Internet visitors can be well protected by hiding their traces. The purpose of traditional traceability is to obtain the user's IP address and physical location through some technical means. However, the essence o...
详细信息
ISBN:
(纸本)9781665414852
Internet visitors can be well protected by hiding their traces. The purpose of traditional traceability is to obtain the user's IP address and physical location through some technical means. However, the essence of anti-traceability is to hide information browsing and search intention through trace hiding technology. Inspired by the PPM (Probability Packet Marking) strategy, an effective method of anti-tracing is to prevent the attacker from reconstructing the user's access path in a VPN network. We investigate a systematic study of ant-itracing to capture the relationship between resource allocation and security level guarantee in this paper. Furthermore, we propose a novel resource allocation and link scheduling algorithm with guaranteed security level. Numerical results verify that our proposed resource allocation solution can achieve good performance in terms of anti-tracing and security level guarantee.
scheduling of tasks of a Directed Acyclic Graph (DAG) onto a set of processors is a NP-hard problem. In this paper we present a scheduling algorithm named as DyDupSA (Dynamic Task Duplication based scheduling Algorith...
详细信息
ISBN:
(纸本)9781509055739
scheduling of tasks of a Directed Acyclic Graph (DAG) onto a set of processors is a NP-hard problem. In this paper we present a scheduling algorithm named as DyDupSA (Dynamic Task Duplication based scheduling Algorithm) to schedule tasks onto a heterogeneous system to minimize the length of schedule, maximize resource utilization and increase the speed up ratio. The existing task duplication based scheduling algorithms proposed for heterogeneous system didn't focus on the above features. The performance of the proposed algorithm is compared with existing scheduling algorithms for heterogeneous processors.
Cyber-Physical Systems (CPSs) are used in various important application areas. Networking of several CPSs, the internal networking of CPSs components as well as the interconnection with other systems, is of major impo...
详细信息
ISBN:
(纸本)9781538655535
Cyber-Physical Systems (CPSs) are used in various important application areas. Networking of several CPSs, the internal networking of CPSs components as well as the interconnection with other systems, is of major importance with respect to scientific, engineering and technical considerations;yet, it is also very challenging. In this paper we describe an architecture and methods which can be used for various networked CPSs. To base the system design and approaches on realistic requirements and devise suitable methods, we use tightly cooperating, mobile robots as application area. This is an example of challenging CPSs which put high demands on the networking methods. Nevertheless, the considerations are applicable to other CPSs as well. In order to enable networked mobile robots to perform individual and cooperative tasks, real-time support and network operations such as merge, split, and synchronize among clusters of such robots are needed. Further, management functions have to be provided which enable independent, but concurrent clusters to allocate and share scarce network resources. In the context of this paper, network resources are considered in a broad sense (e.g., time slots, frequency channels, codes) and assigned by a novel scheduling algorithm. Thus, a schedule means not only a sequence of time slots, but it takes all mentioned dimensions into account.
Fog computing (FC) has the potential to enable computation-intensive applications for the next generation wireless networks. In parallel with the development of FC, non-orthogonal multiple access (NOMA) has been recog...
详细信息
ISBN:
(纸本)9781728109626
Fog computing (FC) has the potential to enable computation-intensive applications for the next generation wireless networks. In parallel with the development of FC, non-orthogonal multiple access (NOMA) has been recognized as a promising solution to improve the spectrum efficiency. In this paper, a NOMA-based FC system is considered, where multiple task nodes perform task scheduling via NOMA to a helper node, the helper node with abundant computation resource is required to compute the computation task from the task nodes. We formulate a joint task scheduling, computational resource allocation, and power allocation problem with an objective to minimize the sum cost (i.e., delay and energy consumptions for all task nodes) realizing energy-delay tradeoff. It is challenging to obtain an optimal policy for such a combinatorial optimization problem. To this end, we propose an online learning-based optimization framework to tackle this problem. Simulation results show that the proposed scheme significantly reduces the sum cost compared to the baselines.
We introduce the research overview of the practical imprecise computation model to achieve imprecise real-time applications. The practical imprecise computation model has multiple mandatory parts as real-time parts an...
详细信息
ISBN:
(纸本)9781479944309
We introduce the research overview of the practical imprecise computation model to achieve imprecise real-time applications. The practical imprecise computation model has multiple mandatory parts as real-time parts and multiple optional parts as non-real-time parts. We explain a new concept of real-time scheduling in the practical imprecise computation model, called semi-fixed-priority scheduling. In addition, we explain a semi-fixed-priority scheduling algorithm, called Rate Monotonic with Wind-up Part (RMWP). RMWP schedules each part in the practical imprecise computation model in Rate Monotonic order. We also introduce a real-time operating system for semi-fixed-priority scheduling algorithms, called RT-Est. We describe programming paradigms for the practical imprecise computation model in RT-Est. RT-Est has the SIM architecture for simulating real-time scheduling algorithms and the visualization tool for drawing simulation results. Finally we give future research directions for the practical imprecise computation model in theory and practice.
On many computers, a request to run a job is not serviced immediately but instead is placed in a queue and serviced only when resources are released by preceding jobs. In this paper, we build on runtime prediction tec...
详细信息
ISBN:
(纸本)3540666761
On many computers, a request to run a job is not serviced immediately but instead is placed in a queue and serviced only when resources are released by preceding jobs. In this paper, we build on runtime prediction techniques that we developed in previous research to explore two problems. The first problem is to predict how long applications will wait in a queue until they receive resources. We develop runtime estimates that result in more accurate wait-time predictions than other run-time prediction techniques. The second problem we investigate is improving scheduling performance. We use run-time predictions to improve the performance of the least-work-first and backfill scheduling algorithms. We find that using our run-time predictor results in lower mean wait times for the workloads with higher offered loads and for the backfill scheduling algorithm.
Time-Sensitive Networking (TSN) introduces standardized mechanisms that add real-time capabilities to IEEE 802.1 Ethernet networks. In particular, the Time-Aware Shaper (TAS) can be used to send frames in a determinis...
详细信息
ISBN:
(纸本)9781728152974
Time-Sensitive Networking (TSN) introduces standardized mechanisms that add real-time capabilities to IEEE 802.1 Ethernet networks. In particular, the Time-Aware Shaper (TAS) can be used to send frames in a deterministic fashion according to a predefined global schedule. Existing methods for generating the global communication schedule enforce isolation either in the time or in the space domain. This extended abstract presents a novel, more flexible window-based scheduling algorithm which removes the previously required isolation constraints for Scheduled Traffic (ST) by integrating worst-case delay analysis to guarantee bounded latency.
scheduling exams at universities can be formulated as a combinatorial optimization problem. Basically one has to schedule a certain number of exams in a given number of time periods so that a predetermined objective f...
详细信息
ISBN:
(纸本)9783540773443
scheduling exams at universities can be formulated as a combinatorial optimization problem. Basically one has to schedule a certain number of exams in a given number of time periods so that a predetermined objective function is minimized. In particular, the objective function penalizes schedules where students have to write exams in consecutive periods or even in the same period. Ant colony approaches have been demonstrated to be a powerful solution approach for various combinatorial optimization problems. This paper presents two ant colony approaches for the exam timetabling problem, a Max-Min and an ANTCOL approach. Using the Toronto benchmark test cases from the literature, both algorithms arc compared to other timetabling heuristics. Finally, the Max-Min and ANTCOL algorithms are compared using the same set of test cases. In spite of some shortcomings, the ANTCOL approach turned out to be a worthwhile algorithm, among the best currently in use for examination timetabling.
We consider the network control problem for wireless networks with How level dynamics under the general k-hop interference model. In particular, we investigate the control problem in low load and high load regimes. In...
详细信息
ISBN:
(纸本)9781424422463
We consider the network control problem for wireless networks with How level dynamics under the general k-hop interference model. In particular, we investigate the control problem in low load and high load regimes. In the low load regime, we show that the network can be stabilized by a regulated maximal scheduling policy considering flow level dynamics if the offered load satisfies a constraining bound condition. Because maximal matching is a general scheduling rule whose implementation is not specified, we propose a constant-time and distributed scheduling algorithm for a general k-hop interference model which can approximate the maximal scheduling policy within an arbitrarily small error. Under the stability condition, we show how to calculate transmission rates for different user classes such that the long-term (time average) network utility is maximized. Our results imply that congestion control is unnecessary when the offered load is low and optimal user rates can be determined to maximize users' long-term satisfaction. In the high load regime where the network can be unstable under the regulated maximal scheduling policy, we propose the cross-layer congestion control and scheduling algorithm which can stabilize the network under arbitrary network load. Through numerical analysis for some typical networks, we show that the proposed scheduling algorithm has much lower overhead than other existing queue-length-based constant-time scheduling schemes in the literature, and it achieves performance much better than the guaranteed bound. In addition, using congestion control in the low load condition results in much lower average utility compared to that due to the optimal transmission rate derived in the paper.
For high mobility users in a 5G NR network, interference management becomes a big challenge. Efficient RRM (Radio Resource Management) plays a primary role in increasing the Signal to Interference and Noise Ratio (SIN...
详细信息
ISBN:
(纸本)9781665422093
For high mobility users in a 5G NR network, interference management becomes a big challenge. Efficient RRM (Radio Resource Management) plays a primary role in increasing the Signal to Interference and Noise Ratio (SINR) values, and also in decreasing signal Transport Block Error Rate (TBER). To this end, the evaluation of these two parameters actively participates in the propagation channel sensitivity prediction. Thus, radio resources allocation must be efficient and powerful. Therefore, eight scheduling algorithms were developed and programmed into the mmWave model of NS-3 simulator. The simulations were run for different types of data flows, and the achieved results were evaluated in terms of SINR and TBER. The performance of most schemes in a typical 5G NR environment is satisfactory. In terms of SINR, and for the RT (Real Time) flows, MLWDF, EXP-Rule and our algorithm EXP-MLWDF ensure more reliability compared to other schemes, with values of around 25 dB for VOIP traffic and around 30 dB for video streams, whereas PF and Max-Rate allow better values for BE flows, with achievements greater than 20 dB, which presents improvements of about 60% compared to other schemes. On the other hand, PF, EXP-PF, EXP-Rule, Log-Rule and EXP-MLWDF ensure optimal values of TBER for RT flows, by achieving stable performance with a rate of less than 0.5% for VOIP, and around 0.1% for Vi5G. These values represent a reduction of 100% compared to other scheduling strategies. For NRT (Non-RT) flows, EXP-Rule and MLWDF have the best achievements and they quickly reach stability, with values between 0.4 and 1.4%, which represents an improvement of 70% in comparison with the concurrent schemes.
暂无评论