A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2008; you can also visit the original URL.
The file type is application/pdf
.
Filters
Server Allocation in Grid Systems with On/Off Sources
[chapter]
2006
Lecture Notes in Computer Science
The results are used to compute the optimal static server allocation policy. ...
A system consisting of a number of servers, where demands of different types arrive in bursts (modelled by interrupted Poisson processes), is examined in the steady state. ...
Acknowledgements This work was carried out in the framework of the collaborative project DOPCHE (Dynamic Operative Policies for Commercial Hosting Environments), funded by the UK Engineering and Physical ...
doi:10.1007/11942634_91
fatcat:quyipytqijhw3lzym5vip2cxsm
Optimal Dynamic Server Allocation in Systems with On/Off Sources
[chapter]
Lecture Notes in Computer Science
The servers can be dynamically reallocated to deal with the different requests, but these switches take time and incur a cost. The problem is to find the optimal dynamic allocation policy. ...
A system consisting of several servers, where demands of different types arrive in bursts, is examined. ...
Conclusions and Future Research We examined a server allocation problem in the presence of on/off sources. ...
doi:10.1007/978-3-540-75211-0_14
fatcat:g6yyv6r72fhonizqulyr7wk7se
Base Station ON-OFF Switching in 5G Wireless Networks: Approaches and Challenges
2017
IEEE wireless communications
However, in 5G systems with new physical layer techniques and the highly heterogeneous network architecture, new challenges arise in the design of BS ON-OFF switching strategies. ...
In this article, we begin with a discussion on the inherent technical challenges of BS ON-OFF switching. ...
[12]
Minimize on-grid power
Blocking probability
BS ON-OFF switching;
Two-stage dynamic programming;
Resource allocation;
1st: BS ON-OFF;
Renewable energy allocation.
2nd: resource allocation ...
doi:10.1109/mwc.2017.1600353
fatcat:hgyilwv6srgp3m73sba2b73q5m
Low-Cost Image Search System on Off-Line Situation
2020
Electronics
Reducing the complexity of the network is one of the solutions to reduce resource usage in the system, which is needed by low-cost system implementation. ...
Implementation of deep learning in low-cost hardware, such as an edge device, is challenging. ...
These data and files are stored in the database. Since we used the lite database, the size is reasonable with the Raspberry Pi 3 memory allocation. We constructed the database, as shown in Table 3 . ...
doi:10.3390/electronics9010153
fatcat:ldequv4dnbcy5knxonksc57w6e
Multi-granular, multi-purpose and multi-Gb/s monitoring on off-the-shelf systems
2014
International Journal of Network Management
Its memory is allocated before the capture begins, avoiding per-packet dynamic allocations. ...
research community for comparison purposes and moving forward in the development of highperformance tasks on off-the-self systems. ...
doi:10.1002/nem.1861
fatcat:5nwb3njxmfbdpir2w5ko47x2pe
Performance analysis of an ATM MUX with a new space priority mechanism under ON-OFF arrival processes
2002
Journal of Communications and Networks
The arrival process is derived from the superposition of two types of traffics, each in turn results from the superposition of homogeneous ON-OFF sources that can be approximated by means of a two-state ...
Simulation results in term of cell loss probability conform with our numerical analysis. ...
16] have been used to approximate the superposition of ON-OFF sources. ...
doi:10.1109/jcn.2002.6596895
fatcat:amakpallvngjbiw56rl23ox6wq
Investigating the Influence of Special On–Off Attacks on Challenge-Based Collaborative Intrusion Detection Networks
2018
Future Internet
In this work, we investigate the influence of advanced on-off attacks on challenge-based CIDNs, which can respond truthfully to one IDS node but behave maliciously to another IDS node. ...
data with each other. ...
On-Off Attacks In literature, a general on-off attack indicates the situation in which an attacker behaves well and badly alternately, aiming to compromise the network if they remain as trusted nodes ...
doi:10.3390/fi10010006
fatcat:5aejn7ak5bfr3oyygzq23nvfdy
Mitigate Lying and On-Off Attacks on Trust Based Group Key Management Frameworks in MANETs
2016
International Journal of Intelligent Engineering and Systems
Lying and on-off attacks on the system are such type of attacks. ...
Our simulation outcomes prove that proposed framework can deliver better network performance and resistance to lying and on-off attacks. ...
adjusting to the dynamic network topology, without depending on a centralized server. ...
doi:10.22266/ijies2016.1231.23
fatcat:rjfwj7e5qbbo5cryhxbqglocsm
Smart Datacenter Electrical Load Model for Renewable Sources Management
2018
The Renewable Energies and Power Quality Journal (RE&PQJ)
Acknowledgments The work presented in this paper was supported by the French ANR DATAZERO project ANR-15-CE25-0012. ...
For source characterization, the experimental database has been obtained thanks to the financial support of several LAPLACE projects, France (leaders Christophe TURPIN, Eric BRU) ...
Several levels of decision are concerned as IT resource management (server switch on/off, process migration, voltage and frequency scaling, among others). ...
doi:10.24084/repqj16.231
fatcat:gq5frgqs75bidkrolfhbnaec6i
On–Off-Based Secure Transmission Design With Outdated Channel State Information
2016
IEEE Transactions on Vehicular Technology
We design new secure on-off transmission schemes in wiretap channels with outdated channel state information (CSI). ...
Based on these results, we present the optimal solutions that maximize the secrecy throughput under dual connection and secrecy outage constraints. ...
SECRECY PERFORMANCE WITH ON-OFF TRANSMISSION SCHEMES In this section, we analyze the secrecy performance for the two scenarios presented in Section II-B by exploiting the on-off transmission schemes. ...
doi:10.1109/tvt.2015.2477427
fatcat:amvr6gara5edhfg5x6l3vdfrw4
On the defense of the distributed denial of service attacks: an on-off feedback control approach
2001
IEEE transactions on systems, man and cybernetics. Part A. Systems and humans
Index Terms-Coordinated defense, distributed denial of service (DDoS) attack, hot spots, on-off control, web server. ...
This paper proposes a coordinated defense scheme of distributed denial of service (DDoS) network attacks, based on the backward-propagation, on-off control strategy. ...
The optimal control theory is proposed in [25] to manage the network traffic, on the basis of a nonlinear dynamic flow model. ...
doi:10.1109/3468.935045
fatcat:ub65z7d3nvgrxpdics7e3fwftm
Energy Allocation for LoRaWAN Nodes with Multi-Source Energy Harvesting
2021
Sensors
In this paper, a multi-source energy-harvesting LoRaWAN node is proposed and optimal energy allocation is proposed when the node runs different sensing tasks. ...
For this purpose, an industrial sensor node platform was extended with a multi-source energy-harvesting circuit and programmed with a novel energy-allocation system for multi-task devices. ...
Funding: This work was funded by Wi6labs [46] and the French National Technology Research Association (ANRT) [47] in the context of the CIFRE PhD thesis. ...
doi:10.3390/s21082874
pmid:33921894
pmcid:PMC8073755
fatcat:7czck5fdufhi3b4ledjpdeiguu
Online energy generation scheduling for microgrids with intermittent energy sources and co-generation
2013
Performance Evaluation Review
In this paper, we study online algorithms for the microgrid generation scheduling problem with intermittent renewable energy sources and co-generation, with the goal of maximizing the cost-savings with ...
), that track the offline optimal in an online fashion. ...
Local Heating System: We assume an on-demand heating system with capacity sufficiently large to satisfy all the heat demand by itself and without on-off cost or ramp limit. ...
doi:10.1145/2494232.2465551
fatcat:ihj75kghkzbm7mm7o755bsspla
Real-time estimation and dynamic renegotiation of UPC parameters for arbitrary traffic sources in ATM networks
1998
IEEE/ACM Transactions on Networking
The UPC estimation scheme is extended to adapt to slow time-scale changes in traffic characteristics via dynamic renegotiation of the UPC parameters. ...
The selected UPC descriptor is optimal in the sense of minimizing a network cost function, subject to meeting user-specified constraints on shaping delay. ...
The authors are with C&C Research Laboratories, NEC USA, Princeton, NJ 08540 USA (e-mail: blmark@ccrl.nj.nec.com; mgr@ccrl.nj.nec.com). Publisher Item Identifier S 1063-6692(98)09619-8. ...
doi:10.1109/90.748091
fatcat:p6jtdtmy2vbjrfr6tfgphll5r4
Online energy generation scheduling for microgrids with intermittent energy sources and co-generation
2013
Proceedings of the ACM SIGMETRICS/international conference on Measurement and modeling of computer systems - SIGMETRICS '13
In this paper, we study online algorithms for the microgrid generation scheduling problem with intermittent renewable energy sources and co-generation, with the goal of maximizing the cost-savings with ...
), that track the offline optimal in an online fashion. ...
Local Heating System: We assume an on-demand heating system with capacity sufficiently large to satisfy all the heat demand by itself and without on-off cost or ramp limit. ...
doi:10.1145/2465529.2465551
dblp:conf/sigmetrics/LuTCCL13
fatcat:l3l437nqzvdxhnpdy4swumuhwa
« Previous
Showing results 1 — 15 out of 4,529 results