The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid increase in data and its complexity of configuration and deployment bring a new challenge to the research community. In this scenario, automatic Hadoop cluster deployment and management tool provide a new horizon which plays a vital role in resource and packet management in distributed environment. This paper describes a low-cost Automatic Hadoop Cluster Deployment and Management tool...
Due to the high cost and high power consumption problem of the present smart home server, we designed and implemented a home server based on embedded system, mainly developed by ARM11 for a hardware platform, Linux system for operating system, SQLite database and BOA server for a software platform. The home server has successfully implemented the network communication, SQLite database peration and...
Pidgin communicator is a multiprotocol instant messenger client, developed by open source community. It was originally a third party client of AIM (AOL Instant Messenger) protocol for Linux operating system founded in 1998. At present, its main goal is to provide common interface for every protocol it supports, so the user does not need care about protocol to use or peer's IM identifier, while he...
Many any large scale scientific applications spend a significant amount of time in file I/O operations. Collective I/O APIs provide higher level abstractions of I/O across a group of processes. They often reduce the time spent in file I/O by reorganizing data across processes to match the layout of the data on the file system. In this paper we present performance models for the communication occurring...
Peer code review locates common coding rule violations and simple logical errors in the early phases of software development, and thus reduces overall cost. However, in GitHub, identifying an appropriate code reviewer for a pull request is a non-trivial task given that reliable information for reviewer identification is often not readily available. In this paper, we propose a code reviewer recommendation...
Today, one of the main challenges of big data research is the processing of big time-series data. Moreover, time data analysis is of considerable importance, because previous trends are useful for predicting the future. Due to the considerable delay when the volume of the data increases, the presence of redundancy, and the innate lack of time-series structures, the traditional relational data model...
Most programs related to security communicate with servers through encrypted channels, and sensitive data that are transmitted should be encrypted using a suitable protocol. Transport Layer Security (TLS) is a protocol that encrypts data by exchanging key materials in a secure way. Protocol analyzers in turn decrypt packets to see the raw protocols in plain text. Decryption is not a minor job, and...
This paper deals with the design principles and implementation of a reconfigurable real-time software platform designed for data exchange between software modules of unmanned underwater and surface vehicles. The aim of developing a new robotic platform was the realization of a light-weight OS-independent library that allows integrating AUVs, ROVs and surface vehicles to a single computing cluster...
The European XFEL project is a free electron linear particle accelerator located in Hamburg, Germany, currently being developed by DESY and to be launched later this year. The particle accelerator is controlled by RF control system, built as a chain of RF stations bound to cryomodules across the tunnel. Each RF station has a set of additional devices, that are used to control particular parts of the...
Large scale molecular dynamics simulations produce terabytes of data that is impractical to transfer to remote facilities. It is therefore necessary to perform visualization tasks in-situ as the data are generated, or by running interactive remote visualization sessions and batch analyses co-located with direct access to high performance storage systems. A significant challenge for deploying visualization...
Information is one of the main resources that every modern organization is based on. A lot of companies introduce electronic document management. At the same time, in order to raise the quality of transport and logistics services, the unions of such organizations become more and more popular. In this article, we consider the main instruments of providing information integrity and availability in electronic...
The development of effective user interfaces for an autonomous system can be quite difficult, especially for devices that are to be operated in the field where access to standard computer platforms may be difficult or impossible. One approach in this type of environment is to utilize tablet or phone devices, which when coupled with an appropriate tool such as ROSBridge can be used to connect with...
Delivering complex software across a worldwide distributed system is a major challenge in high-throughput scientific computing. The problem arises at different scales for many scientific communities that use grids, clouds, and distributed clusters to satisfy their computing needs. For high-energy physics (HEP) collaborations dealing with large amounts of data that rely on hundreds of thousands of...
This paper describes the concept of a distributed system in Home Automation. It explains advantages of distributed software and presents asynchronous application programming interface as a solution for one of the crucial characteristics of such systems which is communication between independent modules. The paper presents communication patterns within library and examples for their use. It describes...
DIBBs Brown Dog is a recent cyberinfrastructure effort which aims to create two new services to aid users in the searching, accessing, and usage of digital data and provide these services in a manner that is as broadly and easily accessible as possible. At its lowest level, the Data Access Proxy (DAP) providing file format conversion capabilities and the Data Tilling Service (DTS) providing content...
DevOps (a portmanteau of “development” and “operations”) is a software development method that extends the agile philosophy to rapidly produce software products and services and to improve operations performance and quality assurance. It was born to accelerate the delivery of web-based systems and quickly bring new value to users. Many web-based systems evolve according to usage trends without a clear...
The demand for parallel I/O performance continues to grow. However, modelling and generating parallel I/O work-loads are challenging for several reasons including the large number of processes, I/O request dependencies and workload scalability. In this paper, we propose the PIONEER, a complete solution to Parallel I/O workload characterization and gEnERation. The core of PIONEER is a proposed generic...
A (build) target specifies the information that is needed to automatically build a software artifact. This paper focuses on underutilized targets -- an important dependency problem that we identified at Google. An underutilized target is one with files not needed by some of its dependents. Underutilized targets result in less modular code, overly large artifacts, slow builds, and unnecessary build...
Application-based access control technologies are used to protect systems from malicious or compromised software. Existing rule-based access control systems rely on a comprehensive policy, which defines the resources an application is allowed to access. The generation of these policies is a hard and error-prone task for system engineers. In this work, we provide a framework to automate this task and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.