this paper presents an experience in use of a parallel mathematical library, ScaLAPACK, on a network composed by heterogeneous workstations. the good performance results have been obtained by means of a distributed pr...
详细信息
ISBN:
(纸本)3540422935
this paper presents an experience in use of a parallel mathematical library, ScaLAPACK, on a network composed by heterogeneous workstations. the good performance results have been obtained by means of a distributed programming environment which is able to dynamically evaluate available computing power at each workstation and to distribute accordingly the set of parallel processes.
One of the prime concern of modern computing world is to optimize energy consumption by an efficient scheduling algorithm. the scheduling process is an NP-complete problem and challenging to produce an optimal solutio...
详细信息
ISBN:
(纸本)9781538644300
One of the prime concern of modern computing world is to optimize energy consumption by an efficient scheduling algorithm. the scheduling process is an NP-complete problem and challenging to produce an optimal solution. In this paper, we have used a minimum-energy-maximum execution time based scheduling approach as a promising method to answer the problem. Our contribution is analyzed and evaluated by extensive experimental results on various synthetic data sets. through extensive simulation runs, the result shows that the proposed algorithm performs better than the existing algorithms like MinMin, MCT, and priority based performance improved algorithm (PPIA). A statistical hypothesis test ANOVA and followed by post-hoc analysis are conducted to demonstrate the effectiveness of the proposed work.
the advent of the Internet of things (IoT) leads to the pervasion of business and private spaces with ubiquitous, networked computing devices. these devices do not simply act as sensors, but feature computational, sto...
详细信息
ISBN:
(纸本)9781509047819
the advent of the Internet of things (IoT) leads to the pervasion of business and private spaces with ubiquitous, networked computing devices. these devices do not simply act as sensors, but feature computational, storage, and networking resources. these resources are close to the edge of the network, and it is a promising approach to exploit them in order to execute IoT services. this concept is known as fog computing. Despite existing theoretical foundations, the adoption of fog computing is still at its very beginning. Especially, there is a lack of approaches for the leasing and releasing of resources. To resolve this shortcoming, we present a conceptual framework for fog resource provisioning. We formalize an optimization problem which is able to take into account existing resources in fog/IoT landscapes. the goal of this optimization problem is to provide delay-sensitive utilization of available fog-based computational resources. We evaluate the resource provisioning model to show the benefits of our contributions. Our results show a decrease in delays of up to 39% compared to a baseline approach, yielding shorter round-trip times and makespans.
One of the most attractive features considered by the recent LTE-A standard is the introduction of femtocells in its main architecture. Rapidly, femtocell technology has been recognized as a potential solution to offl...
详细信息
ISBN:
(纸本)9781457720147
One of the most attractive features considered by the recent LTE-A standard is the introduction of femtocells in its main architecture. Rapidly, femtocell technology has been recognized as a potential solution to offload cellular networks since its deployment is expected to grow up considerably in the near future. However, the small coverage of femtocells may lead to frequent handoffs that need permanent support of the core network. Hence, to ensure seamless handovers through such networks, local mobility management remains an important task to be addressed. In this paper, we propose an efficient X2-based local mobility scheme that allows mobile users to perform handovers with minimum signaling load compared to the mobility procedures proposed in the 3GPP LTE-A standard.
Algorithmic thinking is one of the main key concepts in computational thinking. With using computers in close to all areas of our lives, the progress of algorithmic solutions to problems is very crucial. the comprehen...
详细信息
ISBN:
(纸本)9781538644300
Algorithmic thinking is one of the main key concepts in computational thinking. With using computers in close to all areas of our lives, the progress of algorithmic solutions to problems is very crucial. the comprehension of the character of problems and their algorithmic solutions is enormously most important for everyone. Algorithmic thinking is the capability to realize, execute, assessment, and create computational procedures for solving problems. this paper presents Alg-Design, a visual and block based programming environment to facilitate novices to improve the comprehension of Algorithmic thinking using programming and computing. the visual programming environment motivates students and they find enjoyable while creating personally meaningful projects.
In this paper, we focus on the video streaming as a concrete application of the Peer-to-Peer (P2P) technology, and consider the problem of properly recording contributions made by each peer to make a fair differentiat...
详细信息
this paper describes a design alternative for organizing shared (data) objects in a distributed memory system. Shared objects are organized based on concepts derived from the fields of object-oriented programming and ...
详细信息
ISBN:
(纸本)3540422935
this paper describes a design alternative for organizing shared (data) objects in a distributed memory system. Shared objects are organized based on concepts derived from the fields of object-oriented programming and applied to the philosophy of a distributed shared memory system. Inheritance is implemented through an object hierarchy in which each object inherits information from the ancestor objects, located higher in the hierarchy tree. All other object oriented programming concepts are preserved or adapted to the philosophy of the proposed system. To the best of our knowledge, no similar DSM systems have been proposed by now.
the appealing scenario of today9;s era demands more important security and privacy measures. Cloud computing is considered to be the most crucial computing paradigm for on-demand services, pay-as-you-go model, stor...
详细信息
ISBN:
(纸本)9781538644300
the appealing scenario of today's era demands more important security and privacy measures. Cloud computing is considered to be the most crucial computing paradigm for on-demand services, pay-as-you-go model, storage and processing of data/information. Existing security mechanism has failed in multiple aspects. this paper introduces a naive defense mechanism named as FilterFog. this FilterFog has been implemented to serve two important criteria. the first criterion sums up the reason why fog computing firstly came into the picture i.e. as an extension of the cloud. the fog computing basically provides the cloud services at the network's edge granting proximity. the second criterion is fog computing acting as a defense mechanism for cloud against DDoS attack. Here it uses some script files and some IP table forwarding rules to filter the traffic. this paper is a naive attempt at using fog as FilterFog.
the Mobile Agent paradigm can increase the flexibility in the creation of distributed applications (and the restructuring of sequential applications for distributed systems), and can in particular provide with a robus...
详细信息
ISBN:
(纸本)3540422935
the Mobile Agent paradigm can increase the flexibility in the creation of distributed applications (and the restructuring of sequential applications for distributed systems), and can in particular provide with a robust framework for managing dynamical workload balancing. In this paper we show how the restructuring of a sequential code implementing an irregularly structured application, a combinatorial optimization performed with Branch & Bound (B&B) technique, with adoption of the mobile agent model, allows for yielding a dinamically load-balanced distributed version. the application of the mobile agent model is discussed, with respect to the solutions adopted for knowledge sharing, communication, load balancing, and termination condition.
A crucial challenge in the implementation of cooperative protocol is how to assign relay nodes properly. In this paper, we address the relay assignment issue in the wireless networks where the source nodes, destinatio...
详细信息
ISBN:
(纸本)9781467324809
A crucial challenge in the implementation of cooperative protocol is how to assign relay nodes properly. In this paper, we address the relay assignment issue in the wireless networks where the source nodes, destination nodes and relay nodes are randomly distributed in a large area. Without any kind of central controller, we try to solve the relay assignment problem in a distributed manner withthe local information. Based on this network model, we developed a distributed Genetic Algorithm (DGA) based scheme to pursue a better system capacity compared with other distributed algorithms. We also presented a brief discussion and analysis on the DGA algorithm. At last, extensive simulations show that the DGA outperforms other distributed algorithms with obvious improvement of the system capacity and converges fast.
暂无评论