Filters








109 Hits in 5.3 sec

Letting off STEAM: Distributed Runtime Traffic Scheduling for Service Function Chaining

Marcel Blocher, Ramin Khalili, Lin Wang, Patrick Eugster
2020 IEEE INFOCOM 2020 - IEEE Conference on Computer Communications  
We fill this gap by presenting a queuing-based system model to characterize the runtime traffic scheduling problem for service function chaining.  ...  The provisioning of chains of service functions requires making decisions on both (1) placement of service functions and (2) scheduling of traffic through them.  ...  Attached to each site is a set of service function forwarders (SFFs), which are responsible for forwarding traffic within their site and among sites.  ... 
doi:10.1109/infocom41043.2020.9155404 dblp:conf/infocom/BlocherKWE20 fatcat:b7cc4us2rndtxd7vakqfxdc4lq

INFOCOM 2020 Program

2020 IEEE INFOCOM 2020 - IEEE Conference on Computer Communications  
Ramos (University of Lisboa, Portugal) pp. 814-823 Letting off STEAM: Distributed Runtime Traffic Scheduling for Service Function Chaining Marcel Blöcher (Technische Universität Darmstadt, Germany  ...  A Zeroth-Order ADMM Algorithm for Stochastic Optimization over Distributed Processing Networks Zai Shi and Atilla Eryilmaz ( PDL: A Data Layout towards Fast Failure Recovery for Erasure-coded Distributed  ... 
doi:10.1109/infocom41043.2020.9155443 fatcat:2oi6e5i2zjed5n25ft6ovaeudq

Prospects for Predictable Dynamic Scheduling in RTDOS

Bradley R. Swim, Murat Tayli, Mohamed Benmaiza
1997 Journal of King Saud University: Computer and Information Sciences  
In such systems. static scheduling can determine a feasible schedule off-line for all possible task requests.  ...  Because these algorithms are distributed, they apply dynamic load distribution to globally sear~h the network for a suitable remote host for the incoming task.  ...  Pending research is identifying and quantifying the predictability of the proposed scheduling model. Local and global dynamic schedulers are currently under development and measurement.  ... 
doi:10.1016/s1319-1578(97)80005-5 fatcat:taezq5whmbbzfef65kioq35xfa

5G support for Industrial IoT Applications – Challenges, Solutions, and Research gaps

Pal Varga, Jozsef Peto, Attila Franko, David Balla, David Haja, Ferenc Janky, Gabor Soos, Daniel Ficzere, Markosz Maliosz, Laszlo Toka
2020 Sensors  
These areas include IIoT applications and their requirements; mobile edge cloud; back-end performance tuning; network function virtualization; and security, blockchains for IIoT, Artificial Intelligence  ...  support for 5G, and private campus networks.  ...  Acknowledgments: The authors would like to thank the PhD course entitled "5G Networks, Services and their Synergies with Industrial IoT" that has conceived many ideas and collaboration related to this  ... 
doi:10.3390/s20030828 pmid:32033076 pmcid:PMC7038716 fatcat:cbsr2pao5bffxooaod3l3rlbfe

Fieldbus Technology in Industrial Automation

J.-P. Thomesse
2005 Proceedings of the IEEE  
certain services.  ...  Ironically, these in turn are responsible for the multitude of solutions available.  ...  Wagner for the linguistic aspects. Special thanks are addressed to R. Berthoumieux and M. Desjardins without whose confidence this adventure would never have happened.  ... 
doi:10.1109/jproc.2005.849724 fatcat:nyxcoovobzaebhpewecj6hh7ie

The Vessel Schedule Recovery Problem (VSRP) – A MIP model for handling disruptions in liner shipping

Berit D. Brouer, Jakob Dirksen, David Pisinger, Christian E.M. Plum, Bo Vaaben
2013 European Journal of Operational Research  
in number of services for taxis.  ...  We analyze scheduling chains of divisible computations. In the chain, one application produces input load for the next one. MapReduce applications are example of 2-stage chains.  ...  a work schedule that considers working days and days off for nursing staff in a Turkish hospital.  ... 
doi:10.1016/j.ejor.2012.08.016 fatcat:c27kagfnxnhjfbil2rydhjhomm

Modeling and Optimization of Latency in Erasure-coded Storage Systems [article]

Vaneet Aggarwal, Tian Lan
2020 arXiv   pre-print
The aim of this monograph is to provide a review of recent progress (both theoretical and practical) on systems that employ erasure codes for distributed storage.  ...  Open problems for future research are discussed at the end of each chapter.  ...  The authors would like to thank Alexander Barg at the University of Maryland for the many suggestions on the manuscript.  ... 
arXiv:2005.10855v1 fatcat:rpfipjqqhzd7hnk4k4snngg3bq

Outstanding Research Problems in NoC Design: System, Microarchitecture, and Circuit Perspectives

Radu Marculescu, Umit Y. Ogras, Li-Shiuan Peh, Natalie Enright Jerger, Yatin Hoskote
2009 IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems  
Motivation, problem description, proposed approaches, and open issues are discussed for each problem from system, microarchitecture, and circuit perspectives.  ...  Marculescu of Carnegie Mellon University for the valuable feedback in the early stages of the manuscript.  ...  While it is relatively easy to find the communication latency for guaranteed service traffic [42] , [108] , analyzing the average latency for best effort traffic is a challenging task.  ... 
doi:10.1109/tcad.2008.2010691 fatcat:2doy6ne6ybeptgy2avgvzjloji

Online Reconstruction of Structural Information from Datacenter Logs

Zaheer Chothia, John Liagouris, Desislava Dimitrova, Timothy Roscoe
2017 Proceedings of the Twelfth European Conference on Computer Systems - EuroSys '17  
Reconstructing user sessions, call graphs, transaction trees, and other structural information from these messages, a process known as sessionization, is the foundation for a variety of diagnostic, profiling  ...  Our system is based on the Timely Dataflow framework for low latency, data-parallel computation, and we demonstrate its utility with a number of use-cases and traces from a large, operational, mission-critical  ...  provid-ing access to the production workload logs, for thoroughly detailing the ESB architecture and for offering technical guidance throughout the project.  ... 
doi:10.1145/3064176.3064195 dblp:conf/eurosys/ChothiaLDR17 fatcat:ohlqwf3bgbg3nbqrtnwlutudpe

5G PPP Architecture Working Group - View on 5G Architecture, Version 3.0

Simone Redana, Ömer Bulakci, Christian Mannweiler, Laurent Gallo, Apostolos Kousaridas, David Navrátil, Anna Tzanakaki, Jesús Gutiérrez, Holger Karl, Peer Hasselmeyer, Anastasius Gavras, Stephanie Parker (+1 others)
2019 Zenodo  
The 5G Architecture Working Group as part of the 5G PPP Initiative is looking at capturing novel trends and key technological enablers for the realization of the 5G architecture.  ...  presenting in a harmonized way the architectural concepts developed in various projects and initiatives (not limited to 5G PPP projects only) so as to provide a consolidated view on the technical directions for  ...  (e.g., to turn off a service) [5-16].  ... 
doi:10.5281/zenodo.3265030 fatcat:ctlelszvm5fdfodlequre424wa

New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges [article]

Saurabh Bagchi, Tarek F. Abdelzaher, Ramesh Govindan, Prashant Shenoy, Akanksha Atrey, Pradipta Ghosh, Ran Xu
2020 arXiv   pre-print
We conclude by providing a vision for a desirable end state for IoT systems.  ...  We then discuss the unique challenges for reliability, security, and privacy posed by IoT systems due to their salient characteristics which include heterogeneity of devices and protocols, dependence on  ...  of service for all task queries.  ... 
arXiv:2005.07338v1 fatcat:a6hb5dpk7fgwreua5x2n7vlw7y

D2.2 The COLLABS Level-3 Security Package for Secure Digital Supply Networks: 1st complete version

Panagiotis Rizomiliotis, Konstantinos Tserpes, Aikaterini Triakosia
2021 Zenodo  
(Statistical Analytics and Machine- / Deep-Learning on shared data), T2.5 (Distributed anomaly detection for Industrial IoT) and T2.6 (Workflow-driven security for supply chain and compliance in manufacturing  ...  It describes and demonstrates the various technologies that form the COLLABS Level-3 security package for secure digital supply networks.  ...  For instance, a Distributed Denial of Service (DDoS) attack with low traffic generation per device may not be detected by a device-wise attack detection system.  ... 
doi:10.5281/zenodo.5667012 fatcat:xgzhqfeq6nbwte4h256pntlkau

Holistic Runtime Scheduling for the Distributed Computing Landscape

Marcel Blöcher
2021
Many application-level resource scheduling systems lack support for runtime scheduling, often due to slow or unsuitable algorithms.  ...  Without runtime scheduling, resource scheduling must run in advance for many scenarios and, at best, repeats periodically to update scheduling decisions.  ...  "Letting off STEAM: Distributed Runtime Traffic Scheduling for Service Function Chaining". In: Proceedings of the 39th Conference on Computer Communications (INFOCOM).  ... 
doi:10.26083/tuprints-00018576 fatcat:yhndjijxcjb6bn2h45c6r4aqia

Cross-Layer Optimized Conditions for QoS Support in Multi-Hop Wireless Networks with MIMO Links

Bechir Hamdaoui, Parameswaran Ramanathan
2007 IEEE Journal on Selected Areas in Communications  
The derived conditions are multi-layer aware in the sense that they account for cross-layer effects between the PHY and the MAC layers to support QoS at higher layers.  ...  and let F i denote the set of flows {1, 2, . . . , i}. Let S = [0, τ] be a time schedule of length τ > 0 seconds. We show by induction that for all n = 1, 2, . .  ...  . , F } such that x(i) ≤ x(j) for all 1 ≤ i ≤ j ≤ F , and let F i denote the set of flows {1, 2, . . . , i}. Let S = [0, τ] be a time schedule of length τ > 0 seconds.  ... 
doi:10.1109/jsac.2007.070504 fatcat:zoygk64wfrdsdnjelknc6v326y

Alternative Power Systems and Devices [chapter]

2017 Systems, Controls, Embedded Systems, Energy, and Machines  
Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their  ...  telephone traffic and video distribution.  ...  Data distribution, e.g., for business services, Internet broadband services, etc. .  ... 
doi:10.1201/9781420037043-7 fatcat:px3rpk2xgvhtbjwr7s3h3k6ute
« Previous Showing results 1 — 15 out of 109 results