Loading...
Search for: computing-systems
0.011 seconds
Total 362 records

    Fault injection into verilog models for dependability evaluation of digital systems

    , Article 2nd International Symposium on Parallel and Distributed Computing, ISPDC 2003, 13 October 2003 through 14 October 2003 ; 2003 , Pages 281-287 ; 0769520693 (ISBN); 9780769520698 (ISBN) Zarandi, H. R ; Miremadi, S. G ; Ejlali, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2003
    Abstract
    This paper presents transient and permanent fault injection into Verilog models of digital systems during the design phase by a developed simulation-based fault injection tool called INJECT. With this fault injection tool, it is possible to inject crucial fault models in all abstraction levels (such as swith-level) supported by Verilog HDL. Several fault models for injecting into Verilog models are specified and described. Analyzing the results obtained from the fault injections, using INJECT enables system designers to inform from dependable parameters, such as fault latency, propagation and coverage. As a case study, a 32-bit processor, namely DP32, has been evaluated and effects of faults... 

    A fault-tolerant cache architecture based on binary set partitioning

    , Article Microelectronics Reliability ; Volume 46, Issue 1 , 2006 , Pages 86-99 ; 00262714 (ISSN) Zarandi, H. R ; Miremadi, S. G ; Sharif University of Technology
    2006
    Abstract
    Caches, which are comprised much of a CPU chip area and transistor counts, are reasonable targets for transient single and multiple faults induced from energetic particles. This paper presents: (1) a new fault detection scheme for tag arrays of cache memories and (2) an architectural cache to improve performance as well as dependability. In this architecture, cache space is divided into sets of different sizes and different tag lengths. Using the proposed fault detection scheme, i.e., GParity, when single and multiple errors are detected in a word, the word is rewritten by its correct data from memory and its GParity code is recomputed. The error detection scheme and the cache architecture... 

    A formalism for recongurability analysis in distributed non-blocking components

    , Article 28th International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2008, Beijing, 17 June 2008 through 20 June 2008 ; 2008 , Pages 453-458 ; 9780769531731 (ISBN) Niamanesh, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Reconfigurability for a component of a distributed component-based system means ability to replace the component with a new one, in presence of the other components. In this context, substitutability and compatibility of components should be analyzed. In this paper, we use I/O-Constraint Automata to model behavior of components and propose enough formalism for substitutability and compatibility analysis. We show that in the context of distributed non-blocking components, there is a relation weaker than usual simulation relation in automata theory for notion of substitutability. We illustrate the relation between substitutability and compatibility to reason about the reconfigurability of a... 

    Observations on failure in blogs

    , Article 2007 International Conference on Weblogs and Social Media, ICWSM 2007, Boulder, CO, 26 March 2007 through 28 March 2007 ; 2007 Qazvinian, V ; Rassoulian, A ; Adibi, J ; Sharif University of Technology
    2007
    Abstract
    The capability of placing "comments" on the posts makes the blogspaces rather a complex environment. One of the interesting phenomena in blogspace is "blogger failure" when a blogger stops writing after a certain amount of time and will not return to blogspace for a long time, or when a blogger does not get any comment from her audience. In this paper we illustrate our observation on bloggers failure in a unique blogspace. First, we introduce PersianBlog blogspace briefly along with our observations of behaviors of bloggers on placing comments. Next, we will provide our definition of failure, and give a broad future research path to model failure in blogspace  

    Performing assembly-based method engineering by architecture-centric method engineering approach

    , Article EMS 2008, European Modelling Symposium, 2nd UKSim European Symposium on Computer Modelling and Simulation, Liverpool, 8 September 2008 through 10 September 2008 ; 2008 , Pages 181-186 ; 9780769533254 (ISBN) Ahmadi, H ; Rashidi, H ; Moaven, S ; Habibi, J ; Sharif University of Technology
    2008
    Abstract
    Due to the necessity for methods that are able to handle complexities of systems, use of Method Engineering (ME) to construct more adaptable and flexible methods has become of importance. Assemblybased approach is the most well-known approach of ME that performs method construction by reusing and assembling different method fragments. This approach, like other approaches of ME, suffers from the lack of suitable guidelines. In this way, architecture-centric method engineering (ArCME) is a new approach which aims at performing ME processes in a more disciplined and cohesive way. In this paper, process of assemblybased ME is enhanced by ArCME. Furthermore, benefits of implementing the process... 

    Network-based computing

    , Article Journal of Computer and System Sciences ; Volume 73, Issue 8 , December , 2007 , Pages 1119-1120 ; 00220000 (ISSN) Sarbazi Azad, H ; Mackenzie, L. M ; Sharif University of Technology
    2007
    Abstract
    Dealing with virtual channels has always been a critical issue in developing analytical performance models for interconnection networks. Almost all previous studies relied on a method proposed by Dally to capture the effect of virtual channels multiplexing  

    An enhanced random-walk method for content locating in P2P networks

    , Article 27th International Conference on Distributed Computing Systems Workshops, ICDCSW'07, Toronto, ON, 22 June 2007 through 29 June 2007 ; 2007 ; 0769528384 (ISBN); 9780769528380 (ISBN) Ronasi, K ; Firooz, M. H ; Pakravan, M. R ; Nasiri Avanaki, A ; Sharif University of Technology
    2007
    Abstract
    The important problem of content location in an unstructured distributed network (such as P2P, with no central searching system, graph construction control or file placement regulation) is addressed. The existing methods that are based on either flooding or random walk impose a large traffic load on the network or require a long time to search. In this work, we propose a method that outperforms the existing methods in both of these measures. These advantages are achieved by publishing traces of the contents of each node in its nearby nodes, so that the closer nodes to the target have a stronger trace of it. Such traces are used to rapidly locate the desired content. The superb performance of... 

    Assessment of message missing failures in CAN-based systems

    , Article IASTED International Conference on Parallel and Distributed Computing and Networks, as part of the 23rd IASTED International Multi-Conference on Applied Informatics, Innsbruck, 15 February 2005 through 17 February 2005 ; 2005 , Pages 387-392 ; 10272666 (ISSN) Salmani, H ; Miremadi, S. G ; Fahringer T ; Hamza M. H ; Sharif University of Technology
    2005
    Abstract
    This paper presents a simulation-based environment to study fault effects in message missing failures in CAN-based systems. A CAN controller is modeled by VHDL at behavioral level and is exploited to set up a network composed of several nodes. A total of 27,000 transient faults of seven types are injected into five critical portions of the system including the bus and four portions of the CAN controller. The experimental results show that the faults affect the message sending in which more than 20% of faults cause the failure. Besides, with a heavy workload, faults that are occurred into the CAN controller and on the bus cause about 90% and 10% of all failures, respectively  

    Exact solutions for a universal set of quantum gates on a family of isospectral spin chains

    , Article Physical Review A - Atomic, Molecular, and Optical Physics ; Volume 72, Issue 5 , 2005 ; 10502947 (ISSN) Karimipour, V ; Majd, N ; Sharif University of Technology
    2005
    Abstract
    We find exact solutions for a universal set of quantum gates on a scalable candidate for quantum computers, namely an array of two-level systems. The gates are constructed by a combination of dynamical and geometrical (non-Abelian) phases. Previously these gates have been constructed mostly on nonscalable systems and by numerical searches among the loops in the manifold of control parameters of the Hamiltonian. © 2005 The American Physical Society  

    Performance comparison of deadlock recovery and deadlock avoidance routing algorithms in wormhole-switched networks

    , Article IEE Proceedings: Computers and Digital Techniques ; Volume 150, Issue 2 , 2003 , Pages 97-106 ; 13502387 (ISSN) Khonsari, A ; Shahrabi, A ; Ould Khaoua, M ; Sarbazi Azad, H ; Sharif University of Technology
    2003
    Abstract
    Dealing with deadlock has always been a crucial issue for any routing algorithms proposed for wormhole-switched networks. Adaptive routing algorithms, based on deadlock avoidance strategies, usually dedicate resources specifically to ensure deadlock freedom. However, a number of recent studies have demonstrated that deadlocks are quite rare in the network. This fact has motivated researchers to introduce adaptive routing algorithms based on deadlock recovery strategies. In an effort to gain a deep understanding of the factors that affect routing performance, a comparison of the performance merits of deadlock recovery against deadlock avoidance routing algorithms is performed. While most... 

    Temperature control in three-network on chips using task migration

    , Article IET Computers and Digital Techniques ; Vol. 7, issue. 6 , November , 2013 , pp. 274-281 ; 1751-861X (online) Hassanpour, N ; Hessabi, H ; Hamedani, P. K ; Sharif University of Technology
    Abstract
    Combination of three-dimensional (3D) IC technology and network on chip (NoC) is an effective solution to increase system scalability and also alleviate the interconnect problem in large-scale integrated circuits. However, because of the increased power density in 3D NoC systems and the destructive effect of high temperatures on chip reliability, applying thermal management solutions becomes crucial in such circuits. In this study, the authors propose a runtime distributed migration algorithm based on game theory to balance the heat dissipation among processing elements (PEs) in a 3D NoC chip multiprocessor. The objective of this algorithm is to minimise the 3D NoC system's peak temperature,... 

    Performance analysis of packet loss recovery policies in P2P video streaming

    , Article International Journal of Internet Protocol Technology ; Vol. 8, issue. 1 , 2014 , p. 44-53 Akbari, B ; Rabiee, H. R ; Ghanbari, M ; Sharif University of Technology
    Abstract
    Packet loss recovery is an important part of P2P video streaming networks due to inevitable packet loss in today's internet and interdependency of data units in compressed video streams. In addition, the architecture of P2P streaming networks, in which the data delivered to the receivers through chain of peers, can intensify the impact of the internet packet loss on the quality of perceived video at the receivers. FEC and ARQ are the two most important techniques that can be used to overcome the side effect of the internet packet loss in P2P video streaming networks. Based on these two techniques, different packet loss recovery strategies can be applied in different overlay hops of a given... 

    Temperature control in three-network on chips using task migration

    , Article IET Computers and Digital Techniques ; Volume 7, Issue 6 , 2013 , Pages 274-281 ; 17518601 (ISSN) Hassanpour, N ; Hessabi, H ; Hamedani, P. K ; Sharif University of Technology
    2013
    Abstract
    Combination of three-dimensional (3D) IC technology and network on chip (NoC) is an effective solution to increase system scalability and also alleviate the interconnect problem in large-scale integrated circuits. However, because of the increased power density in 3D NoC systems and the destructive effect of high temperatures on chip reliability, applying thermal management solutions becomes crucial in such circuits. In this study, the authors propose a runtime distributed migration algorithm based on game theory to balance the heat dissipation among processing elements (PEs) in a 3D NoC chip multiprocessor. The objective of this algorithm is to minimise the 3D NoC system's peak temperature,... 

    Memristive neuro-fuzzy system

    , Article IEEE Transactions on Cybernetics ; Volume 43, Issue 1 , January , 2013 , Pages 269-285 ; 21682267 (ISSN) Merrikh Bayat, F ; Shouraki, S. B ; Sharif University of Technology
    2013
    Abstract
    In this paper, a novel neuro-fuzzy computing system is proposed where its learning is based on the creation of fuzzy relations by using a new implication method without utilizing any exact mathematical techniques. Then, a simple memristor cross-bar-based analog circuit is designed to implement this neuro-fuzzy system which offers very interesting properties. In addition to high connectivity between neurons and being fault tolerant, all synaptic weights in our proposed method are always non-negative, and there is no need to adjust them precisely. Finally, this structure is hierarchically expandable, and it can do fuzzy operations in real time since it is implemented through analog circuits.... 

    Crosstalk avoidance coding for reliable data transmission of network on chips

    , Article 2013 International Symposium on System-on-Chip, SoC 2013 - Proceedings ; 2013 Shirmohammadi, Z ; Miremadi, S. G ; Sharif University of Technology
    2013
    Abstract
    Inter-wire coupling capacitance may lead to crosstalk faults that significantly limits the reliability of NoCs. In this paper, we propose a numerical-based crosstalk avoidance code that can omit the Triplet Opposite Direction (TOD) transitions produced by crosstalk faults. The proposed coding does not have ambiguity and uses all of the codeword space. Simulations using VHDL for different channel widths show that the proposed method can reduce crosstalk fault in the NoC links with negligible power and area overheads  

    PAM: A packet manipulation mechanism for mitigating crosstalk faults in NoCs

    , Article Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015, 26 October 2015 through 28 October 2015 ; October , 2015 , Pages 1895-1902 ; 9781509001545 (ISBN) Shirmohammadi, Z ; Ansari, M ; Abharian, S. K ; Safari, S ; Miremadi, S. G ; Atzori L ; Jin X ; Jarvis S ; Liu L ; Calvo R. A ; Hu J ; Min G ; Georgalas N ; Wu Y ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    This paper proposes an efficient mechanism that mitigates crosstalk faults in Network-on-Chips (NoCs). This is done by using a Packet Manipulating mechanism called PAM for reliable data transfer of NoCs. PAM investigates the transitions of a packet to minimize the forbidden transition patterns appearing during the flit traversal in NoCs. To do this, the content of a packet is manipulated using three different manipulating mechanisms. In other words, PAM manipulates the content of packet in three manipulating modes including: vertical, horizontal and diagonal modes. Then, comparing the transitions of these manipulating mechanisms, a packet with minimum numbers of transitions is selected to be... 

    A scalable framework for wireless distributed computing

    , Article IEEE/ACM Transactions on Networking ; Volume 25, Issue 5 , 2017 , Pages 2643-2654 ; 10636692 (ISSN) Li, S ; Yu, Q ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Abstract
    We consider a wireless distributed computing system, in which multiple mobile users, connected wirelessly through an access point, collaborate to perform a computation task. In particular, users communicate with each other via the access point to exchange their locally computed intermediate computation results, which is known as data shuffling. We propose a scalable framework for this system, in which the required communication bandwidth for data shuffling does not increase with the number of users in the network. The key idea is to utilize a particular repetitive pattern of placing the data set (thus a particular repetitive pattern of intermediate computations), in order to provide the... 

    Straggler mitigation in distributed matrix multiplication: fundamental limits and optimal coding

    , Article IEEE Transactions on Information Theory ; Volume 66, Issue 3 , 2020 , Pages 1920-1933 Yu, Q ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    We consider the problem of massive matrix multiplication, which underlies many data analytic applications, in a large-scale distributed system comprising a group of worker nodes. We target the stragglers' delay performance bottleneck, which is due to the unpredictable latency in waiting for slowest nodes (or stragglers) to finish their tasks. We propose a novel coding strategy, named entangled polynomial code, for designing the intermediate computations at the worker nodes in order to minimize the recovery threshold (i.e., the number of workers that we need to wait for in order to compute the final output). We demonstrate the optimality of entangled polynomial code in several cases, and show... 

    Introduction of novel rule based algorithms for scheduling in grid computing systems

    , Article 2nd Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, 13 May 2008 through 15 May 2008 ; 2008 , Pages 138-143 ; 9780769531366 (ISBN) Rasooli Oskooei, A ; Mirza Aghatabar, M ; Khorsandi, S ; Sharif University of Technology
    2008
    Abstract
    The rule based scheduling algorithms are a new trend in grid scheduling algorithms; the combination of rule based algorithms for resource selection with various dispatching rules for queuing of jobs can improve or deteriorate their performance. Thus, choosing a proper queuing strategy for each algorithm is a prominent issue in scheduling. In this paper, we introduce two new dispatching rules for resource selection and three new dispatching rules for queuing of jobs; we evaluate the performance of various combinations of these new rule based scheduling algorithms and queuing strategies. Also, we use some major combination of rule based scheduling algorithms with some important queuing... 

    Organizing P2P nodes in semantically partitioned space

    , Article 3rd International Conference on Semantics, Knowledge, and Grid, SKG 2007, Xi'an, 29 October 2007 through 31 October 2007 ; 2007 , Pages 322-325 ; 0769530079 (ISBN); 9780769530079 (ISBN) Livani, E ; Habibi, J ; Rostami, H ; Sharif University of Technology
    2007
    Abstract
    Peer-to-peer networks are beginning to form the infrastructure of future applications. The use of semantic information to organize nodes in a P2P network is a prosperous approach. In this paper we present a novel method, called Semantic Partition Tree, which organizes nodes in a semantic space, using an upper ontology. In this approach each node can find a target in a time proportioned to the depth of the upper ontology, which is significantly less than the number of nodes in the network. Also we simulated our method with several configurations and measured its performance. The results of the simulation show that our scheme is highly scalable and can be used by real P2P networks. © 2007 IEEE...