The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we consider a root-cause analysis framework for NFV infrastructure. As monitoring machinery for NFV has matured the next step is to leverage on such data to automatically optimize failure detection, analysis, and overall resiliency. The complex architecture and dynamics of NFV poses significant challenges from the point of view of causality inference. In particular, the need for an approach...
This paper studies the interactive visualization and post-mortem analysis of execution traces generated by task-parallel programs. We focus on the detection of performance anomalies inaccessible to state-of-the-art performance analysis techniques, including anomalies deriving from the interaction of multiple levels of software abstractions, anomalies associated with the hardware, and anomalies resulting...
Graphics processing units (GPUs) are becoming increasingly common in today's computing systems due to their superior performance and energy efficiency relative to their cost. To further improve these desired characteristics, researchers have proposed several software and hardware techniques. Evaluation of these proposed techniques could be tricky due to the ad-hoc nature in which applications are...
Besides being an in-memory-oriented computing framework, Spark runs on top of Java Virtual Machines (JVMs), so JVM parameters must be tuned to improve Spark application performance. Misconfigured parameters and settings degrade performance. For example, using Java heaps that are too large often causes a long garbage collection pause time, which accounts for over 10–20% of application execution time...
The Cloud Application Management Framework (CAMF) enables Cloud application developers to design, deploy and manage their applications through an intuitive blueprint design. In this paper we show how Cloud application developers can utilize CAMF in order to have portable applications that can be deployed on different IaaS with minimal effort. Towards this goal, we introduce the Cloud Application Requirement...
This paper describes the design details of a measurement and data acquisition laboratory. The main purpose of this laboratory is to experimentally validate the theoretical concept of sensors, signal conditioning circuits and data acquisition devices. The developed laboratory course emphasizes on theoretical concept of different temperature sensors, signal conditioning circuit of the respective sensors,...
In election systems, there are many opportunities to incorporate forensic techniques and gather forensic evidence that can lead to determining the root cause of an anomaly. Although much has been written about security and forensic techniques in election systems, very little research has focused on measuring the forensic capabilities of election systems and mapping them to potential security safeguards...
Fiber array optical systems that are used for free-space optical communications and phased laser beam projection applications depend on fast, closed-loop adaptive control to efficiently compensate for optical distortion caused by atmospheric turbulence. Current off-the-shelf systems are limited in performance, fiber array control channels, and flexibility. In this research project, we built a scalable...
Evaluating the reliability of Wireless Sensor Networks (WSNs) is of great importance especially for WSNs designed for mission-critical applications. In this paper, we propose a novel reliability metric for WSNs. Unlike existing metrics in the literature, the proposed metric takes into account both aspects of WSN functionality, namely, coverage and connectivity. In addition, it does not assume a specific...
In this work we present a study that evaluates and compares two block ciphers, AES and PRESENT, in the context of lightweight cryptography for smartphones security applications. To the best of our knowledge, this is the first comparison between these ciphers using a smartphone as computing platform. AES is the standard for symmetric encryption and PRESENT is one of the first ultra-lightweight ciphers...
In this paper, a novel attempt is made to design a reconfigurable coder system which can be reconfigured on-the-fly to work either as an encoder, or decoder, or both encoder and decoder depending on the user requirements. In order to build the proposed reconfigurable system, Convolutional encoder, Viterbi decoder, Golay encoder and Golay decoder are employed in different combinations for the proposed...
Synthesis tools for approximate sequential circuits require the ability to quickly, efficiently, and automatically characterize and bound the errors produced by the circuits. Previous approaches to characterize errors in approximate sequential circuits have been based on simulations spanning all cycles of a sequential computation. These approaches, however, are not scalable and only accommodate small...
The development of electric/electronic systems of today's vehicles is becoming more and more complex. New challenges are arising through highly distributed systems, so-called cyber-physical systems, which interact with and have an impact on the physical world. Methods and tools are thus essential to support the development process, especially when systems are safety-critical and demand reliability...
Today on-chip monitoring solutions should be characterized by a reduced software and hardware overheads. So, this work deals with techniques to profile computational behavior and communication patterns of hardware/software components belonging to systems with multiple processing elements, i.e. a more general representation of on-chip embedded systems. In particular, the paper focuses on profiling...
In order to support orders of traffic explosion with sustainable energy consumption, besides conventional Spectrum Efficiency (SE), Energy Efficiency (EE) is proposed as another critical metric for the next generation mobile networks (5G). This paper proposes to evaluate the potential EE gain of 5G on the basis of EARTH Energy Efficiency Evaluation Framework (E3F). As E3F indicated, the large-scale...
Designing applications for heterogeneous systems, like Multiprocessor System-on-Chips (MPSoCs) based on Field Programmable Gate Arrays (FPGAs) is a complex task. In order to exploit all the capabilities of these systems, such as Partial Dynamic Reconfiguration (PDR) and hardware acceleration, the designer still has to develop large parts of the system unassisted, establishing the design choices (i...
With recognizing power as a first-class citizen in the HPC community and the growth of software running on battery-driven devices, the need to evaluate software design based on the combined effects of energy and performance has become eminent. Despite of the numerous metrics to evaluate software performance, the study on how to evaluate software energy efficiency is still in its early stage. In this...
Cloud computing has emerged as powerful technology with various use cases in different environments. The goal of these use cases is to provide services to users on demand. These use cases vary from application to application, but service level agreement (SLA) management plays an important role in all of them. SLA management is an essential part of service provisioning environment. Automated SLA management...
Heterogeneous multicore platforms have become an attractive choice to deploy mixed criticality systems demanding diverse computational requirements. One of the major challenges is to efficiently harness the computational power of these multicore platforms while deploying mixed criticality applications. The problem is acerbated with an additional demand of energy efficiency. It is particularly relevant...
SCADA systems allow users to monitor and/or control physical devices, processes and events remotely. As these systems are critical to industrial processes, they are often run on highly reliable and dedicated hardware. Moving these SCADA systems to an Infrastructure as a Service (IaaS) cloud, allows for: cheaper deployments, system redundancy support, and increased uptime, however it is not clear to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.