The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper addresses the impact of inventory errors on the performance of arborescent supply chains, characterized by the bullwhip effect. The inventory records inaccuracy is caused by a permanent shrinkage. Periodic inventory audits are used to control the consequences of the inventory records inaccuracy phenomenon. Different levels of shrinkage and different frequency of audits are considered in...
An Unmanned Aerial Ad hoc Network (UAANET) is a special type of Mobile Ad hoc Network (MANET). For these networks, researchers rely mostly on simulations to evaluate their proposed networking protocols. One major component of such simulation studies is the movement pattern of the UAVs. In this paper, we first show that mobility models affect the performance of UAANET/MANET routing protocols. To study...
As (M2M) Machine-To-Machine, communication continues to grow rapidly, a full study on overload control approach to manage the data and signaling of H2H traffic from massive MTC devices is required. In this paper, a new M2M resource-scheduling algorithm for Long Term Evolution (LTE) is proposed. It provides Quality of Service (QoS) guarantee to Guaranteed Bit Rate (GBR) services, we set priorities...
Large cities face growing mobility problems, due to the major traffic jams that result from high numbers of vehicles on the roads. In response, city and national governments have invested in alternative means of urban passenger transit, such as subways, trains, as well as Bus Rapid Transit (BRT). This article aims to analyze the BRT system, by attempting to calculate the probability of reaching a...
Accurate prediction of applications' performanceand functional behavior is a critical component for a widerange of tools, including anomaly detection, task scheduling and approximate computing. Statistical modeling is a very powerful approach for making such predictions and it uses observations of application behavior on a small number of training cases to predict how the application will behave in...
Wireless Sensor Networks (WSNs) have been widely considered as a promising solution to support different types of applications on industrial environments. Many of these applications impose strict dependability requirements, since a system failure may result in economic losses, or damage for human life or to the environment. The absence of an effective approach enabling the dependability evaluation...
Topological changes in IP networks may significantly influence the performance of networking algorithms, which therefore should be carefully evaluated using a large topology pool with diverse characteristics. In this paper, we present an automated topology generation and analysis tool to perform an elaborate topological dependency analysis of a Multi Topology Routing based IP Fast Re-Route technology,...
Today's software is getting more and more complex and harder to understand. Models help to organize knowledge and emphasize the structure of a software at a higher abstraction level. While the usage of model-driven techniques is widely adopted during software construction, it is still an open research topic if models can also be used to make runtime phenomena more comprehensible as well. It is not...
In this paper, we propose a state-based energy/performance model for a given parallel application on multicore computer systems. By quantifying energy consumptions at fine-grained levels, defined as states, we analyze the energy/performance impact by taking into account the application characteristics and energy features of multicore computers. By combining Amdahl's Law with our proposed model, we...
By modelling a software project as a complex system, its internal structure can be analyzed in order to asses its design quality. As a software system is being developed, the quality of its internal structure is evolving too, not always for the better. Flaws in the internal structure are usually indicators of code that is hard to understand, maintain and, in many cases, they are pointers of accumulated...
Typically, architecture optimization searches for good architecture candidates based on analyzing a model of the system. Model-based analysis inherently relies on abstractions and estimates, and as such produces approximations which are used to compare architecture candidates. However, approximations are often not sufficient due to the difficulty of accurately estimating certain extra-functional properties...
The cyber security exposure of resilient systems is frequently described as an attack surface. A larger surface area indicates increased exposure to threats and a higher risk of compromise. Ad-hoc addition of dynamic proactive defenses to distributed systems may inadvertently increase the attack surface. This can lead to cyber friendly fire, a condition in which adding superfluous or incorrectly configured...
Recent developments indicate that after more than a decade of intensive pioneer work, both in academia and industry, transactional memory might finally become a standard part of the mainstream processors. Intel Haswell and IBM Blue Gene are first such processors indicating this trend. However, it is still not clear what would be the right performance metric and how it could be estimated and measured...
To move mixed criticality research into industrial practice requires models whose run-time behaviour is acceptable to systems engineers. Certain aspects of current models, such as abandoning lower criticality tasks when certain situations arise, do not give the robustness required in application domains such as the automotive and aerospace industries. In this paper a new bailout protocol is developed...
The recent developments of 3D media technology have brought to life numerous applications of interactive entertainment such as 3D cinema, 3DTV and gaming. However, due to the data intensive nature of 3D visual content, a number of research challenges have emerged. In order to optimise the end-to-end content life-cycle, from capture to processing and delivery, Quality of Experience (QoE) has become...
With the fast development of wireless technologies, Wireless Mesh Networks (WMNs) are becoming an important networking infrastructure due to their low cost and increased high speed wireless Internet connectivity. In this paper, we used our proposed and implemented system based on Hill Climbing algorithm, called WMN-HC for mesh router node placement in WMNs. We analyze WMN-HC simulation system data...
Cloud Systems arose in the last years as a standard de-facto in IT enterprises for offering practically any kind of services to worldwide users. They provide means for realizing and distributing everything-as-a-service, including infrastructures, hardware and software platforms and services. So, composition, analysis and validation of Cloud services are open research challenges. In this work, we describe...
Managing Security is a complex process and existing research in the field of cybersecurity metrics provide limited insight into understanding the impact attacks have on the overall security goals of an enterprise. We need a new generation of metrics that can enable enterprises to react even faster in order to properly protect mission-critical systems in the midst of both undiscovered and disclosed...
Organizations providing large scale software and hardware maintenance support services typically capture detailed metrics of each service request (SR) for a customer. Examples of such metrics include the time taken to resolve the problem, success of the resolution, escalations across levels of support, field engineer site visit statistics, and parts replacement data -- the latter two for hardware...
Energy efficiency of large processing systems is usually assessed as the relation between a performance and a power consumption metric, neglecting malfunction. Execution failures have a tangible cost in terms of wasted energy, however. They are often managed through fault tolerance mechanisms, which in turn consume electricity. We introduce the consumability attribute for batch processing systems,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.