The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cache hierarchies have long been utilized to minimize the latency of main memory accesses by caching frequently used data closer to the processor. Significant research has been done to identify the most crucial metrics of cache performance. Though the majority of research focuses on measuring cache hit rates and data movement as the major cache performance metrics, cache utilization can be equally...
The number of e-commerce customers and database services in cloud computing platforms has grown increasingly, leading providers to adopt resource-sharing solutions to meet growing demand for infrastructure resources, such as processing and storage. Consolidating database applications has become arguably a de-facto solution to support a large number of customers/tenants at low infrastructure costs...
Does a hearing-impaired individual's speech reflect his hearing loss, and if it does, can the nature of hearing loss be inferred from his speech? To investigate these questions, at least four hours of speech data were recorded from each of 37 adult individuals, both male and female, belonging to four classes: 7 normal, and 30 severely-to-profoundly hearing impaired with high, medium or low speech...
This paper discusses the Correntropy Induced Metric (CIM) based Growing Neural Gas (GNG) architecture. CIM is a kernel method based similarity measurement from the information theoretic learning perspective, which quantifies the similarity between probability distributions of input and reference vectors. We apply CIM to find a maximum error region and node insert criterion, instead of euclidean distance...
The increasing availability of 10G Ethernet network capabilities challenges existing transport layer protocols. As 10G connections gain momentum outside of backbone networks, the choice of appropriate TCP congestion control algorithms becomes even more relevant for networked applications running in environments such as data centers. Therefore, we provide an extensive overview of relevant TCP congestion...
The growing variety and consumption of the mobile services throughout the Long Term Evolution (LTE) mobile networks lead to various challenging issues in radio resource scheduling. One of the main challenges in LTE resource management is how to allocate the scare available bandwidth, especially in overload states of the network, to the services which have different characteristics and quality requirements...
Provisioning of high I/O capabilities for high-end HPC architectures is generally considered a challenge. A good understanding of the characteristics of the utilisation of modern I/O systems can help address the increasing performance gap between I/O and computation. In this paper we present results from an analysis of server-side performance counters that had been collected for multiple years on...
Energy consumption represents a large percentage of the operational expenses in data centers. Most of the existing solutions for energy-aware scheduling are focusing on job distribution and consolidation between computing servers, while network characteristics are not considered. In this paper, we propose a model of power and network-aware scheduling that can be tuned to achieve energy-savings, through...
Software-Defined Networking (SDN) provides the potential for highly configurable, automated networks by separating the control and forwarding functions of network devices. While SDN appears to have many potential benefits for coalition tactical networking, including rapid reconfigurability and improved network situational awareness, there are significant obstacles to overcome. In particular, the low...
Precisely estimating the pose of an agent in a global reference frame is a crucial goal that unlocks a multitude of robotic applications, including autonomous navigation and collaboration. In order to achieve this, current state-of-the-art localization approaches collect data provided by one or more agents and create a single, consistent localization map, maintained over time. However, with the introduction...
In recent years, as mobile devices increase, the demands for measuring the available bandwidth in a wireless network increase more and more to provide high quality network services. The available bandwidth is one of the most important parameters to determine the sending rate in WAN optimization. Pathload [2] is a technique to measure the available bandwidth by detecting the point where the receiving...
Convolution Neural Networks today provide the best results for many image detection and image recognition problems. The network accuracy increase in the past years is obtained through an increase in complexity of the structure and amount of parameters of the deep networks. Memory bandwidth and power consumption constraints are limiting the deployment of such state-of-the-art architecture in low power...
Software Defined Networking (SDN) is in the process of revolutionizing the way of managing networks by providing a new way to support current and future services. However, by relocating the control functionality in a remote entity, the measurements' accuracy of the resources' utilization becomes more difficult, which complicates the decision making. Although there are previous works focusing on the...
An ever increasing utility and use of virtualization in various emerging scenarios, e.g.: Cloud Computing, Software Defined Networks, Data Streaming Processing, asks the Infrastructure Providers (InPs) to optimize the allocation of the virtual network requests (VNRs) into a substrate network. In this paper we present a two-stage virtual network embedding (VNE) algorithm, which map first virtual nodes...
Exascale networks are expected to comprise a significant part of the total monetary cost and 10-20% of the power budget allocated to exascale systems. Yet, our understanding of current and emerging workloads on these networks is limited. Left ignored, this knowledge gap likely will translate into missed opportunities for (1) improved application performance and (2) decreased power and monetary costs...
In this work, we propose a novel quality link metric; Bandwidth adjusted Inverse ETX (BIETX) for Static Wireless Multi-hop Networks (SWMhNs). The proposed metric considers two path selection parameters into account i.e., packet delivery ratio and link capacity. For computing packet delivery ratios in BIETX, the mechanism of Expected Transmission Count (ETX) is adopted. On the other hand, we take two...
This work investigates the immediate reservation (IR), advance reservation (AR), malleable reservation (MR) service provisioning in elastic optical networks (EONs).We design request scheduling and/or routing and spectrum allocation (RSA) algorithms for the IR/AR/MR request, respectively. Simulation results show that the proposed IR/AR/MR service provisioning package can reduce request blocking probability...
We study in this work user impatience by adopting a realistic realization: a user gets impatient when its throughput falls below a certain threshold for a given patience duration. We model such a behavior in a cellular network, transporting elastic flows, for a realistic user configuration with random arrivals, following a Poisson process, and departure after a finite duration, either upon transfer...
It has been shown that multiple, correlated failures severely impair telecommunications networks inducing more damage than independent failures. In this paper we present a simple path provisioning scheme, which offers maximal reliability to networks affected by multiple, correlated failures. The scheme characterizes correlated failures, which are modeled using the concept of probabilistic shared-risk...
In this paper, we present a novel approach for environment map sampling, which is an effective and pragmatic technique to reduce the computational cost of realistic rendering and get plausible rendering images. The proposed approach exploits the advantage of adaptive mean-shift image clustering with aid of tone-mapping, yielding oversegmented strata that have uniform intensities and capture shapes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.