This article presents a short (and partial) history of synchronization in systems made up of asynchronous sequential processes (automata). Among other points, it shows that synchronization (which consists in ordering ...
详细信息
ISBN:
(纸本)9783031744976;9783031744983
This article presents a short (and partial) history of synchronization in systems made up of asynchronous sequential processes (automata). Among other points, it shows that synchronization (which consists in ordering operations issued by processes on shared objects) has a different flavor according to the fact that the objects are physical objects (such as a printer or a disk) or logical objects (immaterial objects represented by sequences of bits). It then follows from this physical/logical nature of computing objects that mutual exclusion is to physical objects what consensus is to logical objects. The article also addresses recent results on process synchronization in fully anonymous systems (systems in which processes cannot be distinguished one from the other, and where there is a disagreement on the addresses of the memory registers.
Broadcast is a ubiquitous distributed computing problem that underpins many other system tasks. In static, connected networks, it was recently shown that broadcast is solvable without any node memory and only constant...
详细信息
Convolutional Neural networks (CNNs) have reached a certain level of technological maturity and researchers are now focusing on what they learn, how they work, why, and how to further improve their performance. For ex...
详细信息
ISBN:
(纸本)9798331531317;9798331531300
Convolutional Neural networks (CNNs) have reached a certain level of technological maturity and researchers are now focusing on what they learn, how they work, why, and how to further improve their performance. For example, incorporating Gabor filters - a mathematical representation of the responses in the mammalian primary visual cortex into CNNs has been shown to boost CNN performance in terms of accuracy. Motivated by the ability of Gabor filters to increase the performance of CNNs and the importance of proposing diverse analytical tools to facilitate CNN evaluation and modeling, we proposed a novel three-step methodology specially crafted to systematically analyze and evaluate vision CNNs in terms of the similarity of their first-layer filters to Gabor filters. It is based on direct similarity measurements, and also indirect measurements of similarity through the impact of filter replacement on performance (accuracy) and security (resilience to adversarial attacks). The methodology demonstrates great potential for the areas of explainability, evaluation and modeling of CNN filter responses. Our results showed that all first-layer filters formed in the examined CNNs are highly similar or almost identical to Gabor filters, which was confirmed by our direct and indirect measurements. The security-related experiment further showed that although the filter replacement does not fully protect the network against the perturbations from the baseline model, it can slightly improve its resilience suggesting potential practical implications for security. We provide our code at https://***/iitis/Gabor-Replacement.
distributed denial of service (DDoS) is the most popular disruptive type of attack in wireless sensor networks (WSNs). It is extremely harmful for the functioning of the network, since it generates a huge amount of tr...
详细信息
distributed denial of service (DDoS) is the most popular disruptive type of attack in wireless sensor networks (WSNs). It is extremely harmful for the functioning of the network, since it generates a huge amount of traffic through flooding of the spam packets into the target system. The malicious nodes present in the network prevent the legitimate users from the access to the network through flooding. Hence, it is necessary to handle this issue. Intrusion detection systems (IDSs) are used to monitor all incoming packets and they can compare the traffic patterns to detect the anomalous network activity. In this paper, a survey of works on DDoS attacks launched by the malicious users and the detection of such attacks using IDS are discussed. Moreover, this survey focuses on the IDSs developed using classification techniques since they have been used for detecting and preventing the DDoS attacks more efficiently.
In the context of 6G IoT networks, distributed computing has become a critical enabler for seamless communication across diverse sectors, such as smart manufacturing, intelligent transportation, healthcare, and defens...
详细信息
Vehicular Ad-hoc networks (VANETs) are integral to the future of smart vehicles and transportation, facilitating real-time information sharing and communication among vehicles to enhance safety, improve traffic flow, ...
详细信息
Datacenter environments are gaining an increasing presence in most technology sectors due to the progressive move of information systems to the cloud. The main drivers for this transition are the lower cost of operati...
详细信息
ISBN:
(纸本)9798350366112;9798350366129
Datacenter environments are gaining an increasing presence in most technology sectors due to the progressive move of information systems to the cloud. The main drivers for this transition are the lower cost of operating in a shared infrastructure, the reliability and availability of public clouds and the convenience of a software-based management of the networking infrastructure. This trend is pushing the conversion from private clouds to public clouds for most non-regulated applications which do not require strict levels of performance or security. Hybrid clouds, where part of the infrastructure is deployed in private locations and interface with public clouds, or colocations within the datacenter are also common in sectors like finance, health or companies with strict cybersecurity or confidentiality requirements. Additionally, multiple distributed applications like telecom or utility networks have centralized their services in the datacenter while maintaining distributed access networks nationwide. Following the requirements of the applications with an increasing footprint in the datacenter, time synchronization needs have evolved in terms of accuracy, scalability, reliability and monitoring. In this paper, we present a novel technique which allows White Rabbit devices to measure the offset between their local synchronized clock and several distributed time sources with picosecond-level resolution leveraging their sub-nanosecond time synchronization accuracy. In order to demonstrate the unprecedent capabilities of this technique, the paper showcases multiple experiments where multiple White Rabbit and external Pulse Per Second and clock inputs are evaluated in the laboratory and in a real-life interconnection between two datacenters in a metro area.
This paper presents a fully synthesizable capacitor-less digital low-dropout regulator (DLDO) for distributed power delivery networks in large-scale digital systems. A coarse-fine dual loop architecture is adopted for...
详细信息
ISBN:
(纸本)9798350330991;9798350331004
This paper presents a fully synthesizable capacitor-less digital low-dropout regulator (DLDO) for distributed power delivery networks in large-scale digital systems. A coarse-fine dual loop architecture is adopted for better transient response and higher output voltage accuracy. The coarse loop uses a CMPtriggered oscillator to achieve faster recovery under load voltage droop. An inverter-based droop detector is connected directly to the output voltage, which provides rapid detection of undershoot voltage and dispenses with bulky external capacitors. Moreover, the DLDO is implemented using only digital standard cells and auto place-and-route (P&R) tool. The fully synthesizability enables seamless integration into existing digital systems, providing flexibility and scalability. Therefore, the proposed DLDO offers a scalable and portable architecture that has a low design time cost for a distributed power delivery network. The proposed DLDO is implemented and simulated in the 40-nm CMOS technology, with a core area of 0.04 mm(2). The range of input voltage is from 0.6 to 1.1 V with a 50-mV dropout voltage. When the current load is increased by 120 mA with a 2 ns edge time, the DLDO exhibits a voltage droop of 126 mV, a response time of 2.1 ns and a settle time of 7.5 ns, respectively. The maximum load current and peak current efficiency are 200 mA and 99.98%, respectively.
Minimizing energy consumption is one of the most interesting issues in recent industrial production. Energy-efficient scheduling is a promising approach to reducing energy consumption in manufacturing systems. However...
详细信息
In an era where digital commerce continues to burgeon, the conventional supply chain confronts challenges of inefficiency, fraud, and a dearth of transparency. Blockchain, renowned for its decentralized and immutable ...
详细信息
暂无评论