Multi-access Edge Computing (MEC) is a central piece of 5G telecommunication systems and is essential to satisfy the challenging low-latency demands of future applications. MEC provides a cloud computing platform at t...
Multi-access Edge Computing (MEC) is a central piece of 5G telecommunication systems and is essential to satisfy the challenging low-latency demands of future applications. MEC provides a cloud computing platform at the edge of the radio access network. Our previous publications argue that edge computing should be transparent to clients, leveraging software-Defined Networking (SDN). While we introduced a solution to implement such a transparent approach, one question remained: How to handle user requests to a service that is not yet running in a nearby edge cluster? One advantage of the transparent edge is that one could process the initial request in the cloud. However, this paper argues that on-demand deployment might be fast enough for many services, even for the first request. We present an SDN controller that automatically deploys an application container in a nearby edge cluster if no instance is running yet. In the meantime, the user’s request is forwarded to another (nearby) edge cluster or kept waiting to be forwarded immediately to the newly instantiated instance. Our performance evaluations on a real edge/fog testbed show that the waiting time for the initial request – e.g., for annginx-based service – can be as low as 0.5 seconds – satisfactory for many applications.
High-fidelity flow simulations are indispensable when analyzing systems exhibiting multiphase flow phenomena. The accuracy of multiphase flow simulations is strongly contingent upon the finest mesh resolution used to ...
High-fidelity flow simulations are indispensable when analyzing systems exhibiting multiphase flow phenomena. The accuracy of multiphase flow simulations is strongly contingent upon the finest mesh resolution used to represent the fluid-fluid interfaces. However, the increased resolution comes at a higher computational cost. In this work, we propose algorithmic advances that aim to reduce the computational cost without compromising on the physics by selectively detecting key regions of interest (droplets/filaments) that require significantly higher resolution. The framework uses an adaptive octree–based meshing framework that is integrated with PETSc’s linear algebra solvers. We demonstrate scaling of the framework up to 114,688 processes on TACC’s Frontera. Finally, we deploy the framework to simulate one of the most resolved simulations of primary jet atomization. This simulation – equivalent to 35 trillion grid points on a uniform grid – is 64× larger than current state–of–the–art simulations and provides unprecedented insights into an important flow physics problem with a diverse array of engineering applications.
Cellular Automata (CA) remain actively used to model phenomena as diverse as crowd evacuation, urban planning, or tumors. In their simplest form, CA use a synchronous approach such that cells are updated all together....
详细信息
ISBN:
(纸本)9781665433266
Cellular Automata (CA) remain actively used to model phenomena as diverse as crowd evacuation, urban planning, or tumors. In their simplest form, CA use a synchronous approach such that cells are updated all together. This perfectly synchronous update has been criticized for lack of realism, as it produces outcomes that may not be obtained with less synchronization. Consequently, CA may use an asynchronous update to overcome some of these artifacts. While numerous works have shown how to scale CA models by parallelizing their synchronous updates, a paucity of research has explored the asynchronous case. We present and empirically evaluate algorithms for efficient parallel executions of two types of asynchronous updates: random order and cyclic order. Our algorithms select random orderings that suit parallel execution and are therefore approximate in nature. Our results suggest that they can effectively leverage parallelism while keeping results well aligned with the sequential baseline implementation.
The proceedings contain 27 papers. The special focus in this conference is on Theoretical Aspects of softwareengineering. The topics include: AllSynth: Transiently Correct Network Update Synthesis Accounting for ...
ISBN:
(纸本)9783031103629
The proceedings contain 27 papers. The special focus in this conference is on Theoretical Aspects of softwareengineering. The topics include: AllSynth: Transiently Correct Network Update Synthesis Accounting for Operator Preferences;improving Adversarial Robustness of Deep Neural Networks via Linear Programming;consistency of Heterogeneously Typed Behavioural Models: A Coalgebraic Approach;a Language-Based Causal Model for Safety;complexity of distributed Petri Net Synthesis;Development of Monitoring systems for Anomaly Detection Using ASTD Specifications;Extending SysML with Refinement and Decomposition Mechanisms to Generate Event-B Specifications;dynamic Environment Simulation for Database Performance Evaluation;dynamic Specification Mining Based on Transformer;Testing Vehicle-Mounted systems: A Stepwise Symbolic Execution Approach for OSEK/VDX Programs;optimizing Trans-Compilers in Runtime Verification Makes Sense – Sometimes;machine-Assisted Proofs for Institutions in Coq;extending Process Algebra with an Undefined Action;MSDetector: A Static PHP Webshell Detection System Based on Deep-Learning;collaborative Verification of Uninterpreted Programs;practical Theory of Computation on Structures;automatic Classification of Bug Reports Based on Multiple Text Information and Reports’ Intention;preface;equivalence of Denotational and Operational Semantics for Interaction Languages;on Verification of Smart Contracts via Model Checking;sound Static Analysis of Regular Expressions for Vulnerabilities to Denial of Service Attacks;A Case Study in the Automated Translation of BSV Hardware to PVS Formal Logic with Subsequent Verification;formal Verification of a Keystore;repairing Adversarial Texts Through Perturbation;supporting Algorithm Analysis with Symbolic Execution in Alk.
Modern real-time systems are susceptible to cyber-attacks. The growing adoption of multi-core platforms, where safety and non-safety critical tasks coexist, further introduces new security challenges. Existing solutio...
详细信息
ISBN:
(数字)9798350371284
ISBN:
(纸本)9798350371291
Modern real-time systems are susceptible to cyber-attacks. The growing adoption of multi-core platforms, where safety and non-safety critical tasks coexist, further introduces new security challenges. Existing solutions suffer from either a lack of determinism or excessive cost. This paper addresses these shortcomings and proposes an offline analysis to compute all feasible schedules for real-time tasks running on a multi-core platform, isolating compromised tasks while guaranteeing a fail-operational system and low-cost reconfigurable scheduling. Our experimental results using a UAV autopilot system on a quad-core platform (Raspberry Pi) demonstrate that the proposed scheme incurs run-time recovery overhead at the level of microseconds. Also, the reconfiguration process covers up to 100% of all possible responses for compromised tasks in the synthetic test cases.
The trajectory monitoring based on attitude recognition is the object of this paper. The integration of Internet of Things technology and computer technology is the research feature of this paper. Attitude recognition...
The trajectory monitoring based on attitude recognition is the object of this paper. The integration of Internet of Things technology and computer technology is the research feature of this paper. Attitude recognition has been widely used, so a large number of scholars have conducted in-depth research. The research on trajectory monitoring of attitude recognition in colleges and universities has important promotion value and application prospect for teaching or the future application of other gesture related disciplines. The three key processes of attitude recognition algorithm are based on which the research on real-time monitoring of motion trajectory is carried out. Through the design and implementation of software and hardware systems of real-time monitoring system of motion trajectory, the hardware design based on MPU6050 is realized, Through the design of the software, the real-time monitoring of the movement track is realized, and the acceleration and displacement functions of the test system are debugged. The test shows that the system can complete the recognition and monitoring of posture, and this method can be used for teaching effect feedback in sports teaching in colleges and universities.
Calibrating statistical models using Bayesian inference often requires both accurate and timely estimates of parameters of interest. Particle Markov Chain Monte Carlo (p-MCMC) and Sequential Monte Carlo Squared (SMC2)...
详细信息
Failure recovery is one of the most essential problems in Internet of Things (IoT) systems, and the conventional snapshot method is an effective way to solve this problem. However, snapshot methods lack specialized de...
详细信息
ISBN:
(数字)9798331509712
ISBN:
(纸本)9798331509729
Failure recovery is one of the most essential problems in Internet of Things (IoT) systems, and the conventional snapshot method is an effective way to solve this problem. However, snapshot methods lack specialized designs for heterogeneous IoT devices, and when implemented in edge devices, serious system interruptions occur and performance is impacted. To address these problems, a dynamic checkpointing strategy is proposed for IoT systems that consist of heterogeneous devices. Firstly, an anomaly detection network for snapshots (i.e., ADSnet) that combines long short-term memory networks with multilayer convolutional networks is used to learn the multidimensional features of system resource usage. Secondly, ADSnet is tuned during deployment to learn the behaviors of target devices, so that ADSnet can report the anomalies of target devices in the near future. Finally, a dynamic checkpointing strategy is proposed to dynamically create snapshots on the basis of the anomaly detection results. The experimental results show that the proposed ADSnet achieves 97.73% accuracy in detecting anomalies in the target device; furthermore, our proposed dynamic checkpointing strategy reduces 25.4% snapshots than that created by the recently proposed ResCheck.
In this Internet era, we have become heavily dependent on the World Wide Web and it has become a basic amenity for humans. A normal user can be trapped easily in this vicious web if not careful enough. It is a field t...
详细信息
暂无评论