15,703 research outputs found

    Thermal Fingerprinting—Multi-Dimensional Analysis of Computational Loads

    Get PDF
    Digital fingerprinting is used in several domains to identify and track variable activities and processes. In this paper, we propose a novel approach to categorize and recognize computational tasks based on thermal system information. The concept focuses on all kinds of data center environments to control required cooling capacity dynamically. The concept monitors basic thermal sensor data from each server and chassis entity. The respective, characteristic curves are merged with additional general system information, such as CPU load behavior, memory usage, and I/O characteristics. This results in two-dimensional thermal fingerprints, which are unique and achievable. The fingerprints are used as input for an adaptive, pre-active air-conditioning control system. This allows a precise estimation of the data center health status. First test cases and reference scenarios clarify a huge potential for energy savings without any negative aspects regarding health status or durability. In consequence, we provide a cost-efficient, light-weight, and flexible solution to optimize the energy-efficiency for a huge number of existing, conventional data center environments

    Panako: a scalable acoustic fingerprinting system handling time-scale and pitch modification

    Get PDF
    In this paper a scalable granular acoustic fingerprinting system robust against time and pitch scale modification is presented. The aim of acoustic fingerprinting is to identify identical, or recognize similar, audio fragments in a large set using condensed representations of audio signals, i.e. fingerprints. A robust fingerprinting system generates similar fingerprints for perceptually similar audio signals. The new system, presented here, handles a variety of distortions well. It is designed to be robust against pitch shifting, time stretching and tempo changes, while remaining scalable. After a query, the system returns the start time in the reference audio, and the amount of pitch shift and tempo change that has been applied. The design of the system that offers this unique combination of features is the main contribution of this research. The fingerprint itself consists of a combination of key points in a Constant-Q spectrogram. The system is evaluated on commodity hardware using a freely available reference database with fingerprints of over 30.000 songs. The results show that the system responds quickly and reliably on queries, while handling time and pitch scale modifications of up to ten percent

    Fingerprints for spin-selection rules in the interaction dynamics of O2 at Al(111)

    Full text link
    We performed mixed quantum-classical molecular dynamics simulations based on first-principles potential-energy surfaces to demonstrate that the scattering of a beam of singlet O2 molecules at Al(111) will enable an unambiguous assessment of the role of spin-selection rules for the adsorption dynamics. At thermal energies we predict a sticking probability that is substantially less than unity, with the repelled molecules exhibiting characteristic kinetic, vibrational and rotational signatures arising from the non-adiabatic spin transition.Comment: 4 pages including 3 figures; related publications can be found at http://www.fhi-berlin.mpg.de/th/th.htm

    Measuring Information Leakage in Website Fingerprinting Attacks and Defenses

    Full text link
    Tor provides low-latency anonymous and uncensored network access against a local or network adversary. Due to the design choice to minimize traffic overhead (and increase the pool of potential users) Tor allows some information about the client's connections to leak. Attacks using (features extracted from) this information to infer the website a user visits are called Website Fingerprinting (WF) attacks. We develop a methodology and tools to measure the amount of leaked information about a website. We apply this tool to a comprehensive set of features extracted from a large set of websites and WF defense mechanisms, allowing us to make more fine-grained observations about WF attacks and defenses.Comment: In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18
    corecore