Mobility, usability and security are major requirements for any Ad Hoc network systems, and there have been numerous papers in regards to them. However, often these requirements are addressed separately. For a valid s...
详细信息
ISBN:
(纸本)1595933069
Mobility, usability and security are major requirements for any Ad Hoc network systems, and there have been numerous papers in regards to them. However, often these requirements are addressed separately. For a valid solution, these requirements must be considered from an integrated view. In this paper, taking into account mobility and usability, we implement a framework which allows to securely share resources and services between devices in Ad-hoc networks, based on security policies defined by the owners of those devices. In addition, we extend our framework to support inter-domain sharing of services and resources. We detail our design, present the preliminary results of our prototype, and discuss the lessons learned, in particular how user experience led to several re-designs of the initial security solution. Copyright 2006 ACM.
Geothermal reservoirs refer to any heat stored, naturally, in the earth's crust;it is considered as resource coming from a natural complex depending on the geological, geophysical aspect and territories geochemist...
详细信息
Geothermal reservoirs refer to any heat stored, naturally, in the earth's crust;it is considered as resource coming from a natural complex depending on the geological, geophysical aspect and territories geochemistry. Although this natural resource remains distinguished by his characters to be a renewable, ecological, universal and sustainable mining energy, it stills not, yet, sufficiently exploitable worldwide (El Bouazouli et al., 2020). The same finding was brought up in Moroccan context, despite the presence of some hot resources and capitalizable scientific research to develop this potential. Prospecting for underground geothermal resources is an expensive project that deserves to mobilize scientific and technical methods in order to overcome this risky impasse. Thus, Geomatics has been used, drawing on Remote Sensing for geo-spatial exploration in order to guide prospecting through the development of geothermal deposits potential maps at very low and medium depth on Moroccan territories (El Bouazouli et al., 2019). Furthermore, we explore smart tools to support short and long-term decision-making in terms of creating of clean energy mix and complementary mining energy as well as investment in energy exploration operations. And, as an experiment, we chose for this study, areas distributed mainly in the Moroccan Sahara and the Souss Massa Region, known, probably, by a potentially high geothermal gradient, and therefore constituting geothermal energy reservoirs. As for the exploration methodology adopted, it consists in processing of the imageries: LANDSAT 8, MODIS AND ASTER, in order to extract exploitation indices such as the surface temperature, the layer of lineaments and cracks density, and evidence of hydrothermal alteration that may indicate geothermal activity. The correlation between these three factors, will lead us to conclude that the Moroccan Sahara area is considered as one of the most potential geothermal reservoir areas in Morocco. In short, the a
There have two effective ways to improve the overall efficiency of the object-based distributed storage system, one is network caching technology and the other is metadata server cluster load balancing strategy. Under...
详细信息
The OraCDP disaster recovery system uses CDP disaster recovery technology based on the combination of block level, combining with the communication coupling between the underlying I/O and Oracle database. The experime...
详细信息
Modern computersystems rely extensively on dynamic random-access memory (DRAM) to bridge the performance gap between on-chip cache and secondary storage. However, continuous process scaling has exposed DRAM to high o...
详细信息
Superimpose one protein tertiary structure to another can help to find similarity between them and further identify functional and evolutionary relationships. We first extract invariant features under rigid body trans...
详细信息
Contemporary integrated circuits are becoming increasingly susceptible to soft errors due to single-event upsets, effectively decreasing the reliability of operation. In this paper, we propose the ERrOR microarchitect...
Contemporary integrated circuits are becoming increasingly susceptible to soft errors due to single-event upsets, effectively decreasing the reliability of operation. In this paper, we propose the ERrOR microarchitecture, that detects soft errors in processor operation using temporal redundancy with minimal hardware overhead. Previous proposals have explored the idea of introducing an Early Execution Unit (EXU) at the processor frontend in order to expeditiously execute dynamic instructions with short dependency chains for performance improvement. However, we observe that the functional units in the EXU are idle for a significant fraction of the program execution duration. ERrOR leverages these inactive frontend functional units to re-execute dynamic instructions for the purpose of error detection. A lightweight verifier introduced at the backend makes use of idle resources for redundant execution by interleaving program execution with re-execution for error detection. ERrOR provides exhaustive transient fault coverage while improving performance by 7.5% over an existing restricted OoO microarchitecture, Freeflow Core.
Energy efficiency and computing flexibility are some of the primary design constraints of heterogeneous computing. In this paper, we present FlashAbacus, a data-processing accelerator that self-governs heterogeneous k...
详细信息
Single event upsets have made modern integrated circuits more susceptible to soft errors, making their operation less reliable. In order to detect induced computational faults, we propose a fault-tolerant, low-overhea...
Single event upsets have made modern integrated circuits more susceptible to soft errors, making their operation less reliable. In order to detect induced computational faults, we propose a fault-tolerant, low-overhead microarchitecture that detects soft errors using temporal redundancy. The idea of introducing an Early Execution Unit (EXU) at the processor frontend has been explored by previous proposals in order to execute dynamic instructions with short dependency chains expeditiously for performance improvement. However, we observe that the functional units in the EXU are idle for a significant portion of the program execution duration. Our proposed microarchitecture utilises these inactive frontend functional units in order to re-execute dynamic instructions to ascertain computational correctness. A low-overhead backend verifier leverages idle resources for redundant execution using the proposed priority-based scheduling algorithm that interleaves program execution with re-execution for error detection. Our proposal provides exhaustive transient fault coverage while improving performance by 7.5% over an existing restricted OoO microarchitecture, Freeflow Core, delivering IPC close to that of an out-of-order baseline, while being $1.78 \times $ more energy-efficient than the involuted, power-hungry out-of-order design.
In this work, we propose FUSE, a novel GPU cache system that integrates spin-Transfer torque magnetic random-Access memory (STT-MRAM) into the on-chip L1D cache. FUSE can minimize the number of outgoing memory accesse...
详细信息
暂无评论