Autonomous machines are expected to work in unknown environments where machines may be destroyed or reinforced. We model a continuous version of the mobile-agent dispersion problem and simulate the dynamic response wh...
详细信息
ISBN:
(纸本)9798331521561;9798331521554
Autonomous machines are expected to work in unknown environments where machines may be destroyed or reinforced. We model a continuous version of the mobile-agent dispersion problem and simulate the dynamic response when a machine team arrives to help another machine team.
the increasing gap between processor and disk performance leads to high performance computing (HPC) applications facing I/O bottlenecks. this makes parallel file systems one of the most important components in an HPC ...
详细信息
ISBN:
(纸本)9798350370621
the increasing gap between processor and disk performance leads to high performance computing (HPC) applications facing I/O bottlenecks. this makes parallel file systems one of the most important components in an HPC cluster. this work analyzes the I/O performance of different workloads for various BeeGFS configurations. Our analysis shows that the default allocation strategies and striping configuration leads to an imbalanced distribution of workload data, thereby negatively affecting the I/O performance.
the paper proposed an approach to building a scalable service for spatiotemporal data storage to be used in applications that require searching for localized data and possibility of scaling up the storage resources. T...
详细信息
ISBN:
(纸本)9798350367607;9798350367591
the paper proposed an approach to building a scalable service for spatiotemporal data storage to be used in applications that require searching for localized data and possibility of scaling up the storage resources. the motivation for proposing this approach was enabling the localized data being overlayed over the map, while transferring only required data and minimize the latency time. the paper describes the architecture combining the R-star tree index and Log Structured Merge (LSM) tree methods. the implementation framework based on Erlang OTP is proposed to provide a basis for sustainability and resiliency.
the emerging technology of quantum computing has the potential to change the way how problems will be solved in the future. this work presents a centralized network control algorithm executable on already existing qua...
详细信息
ISBN:
(纸本)9798350363869;9798350363852
the emerging technology of quantum computing has the potential to change the way how problems will be solved in the future. this work presents a centralized network control algorithm executable on already existing quantum computer which are based on the principle of quantum annealing like the D-Wave AdvantageT. We introduce a resource reoccupation algorithm for traffic engineering in wide-area networks. the proposed optimization algorithm changes traffic steering and resource allocation in case of overloaded transceivers. Settings of active components like fiber amplifiers and transceivers are not changed for the reason of stability. this algorithm is beneficial in situations when the network traffic is fluctuating in time scales of seconds or spontaneous bursts occur. Further, we developed a discrete-time flow simulator to study the algorithm's performance in wide-area networks. Our network simulator considers backlog and loss modeling of buffered transmission lines. Concurring flows are handled equally in case of a backlog. this work provides an ILP-based network configuring algorithm that is applicable on quantum annealing computers. We showcase, that traffic losses can be reduced significantly by a factor of 2 if a resource reoccupation algorithm is applied in a network with bursty traffic. As resources are used more efficiently by reoccupation in heavy load situations, overprovisioning of networks can be reduced. thus, this new form of network operation leads toward a zero-margin network. We show that our newly introduced network simulator enables analyses of short-time effects like buffering within fat-pipe networks. As the calculation of network configurations in real-sized networks is typically time-consuming, quantum computing can enable the proposed network configuration algorithm for application in realsized wide-area networks.
Withthe increasing use of mobile Cloud computingsystems (MCC) in various domains, including offices, homes, hospitals, and transportation, distributed Denial of Service (DDoS) attacks have become more frequent and c...
详细信息
ISBN:
(纸本)9798331515935;9783903176690
Withthe increasing use of mobile Cloud computingsystems (MCC) in various domains, including offices, homes, hospitals, and transportation, distributed Denial of Service (DDoS) attacks have become more frequent and complex, posing new challenges and risks. therefore, enhancing the three defense mechanisms (prevention, detection, and mitigation) is crucial. In this paper, we propose a machine-learning model that utilizes neural network techniques, such as an Evolutionary recurrent self-organizing map (ERSOM), in combination with a K-means classifier to detect botnet attacks and ensure the establishment of all defense mechanisms in mobile cloud computing system. Our performance results demonstrate the effectiveness of the proposed adaptive ERSOM model compared withthe literature.
distributedcomputing capabilities at the network's edge enable new use cases, e.g., smart factories, industrial internet of things, or autonomous mobility systems. While new applications evolve, managing the reso...
详细信息
ISBN:
(纸本)9798350361360;9798350361353
distributedcomputing capabilities at the network's edge enable new use cases, e.g., smart factories, industrial internet of things, or autonomous mobility systems. While new applications evolve, managing the resources and being capable of integrating and adjusting the execution of tasks in a distributed edge infrastructure is of great importance. For this, applications need to be migrated between different nodes. these migrations must happen without interruption, allowing the system to meet service requirements while fully utilizing all available hardware resources. therefore, applications should also be executable on all different compute nodes in a heterogeneous edge system without interfering with each other. To this end, applications should be granted only necessary permission, especially when un-trusted applications are integrated into the system. We, therefore, propose a migration method for isolated applications across heterogeneous compute nodes in service-oriented edge architectures. A service-oriented architecture is used to decouple applications, allowing for flexible scheduling. the migration method enables the fast migration of sandboxed applications based on WebAssembly by utilizing a two-stage migration approach. the concept can utilize multiple communication protocols for management and service communication. We have implemented a proof of concept based on the Zenoh(1) communication protocol. While the time required depends on the communication protocol and the memory size, we achieved migration delays of under 51 milliseconds for smaller applications. By providing a method for fast migration for applications across heterogeneous compute nodes, it is possible for distributed edge infrastructures to run applications independently from each other and adjust the execution node based on changes in the system's environment. By integrating applications into our framework, they are executed isolated and with strict access control, allowing for easier reuse
Geo-location, also known as measurement report (MR) location, is a technique to determine the geographic location of user equipment (UE) and the behaviour attribute of telephone traffic based on wireless signals measu...
详细信息
Standard distribution middleware has traditionally been perceived as complex software which is not suitable for satisfying the highest certification criteria in safety-critical environments. However, this idea is slow...
详细信息
ISBN:
(纸本)9798350387964;9798350387957
Standard distribution middleware has traditionally been perceived as complex software which is not suitable for satisfying the highest certification criteria in safety-critical environments. However, this idea is slowly changing and there are efforts such as the Future Airborne Capability Environment (FACE) consortium to integrate standard distribution middleware into the development of avionic systems. this integration facilitates the interoperability and portability of avionic applications, but there are still challenges that need to be addressed before full success can be achieved. To this end, this paper explores the usage of the Data Distribution Service for Real-Time systems (DDS) on top of a partitioned system with a communication network based on the ARINC 664 specification (precisely, the AFDX network). this work specifically identifies the incompatibilities between the two standards and also proposes potential solutions. A set of overhead metrics of using DDS in a distributed partitioned platform is also provided.
Federated Learning (FL) has become a viable technique for realizing privacy-enhancing distributed deep learning on the network edge. Heterogeneous hardware, unreliable client devices, and energy constraints often char...
详细信息
ISBN:
(纸本)9798400706233
Federated Learning (FL) has become a viable technique for realizing privacy-enhancing distributed deep learning on the network edge. Heterogeneous hardware, unreliable client devices, and energy constraints often characterize edge computingsystems. In this paper, we propose FLEdge, which complements existing FL benchmarks by enabling a systematic evaluation of client capabilities. We focus on computational and communication bottlenecks, client behavior, and data security implications. Our experiments with models varying from 14K to 80M trainable parameters are carried out on dedicated hardware with emulated network characteristics and client behavior. We find that state-of-the-art embedded hardware has significant memory bottlenecks, leading to 4x longer processing times than on modern data center GPUs.
While significant investments have been made in the exploration of ethics in computation, recent advances in high performance computing (HPC) and artificial intelligence (AI) have reignited a discussion for more respo...
详细信息
ISBN:
(纸本)9783031346675;9783031346682
While significant investments have been made in the exploration of ethics in computation, recent advances in high performance computing (HPC) and artificial intelligence (AI) have reignited a discussion for more responsible and ethical computing with respect to the design and development of pervasive sociotechnical systems within the context of existing and evolving societal norms and cultures. the ubiquity of HPC in everyday life presents complex sociotechnical challenges for all who seek to practice responsible computing and ethical technological innovation. the present paper provides guidelines which scientists, researchers, educators, and practitioners alike, can employ to become more aware of one's personal values system that may unconsciously shape one's approach to computation and ethics.
暂无评论