The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In high-performance computing systems, application performance and throughput are dependent on a complex interplay of hardware and software subsystems and variable workloads with competing resource demands. Data-driven insights into the potentially widespread scope and propagationof impact of events, such as faults and contention for shared resources, can be used to drive more effective use of resources,...
In this work, we seek to gain an understanding of the InfiniBand network processing limitations that might exist in gathering performance metric information from InfiniBand switches using our new LDMS ibfabric sampler. The limitations studied consist of delays in gathering InfiniBand metric information from a specific switch device due to the switch's processor response delays or RDMA contention for...
In this paper we present lo2s - a lightweight performance monitoring tool to sample applications as well as the executing system. It enables the user to analyze the performance of a parallel application without requiring the time-consuming and error-prone process of application instrumentation. The collected performance data is complemented with various metric data, i.e., perf counters, kernel tracepoints,...
As demands on new software increase, new approaches are needed to help developers ensure Quality of Service (QoS) for their offered service. In this paper we present a QoS modeling approach that complements and extends the standard microservice and component-based software engineering tools by giving the software engineer information on what Non-Functional Requirements (NFRs) and quality constraints...
Virtualization technologies allow cloud providers to optimize server utilization and cost by co-locating services in as few servers as possible. Studies have shown how applications in multi-tenant environments are susceptible to systems anomalies such as abnormal resource usage due to performance interference. Effective detection of such anomalies requires techniques that can adapt autonomously with...
Multi-tiered memory systems, such as those based on Intel® Xeon Phi™processors, are equipped with several memory tiers with different characteristics including, among others, capacity, access latency, bandwidth, energy consumption, and volatility. The proper distribution of the application data objects into the available memory layers is key to shorten the time– to–solution, but the way developers...
As the Android app market keeps growing, there is a pressing need for automated tool supports to empower Android developers to produce quality apps with higher productivity. Yet existing tools for Android mostly aim at security and privacy protection, primarily targeting end users and security analysts. Towards filling this gap, we present DROIDFAX, a toolkit that targets the developers to help them...
A novel approach of a test environment for embedded networking nodes has been conceptualized and implemented. Its basis is the use of virtual nodes in a PC environment, where each node executes the original embedded code. Different nodes run in parallel, connected via so-called virtual channels. The environment allows to modifying the behavior of the virtual channels as well as the overall topology...
In recent years, the use of the internet has become widespread with developing technologies. Internet is used for many needs, especially social media. Today, internet is needed for remote use of electronic devices used in homes and offices. Continuous access to the internet is very important for the quality of life of people. In this study, a proposal was made for early detection of basic faults that...
The paper presents a method of monitoring the basic parameters of cognitive mobile ad hoc network (MANET) with opportunistic access to the spectrum. The collected parameters are based on metrics from different communications layers, combined into single utility function, being a global indicator of the network health. The proposed method was tested and validated using a real time cognitive radio network...
The paper describes the MANET Cognitive Radio test bed. The proposed architecture consists of a number of CR nodes connected to the RF Switch Matrix, and enables simulation, scenario definition and management. Proposed procedures for Opportunistic Spectrum Access in MANET CR are described as well and chosen results of simulations obtained during laboratory tests are presented. The performance of these...
Stability of civil structures is one of the main issues to be considered for the aging of bridges, buildings, tunnels, mines, dams, aircraft or other aging structures. They must be checked correctly, thus, security of civil structures, especially tunnels and bridges, pose a great matter for civil engineering. Therefore, Structural health monitoring ‘SHM’ takes more and more an important area in modern...
An innovative cyber culture and computing of social governance of citizens is proposed, aimed at the moral metric cloud service of social groups through the leverage of digital monitoring and expert evaluation of social processes and phenomena. Cyber culture is defined as the development level of social, technological, moral and material relations between society, the physical world and cyberspace...
The Processing Architecture based on Measurement Metadata (PAbMM) is a data stream management system specialized in measurement and evaluation (M&E) projects, which incorporates predictive and detective behavior on data streams. It uses a case based organizational memory for recommending courses of action in each detected online situation and previously modeled by the project definition. In this...
Technical debt monitoring is one of the activities that have to be performed in technical debt management. To do that, there are different techniques that can be used to estimate technical debt and different tools that implement those different techniques. This paper presents TEDMA Tool, a tool for monitoring technical debt over the software evolution and that it is open to integrate third party tools...
One of the first steps towards the effective Technical Debt (TD) management is the quantification and continuous monitoring of the TD principal. In the current state-ofresearch and practice the most common ways to assess TD principal are the use of: (a) structural proxies—i.e., most commonly through quality metrics; and (b) monetized proxies—i.e., most commonly through the use of the SQALE (Software...
In an industrial facility, a large amount of data on the operation of the facility is collected. The data includes control variables used in monitoring and regulation, alarm variables displayed to notify operators of abnormalities, and operators' actions taken to correct abnormalities as well as to operate the facility. As the data is historized and is readily accessible, it can provide a wealth of...
Monitoring mental fatigue has become important for improving cognitive performance and health outcomes especially for older adults. Previous models using eye-tracking data allow inference of fatigue during cognitive tasks, such as driving, but they require us to engage in specific cognitive tasks. A model capable of inferring fatigue in natural-viewing situations when individuals are not performing...
Many games use dynamic difficulty adjustment (DDA) to promote the achievement of flow and consequent positive affective states. However, performance based DDA assume a specific ludic attitude: that of the hard-core gamer. An alternative approach is to apply affective computing techniques to monitor players adjust difficulty to achieve the desired affective state directly. Such an emotion-controlled...
Fault diagnosis plays a crucial role to maintain healthy conditions in rotating machinery. This paper proposes a framework to detect new patterns of abnormal conditions in gearboxes, that would be associated to new faults. This is achieved through a Hybrid Heuristic Algorithm for Evolving Models in scenarios of Classification and Clustering (HHA-EMCC), which is a machine learning algorithm that can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.