The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Live Virtual machine (VM) migration is a promising solution for data center (DC) administrators to achieve a wide range of objectives - from load balancing to disaster evacuation. Ideally, live VM migration is seamless and the challenge is to minimize the downtime during which the VM is not responding to requests or providing the service. The duration of the downtime is mainly influenced by the migration...
This paper presents a simulation tool for the design and analysis of offshore ocean energy array networks. The tool integrates a number of modules which are divided into two core functions: the automation of the cable laying algorithm and subsequent creation of the network model, and the other performing the power flow analysis. The results of the power flow analysis are used to inform the user of...
Traditional methods for implementing highly resilient systems are costly; and their methods using specialized hardware and high-speed interconnects do not extend to cloud. We demonstrate an architecture that rethinks the traditional approach and uses cloud's agility to provision additional capability as failures occur. This architecture continues serving requests with the best possible response...
This paper studies how intradomain routing instability relates to events in network trouble tickets for two networks: a VPN provider and the Internet2 backbone network. Our goal in performing this joint analysis of routing and trouble tickets is to better understand the likely underlying causes of intradomain routing instability. We develop a method to correlate trouble tickets with instability events...
The coordination of equipment systems has become a major challenge for building contractors. Specialty design firms and trade contractors, working independently, provide these systems. For the past several years the equipment systems coordination has involved sequentially comparing and overlaying drawings from multiple trades, in which representatives from each equipment trade work together to detect,...
MANET (mobile ad hoc network) is a mobile multi-hop, wireless self-organized distributed network. This paper introduces the concept and characteristics of MANET, gives a general survey of research on local repair for MANET and proposes a new local repair scheme based on link breaks in order to make up the deficiency of the existing local repair schemes. The improved local repair scheme concerns about...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
The Department of Electronic Engineering of Beijing Institute of Technology is integrating emerging interconnect technologies with other high-performance technologies to meet the demanding requirement of future, real-time signal processing applications. For next-generation, scalable, modular and adaptable signal-processing system, a universal, flexible and high-performance signal processing module...
In recent years, organizations have been shifting focus to their core business competencies, and reducing total cost of ownership (TCO) associated with training and management of their IT infrastructure. In the same motif, organizations are establishing security and survivability frameworks as an integral part of their business strategy so as to provide an acceptable quality-of-service for their clients...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.