Loading...
Search for: distributed-computer-systems
0.018 seconds
Total 133 records

    Complement routing: A methodology to design reliable routing algorithm for network on chips

    , Article Microprocessors and Microsystems ; Volume 34, Issue 6 , 2010 , Pages 163-173 ; 01419331 (ISSN) Patooghy, A ; Miremadi, S. G ; Sharif University of Technology
    Abstract
    Use of deep sub-micron VLSI technologies in fabrication of Network on Chips (NoCs) makes the reliability to be one of the first order concerns in the design of these products. This paper proposes and evaluates a methodology that adds reliability to NoC routing algorithms with minimal power and performance overheads. The key idea behind this methodology is to use the concept of complement routing in which two routing algorithms with disjoint sets of allowed turns are incorporated. According to this methodology, while a packet is routed by a routing algorithm, a redundant copy of that packet is routed by the complement of that routing algorithm. This is done by exploiting channels with lower... 

    Investigating the effects of schedulability conditions on the power efficiency of task scheduling in an embedded system

    , Article ISORC 2010 - 2010 13th IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, 5 May 2010 through 6 May 2010, Carmona, Sevilla ; Volume 1 , 2010 , Pages 102-106 ; 9780769540375 (ISBN) Bashiri, M ; Miremadi, S. G ; Politecnica; IEEE ; Sharif University of Technology
    2010
    Abstract
    Power consumption, performance and reliability are the most important parameters in modern safety-critical distributed real-time embedded systems. This paper evaluates and compares different schedulability conditions in faulttolerant Rate-Monotonic (RM) and Earliest-Deadline-First (EDF) algorithms, with respect to their power efficiency. The primary-backup scheme is used to implement fault tolerance in the algorithms. To evaluate the algorithms, a software tool is developed that can simulate an embedded system consisting of n processors and m periodic tasks. The results show that depending on the different schedulability conditions, the EDF algorithm implemented with the Best-Fit policy is... 

    The effect of using cube connected cycle for improving locality awareness in peer-to-peer networks

    , Article UKSim2010 - UKSim 12th International Conference on Computer Modelling and Simulation, 24 March 2010 through 26 March 2010 ; March , 2010 , Pages 491-496 ; 9780769540160 (ISBN) Gharib, M ; Barzegar, Z ; Habibi, J ; UK Simulation Society; Asia Modelling and Simulation Society (AMSS); European Federation of Simulation Societies (EUROSIM); IEEE UK and RI; European Council for Modelling and Simulation (ECMS) ; Sharif University of Technology
    2010
    Abstract
    Today, peer-to-peer networks are become more popular among internet users and more than millions peers share high volume of data from anywhere. Sending and receiving these data increase the network traffics terribly. By improving the performance of these networks not only the efficiency of these networks increase but also the overall performance of the internet augments. To achieve high performance and resilience to failures, a peer can make connections with those other peers that are geographically closer to it. There are many solutions that are suggested for locality problem. In this paper, we suggest a Cube Connected Cycle as an overlay network to improve locality with higher performance  

    Combining search and trust models in unstructured peer-to-peer networks

    , Article Journal of Supercomputing ; Volume 53, Issue 1 , July , 2010 , Pages 66-85 ; 09208542 (ISSN) Mashayekhi, H ; Habibi, J ; Sharif University of Technology
    2010
    Abstract
    Effectiveness of Peer-to-Peer (P2P) systems highly depends on efficiency and scalability of their search algorithms. Moreover, managing trust is a key issue for wide acceptance of P2P computing. Surprisingly, the majority of the available trust systems ignore the underlying search algorithm and assume it is preexisting. We claim that combining search and trust systems yields significant performance gains in terms of network traffic and query success rate. In this paper, we propose a robust and efficient trust based search framework for unstructured P2P networks. Our framework maintains limited size routing indexes combining search and trust data to guide queries to most reputable nodes. By... 

    A novel method for supporting locality in peer-to-peer overlays using hypercube topology

    , Article ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation, 27 January 2010 through 29 January 2010, Liverpool ; 2010 , Pages 391-395 ; 9780769539737 (ISBN) Gharib, M ; Barzegar, Z ; Habibi, J ; Sharif University of Technology
    2010
    Abstract
    Today, peer-to-peer networks are become more popular among internet users and more than millions peers share high volume of data from anywhere. Sending and receiving these data increase the network traffics terribly. By improving the performance of these networks not only the efficiency of these networks increase but also the overall performance of the internet augments. To achieve high performance and resilience to failures, a peer can make connections with those other peers that are geographically closer to it. In this paper, we present a novel mechanism for placing peers on the overlay network, which supports locality without increasing network traffic seriously  

    Skiptree: a new scalable distributed data structure on multidimensional data supporting range-queries

    , Article Computer Communications ; Volume 33, Issue 1 , 2010 , Pages 73-82 ; 01403664 (ISSN) Alaei, S ; Ghodsi, M ; Toossi, M ; Sharif University of Technology
    Abstract
    This paper presents a new balanced, distributed data structure for storing data with multidimensional keys in a peer-to-peer network. It supports range queries as well as single point queries which are routed in O (log n) hops. Our structure, called SkipTree, is fully decentralized with each node being connected to O (log n) other nodes. We propose modifications to the structures, so that the memory usage for maintaining the link structure at each node is reduced from the worst case of O (n) to O (log n log log n) on the average and O (log2 n) in the worst case. It is also shown that the load balancing is guaranteed to be within a constant factor. Our experimental results verify our... 

    ACM: Accurate crosstalk modeling to predict channel delay in Network-on-Chips

    , Article 2016 IEEE 22nd International Symposium on On-Line Testing and Robust System Design, IOLTS 2016, 4 July 2016 through 6 July 2016 ; 2016 , Pages 7-8 ; 9781509015061 (ISBN) Mahdavi, Z ; Shirmohammadi, Z ; Miremadi, S. G ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    The severity of timing delay in the communication channels of Network on Chip (NoC) depends on the transition patterns appearing on the wires. An analytical model can estimate the timing delay in NoC channels in the presence of crosstalk faults. However, recently proposed analytical model does not have enough accuracy and is based on 3-wire delay model. In this paper, an Accurate Crosstalk Model (ACM) based on 5-wire delay model is proposed to estimate the delay of communication channels in the presence of crosstalk faults. ACM is more accurate due to considering more wires in the delay model and also considering the overlaps between locations of transition patterns  

    Optimal sizing of distributed energy storage with consideration of demand response in distribution systems

    , Article 24th Iranian Conference on Electrical Engineering, 10 May 2016 through 12 May 2016 ; 2016 , Pages 1181-1186 ; 9781467387897 (ISBN) Seyf Abad, M. S ; Karimi Gharigh, M. R ; Safdarian, A ; Nokhbeh Zaeem, J ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    In future smart grids, energy storage systems (EESs) and demand response (DR) are expected to have an important role in balancing load changes arising from life-style of consumers and varying output of some renewable energy resources. However, activating DR and installing ESSs need huge investment forcing system owner to justify their effectiveness prior to any implementation. This paper presents a model to find the optimal capacity of EESs in distribution systems with demand responding to electricity price changes. The model aims at maximizing system owner profit by lessening total electricity provision costs. The model is formulated as a mixed integer non-linear programming problem. Due to... 

    Collaborative privacy management in P2P online social networks

    , Article 12th International ISC Conference on Information Security and Cryptology, 8 September 2015 through 10 September 2015 ; 2015 , Pages 64-72 ; 9781467376099 (ISBN) Zahak, M ; Alizadeh, M ; Abbas Pour, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Online Social Networks (OSNs) have become widely popular in recent years. In spite of users' interest to join OSNs, sharing vast amounts of personal information and resources in these networks might result in privacy issues for them. In the centralized OSNs, access control policies defined by users are enforced by OSN providers. Moreover, as these shared resources are stored by providers, they can access them. To avoid such problems, various architectures for decentralized OSNs are proposed. But the proposed architectures for P2P OSNs yet do not support any mechanism for collaborative privacy management on the shared content. By increasing the amount of resources such as photos which is... 

    A fuzzy fully distributed trust management system in wireless sensor networks

    , Article AEU - International Journal of Electronics and Communications ; Volume 70, Issue 1 , 2016 , Pages 40-49 ; 14348411 (ISSN) Jadidoleslamy, H ; Aref, M.R ; Bahramgiri, H ; Sharif University of Technology
    Elsevier GmbH  2016
    Abstract
    Wireless sensor networks (WSNs) usually consist of many tiny sensor nodes and a Sink. Problems like nodes' misbehavior due to malicious, compromised or selfishness intentions, and WSNs' security vulnerabilities against different attacks due to free and unprotected communications, untrusted and broadcasted transmissions, hostile environments and limited resources, degrade the security and overall performance of WSNs. In another direction, most of the traditional security mechanisms are unsuitable for WSNs. One significant security solution against these problems is Trust Management System (TMS); TMS enhances the security by detecting the nodes' abnormal behaviors; it improves the cooperation... 

    Power- and performance-efficient cluster-based network-on-chip with reconfigurable topology

    , Article Microprocessors and Microsystems ; Volume 46 , 2016 , Pages 122-135 ; 01419331 (ISSN) Mehrvarzy, P ; Modarressi, M ; Sarbazi Azad, H ; Sharif University of Technology
    Elsevier B.V  2016
    Abstract
    Topology is widely known as the most important characteristic of networks-on-chip (NoC), since it highly affects overall network performance, cost, and power consumption. In this paper, we propose a reconfigurable architecture and design flow for NoCs on which a customized topology for any target application can be implemented. In this structure, the nodes are grouped into some clusters interconnected by a reconfigurable communication infrastructure. The nodes inside a cluster are connected by a mesh to benefit from the interesting characteristics of the mesh topology, i.e. regular structure and efficient handling of local traffic. A reconfigurable inter-cluster topology then eliminates the... 

    A large-scale active measurement study on the effectiveness of piece-attack on bit torrent networks

    , Article IEEE Transactions on Dependable and Secure Computing ; Volume 13, Issue 5 , 2016 , Pages 509-518 ; 15455971 (ISSN) Fattaholmanan, A ; Rabiee, H. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    The peer to peer (P2P) file sharing applications have allocated a significant amount of today's Internet traffic. Among various P2P file sharing protocols, BitTorrent is the most common and popular one that attracts monthly a quarter of a billion users from all over the world. Similar to other P2P file sharing protocols, BitTorrent is mostly used for illegal sharing of copiright protected files such as movies, music and TV series. To impede this huge amount of illegal file distributions, anti-P2P companies have arisen to stand against these applications (specially the BitTorrent). To this end, they have begun to fire large-scale Internet attacks against BitTorrent networks. In this paper, we... 

    A new distributed learning automata based algorithm for maximum independent set problem

    , Article 2016 Artificial Intelligence and Robotics, 9 April 2016 ; 2016 , Pages 12-17 ; 9781509021697 (ISBN) Daliri Khomami, M. M ; Bagherpour, N ; Sajedi, H ; Meybodi, M. R ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    Maximum independent set problem is an NP-Hard one with the aim of finding the set of independent vertices with maximum possible cardinality in a graph. In this paper, we investigate a learning automaton based algorithm that finds a maximum independent set in the graph. Initially, a learning automaton is assigned to each vertex of graph. In order to find candidate independent set, a set of distributed learning automata collaborate with each other. The proposed algorithm based on learning automata is guided iteratively to the maximum independent set by updating the action probability vector. In order to study the performance of the proposed algorithm, we conducted some experiments. The... 

    Have you asked your neighbors? A Hidden Market approach for device-to-device offloading

    , Article 17th International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2016, 21 June 2016 through 24 June 2016 ; 2016 ; 9781509021857 (ISBN) Chatzopoulos, D ; Ahmadi, M ; Kosta, S ; Hui, P ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    During the last years, researchers have proposed solutions to help smartphones offload heavy tasks to remote entities in order to improve execution time and reduce energy consumption. Lately, inspired by the promising results of message forwarding in opportunistic networks, many researchers have proposed strategies for task offloading towards nearby mobile devices. None of these strategies, though, proposes any mechanism that considers selfish users and, most importantly, that motivates and defrays the participating devices who spend their resources. In this paper, we address these problems and propose the design of a framework that integrates an incentive scheme and a reputation mechanism.... 

    A low-cost sparse recovery framework for weighted networks under compressive sensing

    , Article Proceedings - 2015 IEEE International Conference on Smart City, SmartCity 2015, Held Jointly with 8th IEEE International Conference on Social Computing and Networking, SocialCom 2015, 5th IEEE International Conference on Sustainable Computing and Communications, SustainCom 2015, 2015 International Conference on Big Data Intelligence and Computing, DataCom 2015, 5th International Symposium on Cloud and Service Computing, SC2 2015, 19 December 2015 through 21 December 2015 ; 2015 , Pages 183-190 ; 9781509018932 (ISBN) Mahyar, H ; Rabiee, H. R ; Movaghar, A ; Hasheminezhad, R ; Ghalebi, E ; Nazemian, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    In this paper, motivated by network inference, we introduce a general framework, called LSR-Weighted, to efficiently recover sparse characteristic of links in weighted networks. The links in many real-world networks are not only binary entities, either present or not, but rather have associated weights that record their strengths relative to one another. Such models are generally described in terms of weighted networks. The LSR-Weighted framework uses a newly emerged paradigm in sparse signal recovery named compressive sensing. We study the problem of recovering sparse link vectors with network topological constraints over weighted networks. We evaluate performance of the proposed framework... 

    DCS: A distributed coordinate system for network positioning

    , Article Proceedings - IEEE International Symposium on Distributed Simulation and Real-Time Applications, DS-RT, 25 October 2009 through 28 October 2009, Singapore ; 2009 , Pages 113-120 ; 15506525 (ISSN) ; 9780769538686 (ISBN) Hariri, N ; Habibi, J ; Shirmohammadi, S ; Hariri, B ; Sharif University of Technology
    Abstract
    Predicting latency between nodes on the internet can have a significant impact on the performance of many services that use latency distances among nodes as a decision making input. Coordinate-based approaches are among the family of latency prediction techniques where latency between each pair of nodes is modeled as the virtual distance among those nodes over a virtual system. This article proposes the Decentralized Coordinate System (DCS) as a fully distributed system that does not rely on any infrastructure support from the underlying network. DCS uses a two-phase algorithm: first, each host is assigned rough coordinates, then, the rough estimation is refined in a way that it gradually... 

    Decision support system environment for software architecture style selection (DESAS v1.0)

    , Article Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering, SEKE 2009, 1 July 2009 through 3 July 2009, Boston, MA ; 2009 , Pages 147-151 ; 1891706241 (ISBN) ; 9781891706240 (ISBN) Moaven, S ; Ahmadi, H ; Habibi, J ; Kamandi, A ; Sharif University of Technology
    Abstract
    In software systems development lifecycle making use of software architecture, especially by taking advantage of architecture styles and patterns, is an essential part which increases product's quality. Nowadays, in order to cover complexity of systems, combination of different architecture styles should be used; therefore ambiguous behaviors might occur. Hence, due to the critical need for toolsets capable of selecting suitable styles and patterns, an environment is proposed in this paper which can perfectly cover different aspects of the implementation of decision support system (DSS). The designed environment obviates data implementation concepts and security considerations. Moreover, it... 

    A network model for vehicular Ad hoc networks: an introduction to obligatory attachment rule

    , Article IEEE Transactions on Network Science and Engineering ; Volume 3, Issue 2 , 2016 , Pages 82-94 ; 23274697 (ISSN) Ghafourian Ghahramani, S. A. A ; Hemmatyar, A. M. A ; Kavousi, K ; Sharif University of Technology
    Abstract
    In the past few years, the study of complex networks has attracted the attention of researchers. Many real networks, ranging from technological networks such as the Internet to biological networks, have been considered as special types of complex networks. Through application of the network science, important structural properties of such networks have been analyzed and the mechanisms that form such characteristics have been introduced. In this paper, we address the structural characteristics of a technological network called Vehicular Ad hoc Networks (VANETs). Recent studies reveal that the communication graph of VANETs has some interesting characteristics including: the Gaussian degree... 

    Storage, communication, and load balancing trade-off in distributed cache networks

    , Article IEEE Transactions on Parallel and Distributed Systems ; 2017 ; 10459219 (ISSN) Jafari Siavoshani, M ; Pourmiri, A ; Shariatpanahi, S. P ; Sharif University of Technology
    Abstract
    We consider load balancing in a network of caching servers delivering contents to end users. Randomized load balancing via the so-called power of two choices is a well-known approach in parallel and distributed systems. In this framework, we investigate the tension between storage resources, communication cost, and load balancing performance. To this end, we propose a randomized load balancing scheme which simultaneously considers cache size limitation and proximity in the server redirection process. IEEE  

    Cloud manufacturing service selection optimization and scheduling with transportation considerations: mixed-integer programming models

    , Article International Journal of Advanced Manufacturing Technology ; 2017 , Pages 1-28 ; 02683768 (ISSN) Akbaripour, H ; Houshmand, M ; Van Woensel, T ; Mutlu, N ; Sharif University of Technology
    Abstract
    Cloud manufacturing is an emerging service-oriented manufacturing paradigm that integrates and manages distributed manufacturing resources through which complex manufacturing demands with a high degree of customization can be fulfilled. The process of service selection optimization and scheduling (SSOS) is an important issue for practical implementation of cloud manufacturing. In this paper, we propose new mixed-integer programming (MIP) models for solving the SSOS problem with basic composition structures (i.e., sequential, parallel, loop, and selective). Through incorporation of the proposed MIP models, the SSOS with a mixed composition structure can be tackled. As transportation is...