Filters








21 Hits in 5.0 sec

Shard scheduler

Michał Król, Onur Ascigil, Sergi Rene, Alberto Sonnino, Mustafa Al-Bassam, Etienne Rivière
2021 Proceedings of the 3rd ACM Conference on Advances in Financial Technologies  
We propose Shard Scheduler, a system for object placement and migration in account-based sharded blockchains. Our system calculates optimal placement and decides on object migrations across shards.  ...  Placement and migration decisions made by Shard Scheduler are fully deterministic, verifiable, and can be made part of the consensus protocol.  ...  This work is partially supported by The Brussels Institute for Research and Innovation (Innoviris) under project FairBCaaS, and by the Belgian Fonds de la Recherche Scientifique (FNRS) under Grant #F452819F  ... 
doi:10.1145/3479722.3480989 fatcat:nbfsmxjfpneghaffbip2dzodf4

Shard Scheduler: object placement and migration in sharded account-based blockchains [article]

Michał Król, Onur Ascigil, Sergi Rene, Alberto Sonnino, Mustafa Al-Bassam, Etienne Rivière
2021 arXiv   pre-print
We propose Shard Scheduler, a system for object placement and migration in account-based sharded blockchains.  ...  Our system calculates optimal placement and decides of object migrations across shards and supports complex multi-account transactions caused by smart contracts.  ...  We present Shard Scheduler, a novel approach for deciding and enforcing object placement and migration decisions in sharded, account-based blockchains.  ... 
arXiv:2107.07297v1 fatcat:yrolkpj7fvaxdfqxwsanfzylxq

LambdaObjects

Kai Mast, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
2022 Proceedings of the 14th ACM Workshop on Hot Topics in Storage and File Systems  
In addition, LambdaObjects provide strong consistency and enable efficient caching mechanisms and fault-tolerance with low overhead. CCS CONCEPTS • Computer systems organization → Cloud computing.  ...  Data is encapsulated into objects, each associated with a set of methods that allow accessing and modifying the data. Functions then execute directly at the nodes the data is stored at.  ...  We thank the anonymous reviewers and our shepherd Somali Chaterji for their helpful feedback. We are also grateful to Tyler Caraza-Harter and Suyan Qu for reviewing earlier versions of this paper.  ... 
doi:10.1145/3538643.3539751 fatcat:lvbweual7jfhdiwjl2w2nwfmxe

Blockchain Systems, Technologies and Applications: A Methodology Perspective [article]

Bin Cao, Zixin Wang, Long Zhang, Daquan Feng, Mugen Peng, Lei Zhang
2021 arXiv   pre-print
The main findings of this article will provide an overview in a methodology perspective to study theoretical model for blockchain fundamentals understanding, design network service for blockchain-based  ...  In the past decade, blockchain has shown a promising vision greatly to build the trust without any powerful third party in a secure, decentralized and salable manner.  ...  Yu et al. in [28] study the sharding problem in the blockchain, mainly including providing detailed comparison and quantitative evaluation of the main sharding mechanisms, as well as analysis of the  ... 
arXiv:2105.03572v1 fatcat:26tncze65fcllfue5vokl2jvpa

Hints and Principles for Computer System Design [article]

Butler Lampson
2021 arXiv   pre-print
It also gives some principles for system design that are more than just hints, and many examples of how to apply the ideas.  ...  This new long version of my 1983 paper suggests the goals you might have for your system -- Simple, Timely, Efficient, Adaptable, Dependable, Yummy (STEADY) -- and techniques for achieving them -- Approximate  ...  . • Object-based: the object hosts the class, as in Smalltalk or Java.  ... 
arXiv:2011.02455v3 fatcat:jolyz5lknjdbpjpxjcrx5rh6fa

A Review on Application of Blockchain in 5G and Beyond Networks: Taxonomy, Field-trials, Challenges and Opportunities

Mohammad Tahir, Mohammed Hadi Habaebi, Mohammad Dabbagh, Amna Mughees, Abdul Ahad, Kazi Istiaque Ahmed
2020 IEEE Access  
Placement of IoT nodes that enables Blockchain-based IoT is presented in [101] .  ...  The smart contract takes in the logic of the algorithm and available edge resources into account to determine the optimal placement.  ...  His research interest includes 5G, Internet of things, Game theory for wireless networks, wireless security, Blockchain and autonomic computing.  ... 
doi:10.1109/access.2020.3003020 fatcat:s4wcxzjccbcvxkmnwn7tsxtvvu

Blockchain-empowered Data-driven Networks: A Survey and Outlook [article]

Xi Li, Zehua Wang, Victor C.M. Leung, Hong Ji, Yiming Liu, Heli Zhang
2021 arXiv   pre-print
of blockchains in future DDNs.  ...  In this article, we present a survey on the existing research works on the application of blockchain technologies in computer networks, and identify challenges and potential solutions in the applications  ...  This framework schedules requests without relying on a centralized scheduler in the cloud.  ... 
arXiv:2101.12375v1 fatcat:7f6udfdxajczxc6bjqdyzb3hyi

Waste heat from data centers: An investment analysis

Matti Pärssinen, Mikko Wahlroos, Jukka Manner, Sanna Syri
2019 Sustainable cities and society  
Energy efficient solutions in virtualization are a collection of live migration tools and scheduling heuristics. Both can become a competitive advantage for a cloud service provider.  ...  The potential value of ad placement and the associated risks are still poorly understood matters and need to be carefully considered in the context of blockchain implementations.  ... 
doi:10.1016/j.scs.2018.10.023 fatcat:4xsftjaqojdofi3j3vrnbp6w7q

Evil Offspring - Ransomware and Crypto Technology

Hilarie Orman
2016 IEEE Internet Computing  
Fogging/defogging must take into account the size, density, complexity, and tempo of the network, the mobility and geographic proximity of users and nodes where data shards are stored, how soon sharded  ...  . 4 In fact, most of these collaborative approaches are based on rich and efficient information sharing, which supports proper scheduling and monitoring of facility costs, performance and flexibility  ...  UAH Computer Science offers the BS, MS, and PhD degrees in Computer Science and the MS and PhD degrees in modeling and simulation.  ... 
doi:10.1109/mic.2016.90 fatcat:v5zmzx7qrba5dkqxweoo3ifvry

Distributed Intelligence in Wireless Networks [article]

Xiaolan Liu and Jiadong Yu and Yuanwei Liu and Yue Gao and Toktam Mahmoodi and Sangarapillai Lambotharan and Danny H. K. Tsang
2022 arXiv   pre-print
Learning (ML) with its potential to avoid the transmission of large dataset and possible compromise of privacy that may exist in cloud-based centralized learning.  ...  The cloud-based solutions are becoming inefficient due to considerably large time delays, high power consumption, security and privacy concerns caused by billions of connected wireless devices and typically  ...  A RL-based device selection, UAVs placement and resource management algorithm was developed for deploying the asynchronous FL framework in multi-UAV-enabled networks [145] , in which it also demonstrated  ... 
arXiv:2208.00545v1 fatcat:znfxcsceifevvbccog4yz5mkji

Scheduling techniques for efficient execution of stream workflows in cloud environments

MSM Barika
2020
sources and end users' requirements in terms of data processing and deadline for decision making.  ...  compared with the placement problem of streaming graph operators.  ...  objectives (Talbi et al., 2012) . * Guided random search based − This technique schedules tasks randomly. • Adaptive/Dynamic scheduling − This technique generates a scheduling plan that maps workflow  ... 
doi:10.25959/100.00034812 fatcat:4wq3wizftffvjbo2jpp2dwpepi

A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements and Future Directions

Rabia Khan, Pardeep Kumar, Dushantha Nalin K. Jayakody, Madhusanka Liyanage
2019 IEEE Communications Surveys and Tutorials  
. • Promote data accountability and responsibility: As the several players will involve in the 5G network, the data accountability and responsibility are highly required.  ...  In a OFDMA based CR network, the author of [224] has proposed an algorithm for cross-layer scheduling and spectrum access to optimize the average throughput of private and open information.  ... 
doi:10.1109/comst.2019.2933899 fatcat:bulfng6levdelgmel7oxoi6pna

Technological features of preservation systems that support the authenticity of digital records

Adam Jansen
2019
and three different software environments (one open source implementation, and two solutions using a mix of proprietary and open source tools in Linux and Microsoft Operating environments).  ...  and integrity of the records; and Maintenance, in the course of which the institutions safeguard the underlying bits, protect the networks upon which the records reside and implement processes to stay  ...  Securing ehealth records using keyless signature infrastructure blockchain technology in the cloud.  ... 
doi:10.14288/1.0384577 fatcat:pgexjlm6kfajji2kbdqg4qu5be

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends [article]

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 arXiv   pre-print
Recently, data plane programmability has attracted significant attention from both the research community and the industry, permitting operators and programmers in general to run customized packet processing  ...  Despite the impressive advantages of programmable data plane switches and their importance in modern networks, the literature has been missing a comprehensive survey.  ...  The switches explicitly and preemptively compute sending rates based on priorities encoded in scheduling headers, and the real-time link loads.  ... 
arXiv:2102.00643v2 fatcat:izxi645kozdc5ibfsqp2y2foau

An Exhaustive Survey on P4 Programmable Data Plane Switches: Taxonomy, Applications, Challenges, and Future Trends

Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb
2021 IEEE Access  
Recently, data plane programmability has attracted significant attention from both the research community and the industry, permitting operators and programmers in general to run customized packet processing  ...  Despite the impressive advantages of programmable data plane switches and their importance in modern networks, the literature has been missing a comprehensive survey.  ...  ACKNOWLEDGEMENT This material is based upon work supported by the National Science Foundation under grant numbers 1925484 and 1829698, funded by the Office of Advanced Cyberinfrastructure (OAC).  ... 
doi:10.1109/access.2021.3086704 fatcat:2jgbxj2cbfbp7fawkxwrztbbia
« Previous Showing results 1 — 15 out of 21 results