the proceedings contain 25 papers. the special focus in this conference is on Reconciling Parallelism and Predictability in Mixed-Critical systems. the topics include: Parallel-operation-oriented optically reconfigura...
ISBN:
(纸本)9783319160856
the proceedings contain 25 papers. the special focus in this conference is on Reconciling Parallelism and Predictability in Mixed-Critical systems. the topics include: Parallel-operation-oriented optically reconfigurable gate array;exploiting outer loops vectorization in high level synthesis;cache- and communication-aware application mapping for shared-cache multicore processors;parallelizing convolutional neural networks on Intel many integrated core architecture;mobile ecosystem driven dynamic pipeline adaptation for low power;a virtual execution environment for cyber-physical applications;trustworthy self-optimization in organic computing environments;improving reliability and endurance using end-to-end trust in distributed low-power sensor networks;privacy preserved content disclosure for data sharing in cloud;virtualized communication controllers in safety-related automotive embeddedsystems;network interface with task spawning support for NoC-based DSM architectures;MESI-based cache coherence for hard real-time multicore systems and speeding up static probabilistic timing analysis.
the proceedings contain 51 papers. the special focus in this conference is on three broad areas of Computer Science viz., Distributed computing, Internet Technologies, and Societal applications. the topics include: Pr...
ISBN:
(纸本)9783319149769
the proceedings contain 51 papers. the special focus in this conference is on three broad areas of Computer Science viz., Distributed computing, Internet Technologies, and Societal applications. the topics include: Privacy and security challenges in internet of things;fusing sensors for occupancy sensing in smart buildings;discrete control-based design of adaptive and autonomic computingsystems;efficient algorithms and data structures for accurate transcriptomics;gathering asynchronous swarm robots under nonuniform limited visibility;path planning algorithm for mobile anchor in connected sensor networks;on-the-fly symmetry reduction of explicitly represented probabilistic models;time and cost aware checkpointing of choreographed web services;financial risk management in e-commerce using executable business process modeling notation;a hybrid model for dynamic composition and execution of heterogeneous web services;application of soft computing technique for web service selection;weighted load balanced adaptive gateway discovery in integrated internet MANET;improving activity prediction and activity scheduling in smart home networks for enhanced QoS;computationally secure cheating identifiable multi-secret sharing for general access structure;a centrality measure based approach for network anonymization;a Chinese remainder theorem based key management algorithm for hierarchical wireless sensor network;an evolutionary computation based classification model for network intrusion detection;a cryptosystem for blind computing on encrypted character strings;a secure image hashing technique for forgery detection;design and development of secure cloud architecture for sensor services and genetic algorithm framework for Bi-objective task scheduling in cloud computingsystems.
Performing a tsunami or storm surge simulation in realtime is a highly challenging research topic that calls for a collaboration between mathematicians and computer scientists. One must combine mathematical models wi...
详细信息
ISBN:
(纸本)9789897581205
Performing a tsunami or storm surge simulation in realtime is a highly challenging research topic that calls for a collaboration between mathematicians and computer scientists. One must combine mathematical models with numerical methods and rely on computational performance and code parallelization to produce accurate simulation results as fast as possible. the traditional modeling approaches require a lot of computing power and significant amounts of electrical energy;they are also highly dependent on uninterrupted access to a reliable power supply. this paper presents a concept how to develop suitable low power hardware architectures for tsunami and storm surge simulations based on cooperative software and hardware simulation. the main goal is to be able - if necessary - to perform simulations in-situ and battery-powered. For flood warning systems installed in regions with weak or unreliable power and computing infrastructure, this would significantly decrease the risk of failure at the most critical moments.
Cyber-Physical systems (CPS) are subject to platform-given resource constraints upon such resources as CPU, memory, and bus, in executing their functionalities. this causes the behavior of a verified application to de...
详细信息
Triple stores are the backbone of the evolution of the Linked Data Web. However, even standard queries on many at- tributes can result in high query response times using avail- able triple stores. For use in commercia...
详细信息
ISBN:
(纸本)9781450334624
Triple stores are the backbone of the evolution of the Linked Data Web. However, even standard queries on many at- tributes can result in high query response times using avail- able triple stores. For use in commercial search applications, particularly for web scale applications, short and predictable query response times are a strict necessity in order to achieve industrial applicability. In this paper, a custom index extension for the Virtuoso triple store is used to improve the runtime of typical queries. the index extension is connected to a lightweight bitset index that covers the properties in question. A case study withreal world data in the e-commerce domain shows that more comprehensive queries even on highly materialized data result in consistently improved query response times with a predictable upper bound that meets industrial requirements. Hence, to the best of our knowledge, industrial applicability is achieved for the first time considering the requirements of the e-commerce industry.
To improve the real-time performance of anti-jamming decision making, this paper proposes an initial population optimization particle swarm algorithm (IPO-PSO). this algorithm utilizes a portion of the solution from t...
详细信息
ISBN:
(纸本)9781510821279
To improve the real-time performance of anti-jamming decision making, this paper proposes an initial population optimization particle swarm algorithm (IPO-PSO). this algorithm utilizes a portion of the solution from the previous decision as the initial population in the current decision; thus optimizes the adaptive quality of the initial population used for the current decision. the simulation results show that the proposed method can increase the convergence rate of the particle swarm optimization algorithm without increasing the complexity. thus, this method provides impressive real-time performance and is ideally suited for demanding applications such as in military antijamming communications systems.
Cross-ISA (Instruction Set Architecture) system-level virtual machine has a significant research and practical value. For example, several recently announced virtual smart phones for iOS which run smart phone applicat...
详细信息
ISBN:
(纸本)9781450334501
Cross-ISA (Instruction Set Architecture) system-level virtual machine has a significant research and practical value. For example, several recently announced virtual smart phones for iOS which run smart phone applications on x86 based PCs are deployed on cross-ISA system level virtual machines. Also, for mobile device application development, by emulating the Android/ARM environment on the more powerful x86-64 platform, application development and debugging become more convenient and productive. However, the virtualization layer often incurs high performance overhead. the key overhead comes from memory virtualization where a guest virtual address (GVA) must go through multilevel address translation to become a host physical address (HPA). the embedded Shadow Page Table (ESPT) approach has been proposed to effectively decrease this address translation cost. ESPT directly maps GVA to HPA, thus avoid the lengthy guest virtual to guest physical, guest physical to host virtual, and host virtual to host physical address translation. However, the original ESPT work has a few drawbacks. For example, its implementation relies on a loadable kernel module (LKM) to manage the shadow page table. Using LKMs is less desirable for system virtual machines due to portability, security and maintainability concerns. Our work proposes a different, yet more practical, implementation to address the shortcomings. Instead of relying on using LKMs, our approach adopts a shared memory mapping scheme to maintain the shadow page table (SPT) using only "mmap" system call. Furthermore, this work studies the support of SPT for multi-processing in greater details. It devices three different SPT organizations and evaluates their strength and weakness with standard and real Android applications on the system virtual machine which emulates the Android/ ARM platform on x86-64 systems.
the proceedings contain 30 papers. the topics discussed include: crowdsourced semantic annotation of scientific publications and tabular data in PDF;complex event extraction from real-time news streams;an elastic and ...
ISBN:
(纸本)9781450334624
the proceedings contain 30 papers. the topics discussed include: crowdsourced semantic annotation of scientific publications and tabular data in PDF;complex event extraction from real-time news streams;an elastic and scalable spatiotemporal query processing for linked sensor data;toward a statistical data integration environment the role of semantic metadata;the role of reasoning for RDF validation;accessing and reasoning with data from disparate data sources using modular ontologies and OBDA;making sense of description logics;integrating custom index extensions into virtuoso RDF store for e-commerce applications;knowledge base shipping to the linked open data cloud;a linked data platform for finite element biosimulations;and cross-lingual lexical matching with word translation and local similarity optimization.
this paper presents an approach to the synthesis of secure real-timeapplications mapped on distributed embeddedsystems, which focuses on preventing fault injection attacks. We utilize symmetric cryptographic service...
详细信息
this paper presents an approach to the synthesis of secure real-timeapplications mapped on distributed embeddedsystems, which focuses on preventing fault injection attacks. We utilize symmetric cryptographic service to protect confidentiality, and deploy fault detection within confidential algorithm to resist fault injection attacks. Several fault detection schemes are identified, and their fault coverage rates and time overheads are derived and measured, respectively. Our synthesis approach makes efforts to determine the best fault detection schemes for the encryption/decryption of messages, such that the overall security strength of resisting fault injection attack is minimized, and the deadline constraint of the real-timeapplications is guaranteed. Since addressing the problem is still a NP-hard problem, we propose an efficient algorithm based on Fruit fly Optimization Algorithm (FOA), which can achieve better results by lower time overheads, compared with simulated annealing algorithm. Extensive experiments demonstrate the superiority of our approach.
Nowadays modern chip multi-cores (CMPs) become more demanding because of their high performance especially in real-timeembeddedsystems. On the other side, bounded latencies has become vital to guarantee high perform...
详细信息
Nowadays modern chip multi-cores (CMPs) become more demanding because of their high performance especially in real-timeembeddedsystems. On the other side, bounded latencies has become vital to guarantee high performance and fairness for applications running on CMPs cores. We propose a new memory controller that prioritizes and assigns defined quotas for cores within unified epoch (MCES). Our approach works on variety of generations of double data rate DRAM(DDR DRAM). MCES is able to achieve an overall performance reached 35% for 4 cores system.
暂无评论