The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Context switching is a key technique enabling preemption and time-multiplexing for CPUs. However, for single-instruction multiple-thread (SIMT) processors such as high-end graphics processing units (GPUs), it is challenging to support context switching due to the massive number of threads, which leads to a huge amount of architectural states to be swapped during context switching. The architectural...
Service Chaining provides opportunities for network and service providers to implement their services and policies with finer granularity of an individual user or an application. However, the increasing number of Service Chains and middleboxes will introduce a larger number of flow rules and more consumption of Ternary Content Addressable Memory (TCAM), whose capacity is limited due to high cost and...
In this paper, we introduce the virtual SoC platform based on Aldebaran quad-core. The virtual platform provides an efficient method for architecture performance analysis and software profiling using a virtualized system and high performance emulation at the process level.
In recent years, we have been witnessing profound transformation of energy distribution systems fueled by Information and Communication Technologies (ICT), towards the so called Smart Grid. However, while the Smart Grid design strategies have been studied by academia, only anecdotal guidance is provided to the industry with respect to increasing the level of grid intelligence. In this paper, we report...
We address input design for piecewise affine systems so as to satisfy a reachability specification, and, simultaneously, detect the inputs that are actually relevant (influential inputs). This can be useful for system verification, when one has to check if some undesired/unsafe behavior coded via a reachability specification can actually occur and then possibly take appropriate corrective actions...
Electric Vehicles demand high efficiency power converter in their powertrains in order to use the energy of the storage unit in a better way. Specifically, the power converters, that interface the storage unit with the motors, are usually composed of high-losses components. Moreover, the topologies used in these systems present conditions of hard switching and reverse recovery phenomena that reduce...
Energy efficiency of wireless cellular networks is a well-studied domain and many proposals have been done following different amelioration paths. In this paper, we analyze the efficient use of small cells in a renewable energy context and considering real- time price of grid energy. This is typically the case when the mobile network is powered by the Smart Grid, in addition to renewable energy when...
This study demonstrates that the prediction error minimization (PEM) mechanism can account for the emergence of reciprocal interaction between two cognitive agents. During interactive processes, alternation of forming and deforming interactions may be triggered by various internal and external causes. We focus in particular on external causes derived from a dynamic and uncertain environment. Two small...
[Background] Software Engineering (SE) is predominantly a team effort that needs close cooperation among several people who may be geographically distributed. It has been recognized that appropriate tool support is a prerequisite to improve cooperation within SE teams. In an effort to contribute to this line of research, we have designed and developed an infrastructure, called ABC4GSD, based on the...
Cloud computing has recently become popular information technologies in enterprises. More and more enterprises tend to move from traditional enterprise information systems (EIS) to private EIS. However, few studies have addressed the switching issues, especially in large enterprises. The purpose of this study is to investigate switching intentions from traditional EIS to private cloud EIS for large...
In this position paper we identify the design of “wise systems” as an open research problem addressing new technology-based systems. Increasing complexity and sophistication make those systems hard to understand and to master. Human users are very often involved in learning processes that capture all their attention while being of little interest for them. To alleviate human interaction with such...
Due to the lack of a centralized management, mobile ad hoc networks (MANETs) are prone to various types of attacks. Trust management systems has been proposed to allow such networks to identify misbehaving nodes, enforce their collaboration in network functions. However, the trust management can be challenged by unique characteristics of MANETs in terms of absence of centralized management, severe...
Mobile Number Portability service has been launched in many countries and supported by all mobile and some fixed telecom operators in the world. In some fixed operators, this service regulation may have an interaction with national VoIP switches for call forwarding scenarios based on ISUP telecom protocol standard. In this work, we share our experience and solution approach for such a case mentioned...
Users context is exploited by an increased number of applications, especially mobile ones, in order to provide their clients with context-oriented services. With our work we try to extend the usage context to laptop and desktop applications and environments. This paper aims analyzing user behavior on three different habitats: at work, at school and at home. The main purpose of this paper is to find...
Many new cloud-focused applications such as deeplearning and graph analytics have started to rely on the highcomputing throughput of GPUs, but cloud providers cannotcurrently support fine-grained time-sharing on GPUs to enablemulti-tenancy for these types of applications. Currently, schedulingis performed by the GPU driver in combination with ahardware thread dispatcher to maximize utilization. However,...
Memory corruption vulnerabilities are the root cause of many modern attacks. Existing defense mechanisms are inadequate; in general, the software-based approaches are not efficient and the hardware-based approaches are not flexible. In this paper, we present hardware-assisted data-flow isolation, or, HDFI, a new fine-grained data isolation mechanism that is broadly applicable and very efficient. HDFI...
In modern symmetrical chip multiprocessor (CMP) architecture, problems in cache coherence, context switch overheads and serialized code bottleneck are major causes of excessive computing power dissipation in the application of simultaneous multithreading (SMT) technique. This research models and manages above-mentioned problems based on user application usage patterns identified in a mobile computing...
We can improve the performance of deflection-routed FPGA overlay networks-on-chip (NoCs) like Hoplite by as much as 10× (random traffic) at the expense of modest extra storage cost when combining static scheduling with packet switching in an efficient, hybrid manner. Deflection routed bufferless NoCs such as Hoplite, allow extremely lightweight packet switched routers on FPGAs, but suffer from high...
Legacy Internet systems and protocols are mostly static and keep state information in silo-style storage, thus making state migration, transformation and re-use difficult. Software Defined Networking (SDN) approaches in unison with Network Functions Virtualization (NFV) allow for more flexibility, yet they are currently restricted to a limited set of state migration options. Impeding the sharing of...
The current LTE network architecture experiences high level of signalling traffic between control plane entities. As a result many innovative architectures have been proposed including SDN to simplify the network. Cloud RAN on the other hand proposes a pioneering paradigm in terms of sustaining the profitability margin with unprecedented surge of mobile traffic and providing better performance to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.