmica  
Because of the very nature of networks, broadcast protocols should be distributed, localized, reliable and, in case of networks with limited node resources, they should also be resource-efficient.  ...  Asymptotic analytical results are provided which assess the reliability of the Irrigator and Fireworks techniques.  ...  Related Works In this section we review the major solutions that have been proposed in the literature for broadcasting in multi-hop wireless ad hoc networks.  ... 
doi:10.1007/s00453-007-9092-8 fatcat:wtr3v24y5fh2lmdhvi25jiokeq

Approximation algorithms for energy minimization in Cloud service allocation under reliability constraints

Olivier Beaumont, Philippe Duchon, Paul Renaud-Goud
2013 20th Annual International Conference on High Performance Computing  
We consider allocation problems that arise in the context of service allocation in Clouds.  ...  Moreover, it should remain valid during a time period (with a given reliability in presence of failures) while minimizing the energy consumption of used resources.  ...  In such systems, efficient data sharing is complicated by erratic node failure, unreliable network connectivity and limited bandwidth.  ... 
doi:10.1109/hipc.2013.6799123 dblp:conf/hipc/BeaumontDR13 fatcat:3d7dyvedfzbwnllo23hnfh7nle

A Survey of Multi-Agent Trust Management Systems

Han Yu, Zhiqi Shen, Cyril Leung, Chunyan Miao, Victor R. Lesser
2013 IEEE Access  
In open and dynamic multi-agent systems (MASs), agents often need to rely on resources or services provided by other agents in order to accomplish their goals.  ...  The basic idea is to let agents self-police the MAS by rating each other based on their observed behavior and basing future interaction decisions on such information.  ...  MULTI-AGENT TRUST AS A CONGESTION GAME Most of the existing multi-agent trust models are pro-posed for application domains where trustees represent computerized services or resources (e.g., a node in a  ... 
doi:10.1109/access.2013.2259892 fatcat:x7aegwqwwndftgvdu5eqpwrgfm

Toward a New Application of Real-Time Electrophysiology: Online Optimization of Cognitive Neurosciences Hypothesis Testing

Gaëtan Sanchez, Jean Daunizeau, Emmanuel Maby, Olivier Bertrand, Aline Bompas, Jérémie Mattout
2014 Brain Sciences  
In this paper, we use a Bayesian decision theoretic approach to cast model comparison in an online adaptive design optimization procedure.  ...  We show how to maximize design efficiency for individual healthy subjects or patients.  ...  We gratefully acknowledge CC-IN2P3 through TIDRA [58] for providing a significant amount of the computing resources and services needed for this work.  ... 
doi:10.3390/brainsci4010049 pmid:24961700 pmcid:PMC4066237 fatcat:bh5aso2wojesnmetoqc4xe7i6a

An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses

Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa
2019 Entropy  
in the face of jamming attacks in wireless channels and malicious packet drops in multi-hop networks.  ...  In this paper, we provide an overview of recent research efforts on networked control systems under denial-of-service attacks.  ...  Multi-Hop Network Models In addition to SINR-based jamming models, the probabilistic characterization through the class Λ ρ can be employed for modeling transmission failures in multi-hop networks.  ... 
doi:10.3390/e21020210 pmid:33266925 fatcat:kbjpmxnfqneqzffufjiem7wuhi
« Previous Showing results 1 — 15 out of 264 results