Techniques are proposed for computing a global virtual time (GVT), which is the minimum local virtual time of processes in Time Warp. the algorithm computes a conservative estimate of GVT using an approach which is co...
详细信息
ISBN:
(纸本)0818621443
Techniques are proposed for computing a global virtual time (GVT), which is the minimum local virtual time of processes in Time Warp. the algorithm computes a conservative estimate of GVT using an approach which is considerably simpler than previous algorithms for computing GVT. this algorithm does not require a global synchronization of processors. An inherent problem in GVT computation relates to handling messages in transit. Several alternatives are proposed for solving the transient message problem. the algorithm is suitable for distributed shared memory machines such as the BBN Butterfly and message passing machines with a variety of interconnection networks.
With a more significant number of devices integrated and connected in a VANET (Vehicular Ad Hoc Networks), there is greater availability and variety of computing resources to run applications. In VANETs, VFC (Vehicula...
详细信息
ISBN:
(数字)9781665486279
ISBN:
(纸本)9781665486279
With a more significant number of devices integrated and connected in a VANET (Vehicular Ad Hoc Networks), there is greater availability and variety of computing resources to run applications. In VANETs, VFC (Vehicular Fog computing) technology establishes vehicles, edge, and cloud as resource-providing infrastructures. However, the use of VFC as infrastructure for pedestrians is still limited, with few works addressing computational offloading in such a scenario. In this context, we implemented a decision algorithm for the offloading process based on resources provided by VFC to guarantee better offloading and latency rates. the results showed that the implemented algorithm obtained efficiency rates above 90% in the tested scenarios and a reduction of up to 40% in the offloading execution time compared to a random approach tested.
Software Defined Systems (SDS) abstract the actual hardware at different layers with software components, layers such as networking, Storage, Security, Servers, Data Centers, Clouds etc. this abstraction facilitates c...
详细信息
the Group Mutual l-Exclusion (GMLE) problem is an interesting combination of two widely studied generalizations of the classical mutual exclusion problem namely, k-exclusion and group mutual exclusion (GME). In GMLE, ...
详细信息
ISBN:
(纸本)9783642113215
the Group Mutual l-Exclusion (GMLE) problem is an interesting combination of two widely studied generalizations of the classical mutual exclusion problem namely, k-exclusion and group mutual exclusion (GME). In GMLE, up to l sessions can be held simultaneously. In the present exposition, we propose a token-based algorithm to the GMLE problem. To the best of our knowledge, this is the first token-based algorithm for the GMLE problem. the proposed algorithm satisfies all properties necessary for a GMLE algorithm.
distributed (computing) systems come in various sizes and scale. they range from a single workstation computer with several processors, a cluster of compute nodes (servers) to a federation of geographically distribute...
详细信息
ISBN:
(纸本)9781728150116
distributed (computing) systems come in various sizes and scale. they range from a single workstation computer with several processors, a cluster of compute nodes (servers) to a federation of geographically distributed data centres with millions of servers. Job scheduling is a fundamental aspect for data centre efficiency. In this paper, we present ds-viz as a visualisation aid for ds-sim, a recently developed distributed systems simulator. In particular, ds-viz significantly helps leverage the evaluation and analysis of scheduling algorithms that ds-sim facilitates to design. We show the effectiveness of these tools with some examples.
Software defined networking is going to be an essential part of networking domain which moves the traditional networking domain to automation network. Data security is going to be an important factor in this new netwo...
详细信息
ISBN:
(纸本)9781665414517
Software defined networking is going to be an essential part of networking domain which moves the traditional networking domain to automation network. Data security is going to be an important factor in this new networking architecture. Paper aim to classify the traffic into normal and malicious classes based on features given in dataset by using various deep learning techniques. the classification of traffic into one of the classes after pre-processing of the dataset is dune. We got accuracy score of 99.75% by applying Stacked Auto-Encoder Multi-layer Perceptron (SAE-MLP) which is explained in the paper. thus, the purpose of network traffic classification using deep learning techniques was fulfilled.
Measuring environmental data in city areas has become an important issue for municipalities due to several climate directives. As fixed measuring stations are inflexible, cost-intensive, and limited to monitoring a sp...
详细信息
Measuring environmental data in city areas has become an important issue for municipalities due to several climate directives. As fixed measuring stations are inflexible, cost-intensive, and limited to monitoring a specific spot, we developed a distributed environmental monitoring network called Environmental Monitoring in Metropolitan Areas (EMMA). this architecture is based on the delay tolerant networking approach and can be integrated into existing Public Transportation Networks (PTNs). Buses or other vehicles can be equipped with sensor nodes that gather data and forward messages. In order to evaluate the basic ideas of this project we performed a series of real-world experiments. Besides analyzing the behavior of 802.11-based Wireless Local Area Network (WLAN) between moving vehicles in a controlled environment, we also evaluated the communication performance in urban environments. Moreover, we examined the qualification of a Disruption Tolerant networking (DTN) implementation for spreading measurement results throughout the network. the suitability of EMMA's architecture has been successfully demonstrated by these experiments. Copyright (C) 2007 John Wiley & Sons, Ltd.
Both mobile and cloud computing are two areas which are rapidly expanding in terms of use case and functionality. Whilst mobile computing enables a variety of feature rich functionality for users in a non-fixed locati...
详细信息
Both mobile and cloud computing are two areas which are rapidly expanding in terms of use case and functionality. Whilst mobile computing enables a variety of feature rich functionality for users in a non-fixed location, cloud computing is revolutionising the way in which computing resources are being provisioned, used and optimised for both service providers and end users. these two fields are being combined in order to provide greater functionality for mobile devices by off loading resources to the cloud. However, the advantages of this only hold true if the device resources are truly optimised. this paper examines the effect of network simulation on understanding methods for optimising device life and suggests a number of ways in which Software-Defined-networking (SDN) may be leveraged in order to determine the exact nature of optimisations available through this combination. (C) 2016 Published by Elsevier B.V.
Withthe rapid development of mobile Internet and electronic commerce, massive transactional operations under new data modules becomes the dominated workload of the database systems. In order to meet the functional an...
详细信息
ISBN:
(纸本)9781450366199
Withthe rapid development of mobile Internet and electronic commerce, massive transactional operations under new data modules becomes the dominated workload of the database systems. In order to meet the functional and performance requirements of this kind of business, new distributed transactional databases system evolve fast. However, because of the distinct technical differences between the new distributed transactional database and traditional centralized transactional database, such as technical component architecture and principles of computing and storage, the evaluation framework and method for traditional database cannot directly apply to distributed transactional database. For example, the existing benchmarks can't evaluate high availability, scalability, and distributed consistency issues which are important characteristics after distribution. It is urgent for the industry to construct evaluation methods for distributed transactional databases so as to comprehensively measure the technical maturity and capability of these products. In this paper, we first summarize the definition and characteristics of distributed transactional database system. After evaluating the existing test benchmarks for distributed transactional database, we propose a new evaluation framework and test methods for distributed transactional database system. this paper provides a new guidance for testing and selecting distributed transactional database in the world.
the rapidly increasing complexity of computing systems is driving the movement towards autonomic systems that are capable of managing themselves without the need for human intervention. Without autonomic technologies,...
详细信息
ISBN:
(纸本)0769522815
the rapidly increasing complexity of computing systems is driving the movement towards autonomic systems that are capable of managing themselves without the need for human intervention. Without autonomic technologies, many conventional systems suffer reliability degradation due to the accumulation of errors. the autonomic management techniques break the traditional reliability degradation trend. this paper comprehensively describes the roles and functions of various autonomic components, and systematically reviews past and current technologies that have been/are being developed to address the specific areas of the autonomic computing environment. the effort to identify those ideas can lead to the design of more advanced autonomic computingthat will support highly reliable systems, as briefly proposed in the conclusion.
暂无评论