MPEG-4 is currently being developed by MPEG to specify the technologies for supporting current and emerging multimedia applications. Because of its object-based features and flexible toolbox approach, it is much more ...
详细信息
MPEG-4 is currently being developed by MPEG to specify the technologies for supporting current and emerging multimedia applications. Because of its object-based features and flexible toolbox approach, it is much more complex than previous video coding standards. We believe that software-based implementation on parallel and distributed computing systems is a natural and viable option. In this paper, we describe such an approach on the MPEG-4 video encoder using a cluster of workstations. We propose to use hierarchical Petri nets as a modeling tool to describe the temporal relations and time constraints among various video objects at different levels. This would allow us to perform scheduling with a guarantee of synchronization among multiple objects. A dynamic shape-adaptive data parallel approach is used in the spatial domain for further speed-up gain. Our preliminary results indicate that real-time MPEG-4 encoding using distributed and parallel computing is achievable.
Conventional approaches for implementing barrier synchronization in large scale systems result in long synchronization times due to memory and network contention. The authors present some applications of a very simple...
详细信息
Conventional approaches for implementing barrier synchronization in large scale systems result in long synchronization times due to memory and network contention. The authors present some applications of a very simple barrier hardware that allows barrier synchronizations to be performed within a few processor cycles. The low latency of this barrier synchronizer and its ability to allow dynamic participation permits several rather unconventional applications like low-latency software combining, scans and determination of extremum values in constant time. This paper presents these applications.< >
Resource allocation decisions are critical for the design of embedded real-time systems. Today's trend to software integration makes these decisions tightly coupled to the software architecture. In this paper we d...
详细信息
ISBN:
(纸本)9780769531328
Resource allocation decisions are critical for the design of embedded real-time systems. Today's trend to software integration makes these decisions tightly coupled to the software architecture. In this paper we discuss the use of architectural models to guide and maintain the integrity of the resource allocation decision at different levels of refinement of the system design. We discuss the budgeting process to split the development process into different teams, the use of bin packing techniques for low level resource allocation and the isolation strategies to separate the different criticality levels of these systems.
In order to effectively provide INaaS (Inference-as-a-Service) for AI applications in resource-limited cloud environments, two major challenges must be overcome: achieving low latency and providing multi-tenancy. This...
详细信息
This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th international Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in Sep...
ISBN:
(数字)9783319238296
ISBN:
(纸本)9783319238289;9783319238296
This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th international Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.
software Architecture (SA) is emerging as an important research area in softwareengineering and forms the backbone for building successful softwareintensive systems. Based on practical requirements, especially the re...
详细信息
software Architecture (SA) is emerging as an important research area in softwareengineering and forms the backbone for building successful softwareintensive systems. Based on practical requirements, especially the requirements of distributed applications and Internet applications, a new architectural style referred to as TreeSA is proposed. The primary elements of TreeSA and he message routing mechanism are discussed. Finally, an application based on TreeSA is outlined.
Group decisions are crucial in solving complex problems successfully across many socio-Technical contexts. The development of distributed group decision systems are problem-specific, literally with no systematic suppo...
详细信息
Grid and peer-to-peer (P2P) network technologies enable aggregation of distributed resources for solving large-scale and computationally-intensive applications. These technologies are well-suited for bag-of-tasks (BoT...
详细信息
Grid and peer-to-peer (P2P) network technologies enable aggregation of distributed resources for solving large-scale and computationally-intensive applications. These technologies are well-suited for bag-of-tasks (BoT) applications, because each application consists of many parallel and independent tasks. With multiple users competing for the same resources, the key challenge is to finish a user application within a specified deadline. In this paper, we propose a time optimization algorithm that schedules a user application on auction-based resource allocation systems. These allocation systems, which are based on proportional share, allow users to bid higher in order to gain more resource shares. Therefore, this algorithm adjusts a user bid periodically on these systems in order to finish the application on time.
Summary form only given. This paper describes a parallel debugger and the related debugging support implemented for CHARM++, a data-driven parallel programming language. Because we build extensive debugging support in...
详细信息
Summary form only given. This paper describes a parallel debugger and the related debugging support implemented for CHARM++, a data-driven parallel programming language. Because we build extensive debugging support into the parallel runtime system, applications can be debugged at a very high level.
作者:
Pierre RiteauIRISA
INRIA Rennes-Bretagne Atlantique University of Rennes I Rennes France
The emergence of cloud computing infrastructures brings new ways to build and manage computing systems, with the flexibility offered by virtualization technologies. In this context, this PhD thesis focuses on two prin...
详细信息
The emergence of cloud computing infrastructures brings new ways to build and manage computing systems, with the flexibility offered by virtualization technologies. In this context, this PhD thesis focuses on two principal objectives. First, leveraging virtualization and cloud computing infrastructures to build distributed large scale computing platforms from multiple cloud providers, allowing to run software requiring large amounts of computation power. Second, developing mechanisms to make these infrastructures more dynamic. These mechanisms, providing inter-cloud live migration, offer new ways to exploit the inherent dynamic nature of distributed clouds.
暂无评论