Efficient load balancing is essential for distributedsystems to have outstanding performance and scalability. this study compares the load balancing strategies of two popular distributed application frameworks, gRPC ...
详细信息
In recent years, there has been significant growth in mobile wireless sensor networks (WSNs), yet prevailing research has primarily focused on 2D planar deployments, overlooking the importance of three-dimensional (3D...
详细信息
In recent years, there has been significant growth in mobile wireless sensor networks (WSNs), yet prevailing research has primarily focused on 2D planar deployments, overlooking the importance of three-dimensional (3D) coverage in various applications. this oversight leads to ineffective data gathering due to incomplete area coverage and network connectivity. In previous researches (Boufares et al. in: 2018 31 IEEE/ACS 15thinternationalconference on computer systems and applications (AICCSA), Aqaba, Jordan, pp 1-8, 2018, in: 13thinternational wireless communications and mobile computingconference (IWCMC), Valencia, pp 1628-1633, 2017, in: IEEE wireless communications and mobile computingconference (IWCMC), Dubrovnik, Croatia, pp 563-568, 2015a, in: the 4thinternationalconference on performance evaluation and modeling in wired and wireless networks (PEMWN), Hammamet, Tunisia, pp 103-108, 2015b), we proposed 3D mobile autonomous redeployment strategies based on the Virtual Forces Algorithm, tailored for diverse configurations: 3D volume applications such as smart homes or agriculture, 3D flat surfaces like snow monitoring, and 3D terrain surfaces like volcano monitoring. Our approach ensured complete coverage and connectivity in these scenarios. Moreover, energy efficiency emerges as a critical concern, given the autonomous and mobile nature of sensor nodes operating on finite battery power. Hence, in this paper, we provide an overview of our previous results, highlighting the efficacy of our 3D mobile autonomous redeployment strategies across various configurations. Subsequently, we delve into an in-depth analysis of the energy consumption associated withthe different proposed contributions. Building upon these insights, we propose an energy harvesting approach aimed at extending the operational lifespan of mobile 3D WSNs, thus ensuring sustained functionality in diverse real-world *** these contributions, we address critical challenges and p
the proceedings contain 28 papers. the topics discussed include: performance and usability implications of multiplatform and WebAssembly containers;operations patterns for hybrid quantum applications;optimization of c...
ISBN:
(纸本)9789897587474
the proceedings contain 28 papers. the topics discussed include: performance and usability implications of multiplatform and WebAssembly containers;operations patterns for hybrid quantum applications;optimization of cloud-native application execution over the edge cloud continuum enabled by DVFS;energy-aware node selection for cloud-based parallel workloads with machine learning and infrastructure as code;security-aware allocation of replicated data in distributed storage systems;performance analysis of mdx ii: a next-generation cloud platform for cross-disciplinary data science research;data orchestration platform for AI workflows execution across computing continuum;framework for decentralized data strategies in virtual banking: navigating scalability, innovation, and regulatory challenges in thailand;and anomaly detection for partially observable container systems based on architecture profiling.
In distributedcomputing, coding techniques are shown to be an effective solution for mitigating the impact of stragglers. However, previous research on coding has predominantly focused on homogeneous worker environme...
详细信息
ISBN:
(纸本)9798350385304;9798350385298
In distributedcomputing, coding techniques are shown to be an effective solution for mitigating the impact of stragglers. However, previous research on coding has predominantly focused on homogeneous worker environments, overlooking the fact that real-world systems often consist of heterogeneous workers with varying computing and communication capabilities. Specifically, uniform load allocation, without considering worker heterogeneity, can result in substantial latency losses. In this paper, we propose a load allocation strategy designed for distributedsystems with group heterogeneity, where workers in the same group have similar computing and communication capabilities, but workers of different groups do not. By exploring group-wise MDS codes, we determine the optimal code dimension and optimal computation loads for individual groups. Our proposed approach demonstrates comparable computation times to existing methods, while exhibiting the advantage of much shorter encoding and decoding times.
Edge computing and storage have been proposed as an alternative to current cloud computing infrastructures to address the latter's limitations. However, edge computing services and support for applications based o...
详细信息
ISBN:
(纸本)9781665477062
Edge computing and storage have been proposed as an alternative to current cloud computing infrastructures to address the latter's limitations. However, edge computing services and support for applications based on edge infrastructures are still in the incipient stages. there are numerous storage services for efficient data storage in the cloud. In contrast, few such services exist at the edge. We look at the performance of a cloud storage service Cassandra when deployed on an edge network. In this paper, we analyze Cassandra's performance in three different networks. We vary Cassandra's attributes and the overall conditions in each network to simulate a real-world scenario and study the effect on the total time taken for a particular request. We (a) establish trends for different configurations, (b) discuss the reasoning behind them, and (c) suggest optimal configurations for the networks used, which are important for deploying Cassandra in an edge setting.
this paper summarizes state-of-the-art results on data series processing withthe emphasis on parallel and distributed data series indexes that exploit the computational power of modern computing platforms. the paper ...
详细信息
ISBN:
(纸本)9783031516429;9783031516436
this paper summarizes state-of-the-art results on data series processing withthe emphasis on parallel and distributed data series indexes that exploit the computational power of modern computing platforms. the paper comprises a summary of the tutorial the author delivered at the 15thinternationalconference on Management of Digital Ecosystems (MEDES'23).
Decentralization is an important feature both for security and for reliability as it reduces the risks of collusion and impact of the single-point-of-failure vulnerability in a system. After having recalled the re-enc...
详细信息
ISBN:
(纸本)9783031485893;9783031485909
Decentralization is an important feature both for security and for reliability as it reduces the risks of collusion and impact of the single-point-of-failure vulnerability in a system. After having recalled the re-encryption procedure - mainly to establish notations - we will describe a modification of the distributed encrypted storage protocol by Ateniese-Fu-Green-Hohenberger. Such a protocol is a strongly centralized one since it assigns to the manager the possibility of storing all the symmetric keys involved in enciphering the resources required by the users of the system. Our goal here is to show how to reduce the role of the manager as being just a certifier of the access requests to the shared resources. We will achieve this by using standard public-key cryptography tools like the digital signature with message integrity.
Cloud computing is becoming part and parcel of the optimization of wireless networks for distributed mobile applications. thanks to the scalable, distributed nature of Kubernetes which leverages the to-be had sources ...
详细信息
Future telecommunications networks are increasingly vulnerable to external attacks mainly due to the fast development of applications based on the massive use of IoT devices As a consequence, the perimeter of attacks ...
详细信息
ISBN:
(纸本)9798350377774;9798350377767
Future telecommunications networks are increasingly vulnerable to external attacks mainly due to the fast development of applications based on the massive use of IoT devices As a consequence, the perimeter of attacks on networks has expanded enormously and traditional security control techniques need to evolve to cope withthis issue. A promising approach leverages the potential of Programmable Data Planes, that will characterize future networks, to implement effective in-network Intrusion Detection systems (IDS). Initial works addressed the in-network IDS development, mainly with a centralized approach. In this paper, instead, we propose a Proof-of-Concept study dealing with a deployment approach that allows to distribute across the network nodes an in-network IDS created via a chain of Weak Learners. this, as demonstrated in the Prof-of-Concept experiments shown, allows to overcome some limitations of in-network centralized approaches, by working faster, and occupying fewer resources of the devices involved, while maintaining the level of precision sought.
Traffic congestion is a pervasive problem causing severe environmental and economic issues. In recent years, traffic signal control using reinforcement learning (RL) has come a long way. Most existing studies focus on...
详细信息
ISBN:
(纸本)9798331507879;9798331507862
Traffic congestion is a pervasive problem causing severe environmental and economic issues. In recent years, traffic signal control using reinforcement learning (RL) has come a long way. Most existing studies focus on using distributed agents with data exchange among neighbors, which, however, increases network complexity and usage and still suffers from the lack of broader coordination. Meanwhile, the attention mechanism has achieved tremendous success, and advances in vehicle-to-infrastructure (V2I) communications have enabled real-time collections of granular data. However, integrating these technologies into traffic signal control remains under-explored. therefore, we present GreenLight, a forward-thinking and eco-friendly traffic signal control framework that can be applied to V2I-equipped fog computing environments. For a large urban area, traffic signals are divided into clusters, each coordinated by a fog node with an RL agent. Intra-cluster indexed self-attention is applied to extract context-aware features that the fog-residing RL agent utilizes to determine the proper signal control command. Results of simulation experiments using both synthetic and real-world scenarios show that the presented framework yields lower waiting time, emissions, and fuel consumption compared to baseline methods, indicating its potential for next-generation transportation systems.
暂无评论