首页 > 最新文献

2010 IEEE Fifth International Conference on Networking, Architecture, and Storage最新文献

英文 中文
Symmetric Distributed Joint Source-Channel Coding Using Raptor Codes 使用猛禽码的对称分布式联合源信道编码
Xuqi Zhu, Wenbo Zhang, Bin Li, Lin Zhang
Distributed compression of correlated sources has been discussed much in wireless sensor networks, while the error-resilient implementation of this efficient coding strategy is one of the crucial issues for applications. In this paper, a symmetric Distributed Joint Source-Channel Coding (DJSCC) scheme is proposed by using Raptor codes for the independent channels case. The channel noise and the correlation of sources are considered simultaneously within one set of encoder and decoder. The symmetric structure of the proposed approach leads to more flexible and balanced rate allocation, and the rateless property of Raptor codes also guarantees tractable code rates and error correction. At last, the simulation results demonstrate that our scheme outperforms the existing LDPC-based scheme at low SNR.
在无线传感器网络中,相关源的分布式压缩已经被广泛讨论,而这种高效编码策略的容错实现是应用中的关键问题之一。针对独立信道的情况,提出了一种采用Raptor码的对称分布式联合源信道编码(DJSCC)方案。在一组编码器和解码器中同时考虑信道噪声和源的相关性。该方法的对称结构使得速率分配更加灵活和均衡,Raptor码的无速率特性也保证了易于处理的码率和纠错。最后,仿真结果表明,该方案在低信噪比下优于现有的基于ldpc的方案。
{"title":"Symmetric Distributed Joint Source-Channel Coding Using Raptor Codes","authors":"Xuqi Zhu, Wenbo Zhang, Bin Li, Lin Zhang","doi":"10.1109/NAS.2010.17","DOIUrl":"https://doi.org/10.1109/NAS.2010.17","url":null,"abstract":"Distributed compression of correlated sources has been discussed much in wireless sensor networks, while the error-resilient implementation of this efficient coding strategy is one of the crucial issues for applications. In this paper, a symmetric Distributed Joint Source-Channel Coding (DJSCC) scheme is proposed by using Raptor codes for the independent channels case. The channel noise and the correlation of sources are considered simultaneously within one set of encoder and decoder. The symmetric structure of the proposed approach leads to more flexible and balanced rate allocation, and the rateless property of Raptor codes also guarantees tractable code rates and error correction. At last, the simulation results demonstrate that our scheme outperforms the existing LDPC-based scheme at low SNR.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123844441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stabilizing Path Modification of Power-Aware On/Off Interconnection Networks 电力感知开/关互联网络的稳定路径修改
José Miguel Montañana, M. Koibuchi, Hiroki Matsutani, H. Amano
Power saving is required for interconnects of modern PC clusters as well as the performance improvement. To reduce the power consumption of switches with maintaining the performance, on/off link regulations that activate and deactivate the links based on the traffic load have been widely developed in interconnection networks. Depending on which operation is selected, link activation or deactivation, the available network resources are changed, thus requiring paths to be reconfigured. To maintain deadlock freedom of packet transfers, connectivity, and performance during the path changes, we propose to apply dynamic reconfiguration techniques that process packet transfer uninterruptedly to power-aware on/off interconnection networks. The dynamic network reconfiguration techniques stabilize the update of paths that are quite crucial to use power-aware on/off link techniques in interconnects of PC clusters. We investigate the performance and behavior of network reconfiguration technique as soon as the link activation or deactivation occurs. Evaluation results show that the simple dynamic reconfiguration techniques slightly reduce the peak packet latency and reconfiguration time of the change compared with existing static reconfiguration in on/off interconnection networks. A reconfiguration technique called Double Scheme reduces by up to 95% the peak packet latency caused by the on/off link operation.
节能是现代PC集群互连和性能提升的要求。为了在保证性能的同时降低交换机的功耗,在互连网络中广泛发展了基于流量负载激活和关闭链路的开关链路规则。根据选择的操作,链路激活或去激活,可用的网络资源会发生变化,因此需要重新配置路径。为了在路径改变期间保持数据包传输、连接和性能的死锁自由,我们建议应用动态重新配置技术,在电源感知的开/关互连网络中不间断地处理数据包传输。动态网络重构技术稳定了路径的更新,这对于在PC集群互连中使用功率感知的开/关链路技术至关重要。我们研究了当链路激活或去激活发生时,网络重构技术的性能和行为。评估结果表明,在开/关互联网络中,与现有的静态重构相比,简单的动态重构技术略微降低了峰值数据包延迟和重构时间。一种称为双方案的重新配置技术可减少高达95%的由开/关链路操作引起的峰值数据包延迟。
{"title":"Stabilizing Path Modification of Power-Aware On/Off Interconnection Networks","authors":"José Miguel Montañana, M. Koibuchi, Hiroki Matsutani, H. Amano","doi":"10.1109/NAS.2010.13","DOIUrl":"https://doi.org/10.1109/NAS.2010.13","url":null,"abstract":"Power saving is required for interconnects of modern PC clusters as well as the performance improvement. To reduce the power consumption of switches with maintaining the performance, on/off link regulations that activate and deactivate the links based on the traffic load have been widely developed in interconnection networks. Depending on which operation is selected, link activation or deactivation, the available network resources are changed, thus requiring paths to be reconfigured. To maintain deadlock freedom of packet transfers, connectivity, and performance during the path changes, we propose to apply dynamic reconfiguration techniques that process packet transfer uninterruptedly to power-aware on/off interconnection networks. The dynamic network reconfiguration techniques stabilize the update of paths that are quite crucial to use power-aware on/off link techniques in interconnects of PC clusters. We investigate the performance and behavior of network reconfiguration technique as soon as the link activation or deactivation occurs. Evaluation results show that the simple dynamic reconfiguration techniques slightly reduce the peak packet latency and reconfiguration time of the change compared with existing static reconfiguration in on/off interconnection networks. A reconfiguration technique called Double Scheme reduces by up to 95% the peak packet latency caused by the on/off link operation.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114717102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Innovative Application of RFID Systems to Special Education Schools RFID系统在特殊教育学校的创新应用
Shu-Hui Yang, Pao-Ann Hsiung
Innovation is a new way of doing something. It may be incremental, radical, or revolutionary changes in thinking, products, processes, or organizations. Different from invention, which is an idea made manifest, innovation is ideas applied successfully. In this work, we strive to apply innovative Radio Frequency Identification (RFID) systems to special education school campus because in this modern age of science and technology, there still exists a wide digital gap in special education schools such that they have not yet benefited from technology advancements such as RFID. Supported by the ministry of education in Taiwan, we successfully designed and deployed RFID technology to the campus of a special education school at Chiayi in Taiwan. Though the technology was applied to eight different use case scenarios, we will focus on five of the more innovative ones in this work, including student temperature monitoring (STM), body weight monitoring (BWM), garbage disposal monitoring (GDM), mopping course recording (MCR), and campus visitor monitoring (CVM). Both active and passive tags and readers were employed to implement these five systems within the same campus. The benefits obtained from these systems by the students, teachers, and administrators were three-folds. First, student health monitoring through STM and BWM systems allowed the teachers and administration real-time control over changing health conditions that significantly affects such students. Second, course monitoring and recording through GDM and MCR allowed teachers to easily grasp and tune the learning curve of each student and also to implement a more guided training based on past learning efforts. Last but not least, campus safety monitoring through CVM allowed the administration to monitor the location of visitors in the campus and thus safeguard the students and teachers from dangerous or troublesome visitors. Novel techniques and creative methods were employed in the five systems, including temperature correction algorithm in STM, BMI-based weight tuning strategy in BWM, multiple route-tracking in GDM, learning improvement through history analysis in MCR, and face detection in CVM. The project was successfully deployed and is currently in use by the Chiayi School of Special Education which has more than 300 students and 150 administration staff and faculty.
创新是做某事的新方法。它可能是思想、产品、过程或组织中渐进的、激进的或革命性的变化。发明是一种思想的体现,而创新是思想的成功应用。在这项工作中,我们努力将创新的无线射频识别系统应用于特殊教育学校校园,因为在这个现代科技时代,特殊教育学校仍然存在很大的数字差距,因此他们尚未从无线射频识别等技术进步中受益。在台湾教育部的支持下,我们成功地设计并部署了RFID技术到台湾嘉义一所特殊教育学校的校园。虽然这项技术被应用于八个不同的用例场景,但我们将在这项工作中重点关注五个更具创新性的用例,包括学生体温监测(STM)、体重监测(BWM)、垃圾处理监测(GDM)、拖地课程记录(MCR)和校园访客监测(CVM)。采用主动和被动标签和阅读器在同一校园内实现这五个系统。学生、教师和管理人员从这些系统中获得了三倍的好处。首先,通过STM和BWM系统进行学生健康监测,使教师和管理部门能够实时控制对这些学生产生重大影响的不断变化的健康状况。其次,通过GDM和MCR进行课程监控和记录,使教师能够轻松掌握和调整每个学生的学习曲线,并根据过去的学习努力实施更有针对性的培训。最后但并非最不重要的是,通过CVM校园安全监控允许管理部门监控校园内访客的位置,从而保护学生和老师免受危险或麻烦的访客的侵害。五个系统采用了新颖的技术和创新的方法,包括STM中的温度校正算法、BWM中的基于bmi的权值调整策略、GDM中的多路径跟踪、MCR中的历史分析学习改进和CVM中的人脸检测。该项目已成功部署,目前正在嘉义特殊教育学校使用,该学校有300多名学生和150多名管理人员和教师。
{"title":"Innovative Application of RFID Systems to Special Education Schools","authors":"Shu-Hui Yang, Pao-Ann Hsiung","doi":"10.1109/NAS.2010.33","DOIUrl":"https://doi.org/10.1109/NAS.2010.33","url":null,"abstract":"Innovation is a new way of doing something. It may be incremental, radical, or revolutionary changes in thinking, products, processes, or organizations. Different from invention, which is an idea made manifest, innovation is ideas applied successfully. In this work, we strive to apply innovative Radio Frequency Identification (RFID) systems to special education school campus because in this modern age of science and technology, there still exists a wide digital gap in special education schools such that they have not yet benefited from technology advancements such as RFID. Supported by the ministry of education in Taiwan, we successfully designed and deployed RFID technology to the campus of a special education school at Chiayi in Taiwan. Though the technology was applied to eight different use case scenarios, we will focus on five of the more innovative ones in this work, including student temperature monitoring (STM), body weight monitoring (BWM), garbage disposal monitoring (GDM), mopping course recording (MCR), and campus visitor monitoring (CVM). Both active and passive tags and readers were employed to implement these five systems within the same campus. The benefits obtained from these systems by the students, teachers, and administrators were three-folds. First, student health monitoring through STM and BWM systems allowed the teachers and administration real-time control over changing health conditions that significantly affects such students. Second, course monitoring and recording through GDM and MCR allowed teachers to easily grasp and tune the learning curve of each student and also to implement a more guided training based on past learning efforts. Last but not least, campus safety monitoring through CVM allowed the administration to monitor the location of visitors in the campus and thus safeguard the students and teachers from dangerous or troublesome visitors. Novel techniques and creative methods were employed in the five systems, including temperature correction algorithm in STM, BMI-based weight tuning strategy in BWM, multiple route-tracking in GDM, learning improvement through history analysis in MCR, and face detection in CVM. The project was successfully deployed and is currently in use by the Chiayi School of Special Education which has more than 300 students and 150 administration staff and faculty.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"967 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123075008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secondary User Authentication Based on Mobile Devices Location 基于移动设备位置的用户从认证
Min-Hsao Chen, Chung-Han Chen
We propose a new authentication method based on identifying the ownership and location of the mobile devices. It can be assumed that the majority of the authenticating users will have a cellular device, a personal data assistant (PDA), or a smart phone device and, therefore, such devices are prime candidates to be used as another form of secondary authentication device. The proposed system uses the identifier pair (BSSID and SSID) and the corresponding signal strength in a wireless environment as a relative location marker for the mobile device. The marked locations are update to a centralized server database. This information can then be used as a secondary means of authentication by associating the authenticating user with the location of the authentication device
我们提出了一种基于识别移动设备的所有权和位置的新认证方法。可以假设,大多数身份验证用户将拥有蜂窝设备、个人数据助理(PDA)或智能电话设备,因此,这些设备是用作另一种形式的辅助身份验证设备的主要候选者。该系统使用标识符对(BSSID和SSID)以及无线环境中相应的信号强度作为移动设备的相对位置标记。标记的位置被更新到一个集中的服务器数据库。然后,通过将身份验证用户与身份验证设备的位置关联起来,这些信息可以用作辅助身份验证手段
{"title":"Secondary User Authentication Based on Mobile Devices Location","authors":"Min-Hsao Chen, Chung-Han Chen","doi":"10.1109/NAS.2010.56","DOIUrl":"https://doi.org/10.1109/NAS.2010.56","url":null,"abstract":"We propose a new authentication method based on identifying the ownership and location of the mobile devices. It can be assumed that the majority of the authenticating users will have a cellular device, a personal data assistant (PDA), or a smart phone device and, therefore, such devices are prime candidates to be used as another form of secondary authentication device. The proposed system uses the identifier pair (BSSID and SSID) and the corresponding signal strength in a wireless environment as a relative location marker for the mobile device. The marked locations are update to a centralized server database. This information can then be used as a secondary means of authentication by associating the authenticating user with the location of the authentication device","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121165880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
NASA: A Novel System Architecture for Ad Hoc Networks NASA:一种用于自组织网络的新型系统架构
G. Xue, Yunxia Feng, Zhigang Gao, Guojun Dai
A novel architecture used in the Ad Hoc networks is designed for building a well communication network quickly and reliably without any support of base installation. The system including hardware and software, called NASA, is also designed for high data rate transmission. The system architecture of NASA takes collaborative design of hardware and software. Therefore, it is completely open and doesn’t base on any operating system. NASA is designed for distributed networks and every NASA node could communicate with each other coequally. The paper discusses how to build the hardware platform of NASA, the cross layer implementation of the MAC and routing protocol. It has been proved that the proposed system is quite efficient and has low data transmission delay. In our experiments, the highest data transfer rate of NASA can be up to 1Mbps with 120 meters.
在Ad Hoc网络中,设计了一种新的架构,可以在没有基础设施支持的情况下快速、可靠地构建良好的通信网络。该系统包括硬件和软件,被称为NASA,也是为高数据速率传输而设计的。NASA的系统架构采用软硬件协同设计。因此,它是完全开放的,不基于任何操作系统。NASA是为分布式网络设计的,每个NASA节点都可以平等地相互通信。本文讨论了NASA硬件平台的构建、MAC和路由协议的跨层实现。实践证明,该系统具有较高的传输效率和较低的数据传输延迟。在我们的实验中,在120米的距离内,NASA最高的数据传输速率可以达到1Mbps。
{"title":"NASA: A Novel System Architecture for Ad Hoc Networks","authors":"G. Xue, Yunxia Feng, Zhigang Gao, Guojun Dai","doi":"10.1109/NAS.2010.54","DOIUrl":"https://doi.org/10.1109/NAS.2010.54","url":null,"abstract":"A novel architecture used in the Ad Hoc networks is designed for building a well communication network quickly and reliably without any support of base installation. The system including hardware and software, called NASA, is also designed for high data rate transmission. The system architecture of NASA takes collaborative design of hardware and software. Therefore, it is completely open and doesn’t base on any operating system. NASA is designed for distributed networks and every NASA node could communicate with each other coequally. The paper discusses how to build the hardware platform of NASA, the cross layer implementation of the MAC and routing protocol. It has been proved that the proposed system is quite efficient and has low data transmission delay. In our experiments, the highest data transfer rate of NASA can be up to 1Mbps with 120 meters.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127220233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Characterizing the Dependability of Distributed Storage Systems Using a Two-Layer Hidden Markov Model-Based Approach 基于两层隐马尔可夫模型的分布式存储系统可靠性表征
Xin Chen, James Warren, Fang Han, Xubin He
Nowadays, dependability is of paramount importance in modern distributed storage systems. A challenging issue to deploy a storage system with certain dependability requirements or improve existing systems' dependability is how to comprehensively and efficiently characterize the dependability of those systems. In this paper, we present a two-layer Hidden Markov Model (HMM) to characterize the dependability of a distributed storage system, focusing on the layer of parallel file system. By training the model with observable measurements under faulty scenarios, such as I/O performance, we quantify the system dependability via a tuple of state transition probability, service degradation, and fault latency under those scenarios. Our experimental results on a distributed storage system with PVFS (Parallel Virtual File System) demonstrate the effectiveness of our HMM-based approach, which efficiently captures the behavior patterns of the target system under disk faults and memory overusage.
在现代分布式存储系统中,可靠性是最重要的。如何对具有一定可靠性要求的存储系统进行部署或提高现有系统的可靠性,是一个具有挑战性的问题。本文以并行文件系统层为研究对象,提出了一种描述分布式存储系统可靠性的二层隐马尔可夫模型(HMM)。通过使用故障场景(如I/O性能)下的可观察测量来训练模型,我们通过这些场景下的状态转移概率、服务退化和故障延迟的元组来量化系统可靠性。我们在PVFS(并行虚拟文件系统)分布式存储系统上的实验结果证明了我们基于hmm的方法的有效性,该方法可以有效地捕获目标系统在磁盘故障和内存过度使用下的行为模式。
{"title":"Characterizing the Dependability of Distributed Storage Systems Using a Two-Layer Hidden Markov Model-Based Approach","authors":"Xin Chen, James Warren, Fang Han, Xubin He","doi":"10.1109/NAS.2010.28","DOIUrl":"https://doi.org/10.1109/NAS.2010.28","url":null,"abstract":"Nowadays, dependability is of paramount importance in modern distributed storage systems. A challenging issue to deploy a storage system with certain dependability requirements or improve existing systems' dependability is how to comprehensively and efficiently characterize the dependability of those systems. In this paper, we present a two-layer Hidden Markov Model (HMM) to characterize the dependability of a distributed storage system, focusing on the layer of parallel file system. By training the model with observable measurements under faulty scenarios, such as I/O performance, we quantify the system dependability via a tuple of state transition probability, service degradation, and fault latency under those scenarios. Our experimental results on a distributed storage system with PVFS (Parallel Virtual File System) demonstrate the effectiveness of our HMM-based approach, which efficiently captures the behavior patterns of the target system under disk faults and memory overusage.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134369991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design Space Exploration for Memory Subsystems of VLIW Architectures VLIW体系结构中存储子系统的设计空间探索
T. Jungeblut, Gregor Sievers, Mario Porrmann, U. Rückert
In this work we present a design space exploration of the memory subsystem of our configurable CoreVA VLIW architecture. The development of resource efficient processor architectures is based on a two-stage tool flow using a high-level processor specification as a reference. We evaluate several memory configurations like one memory port or two memory ports, as well as different write-miss-allocation modes. Applications ranging from LTE protocol stack over baseband processing up to cryptography and multimedia are evaluated in terms of execution time and energy efficiency. Analyses have shown that the application specific configuration of the memory subsystem can improve energy by up to 25%. Our environment allows the rapid profiling and evaluation of algorithms to choose the most efficient configuration.
在这项工作中,我们提出了我们的可配置CoreVA VLIW架构的内存子系统的设计空间探索。资源高效处理器体系结构的开发基于两阶段工具流,使用高级处理器规范作为参考。我们评估了几种内存配置,如一个内存端口或两个内存端口,以及不同的写-不分配模式。从基带处理上的LTE协议栈到密码学和多媒体的应用程序都在执行时间和能源效率方面进行了评估。分析表明,存储子系统的特定应用配置可以提高高达25%的能量。我们的环境允许快速分析和评估算法,以选择最有效的配置。
{"title":"Design Space Exploration for Memory Subsystems of VLIW Architectures","authors":"T. Jungeblut, Gregor Sievers, Mario Porrmann, U. Rückert","doi":"10.1109/NAS.2010.14","DOIUrl":"https://doi.org/10.1109/NAS.2010.14","url":null,"abstract":"In this work we present a design space exploration of the memory subsystem of our configurable CoreVA VLIW architecture. The development of resource efficient processor architectures is based on a two-stage tool flow using a high-level processor specification as a reference. We evaluate several memory configurations like one memory port or two memory ports, as well as different write-miss-allocation modes. Applications ranging from LTE protocol stack over baseband processing up to cryptography and multimedia are evaluated in terms of execution time and energy efficiency. Analyses have shown that the application specific configuration of the memory subsystem can improve energy by up to 25%. Our environment allows the rapid profiling and evaluation of algorithms to choose the most efficient configuration.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128471117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Geocast-Driven Structureless Information Dissemination Scheme for Vehicular Ad Hoc Networks geocast驱动的车载Ad Hoc网络无结构信息发布方案
Filip Cuckov, Min Song
Most data aggregation and dissemination approaches for VANETs attempt to create and utilize a structure for collecting information. The structures vary and could be categorized as either node-centric, as in a tree, mesh, or a cluster, or road-centric as in highway segmentation. In this paper we present a structureless information dissemination scheme that creates a layered view of road conditions with a diminishing resolution as the geocast distance increases. Our scheme first provides a high-detail local view of a given vehicle's neighbors and their immediate neighbors, which is further extended when information dissemination is employed. The scheme also allows for the preservation of unique reports within aggregated frames, such that safety-critical notifications are kept in high detail, all for the benefit of the driver's improved decision making during emergency scenarios. Here we report that our scheme provides the driver with a high detail view of road conditions sufficiently far ahead, as well as with aggregated information for the length of the whole geocast distance, all while preserving safety critical reports.
VANETs的大多数数据汇总和传播方法都试图创建和利用一种收集信息的结构。结构各不相同,可以分为以节点为中心(如树、网格或集群)或以道路为中心(如高速公路分段)。在本文中,我们提出了一种无结构的信息传播方案,该方案创建了一个分层的路况视图,随着地理投影距离的增加,分辨率逐渐降低。我们的方案首先提供给定车辆的邻居及其近邻的高细节局部视图,并在使用信息发布时进一步扩展。该方案还允许在聚合框架内保存独特的报告,这样就可以非常详细地保存对安全至关重要的通知,这一切都有利于驾驶员在紧急情况下改进决策。在这里,我们报告说,我们的方案为驾驶员提供了足够远的前方路况的高细节视图,以及整个地理距离长度的汇总信息,同时保留了安全关键报告。
{"title":"Geocast-Driven Structureless Information Dissemination Scheme for Vehicular Ad Hoc Networks","authors":"Filip Cuckov, Min Song","doi":"10.1109/NAS.2010.51","DOIUrl":"https://doi.org/10.1109/NAS.2010.51","url":null,"abstract":"Most data aggregation and dissemination approaches for VANETs attempt to create and utilize a structure for collecting information. The structures vary and could be categorized as either node-centric, as in a tree, mesh, or a cluster, or road-centric as in highway segmentation. In this paper we present a structureless information dissemination scheme that creates a layered view of road conditions with a diminishing resolution as the geocast distance increases. Our scheme first provides a high-detail local view of a given vehicle's neighbors and their immediate neighbors, which is further extended when information dissemination is employed. The scheme also allows for the preservation of unique reports within aggregated frames, such that safety-critical notifications are kept in high detail, all for the benefit of the driver's improved decision making during emergency scenarios. Here we report that our scheme provides the driver with a high detail view of road conditions sufficiently far ahead, as well as with aggregated information for the length of the whole geocast distance, all while preserving safety critical reports.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125388513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Fast Hierarchical Cache Directory: A Scalable Cache Organization for Large-Scale CMP 快速分级缓存目录:用于大规模CMP的可扩展缓存组织
Chongmin Li, Haixia Wang, Y. Xue, Xi Zhang, Dongsheng Wang
As more processing cores are integrated into one chip and the feature size continues to shrink, the increasing on-chip access latency complicates the design of the on-chip last-level cache for chip multiprocessors. At the same time, the overhead of maintaining on-chip directory cannot be ignored as the number of processing cores increasing. There is an urgent need for scalable organization of on-chip last-level cache. In this work, we propose fast hierarchical cache directory for tiled CMP, which divides CMP tiles into multiple regions hierarchically, and combines it with data replication. Multi-level directory is used to record the share information within a region and assist the regional home node to complete operation efficiently. Fast directory is used to get lower L2 slice access latency at the same time. Most cache requests to last-level cache can be handled within the local level-1 region. Evaluation indicates this architecture is highly scalable. Simulation results show that for a 16-core CMP, hierarchical cache directory reduces average access latency to last-level cache by 46.35% and average on-chip network traffic by 19.25% respectively. The system performance is increased by 20.82% at the same time.
随着越来越多的处理核心被集成到一个芯片中,并且特征尺寸不断缩小,片上访问延迟的增加使片上多处理器的片上最后一级缓存的设计变得复杂。同时,随着处理内核数量的增加,维护片上目录的开销也不容忽视。迫切需要对片上最后一级缓存进行可伸缩组织。本文提出了一种快速分层CMP缓存目录,将CMP分层划分为多个区域,并将其与数据复制相结合。多级目录用于记录区域内的共享信息,辅助区域主节点高效完成操作。使用快速目录可以同时获得较低的L2片访问延迟。大多数对最后一级缓存的缓存请求可以在本地一级区域内处理。评估表明此体系结构具有高度可伸缩性。仿真结果表明,对于16核CMP,分层缓存目录使对最后一级缓存的平均访问延迟和片上网络流量分别降低46.35%和19.25%。系统性能提升20.82%。
{"title":"Fast Hierarchical Cache Directory: A Scalable Cache Organization for Large-Scale CMP","authors":"Chongmin Li, Haixia Wang, Y. Xue, Xi Zhang, Dongsheng Wang","doi":"10.1109/NAS.2010.25","DOIUrl":"https://doi.org/10.1109/NAS.2010.25","url":null,"abstract":"As more processing cores are integrated into one chip and the feature size continues to shrink, the increasing on-chip access latency complicates the design of the on-chip last-level cache for chip multiprocessors. At the same time, the overhead of maintaining on-chip directory cannot be ignored as the number of processing cores increasing. There is an urgent need for scalable organization of on-chip last-level cache. In this work, we propose fast hierarchical cache directory for tiled CMP, which divides CMP tiles into multiple regions hierarchically, and combines it with data replication. Multi-level directory is used to record the share information within a region and assist the regional home node to complete operation efficiently. Fast directory is used to get lower L2 slice access latency at the same time. Most cache requests to last-level cache can be handled within the local level-1 region. Evaluation indicates this architecture is highly scalable. Simulation results show that for a 16-core CMP, hierarchical cache directory reduces average access latency to last-level cache by 46.35% and average on-chip network traffic by 19.25% respectively. The system performance is increased by 20.82% at the same time.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121470570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Binomial Probability Redundancy Strategy for Multimedia Transmission 多媒体传输的二项概率冗余策略
Lizhuo Zhang, W. Jia, Shifei Zhou
This paper proposes a Binomial Probability Redundancy Model (BPRM). This model is based on the Forward Error Correction (FEC) Reed-Solomon Coding Technique and the Interweaving Packet Loss Recovery Technique. It calculates the number of redundant packets according to the feedback from the receiver and dynamically generates these superfluous packets. Different from the Linear Probability Redundancy Model (LPRM) proposed by McKinley et al., we adopt the interweaving technique to transmit these redundant packets. We also present a bandwidth control strategy to improve quality of video data. The experimental result shows that BPRM is able to generate enough redundant packets even under congestive network condition. These packets ensure the receiver to restore the original data and achieve a better video quality compared with LPRM.
提出了一种二项概率冗余模型(BPRM)。该模型基于前向纠错(FEC)里德-所罗门编码技术和交织丢包恢复技术。它根据接收方的反馈计算冗余数据包的数量,并动态生成这些冗余数据包。与McKinley等人提出的线性概率冗余模型(LPRM)不同,我们采用交织技术来传输这些冗余数据包。我们还提出了一种带宽控制策略来提高视频数据的质量。实验结果表明,BPRM在网络拥挤的情况下也能产生足够的冗余数据包。与LPRM相比,这些数据包保证了接收端能够恢复原始数据并获得更好的视频质量。
{"title":"Binomial Probability Redundancy Strategy for Multimedia Transmission","authors":"Lizhuo Zhang, W. Jia, Shifei Zhou","doi":"10.1109/NAS.2010.45","DOIUrl":"https://doi.org/10.1109/NAS.2010.45","url":null,"abstract":"This paper proposes a Binomial Probability Redundancy Model (BPRM). This model is based on the Forward Error Correction (FEC) Reed-Solomon Coding Technique and the Interweaving Packet Loss Recovery Technique. It calculates the number of redundant packets according to the feedback from the receiver and dynamically generates these superfluous packets. Different from the Linear Probability Redundancy Model (LPRM) proposed by McKinley et al., we adopt the interweaving technique to transmit these redundant packets. We also present a bandwidth control strategy to improve quality of video data. The experimental result shows that BPRM is able to generate enough redundant packets even under congestive network condition. These packets ensure the receiver to restore the original data and achieve a better video quality compared with LPRM.","PeriodicalId":284549,"journal":{"name":"2010 IEEE Fifth International Conference on Networking, Architecture, and Storage","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114827978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2010 IEEE Fifth International Conference on Networking, Architecture, and Storage
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1