361 research outputs found

    Network-based business process management: embedding business logic in communications networks

    Get PDF
    Advanced Business Process Management (BPM) tools enable the decomposition of previously integrated and often ill-defined processes into re-usable process modules. These process modules can subsequently be distributed on the Internet over a variety of many different actors, each with their own specialization and economies-of-scale. The economic benefits of process specialization can be huge. However, how should such actors in a business network find, select, and control, the best partner for what part of the business process, in such a way that the best result is achieved? This particular management challenge requires more advanced techniques and tools in the enabling communications networks. An approach has been developed to embed business logic into the communications networks in order to optimize the allocation of business resources from a network point of view. Initial experimental results have been encouraging while at the same time demonstrating the need for more robust techniques in a future of massively distributed business processes.active networks;business process management;business protocols;embedded business logic;genetic algorithms;internet distributed process management;payment systems;programmable networks;resource optimization

    A Distance-Heuristic Tree Building Approach in Application Layer Multicast

    Get PDF
    In the application layer multicast (ALM), clustering nearby nodes can effectively improve the multicast performance. However, it is difficult for the ALM solution to quickly and accurately position the newcomer, because group members have no direct knowledge of underlying network topology. Additionally, ALM delivery trees with different performances are built when group members join the group in different join sequences. To alleviate the above problems, this paper proposes a distance-heuristic tree building protocol (called DHTB). DHTB uses our proposed distance-constrained cluster model and close-member-first-receive (CF) rule. In the model, most nearby nodes are grouped into some distance-constrained clusters, with little cluster organization and maintenance overhead. The CF rule arranges or rearranges the locations of group members according to related distances, and effectively positions the newcomer with the help of on-demand landmarks. Both the distance-constrained cluster model and CF rule are distance-heuristic. Therefore DHTB can alleviate the join sequence problem, and build the ALM tree with desirable performance

    Real-time stream processing in radio astronomy

    Full text link
    A major challenge in modern radio astronomy is dealing with the massive data volumes generated by wide-bandwidth receivers. Such massive data rates are often too great for a single device to cope, and so processing must be split across multiple devices working in parallel. These devices must work in unison to process incoming data in real time, reduce the data volume to a manageable size, and output a science-ready data product. The aim of this chapter is to give a broad overview of how digital systems for radio telescopes are commonly implemented, with a focus on real-time stream processing over multiple compute devices.Comment: Chapter to appear in "Big Data in Radio Astronomy: Scientific Data Processing for Advanced Radio Telescopes

    Hybrid Strategies for Link Adaptation Exploiting Several Degrees of Freedom in WiMAX Systems

    Get PDF

    Models and Performance of VANET based Emergency Braking

    Get PDF
    The network research community is working in the field of automotive to provide VANET based safety applications to reduce the number of accidents, deaths, injuries and loss of money. Several approaches are proposed and investigated in VANET literature, but in a completely network-oriented fashion. Most of them do not take into account application requirements and no one considers the dynamics of the vehicles. Moreover, message repropagation schemes are widely proposed without investigating their benefits and using very complicated approaches. This technical report, which is derived from the Master Thesis of Michele Segata, focuses on the Emergency Electronic Brake Lights (EEBL) safety application, meant to send warning messages in the case of an emergency brake, in particular performing a joint analysis of network requirements and provided application level benefits. The EEBL application is integrated within a Collaborative Adaptive Cruise Control (CACC) which uses network-provided information to automatically brake the car if the driver does not react to the warning. Moreover, an information aggregation scheme is proposed to analyze the benefits of repropagation together with the consequent increase of network load. This protocol is compared to a protocol without repropagation and to a rebroadcast protocol found in the literature (namely the weighted p-persistent rebroadcast). The scenario is a highway stretch in which a platoon of vehicles brake down to a complete stop. Simulations are performed using the NS_3 network simulation in which two mobility models have been embedded. The first one, which is called Intelligent Driver Model (IDM) emulates the behavior of a driver trying to reach a desired speed and braking when approaching vehicles in front. The second one (Minimizing Overall Braking Induced by Lane change (MOBIL)), instead, decides when a vehicle has to change lane in order to perform an overtake or optimize its path. The original simulator has been modified by - introducing real physical limits to naturally reproduce real crashes; - implementing a CACC; - implementing the driver reaction when a warning is received; - implementing different network protocols. The tests are performed in different situations, such as different number of lanes (one to five), different average speeds, different network protocols and different market penetration rates and they show that: - the adoption of this technology considerably decreases car accidents since the overall average maximum deceleration is reduced; - network load depends on application-level details, such as the implementation of the CACC; - VANET safety application can improve safety even with a partial market penetration rate; - message repropagation is important to reduce the risk of accidents when not all vehicles are equipped; - benefits are gained not only by equipped vehicles but also by unequipped ones

    Best practice report – operation and maintenance requirements

    Get PDF
    Deliverable 3.6.3 from the MERiFIC Project A report prepared as part of the MERiFIC Project "Marine Energy in Far Peripheral and Island Communities"This report is a deliverable of MERiFIC Work Package 3.6: ‘Operation and Maintenance requirements’ and has been produced as a cross border collaboration between IFREMER and the University of Exeter. The report provides an overview of guidelines and recommendations for the management of O&M operations necessary for an optimal exploitation of Marine energy plants, with a focus on the specific areas of South West Cornwall, UK and Iroise sea, Brittany, France. An overview of the onshore infrastructures and ports possibly suitable for management of such O&M operations is also provided. Management of scheduled and unscheduled maintenance operations are discussed in their various aspects including site accessibility. It should be noted that this topic, including weather window assessment for operations is discussed in more details in the additional MERIFIC report D3.6.2: Best Practice for installation proceduresMERiFIC was selected under the European Cross-Border Cooperation Programme INTERREG IV A France (Channel) – England, co-funded by the ERDF

    Paths to wider adoption of e-infrastructure services

    Get PDF
    This paper presents work conducted as part of the e-Uptake project, which aims to widen the uptake of e-Infrastructure services for research. We will discuss our fieldwork conducted so far, give examples of the barriers and enablers identified and discuss how using the accumulated knowledge can lead to paving the way for wider adoption of e Infrastructure Services
    corecore