Filters








22,594 Hits in 12.0 sec

The TMO Scheme for Wide-Area Distributed Real-Time Computing and Distributed Time-Triggered Simulation

K. H. Kim, Stephen F. Jenks
2007 2007 IEEE International Parallel and Distributed Processing Symposium  
The distributed time-triggered simulation (DTS) scheme is a new type of an approach to real-time simulation based on parallel / distributed computing.  ...  Some parts of our recent efforts on establishing a technical foundation for wide-area distributed real-time computing (DRC) and distributed time-triggered simulation (DTS) are briefly reviewed.  ...  Acknowledgment: The work reported here was supported in part by the NSF under Grant Numbers 02-04050 (NGS) and in part by the NSF under Cooperative Agreement ANI-0225642 to UCSD for "The OptIPuter".  ... 
doi:10.1109/ipdps.2007.370495 dblp:conf/ipps/KimJ07 fatcat:piaxrde2jvemzcakrjjotrp5wq

A Multi-layered Scheme for Distributed Simulations on the Cloud Environment

Shichao Guan, Robson De Grande, Azzedine Boukerche
2015 IEEE Transactions on Cloud Computing  
Such a PaaS should satisfy the requirements of distributed simulation standards, and support the management and maintenance of underlying resources that these standards do not cover.  ...  In this thesis, we propose a new multi-layered cloud-based scheme for enabling modeling and simulation based on different distributed simulation standards.  ...  4 6 8 4 Principles of Advanced and Distributed Simulation, PADS 2005.  ... 
doi:10.1109/tcc.2015.2453945 fatcat:55kvxuztkrdf3hcpdyuvy4h3se

Simulation-Based Modeling and Evaluation of Incentive Schemes in Crowdsourcing Environments [chapter]

Ognjen Scekic, Christoph Dorn, Schahram Dustdar
2013 Lecture Notes in Computer Science  
We show how the model is used to simulate different compositions of incentive mechanisms and model parameters, and how these choices influence the costs on the system provider side and the number of malicious  ...  More specifically, we present a simulation model of incentive schemes and evaluate it on a relevant real-world scenario.  ...  Acknowledgments This work has been partially supported by the EU FP7 SmartSociety project under Grant No. 600854 and the Austrian Science Fund (FWF) under Grant No. J3068-N23.  ... 
doi:10.1007/978-3-642-41030-7_11 fatcat:u55mzh4dhjftlol5r3gtjzij6a

Scheme in Industrial Automation

Marco Benelli
2012 European Lisp Symposium  
instance, to run Maxima in the Sage environment), but also fully functional as the core of arbitrarily complex standalone applications.  ...  This paper discusses the history of this implementation, starting with its roots in the ECoLisp, KCL and AKCL programmes, and the difficulties faced in upgrading this software to make it fully standalone  ...  Acknowledgments The author would like to thank the referees for their constructive remarks which helped improving the quality of the paper and the code.  ... 
dblp:conf/els/Benelli12 fatcat:dgfa433t4fbhrfyhbvj5nj6ds4

Speculative Interference Attacks: Breaking Invisible Speculation Schemes [article]

Mohammad Behnia, Prateek Sahu, Riccardo Paccagnella, Jiyong Yu, Zirui Zhao, Xiang Zou, Thomas Unterluggauer, Josep Torrellas, Carlos Rozas, Adam Morrison, Frank Mckeen, Fangfei Liu (+4 others)
2021 arXiv   pre-print
The highly publicized vulnerability uses speculative execution to learn victim secrets by changing cache state.  ...  We show that this problem is not easy to fix: Speculative interference converts timing changes to persistent cache-state changes, and timing is typically ignored by many cache-based defenses.  ...  of the frontend and the execution engine are not deallocated until the instruction becomes non-speculative.  ... 
arXiv:2007.11818v4 fatcat:mijmtovhzfdjhd3xiamgus4mqe

Timing Assurance of Avionic Reconfiguration Schemes using Formal Analysis

A. A. Da Fontoura, F. A. M. Do Nascimento, S. Nadjm-Tehrani, E. P. De Freitas
2019 IEEE Transactions on Aerospace and Electronic Systems  
This paper proposes a distributed reconfigurable architecture for application migration from failed modules to working ones.  ...  A case study is used to show the application of the presented approach as a proof of concept.  ...  For the AMP solution, every single core has an RMC to provide health monitoring and the reconfiguration execution.  ... 
doi:10.1109/taes.2019.2915406 fatcat:saboak45dnd73akrsbmomuiyom

An SDN Controller Security Cluster Scheme Based on Intrusion Detection Technology

Xiao-feng XU, Jia-hao DAI, Gao-lei YANG
2020 DEStech Transactions on Computer Science and Engineering  
Finally, we implemented the scheme based on Opendaylight controller, and proved the effectiveness of the scheme by experiments.  ...  In the SDNs, the control layer is the core of the entire network, and its security is very important. In practical applications, the control layer is usually composed of SDN controller clusters.  ...  alarm is triggered to simulate a network attack, and the alarm is output in the alert file in the /var/log/snort directory.  ... 
doi:10.12783/dtcse/msam2020/34235 fatcat:e3kwpc2tbjflxnlwglbzgolq4q

A Novel Query Caching Scheme for Dynamic InfiniBand Subnets

Evangelos Tasoulas, Ernst Gunnar Gran, Bjorn Dag Johnsen, Tor Skeie
2015 2015 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing  
Without their positiveness, supervision, suggestions and encouragement, my PhD journey would not have been so fruitful and enjoyable during both the good and hard times.  ...  A special thank you must be directed to Hårek Haugerud, Anis Yazidi, Hugo Lewi Hammer, Laurence Marie Anna Habib and the whole NETSYS group at the Oslo and Akershus University College for being so supportive  ...  A metric that users directly perceive when executing a well known workload, is how much time did the computation need to complete and if the execution has been delayed.  ... 
doi:10.1109/ccgrid.2015.10 dblp:conf/ccgrid/TasoulasGJS15 fatcat:hsxswl63gfbtbdipuhvrhx6y7u

Using Migratable Objects to Enhance Fault Tolerance Schemes in Supercomputers

Esteban Meneses, Xiang Ni, Gengbin Zheng, Celso L. Mendes, Laxmikant V. Kale
2015 IEEE Transactions on Parallel and Distributed Systems  
Our experimental results on thousands of cores suggest fault tolerance schemes based on migratable objects have low performance overhead and high scalability.  ...  In this paper, we demonstrate how the migratable-objects model facilitates and improves several fault tolerance approaches.  ...  ACKNOWLEDGMENTS This research was supported in part by the US Department of Energy under grant DOE DE-SC0001845 and by a machine allocation on XSEDE under award ASC050039N.  ... 
doi:10.1109/tpds.2014.2342228 fatcat:eejnsy5vuzgx7kb64yigciuhwa

Experimenting New Metaphors for PDM through a Model Driven Engineering Scheme [chapter]

Frédéric Noël, Mohd Azwan Azli
2013 IFIP Advances in Information and Communication Technology  
This paper proposes the Model Driven Engineering horizontal transformation approach to provide a systematic way to explore Virtual Reality opportunities within the PDM scope.  ...  But PLM systems did not solve complexity and new gaps must be managed. At this point, it may be interesting to investigate new ways to overpass the new complexity gap.  ...  This paper was written within the scope of the VISION-AIR infrastructure project. VISIONAIR is leaded by Grenoble INP, 46 avenue Felix Viallet, F-38 031 Grenoble cedex 1, FRANCE.  ... 
doi:10.1007/978-3-642-41501-2_57 fatcat:exkjxilj5jbhzajuxdhi4piehy

Performance evaluation of a voice call handover scheme between LTE and UMTS

J. Namakoye, R. Van Olst
2011 IEEE Africon '11  
The resulting equations were simulated and the output was analysed and compared with the Third Generation Partnership Project (3GPP) specifications.  ...  As cellular networks evolve from the third generation Universal Mobile Telecommunication System (UMTS) to the Long Term Evolution (LTE), a new Evolved Packet Core (EPC) will support heterogeneous radio  ...  If they trigger, then it allows handover execution.  ... 
doi:10.1109/afrcon.2011.6072033 fatcat:5dbveurbmjgj7mpfmp3q2zmqfi

Seamless session mobility scheme in heterogeneous wireless networks

Kuan-Lin Chiu, Yuh-Shyan Chen, Ren-Hung Hwang
2010 International Journal of Communication Systems  
The simulation and numerical results demonstrate that the proposed SmSCTP scheme yields better signaling cost, hand-off delay time, packet loss and delay jitter than SIP and mSCTP protocols.  ...  This work describes the major idea of the proposed scheme and infrastructure. The proposed scheme has been implemented in Linux system.  ...  They introduced a core component, called the Rule Engine (RE), to collect the information from multiple layers of a protocol stack or other databases.  ... 
doi:10.1002/dac.1189 fatcat:zuzxi4uzhfexfdmzcuzht3m4gu

TMSUI: A Trust Management Scheme of USB Storage Devices for Industrial Control Systems [chapter]

Bo Yang, Yu Qin, Yingjun Zhang, Weijin Wang, Dengguo Feng
2016 Lecture Notes in Computer Science  
The security of sensitive data and the safety of control signal are two core issues in industrial control system (ICS).  ...  ICS for a particular period of time.  ...  This work was supported in part by grants from the National Natural Science Foundation of China (91118006) and the National 973 Program of China (2013CB338003).  ... 
doi:10.1007/978-3-319-29814-6_13 fatcat:w5trytqirzhbxmo7kb4phlkday

EMC: The Effective Multi-Path Caching Scheme for Named Data Networking

Hao Wu, Jun Li, Yi Wang, Bin Liu
2013 2013 22nd International Conference on Computer Communication and Networks (ICCCN)  
Extensive simulation results demonstrate that our proposed caching scheme is effective, scalable and light-weight. 978-1-4673-5775-3/13/$31.00 ©2013 IEEE * Since our objective is to reducing the inter-ISP  ...  The Named Data Networking (NDN) is proposed recently as a promising paradigm for the future Internet due to its built-in caching and name-based routing for efficient content distribution.  ...  As such, the average communication consumption for each router is around 16KB during a triggered interval. 3) Execution time: Table IV shows the actual execution time of EMC and LCProb measured from  ... 
doi:10.1109/icccn.2013.6614132 dblp:conf/icccn/WuLWL13 fatcat:wiwbj7fitjbrxal563u4mcbxwa

Influence of A-Posteriori Subcell Limiting on Fault Frequency in Higher-Order DG Schemes

Anne Reinarz, Jean-Mathieu Gallard, Michael Bader
2018 2018 IEEE/ACM 8th Workshop on Fault Tolerance for HPC at eXtreme Scale (FTXS)  
Algorithmically, it can be interpreted as element-local checkpointing and restarting of the solver with a more robust finite volume scheme on a fine subgrid.  ...  We show that the limiter indeed increases the resilience of the DG algorithm, detecting and correcting particularly those faults which would otherwise lead to a fatal failure.  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the compute and data resources provided by the Leibniz Supercomputing Centre (www.lrz.de).  ... 
doi:10.1109/ftxs.2018.00012 dblp:conf/sc/ReinarzGB18 fatcat:qhpux7hu7nckdnlhdzqnytc47y
« Previous Showing results 1 — 15 out of 22,594 results