Cloud computing is widely used in academia and industry. Users can provide jobs to cloud service providers that provide pay-as-you-go methods by cloud for calculation and obtaining results. Cloud service providers mak...
详细信息
New hierarchical crossbar switch architectures, such as Omni-Path (OPA) and Cray X2, have appeared to improve packet latency, reduce overall cost and increase fault tolerance of the high-performance interconnection ne...
详细信息
New hierarchical crossbar switch architectures, such as Omni-Path (OPA) and Cray X2, have appeared to improve packet latency, reduce overall cost and increase fault tolerance of the high-performance interconnection networks in supercomputing and data center systems. These and other interconnect technologies (Infiniband or 40/100 Gigabit Ethernet) include support to provide quality of service (QoS) to the applications. In this paper, we show how this QoS support can be enabled to achieve bandwidth and/or latency differentiation in Omni-Path interconnection networks, as a representative case of hierarchical switches. To do that, three different table-based schedulers are used. We include the description of these schedulers and a comparative study by using the results obtained when we evaluate them with Hiperion, a simulation tool that implements an OPA model.
The task scheduling problem in power systems is complex, especially when communication costs exceed computation costs. This paper proposes an improved HEFT algorithm with a node merging mechanism, merging nodes throug...
详细信息
Planning management is the most important aspect of management activities in large manufacturing enterprises. In addition to their large scale, large manufacturing enterprises are also reflected in the complexity of t...
详细信息
In this paper, we explore adaptive offloading and enhancement strategies for video analytics tasks on computing-constrained mobile devices in low-light conditions. We observe that the accuracy of low-light video analy...
详细信息
Time-sensitive network (TSN) provides end-to-end data transfer with very low latency and high reliability on the basis of Ethernet. It is suitable for time-sensitive applications and will be widely used in scenarios s...
详细信息
Makespan minimization on parallel identical machines is a classical and intensively studied problem in scheduling, and a classic example for online algorithm analysis with Graham’s famous list scheduling algorithm da...
详细信息
In wireless sensor networks (WSNs), the finite battery capacity of the sensor nodes restricts the lifetime of the network. With the wireless power transfer (WPT) technology, the mobile chargers can transmit energy to ...
详细信息
In the last few years, the environment around us has evolved into an almost IoT-based environment. IoT has an effect in each sector, from medical services to industry. IoT devices are sensor-based, the sensor nodes re...
详细信息
Over the last decade, machine learning (ML) and deep learning (DL) algorithms have significantly evolved and been employed in diverse applications, such as computer vision, natural language processing, automated speec...
详细信息
Over the last decade, machine learning (ML) and deep learning (DL) algorithms have significantly evolved and been employed in diverse applications, such as computer vision, natural language processing, automated speech recognition, etc. Real-time safety-critical embedded and Internet of Things (IoT) systems, such as autonomous driving systems, UAVs, drones, security robots, etc., heavily rely on ML/DL-based technologies, accelerated with the improvement of hardware technologies. The cost of a deadline (required time constraint) missed by ML/DL algorithms would be catastrophic in these safety-critical systems. However, ML/DL algorithm-based applications have more concerns about accuracy than strict time requirements. Accordingly, researchers from the real-time systems (RTSs) community address the strict timing requirements of ML/DL technologies to include in RTSs. This article will rigorously explore the state-of-the-art results emphasizing the strengths and weaknesses in ML/DL-based scheduling techniques, accuracy versus execution time tradeoff policies of ML algorithms, and security and privacy of learning-based algorithms in real-time IoT systems.
暂无评论