The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present our view of massively-parallel heterogeneous computing for solving large scientific problems. We start by observing that computing has been the primary driver of major innovations since the beginning of the 21st century. We argue that this is the fruit of decades of progress in computing methods, technology, and systems. A high-level analysis on out-scaling and up-scaling...
As we continue toward exascale, scientific data volume is continuing to scale and becoming more burdensome to manage. In this paper, we lay out opportunities to enhance state of the art data management techniques. We emphasize well-principled data compression, and using it to achieve progressive refinement. This can both accelerate I/O and afford the user increased flexibility when she interacts with...
Swarming systems, such as BitTorrent, are one of the most common solutions for scalable, robust and inexpensive content distribution. Although the service capacity of swarming systems has been studied for decades through modeling and analysis, there is a lack of experimental evidence about how the throughput of such systems behaves in under-provisioned regimes. The aim of this paper is to fill this...
Synchronous Dataflow (SDF) is the most commonly used dataflow Model of Computation (MoC) for the specification of Digital Signal Processing (DSP) systems. The Interface-Based SDF (IBSDF) model extends the semantics of the SDF model by introducing a graph composition mechanism based on hierarchical interfaces. Computing the throughput of an application is essential when designing DSP systems. This...
In order to cope with the exponential growth of mobile traffic, mobile operators need to access more spectrum resources. LTE in unlicensed spectrum (LTE-U) has been proposed to extend the usual operation of LTE in licensed spectrum to cover also unlicensed spectrum. However, this extension poses significant challenges especially regarding the coexistence between LTE-U and legacy systems like Wi-Fi...
We investigate the potential gains of Physical-Layer Network Coding (PLNC) in multi-hop wireless networks. Physical-Layer Network Coding was first introduced as a solution to increase the throughput of a two-way relay channel communication. Unlike most wireless communications techniques which try to avoid collisions, PLNC allows two simultaneous transmissions to a common receiver. Such transmitted...
The amount of video traffic on the Internet has seen a tremendous increase over the past few years. In 2020, it is predicted to account for 85% of the total Internet consumer traffic. Due to this dominant role, streaming traffic has to be considered by workload models used to evaluate the performance of networking systems. A de facto standard technology for Internet-based Video on Demand (VoD) services...
Users located on the cell edge suffer from low data rates due to interference and poor reception. The Coordinated Multipoint technology targets this problem but it imposes overhead on the network, which can result in degradation of the Quality of Service. The Direct CSI feedback to Elected Coordination station architecture minimizes such overhead, resulting in improved data rates. Here, we analyze...
In cloud-based stream processing services, the maximum sustainable throughput (MST) is defined as the maximum throughput that a system composed of a fixed number of virtual machines (VMs) can ingest indefinitely. If the incoming data rate exceeds the system's MST, unprocessed data accumulates, eventually making the system inoperable. Thus, it is important for the service provider to keep the MST always...
Cache-partitioned architectures allow subsections of the shared last-level cache (LLC) to be exclusively reserved for some applications. This technique dramatically limits interactions between applications that are concurrently executing on a multicore machine. Consider n applications that execute concurrently, with the objective to minimize the makespan, defined as the maximum completion time of...
Since their introduction, automated storage and retrieval systems (AS/RS) give a better solution for the inventory management in industrial companies and distribution centres to improve theirs performances. The main objective of the paper is to offer a performance comparison between two kinds of AS/RS (Free-Fall flow-rack and classic flow-rack), to highlight the benefits of using FF-flow-rack AS/RS...
Mobile Ad hoc Network (MANET) in the form of wireless local area networks is becoming a common platform for communication among internet users. As compared with wired networks, the rate of random packet loss due to wireless channel errors or node mobility is very high in MANET. Misinterpretation of random packet loss as a loss due to congestion by TCP causes significant degradation in the performance...
The widening gap between the processor and memory performance has led to the inclusion of multiple levels of caches in the modern multi-core systems. Processors with simultaneous multithreading (SMT) support multiple hardware threads on the same physical core, which results in shared private caches. Any inefficiency in the cache hierarchy can negatively impact the system performance and motivates...
This paper presents an analytical model to study the performance of cloud applications using message queueing as a service (MaaS). MaaS is a cloud service which allows the development departments to focus on delivering business and computing applications without being concerned with the underlying message queueing infrastructure to be scalable, secure, and reliable. Estimating the service delay (prior...
The power of IT has been applied to provide a solution for partially solvable and unsolvable problem with the help of artificial intelligence to minimize the uncertainty. A new rule based sampling method is being proposed and used to categorize use cases of a GT concept in simple, moderate and complex category [22]. Six diiferent GT concepts have been considered for quantification process. The outcome...
To write data on a disk block or to read data from a disk block, three factors are considered: seek time, rotational delay and actual data transfer time. The seek time is the time taken to move the arm to the proper cylinder and the rotational delay is the time for the proper sector to rotate under the head. The seek time dominates the other two factors by a wide margin. Thus, disk scheduling algorithms...
Choosing suitable buffer setups for network-flow production lines of automated manufacturing systems to augment throughputs is a pragmatic issue. In this work, an approach merging artificial immune system (AIS) and ordinal optimization (OO) is developed to determine an optimal buffer resource allocation of a network-flow production line for maximizing the throughput. The proposed approach consists...
Streaming applications are often modeled with Synchronous data flow graphs (SDFGs). A proper analysis of the models is helpful to predict the performance of a system. In this paper, we focus on the throughput analysis of memory-constrained SDFGs (MC SDFGs), which needs to choose a memory abstraction that decides when the space of consumed data is released and when the required space is claimed. Di↵erent...
In this paper, we propose a new dataflow runtime that dy- namically manages several dataflow applications. We pro- pose an implementation of such a runtime called CalMAR built on top of the RVC-Cal environment, and validate its efficiency compared to the RVC-CAL traditional approach.
Fog computing is a promising technology that enables users to perform time-sensitive IoT analytics at locations near the clients. Recent studies have shown the improved delivery performance of fog networks by comparing them with traditional cloud-based architectures. In this paper, we focus on further improving the delivery performance of a fog network. We first show that the performance of fog networks...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.