72 Hits in 4.8 sec

NoCGIN: A Gamma Interconnection Network as NoC Interconnect

Meenal A., Nitin Nitin, Atul Kumar
2016 International Journal of Computer Applications  
The paper further gives information about the topology of NoCGIN and a simple routing algorithm for routing packets.  ...  Many researchers tried to utilize the boosted capacity of multiprocessor chips to implement time consuming, bulky, parallel algorithms.  ...  Gamma Network variants with their routing methods Sr. No. Name of Network Routing Method Used 1 1. GIN Distance Tag Routing 2. Kappa Network Destination Tag Routing 3.  ... 
doi:10.5120/ijca2016909552 fatcat:i2oya2o3rnerllpu2gosnojfpy

Is an alligator better than an armadillo? [interconnection networks]

K.J. Liszka, J.K. Antonio, H.J. Siegel
1997 IEEE Concurrency  
ACKNOWLEDGMENTS The authors thank Janet M. Siegel and Nancy Talbert for their comments, Muthucumaru Maheswaran for his assistance with the illustrations, and Marcelia Sawyers for her careful typing.  ...  A preliminary version of portions of this material was presented at The New Frontiers: A Workshop on Future Directions of Massively Parallel Processing.  ...  The fault-tolerance criterion is the condition that must be met for the network to tolerate the fault.  ... 
doi:10.1109/4434.641622 fatcat:dquvzlnk3ngsrkudd5agvsnihi

Reliability and Performance Analyses of Balanced Gamma Network for use in Broadband Communication Switch Fabrics [chapter]

H. Sivakumar, R. Venkatesan
1996 IFIP Advances in Information and Communication Technology  
This paper studies the fault tolerance and reliability of the balanced gamma network.  ...  It is shown that the balanced gamma network is single fault-tolerant and robust under multiple faults.  ...  The BG network uses a reverse destination tag routing scheme [20, 21] . The routing tag bits for a cell to be routed from sourceS to destination Dis Din binary.  ... 
doi:10.1007/978-0-387-34987-9_47 fatcat:xstmbmzc7vfhpi4nsvzqxxqoxm

Fault location techniques for distributed control interconnection networks

Nathaniel J. Davis, William Tsun-Yuk Hsu, Howard Jay Siegel
1985 IEEE transactions on computers  
This paper focuses on fault location procedures suitable for use in networks that employ distributed routing control through the use of routing tags and message transmission protocols.  ...  Faults occurring in the data lines can corrupt message routing tags transmitted over them and thereby cause misrouting of messages.  ...  Fault tolerance can be introduced into the network through the use of one or more "extra" stages of switches [1] , [3] , [12] .  ... 
doi:10.1109/tc.1985.6312193 fatcat:aphjdtlilncwhhbk37vbg2iuvy

Performance Study of Packet Switching Multistage Interconnection Networks

Jungsun Kim Kim
1994 ETRI Journal  
Network Control Strategy Delta Destination Tag Algorithm Gamma Unrestricted Routing Kappa Fault-tolerant Destination Tag Algorithm Multipath network with cross link H-route cept of congestion  ...  4] , Kappa network [5] , Multipath network with cross link [6] , etc.  ... 
doi:10.4218/etrij.94.0194.0033 fatcat:yec5wi462rbcjnih6lqq6sr6da

Using the multistage cube network topology in parallel supercomputers

H.J. Siegel, W.G. Nation, C.P. Kruskal, L.M. Napolitano
1989 Proceedings of the IEEE  
The multistage cube topology can he converted into a single-stage network by associating with each switch in the network a processor (and a memory).  ...  Properties of systems that use the multistage cube network in this way are also examined. Manuscript  ...  ACKNOWLEDGMENT The authors gratefully acknowledge the following people for providing information for section VII: Ken  ... 
doi:10.1109/5.48833 fatcat:kiwmgx4lqrbyza6m52nvpuwf2y

Large-scale parallel processing systems

Howard Jay Siegel, Thomas Schwederski, David G Meyer, William Tsun-yuk Hsu
1987 Microprocessors and microsystems  
This need is generally a result of the time constraints on attaining the results combined with the computational complexity of the algorithms involved and the sizes of the  ...  The single stage Cube, PM21, Four Nearest Neighbor and Shuffle-Exchange networks are presented, and the multistage Cube network is described.  ...  A fault tolerant variation of the Generalized Cube network, the Extra Stage Cube (ESC) network s6, is included in the prototype.  ... 
doi:10.1016/0141-9331(87)90325-5 fatcat:wb54jmakv5hb7k7wfkssjz3zwq

High-throughput, low-memory applications on the Pica architecture

D.S. Wills, H.H. Cat, J. Cruz-Rivera, W.S. Lacy, J.M. Baker, J.C. Eble, A. Lopez-Lagunas, M. Hopper
1997 IEEE Transactions on Parallel and Distributed Systems  
Word-tag synchronization bits provide low-cost synchronization.  ...  The results of these experiments and an evaluation of Pica's architectural features are presented.  ...  The use of a direct mapped context cache allows these tag comparisons to occur in parallel with the datapath operation, but prior to the destination write.  ... 
doi:10.1109/71.629488 fatcat:t3cajwzvnfbafcqhlnjik5jlse

Context-Aware Migratory Services in Ad Hoc Networks

Oriana Riva, Tamer Nadeem, Cristian Borcea, Liviu Iftode
2007 IEEE Transactions on Mobile Computing  
The experimental results obtained over an ad hoc network of personal digital assistants (PDAs) show the effectiveness of our approach in the presence of frequent disconnections.  ...  Unlike a regular service that executes always on the same node, a migratory service can migrate to different nodes in the network in order to accomplish its task.  ...  The authors would also like to thank the anonymous reviewers who helped them improve this paper.  ... 
doi:10.1109/tmc.2007.1053 fatcat:beqsx45swbfivbtoclncagf2vq

Software defined networking to support the software defined environment

C. Dixon, D. Olshefski, V. Jain, C. DeCusatis, W. Felter, J. Carter, M. Banikazemi, V. Mann, J. M. Tracey, R. Recio
2014 IBM Journal of Research and Development  
algorithms that eliminate limitations of traditional Ethernet routing and allow newer network topologies.  ...  This enables more automation and optimization of the network and, when combined with software defined compute and software defined storage, forms one of the three pillars of IBM's software defined environment  ...  ., Open Networking Foundation, Embrane, Inc., Sun Microsystems, or InfiniBand Trade Association in the United States, other countries, or both.  ... 
doi:10.1147/jrd.2014.2300365 fatcat:ddjts2h2qbh7vdcjwtulzykq4y

Topology Embedding on GIN Family

Meenal Borkar, Nitin, Atul Kumar
This paper tries to map / embed frequently used topologies on GIN family network. The promising network variants like 3D-CGIN, CGIN along with original GIN are considered for mapping purpose.  ...  GIN variants with size 8 are considered for mapping. The paper presents the comparison of factors related to mapping.  ...  GIN Distance Tag Routing 2. Kappa Network Destination Tag Routing 3. Extra Stage GIN Distance Tag Routing 4. B-Network Destination Tag Routing 5.  ... 

NileOS: A Distributed Asymmetric Core-Based Micro-kernel for Big Data Processing

A. El-Rouby, A. Khalaf, A. Mostafa, F. Mohamed, N. Ghaly, A. El-Kadi, K. Sobh
2020 IEEE Access  
In this paper, we present a new special purpose distributed micro-kernel designed with big data applications' needs in mind.  ...  INDEX TERMS Asymmetric multiprocessing, big data, distributed micro-kernels, core-based, general-purpose operating systems, inter-processor interrupts, inter-processor interrupts over Ethernet, network  ...  The gateway directory service should be conceptually a centralized service deployed over redundant scalable underlying infrastructure for maximum scalability, availability, and fault-tolerance.  ... 
doi:10.1109/access.2020.3048082 fatcat:blviwcspubdnbdqd2wvvoopij4

A secure and efficient inventory management system for disasters

Eren Erman Ozguven, Kaan Ozbay
2013 Transportation Research Part C: Emerging Technologies  
The novelty of this thesis is that, for the first time in the emergency inventory management field, the proposed approach combines an offline planning strategy with online control techniques in a unified  ...  network-based functional approximation, simultaneous perturbation stochastic approximation (SPSA), and continuous time model predictive control (CMPC) techniques.  ...  With the target 156 values and simulated data obtained using the multi-commodity SHIC model, the neural network approximation with the LM algorithm and the SPSA algorithm are used to solve the unconstrained  ... 
doi:10.1016/j.trc.2011.08.012 fatcat:qzgdoz5onzai7hvjfs3pi4h22i

A methodology for studying persistency aspects of internet flows

Jörg Wallerich, Holger Dreger, Anja Feldmann, Balachander Krishnamurthy, Walter Willinger
2005 Computer communication review  
Acknowledgments Orion Hodson assisted with our TBIT measurements. Thanks also to Gorry Fairhurst, Sourabh Ladha, and the anonymous reviewers for their helpful feedback.  ...  The research of the authors is supported in part by EPSRC grant GR/S86266/01.  ...  While this setup guarantees the scalability of the multihoming solution, such multi-addressed configuration presents additional difficulties when attempting to provide the fault tolerance capabilities  ... 
doi:10.1145/1064413.1064417 fatcat:b5leqpkvmnd5paw2vws4mqhlme

Welcome message from the General Chairs

Giovanni Giambene, Boon Sain Yeo
2009 2009 International Workshop on Satellite and Space Communications  
Many papers demonstrated notable systems with good analytical and/or empirical analyses. Each paper was reviewed by at least two reviewers (most papers received three reviews each).  ...  All accepted papers will be included in the Proceeding of Adaptation, Learning and Optimization Series published by Springer-Verlag.  ...  Autonomous cyberphysical systems often have safety-critical missions, which means they must be fault tolerant.  ... 
doi:10.1109/iwssc.2009.5286448 fatcat:wcu4uzasizhzjmdkzyekynnqwi
« Previous Showing results 1 — 15 out of 72 results