The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Exascale computing represents the next leap in the HPC race. Reaching this level of performance is subject to several engineering challenges such as energy consumption, equipment-cooling, reliability and massive parallelism. Model-based optimization is an essential tool in the design process and control of energy efficient, reliable and thermally constrained systems. However, in the Exascale domain,...
Although it is possible to design and manufacture MPSoCs with hundreds of processors, there is still a gap in the ability to debug hardware, software, and applications for such chips. Current state-of-the-art works related to MPSoC debugging suffer from poor integration, scalability in data storage, and simple graphical data representation. This work proposes a modular debugging framework to aid the...
Multi-channel access and spectrum agility represent significant challenges to temporal occupancy modelling for compliance enforcement of individual users/networks in opportunistic spectrum access (OSA) scenarios. In previous work, temporal occupancy estimation within spectrum bands was examined, when there was no requirement to track individual user/network behaviors. This approach was in line with...
Trust is the matter of reliance by which one can share information to other for specific task. Trust management gives the schematic survey of trustworthy path selection across mobile ad hoc network. This trustworthiness depends on the reliance of trusted path selection and trust management hierarchy. The trust management is the open area in terms of mobile ad hoc networks, to establish trust across...
The Cresco distributed agent-based framework is designed to address the challenges of edge computing. We present an actor-model implementation for the management of large numbers of geographically distributed services, comprised from heterogeneous resources and communication protocols, in support of low-latency realtime streaming applications. We present the purpose of our work, the basic methodology,...
Trust management plays a significant role for guaranteeing the reliability and security of wireless sensor networks. A hierarchical trust model for cluster-based wireless sensor network is proposed. According to the differences between cluster heads and general nodes, the distributed and centralized trust management mechanisms are combined in this paper. In the proposed model, the computation of node...
The aim of this paper is the discussion of the main features implemented in an Android application for ECG processing. It was designed to use a mobile phone, connected by Bluetooth to a battery-powered ECG device, as a signal acquisition layer in a Telemedicine platform. The Android application receives the ECG data according to a simple protocol. The Bluetooth pairing process is made by the proposed...
In this paper, a communication-based fault detection and isolation strategy for multi-agent systems is proposed and all the fault processing operations are achieved by controlling the contents of communication. A fault detection scheme based on the gossip algorithm and status information exchange is introduced first. Then, a new fault isolation and recovery algorithm is designed to moderate its negative...
Establishing trust in cloud system is a complex and challenging problem. In cloud computing trust establishment has to be both identity and properties based due to its dynamic nature, complexity of infrastructure, automated services, application interdependencies, and diversity of stakeholders. Trust in cloud depends mainly upon two factors. One is the operational trust which deals with the operations...
We asset about the analysis of electrical appliance consumption signatures for the identification task. We apply Hidden Markov Models to appliance signatures for the identification of their category and of the most probable sequence of states. The electrical signatures are measured at low frequency (10−1 Hz) and are sourced from a specific database. We follow two predefined protocols for providing...
Clinical protocols are a popular instrument to document how clinicians are expected to behave under specific conditions. Protocols are typically based on internationally peer reviewed clinical guidelines as well as on hospital-local agreements. Existing techniques for monitoring protocol adherence only support protocol descriptions involving simple sequences and local decision rules. As care and cure...
Researching how to combine workflow with Agent in order to improve flexibility and self learning ability is a hotspot of researches because of the needs of the workflow technology and the characteristics of the agent technology with self-learningability. This paper introduces agent technology in workflow engine, designs a Workflow Engine Model on Multi-agent and analyzes the functions of each agent...
Wireless sensor network is a set of autonomous sensor nodes dedicated to sense sizes of physical phenomena of a geographical area of interest. The sizes so collected are converted to numerical data to be transmitted to a specific node called base station or sink. After some appropriate processing, the data are sent out to a monitoring center. Therefore, a sink takes over a vital role in a WSN since...
We consider the using of graph models (graphs, hypergraphs and hypernets) for some analysis of functioning problems of the modern information networks. We discuss some examples of application of these models — investigated by us and other authors. Using of model Hypernet for the analysis of networks is described on the example of modeling attacks problem and network monitoring.
This paper presents NetSim-Steer, a runtime steering framework for network simulators. With this framework, users can specify execution constraints for the network protocols and network models. In addition to this, users can implement steering rules to be executed when a constraint is violated. These rules allow users to alter the parameters of the protocols/models during the simulation so that they...
Workflows are ubiquitous in educational ERP and process management. The question we address in this paper is how to specify and design verifiable workflows for educational processes. To specify workflows, we borrow a simple algebraic notation from computer science. We illustrate the use of this notation through a series of typical workflow examples. We show how an algebraic specification is more expressive...
Within the EU IS-ENES project, the deployment of an e-infrastructure providing climate scientists with an efficient virtual proximity to distributed data and distributed computing resources is required. The access point of this infrastructure is represented by the v.E.R.C. (virtual Earth system modelling Resource Centre) web portal. It allows the Earth System Models (ESMs) scientists to run complex...
The wireless sensor networks are attracting more attention from the research community. And simulation is a frequently used approach to test and validate approaches, simulation environments must be able to support different models of wireless sensor networks. Our paper focuses specifically on a case-monitoring sensor networks. The protocol tested is based on the reconfiguration of nodes with the principle...
In this paper we propose a distributed real-time fault detection, isolation and mitigation framework for multiagent systems performing cooperative tasks. Various system models and detection schemes with respect to communication and sensing are considered. Two communication protocols for fault detection are introduced first and proved to be effective. Then a scheme based on limited relative state measurements...
Since P2P systems have become popular in the late nineties, simulation of these systems has always been a preferable method of performance evaluation. Simulations facilitate the development and evaluation of new protocols and mechanisms, while enabling a comparison of existing solutions. In this paper, we present PeerfactSim.KOM, a discrete-event P2P simulator that is suitable for a wide range of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.