Loading...
Search for: distributed-computer-systems
0.008 seconds
Total 133 records

    CodedSketch: Coded distributed computation of approximated matrix multiplication

    , Article 2019 IEEE International Symposium on Information Theory, ISIT 2019, 7 July 2019 through 12 July 2019 ; Volume 2019-July , 2019 , Pages 2489-2493 ; 21578095 (ISSN); 9781538692912 (ISBN) Jahani Nezhad, T ; Maddah Ali, M. A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we propose CodedSketch, as a distributed straggler-resistant scheme to compute an approximation of the multiplication of two massive matrices. The objective is to reduce the recovery threshold, defined as the total number of worker nodes that the master node needs to wait for to be able to recover the final result. To exploit the fact that only an approximated result is required, in reducing the recovery threshold, some sorts of pre-compression are required. However, compression inherently involves some randomness that would lose the structure of the matrices. On the other hand, considering the structure of the matrices is crucial to reduce the recovery threshold. In... 

    A formalism for recongurability analysis in distributed non-blocking components

    , Article 28th International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2008, Beijing, 17 June 2008 through 20 June 2008 ; 2008 , Pages 453-458 ; 9780769531731 (ISBN) Niamanesh, M ; Jalili, R ; Sharif University of Technology
    2008
    Abstract
    Reconfigurability for a component of a distributed component-based system means ability to replace the component with a new one, in presence of the other components. In this context, substitutability and compatibility of components should be analyzed. In this paper, we use I/O-Constraint Automata to model behavior of components and propose enough formalism for substitutability and compatibility analysis. We show that in the context of distributed non-blocking components, there is a relation weaker than usual simulation relation in automata theory for notion of substitutability. We illustrate the relation between substitutability and compatibility to reason about the reconfigurability of a... 

    Model checking of component based software using compositional reductions

    , Article International Journal of Software Engineering and Knowledge Engineering ; Volume 18, Issue 5 , 2008 , Pages 683-712 ; 02181940 (ISSN) Izadi, M ; Movaghar, A ; Sharif University of Technology
    World Scientific Publishing Co. Pte Ltd  2008
    Abstract
    A component-based computing system consists of two main parts: a set of components and a coordination subsystem. Reo is an exogenous coordination language for compositional construction of the coordination subsystem. Constraint automaton has been defined as the operational semantics of Reo. The main goal of this paper is to prepare a model checking method for verifying linear time temporal properties of component-based systems whose coordinating subsystems are modeled by Reo and components are modeled by labeled transition systems. For this purpose, we introduce modified definitions of constraint automata and their composition operators by which, every constraint automaton can be considered... 

    IPROMISE: Reliable multi-sender algorithm for peer-to-peer networks

    , Article 2007 2nd International Conference on Communication System Software and Middleware and Workshops, COMSWARE 2007, Bangalore, 7 January 2007 through 12 January 2007 ; 2007 ; 1424406145 (ISBN); 9781424406142 (ISBN) Firooz, M. H ; Ronasi, K ; Pakravan, M. R ; Nasiri Avanaki, A ; Sharif University of Technology
    2007
    Abstract
    Due to the constraints of P2P networks (such as bandwidth limitation) multiple senders should be employed for reliable multimedia streaming. This paper introduces a mathematic approach to select a set of senders among all available senders to provide the most reliable stream for the receiver. This selection is based on upload bandwidths and availability of peers as well as bandwidth of links connecting the senders and the receiver. Our method is called IPROMISE as it is an improved version of the PROMISE algorithm. Simulation results demonstrate improved media quality delivered to the receiver, while the complexity of sender selection remains the same. © 2007 IEEE  

    RAQNet: A topology-aware overlay network

    , Article 1st International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, 21 June 2007 through 22 June 2007 ; Volume 4543 LNCS , 2007 , Pages 13-24 ; 03029743 (ISSN); 3540729852 (ISBN); 9783540729853 (ISBN) Mirrezaei, S. I ; Shahparian, J ; Ghodsi, M ; Sharif University of Technology
    Springer Verlag  2007
    Abstract
    Peer-to-peer overlay networks provide a useful infrastructure for building distributed applications. These networks provide efficient and fault-tolerant routing and object locating within a self-organizing overlay network. This paper presents a multi-dimensional overlay network called RAQNet which is based on RAQ1. RAQ supports exact match queries and range queries over multi-dimensional data efficiently. Moreover, its routing cost does not depend on the dimension of the search space. In RAQNet, we have improved its original routing algorithms and extended it to have topology awareness property. In RAQNet, nodes are connected to each other if their labels are "close" to each other with... 

    Topology awareness of overlay P2P networks

    , Article Concurrency and Computation: Practice and Experience ; Volume 19, Issue 7 , 2007 , Pages 999-1021 ; 15320626 (ISSN) Rostami, H ; Habibi, J ; Sharif University of Technology
    John Wiley and Sons Ltd  2007
    Abstract
    In overlay networks, the mechanism of a peer randomly joining and leaving a network, causes a topology mismatch between the overlay and the underlying physical topology. This causes a large volume of redundant traffic in the underlying physical network as well as an extra delay in message delivery in the overlay network. Topology mismatch occurs because overlay networks are not aware of their underlying physical networks. In this paper we present a mathematical model for topology awareness of overlay networks (degree of matching between an overlay and its underlying physical network) and the efficiency of message delivery on them. Then we experimentally show that the model is precise in the... 

    Using description logics for network vulnerability analysis

    , Article International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, ICN/ICONS/MCL'06, Morne, 23 April 2006 through 29 April 2006 ; Volume 2006 , 2006 ; 0769525520 (ISBN); 9780769525525 (ISBN) Zakeri, R ; Jalili, R ; Abolhassani, H ; Shahriari, H. R ; Sharif University of Technology
    2006
    Abstract
    The distributed nature and complexity of computer networks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to provide a simple, open communication infrastructure in an academic and collaborative environment, causes this protocol lack of built-in mechanisms for authentication, integrity and privacy. Even though in the last few years a more systematic approach to TCP/IP network security problem has been followed, a formal approach to this problem is lacking. In this paper, we propose using Description Logics as a formal model which could be used to analyze TCP/IP networks against attacks.... 

    Semantic HyperCup

    , Article 39th Annual Hawaii International Conference on System Sciences, HICSS'06, Kauai, HI, 4 January 2006 through 7 January 2006 ; Volume 9 , 2006 , Pages - ; 15301605 (ISSN) ; 0769525075 (ISBN); 9780769525075 (ISBN) Rostami, H ; Habibi, J ; Rahnama, A ; Sharif University of Technology
    2006
    Abstract
    Peer-to-peer networks are beginning to form the infrastructure of future applications. One of the problems with non structured peer-to-peer networks is their scalability limitation. These networks can't contain a large number of nodes because of the large amount of traffic that they have to handle. HyperCup is a structured overlay network that solves the scalability problem for message broadcasts. This overlay broadcasts search queries throughout the entire network and all nodes receive broadcasted messages. In this paper we introduce Semantic HyperCup, an extension of HyperCup which uses semantic data to route messages and reduce overlay network traffic through search queries. © 2006 IEEE  

    A solution to single point of failure using voter replication and disagreement detection

    , Article 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing, DASC 2006, Indianapolis, IN, 29 September 2006 through 1 October 2006 ; 2006 , Pages 171-176 ; 0769525393 (ISBN); 9780769525396 (ISBN) Patooghy, A ; Miremadi, S. Gh ; Javadtalab, A ; Fazeli, M ; Farazmand, N ; Sharif University of Technology
    2006
    Abstract
    This paper suggests a method, called distributed voting, to overcome the problem of the single point of failure in a TMR system used in robotics and industrial control applications. It uses time redundancy and is based on TMR with disagreement detector feature. This method masks faults occurring in the voter where the TMR system can continue its function properly. The method has been evaluated by injecting faults into Vertex2Pro and Vertex4 Xilinx FPGAs. An analytical evolution is also performed. The results of both evaluation approaches show that the proposed method can improve the reliability and the mean time to failure (MTTF) of a TMR system by at least a factor of (2-R v(t)) where Rv(t)... 

    A robust free size OCR for omni-font persian/arabic printed document using combined MLP/SVM

    , Article 10th Iberoamerican Congress on Pattern Recognition, CIARP 2005, Havana, 15 November 2005 through 18 November 2005 ; Volume 3773 LNCS , 2005 , Pages 601-610 ; 03029743 (ISSN); 3540298509 (ISBN); 9783540298502 (ISBN) Pirsiavash, H ; Mehran, R ; Razzazi, F ; Sharif University of Technology
    2005
    Abstract
    Optical character recognition of cursive scripts present a number of challenging problems in both segmentation and recognition processes and this attracts many researches in the field of machine learning. This paper presents a novel approach based on a combination of MLP and SVM to design a trainable OCR for Persian/Arabic cursive documents. The implementation results on a comprehensive database show a high degree of accuracy which meets the requirements of commercial use. © Springer-Verlag Berlin Heidelberg 2005  

    SkipTree: A Scalable range-queryable distributed data structure for multidimensional data

    , Article 16th International Symposium on Algorithms and Computation, ISAAC 2005, Hainan, 19 December 2005 through 21 December 2005 ; Volume 3827 LNCS , 2005 , Pages 298-307 ; 03029743 (ISSN); 3540309357 (ISBN); 9783540309352 (ISBN) Alaei, S ; Toossi, M ; Ghodsi, M ; Sharif University of Technology
    2005
    Abstract
    This paper presents the SkipTree, a new balanced, distributed data structure for storing data with multidimensional keys in a peer-to-peer network. The SkipTree supports range queries as well as single point queries which are routed in O(log n) hops. SkipTree is fully decentralized with each node being connected to O(logn) other nodes. The memory usage for maintaining the links at each node is O(log n log log n) on average and O(log2 n) in the worst case. Load balance is also guaranteed to be within a constant factor. © Springer-Verlag Berlin Heidelberg 2005  

    A mathematical foundation for topology awareness of P2P overlay networks

    , Article 4th International Conference on Grid and Cooperative Computing - GCC 2005, Beijing, 30 November 2005 through 3 December 2005 ; Volume 3795 LNCS , 2005 , Pages 906-918 ; 03029743 (ISSN); 3540305106 (ISBN); 9783540305101 (ISBN) Rostami, H ; Habibi, J ; Sharif University of Technology
    2005
    Abstract
    In peer-to-peer (P2P) overlay networks, the mechanism of a peer randomly joining and leaving a network, causes a topology mismatch between the overlay and the underlying physical topology. This causes a large volume of redundant traffic in the underlying physical network as well as an extra delay in message delivery in the overlay network. Topology mismatch occurs because overlay networks are not aware of their underlying physical networks. In this paper we present a mathematical model for topology awareness of overlay networks (degree of matching between an overlay and its underlying physical network) and the efficiency of message delivery on them. We also after determining the... 

    Parallel clustering on the star graph

    , Article 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, 2 October 2005 through 3 October 2005 ; Volume 3719 LNCS , 2005 , Pages 287-292 ; 03029743 (ISSN); 3540292357 (ISBN); 9783540292357 (ISBN) Fazeli, M ; Sarbazi Azad, H ; Farivar, R ; Sharif University of Technology
    2005
    Abstract
    In this paper, a parallel algorithm for data clustering is presented on a multi-computer with star topology. This algorithm is fast and requires a small amount of memory per processing element, which makes it even suitable for SIMD implementation. The proposed parallel algorithm completes in O(K+S 2-T 2) steps for a clustering problem of N data patterns with M features per pattern and K clusters, where N.M = S!, K.M = T!, and M=R!, on a s-star interconnection network. © Springer-Verlag Berlin Heidelberg 2005  

    Temperature control in three-network on chips using task migration

    , Article IET Computers and Digital Techniques ; Vol. 7, issue. 6 , November , 2013 , pp. 274-281 ; 1751-861X (online) Hassanpour, N ; Hessabi, H ; Hamedani, P. K ; Sharif University of Technology
    Abstract
    Combination of three-dimensional (3D) IC technology and network on chip (NoC) is an effective solution to increase system scalability and also alleviate the interconnect problem in large-scale integrated circuits. However, because of the increased power density in 3D NoC systems and the destructive effect of high temperatures on chip reliability, applying thermal management solutions becomes crucial in such circuits. In this study, the authors propose a runtime distributed migration algorithm based on game theory to balance the heat dissipation among processing elements (PEs) in a 3D NoC chip multiprocessor. The objective of this algorithm is to minimise the 3D NoC system's peak temperature,... 

    A platform for optimisation in distributed manufacturing enterprises based on cloud manufacturing paradigm

    , Article International Journal of Computer Integrated Manufacturing ; Vol. 27, Issue 11 , 2 November , 2014 , pp. 1031-1054 ; ISSN: 0951192X Fatahi Valilai, O ; Houshmand, M ; Sharif University of Technology
    Abstract
    The synergy of fundamental factors like changes in governmental policies, global expansions of the manufacturing industries and improvements in technology related to reliability of manufacturing information flow have created the global manufacturing revolution in the first years of the twenty-first century. Although the concept of global manufacturing enterprise has created benefits and opportunities for todays manufacturing enterprises, it has enforced enterprises to endure costs to adopt the global manufacturing solutions. Besides, considering the researches aimed to enable the global manufacturing paradigm, there is still a need for efficient solutions to fulfil the global product... 

    Performance analysis of packet loss recovery policies in P2P video streaming

    , Article International Journal of Internet Protocol Technology ; Vol. 8, issue. 1 , 2014 , p. 44-53 Akbari, B ; Rabiee, H. R ; Ghanbari, M ; Sharif University of Technology
    Abstract
    Packet loss recovery is an important part of P2P video streaming networks due to inevitable packet loss in today's internet and interdependency of data units in compressed video streams. In addition, the architecture of P2P streaming networks, in which the data delivered to the receivers through chain of peers, can intensify the impact of the internet packet loss on the quality of perceived video at the receivers. FEC and ARQ are the two most important techniques that can be used to overcome the side effect of the internet packet loss in P2P video streaming networks. Based on these two techniques, different packet loss recovery strategies can be applied in different overlay hops of a given... 

    Bacterial foraging search in unstructured P2P networks

    , Article Canadian Conference on Electrical and Computer Engineering ; 2014 Sharifkhani, F ; Pakravan, M. R ; Sharif University of Technology
    Abstract
    In this paper, a new search algorithm in heterogeneous hierarchical unstructured p2p networks is presented which takes into account heterogeneity of peers such as upload bandwidth, life time in the network and process capacity in its peer discovery policy as factors that influence download performance and user satisfaction. One advantage of this algorithm is that it can be performed in a completely unstructured network without imposing any change on network topology and file replication. However, it obviously decreases file download time as it is designed to discover broad-bandwidth nodes with a higher probability. This property results in a fair distribution of load over heterogeneous p2p... 

    Temperature control in three-network on chips using task migration

    , Article IET Computers and Digital Techniques ; Volume 7, Issue 6 , 2013 , Pages 274-281 ; 17518601 (ISSN) Hassanpour, N ; Hessabi, H ; Hamedani, P. K ; Sharif University of Technology
    2013
    Abstract
    Combination of three-dimensional (3D) IC technology and network on chip (NoC) is an effective solution to increase system scalability and also alleviate the interconnect problem in large-scale integrated circuits. However, because of the increased power density in 3D NoC systems and the destructive effect of high temperatures on chip reliability, applying thermal management solutions becomes crucial in such circuits. In this study, the authors propose a runtime distributed migration algorithm based on game theory to balance the heat dissipation among processing elements (PEs) in a 3D NoC chip multiprocessor. The objective of this algorithm is to minimise the 3D NoC system's peak temperature,... 

    Locality-awareness in multi-channel peer-to-peer live video streaming networks

    , Article Proceedings - International Conference on Advanced Information Networking and Applications, AINA ; March , 2013 , Pages 1048-1055 ; 1550445X (ISSN) ; 9780769549538 (ISBN) Bayat, N ; Rabiee, H. R ; Salehi, M ; Sharif University of Technology
    2013
    Abstract
    The current multi-channel P2P video streaming architectures still suffer from several performance problems such as low Quality of Service (QoS) in unpopular channels. The P2P systems are inherently dynamic, and their performance problems could be categorized into four groups; peer churn, channel churn, uncooperative peers, and geographical distribution of peers. In this paper, for the first time, we develop a novel locality-incentive framework for multi-channel live video streaming. We propose a hierarchical overlay network architecture by utilizing a dual-mode locality-Awareness method (spatial and temporal). Moreover, an incentive mechanism for encouraging peers to dedicate their upload... 

    Crosstalk avoidance coding for reliable data transmission of network on chips

    , Article 2013 International Symposium on System-on-Chip, SoC 2013 - Proceedings ; 2013 Shirmohammadi, Z ; Miremadi, S. G ; Sharif University of Technology
    2013
    Abstract
    Inter-wire coupling capacitance may lead to crosstalk faults that significantly limits the reliability of NoCs. In this paper, we propose a numerical-based crosstalk avoidance code that can omit the Triplet Opposite Direction (TOD) transitions produced by crosstalk faults. The proposed coding does not have ambiguity and uses all of the codeword space. Simulations using VHDL for different channel widths show that the proposed method can reduce crosstalk fault in the NoC links with negligible power and area overheads