31,542 research outputs found

    Smart PIN: utility-based replication and delivery of multimedia content to mobile users in wireless networks

    Get PDF
    Next generation wireless networks rely on heterogeneous connectivity technologies to support various rich media services such as personal information storage, file sharing and multimedia streaming. Due to users’ mobility and dynamic characteristics of wireless networks, data availability in collaborating devices is a critical issue. In this context Smart PIN was proposed as a personal information network which focuses on performance of delivery and cost efficiency. Smart PIN uses a novel data replication scheme based on individual and overall system utility to best balance the requirements for static data and multimedia content delivery with variable device availability due to user mobility. Simulations show improved results in comparison with other general purpose data replication schemes in terms of data availability

    Fault Tolerant Adaptive Parallel and Distributed Simulation through Functional Replication

    Full text link
    This paper presents FT-GAIA, a software-based fault-tolerant parallel and distributed simulation middleware. FT-GAIA has being designed to reliably handle Parallel And Distributed Simulation (PADS) models, which are needed to properly simulate and analyze complex systems arising in any kind of scientific or engineering field. PADS takes advantage of multiple execution units run in multicore processors, cluster of workstations or HPC systems. However, large computing systems, such as HPC systems that include hundreds of thousands of computing nodes, have to handle frequent failures of some components. To cope with this issue, FT-GAIA transparently replicates simulation entities and distributes them on multiple execution nodes. This allows the simulation to tolerate crash-failures of computing nodes. Moreover, FT-GAIA offers some protection against Byzantine failures, since interaction messages among the simulated entities are replicated as well, so that the receiving entity can identify and discard corrupted messages. Results from an analytical model and from an experimental evaluation show that FT-GAIA provides a high degree of fault tolerance, at the cost of a moderate increase in the computational load of the execution units.Comment: arXiv admin note: substantial text overlap with arXiv:1606.0731

    Terrace reconstruction and long profile projection: a case study from the Solent river system near Southampton, England

    Get PDF
    River terrace sequences are important frameworks for archaeological evidence and as such it is important to produce robust correlations between what are often fragmentary remnants of ancient terraces. This paper examines both conceptual and practical issues related to such correlations, using a case study from the eastern part of the former Solent River system near Southampton, England. In this region two recent terrace schemes have been constructed using different data to describe the terrace deposits: one based mainly on terrace surfaces; the other on gravel thicknesses, often not recording the terrace surface itself. The utility of each of these types of data in terrace correlation is discussed in relation to the complexity of the record, the probability of post-depositional alteration of surface sediments and comparison of straight-line projections with modern river long profiles. Correlation using age estimates is also discussed, in relation to optically-stimulated luminescence dating of sand lenses within terrace gravels in this region during the PASHCC project. It is concluded that the need for replication at single sites means that this approach has limited use for correlative purposes, although dating of sediments is important for understanding wider landscape evolution and patterns of human occupation

    Livelisystems: a conceptual framework integrating social, ecosystem, development and evolutionary theory

    Get PDF
    Human activity poses multiple environmental challenges for ecosystems that have intrinsic value and also support that activity. Our ability to address these challenges is constrained, inter alia, by weaknesses in cross disciplinary understandings of interactive processes of change in socio-ecological systems. This paper draws on complementary insights from social and biological sciences to propose a ‘livelisystems’ framework of multi-scale, dynamic change across social and biological systems. This describes how material, informational and relational assets, asset services and asset pathways interact in systems with embedded and emergent properties undergoing a variety of structural transformations. Related characteristics of ‘higher’ (notably human) livelisystems and change processes are identified as the greater relative importance of (a) informational, relational and extrinsic (as opposed to material and intrinsic) assets, (b) teleological (as opposed to natural) selection, and (c) innovational (as opposed to mutational) change. The framework provides valuable insights into social and environmental challenges posed by global and local change, globalization, poverty, modernization, and growth in the anthropocene. Its potential for improving inter-disciplinary and multi-scale understanding is discussed, notably by examination of human adaptation to bio-diversity and eco-system service change following the spread of Lantana camera in the Western Ghats, India

    STOP-IT: strategic, tactical, operational protection of water infrastructure against cyberphysical threats

    Get PDF
    Water supply and sanitation infrastructures are essential for our welfare, but vulnerable to several attack types facilitated by the ever-changing landscapes of the digital world. A cyber-attack on critical infrastructures could for example evolve along these threat vectors: chemical/biological contamination, physical or communications disruption between the network and the supervisory SCADA. Although conceptual and technological solutions to security and resilience are available, further work is required to bring them together in a risk management framework, strengthen the capacities of water utilities to systematically protect their systems, determine gaps in security technologies and improve risk management approaches. In particular, robust adaptable/flexible solutions for prevention, detection and mitigation of consequences in case of failure due to physical and cyber threats, their combination and cascading effects (from attacks to other critical infrastructure, i.e. energy) are still missing. There is (i) an urgent need to efficiently tackle cyber-physical security threats, (ii) an existing risk management gap in utilities’ practices and (iii) an un-tapped technology market potential for strategic, tactical and operational protection solutions for water infrastructure: how the H2020 STOP-IT project aims to bridge these gaps is presented in this paper.Postprint (published version

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    A Resource Intensive Traffic-Aware Scheme for Cluster-based Energy Conservation in Wireless Devices

    Full text link
    Wireless traffic that is destined for a certain device in a network, can be exploited in order to minimize the availability and delay trade-offs, and mitigate the Energy consumption. The Energy Conservation (EC) mechanism can be node-centric by considering the traversed nodal traffic in order to prolong the network lifetime. This work describes a quantitative traffic-based approach where a clustered Sleep-Proxy mechanism takes place in order to enable each node to sleep according to the time duration of the active traffic that each node expects and experiences. Sleep-proxies within the clusters are created according to pairwise active-time comparison, where each node expects during the active periods, a requested traffic. For resource availability and recovery purposes, the caching mechanism takes place in case where the node for which the traffic is destined is not available. The proposed scheme uses Role-based nodes which are assigned to manipulate the traffic in a cluster, through the time-oriented backward difference traffic evaluation scheme. Simulation study is carried out for the proposed backward estimation scheme and the effectiveness of the end-to-end EC mechanism taking into account a number of metrics and measures for the effects while incrementing the sleep time duration under the proposed framework. Comparative simulation results show that the proposed scheme could be applied to infrastructure-less systems, providing energy-efficient resource exchange with significant minimization in the power consumption of each device.Comment: 6 pages, 8 figures, To appear in the proceedings of IEEE 14th International Conference on High Performance Computing and Communications (HPCC-2012) of the Third International Workshop on Wireless Networks and Multimedia (WNM-2012), 25-27 June 2012, Liverpool, U
    corecore