IRISA

Displaying 1-21 of 21 results

  • White Papers // Nov 2014

    Checkpointing as a Service in Heterogeneous Cloud Environments

    A non-invasive, cloud-agnostic approach is demonstrated for extending existing cloud plat-forms to include checkpoint-restart capability. Most cloud platforms currently rely on each application to provide its own fault tolerance. A uniform mechanism within the cloud itself serves two purposes: direct support for long-running jobs, which would otherwise require a custom...

    Provided By IRISA

  • White Papers // Jun 2013

    A Single Sediment-Microbial Fuel Cell Powering a Wireless Telecommunication System

    The authors report the ability of a single sediment-Microbial Fuel Cell (MFC) to power Wireless Sensor Network (WSN) nodes. Such a system is able to collect information from sensors and to transmit it to sinks. In particular, the PowWow platform presented here is combining an open and modular hardware design...

    Provided By IRISA

  • White Papers // Jul 2012

    Export Methods in Fault Detection and Localization Mechanisms

    Monitoring the quality of service in a multi-domain network allows providers to ensure the control of multi-domain service performance. A multi-domain service is a service that crosses multiple domains. In this paper, the authors propose several mechanisms for fault detection and fault localization. A fault is detected when an end-to-end...

    Provided By IRISA

  • White Papers // Dec 2011

    Global Vs. Per-Domain Monitoring of Multi-Domain Networks

    Multi-domain monitoring aims at guaranteeing QoS for services crossing several domains. It is often desirable to perform global monitoring to guarantee end-to-end QoS for services across domains and to reduce the monitoring cost. However, global monitoring might be infeasible due to confidentiality constraints. The alternative solution is to perform per-domain...

    Provided By IRISA

  • White Papers // Jul 2011

    MDE to Manage Communications With and Between Resource-Constrained Systems

    With the emergence of Internet of Things (IoT), many things which typically used to be isolated or operated in small local networks, will be interconnected through the Internet. One main challenge to tackle in IoT is efficient management of communication between things, since things can be very different in terms...

    Provided By IRISA

  • White Papers // Jun 2011

    Shrinker: Improving Live Migration of Virtual Clusters Over WANs With Distributed Data Deduplication and Content-Based Addressing

    Live virtual machine migration is a powerful feature of virtualization technologies. It enables efficient load balancing, reduces energy consumption through dynamic consolidation, and makes infrastructure maintenance transparent to users. While live migration is available across wide area networks with state of the art systems, it remains expensive to use because...

    Provided By IRISA

  • White Papers // Jan 2011

    Characterization of Embedded Applications for Decoupled Processor Architecture

    Needs for performance on embedded applications will lead to the use of dynamic execution on embedded processors in the next few years. However, complete out-of-order superscalar cores are still expensive in terms of silicon area and power dissipation. In this paper, one study the adequation of a more limited form...

    Provided By IRISA

  • White Papers // Nov 2010

    Cost Bounds of Multicast Light-Trees in WDM Networks

    Multicast routing in WDM networks is to determine a set of light-paths on a physical topology from a source to a set of destinations involved in a multi-cast communication. The light-tree concept is introduced in to minimize the number of wavelength channels and transceivers used for a multicast session. Branching...

    Provided By IRISA

  • White Papers // Oct 2010

    Individual Vs. Global Radio Resource Management in a Hybrid Broadband Network

    Nowadays, with the abundance of diverse air interfaces in the same operating area, advanced Radio Resource Management (RRM) is vital to take advantage of the available system resources. In such a scenario, a mobile user will be able to connect concurrently to different wireless access networks. In this paper, the...

    Provided By IRISA

  • White Papers // Jun 2010

    High Throughput Data-Compression for Cloud Storage

    As data volumes processed by large-scale distributed data intensive applications grow at high-speed, an increasing I/O pressure is put on the underlying storage service, which is responsible for data management. One particularly difficult challenge, that the storage service has to deal with, is to sustain a high I/O throughput in...

    Provided By IRISA

  • White Papers // Jun 2010

    FORUM: A Flexible Data Integration System Based on Data Semantics

    Integrating and sharing information across disparate data sources entails several challenges: relevant data objects are split across multiple sources, often owned by different organizations. The data sources represent, maintain, and export their data using a variety of formats, interfaces and semantics. In the last two decades, much research work in...

    Provided By IRISA

  • White Papers // Mar 2010

    Combining Processor Virtualization and Component-Based Engineering in C for Heterogeneous Many-Core Platforms

    Embedded system design is driven by strong efficiency constraints in terms of performance, silicon area and power consumption, as well as pressure on the cost and time-to-market. As of today, this forms three tough problems: many-core systems are becoming mainstream, however there is still no decent approach for distributing software...

    Provided By IRISA

  • White Papers // Jan 2010

    A Survey of Survivability in Multi-Domain Optical Networks

    Network survivability is becoming an important issue and a topical subject in WDM optical mesh networks. Many works have studied network survivability. However, few works have focused on survivability in multi-domain optical networks. This paper reviews the literature on survivability against failures in multi-domain optical networks. The main objective of...

    Provided By IRISA

  • White Papers // Jan 2010

    Graph Partitioning for Survivability in Multi-Domain Optical Networks

    As optical networking deployments increase, multidomain provisioning and survivability are becoming major concerns. A key challenge in multi-domain survivability is the scalability problem. To address this concern, various solutions have already been proposed based upon topology aggregation schemes. However, these mechanisms do not scale well with increasing domain counts and...

    Provided By IRISA

  • White Papers // Sep 2009

    High-Level Model of Dynamically Reconfigurable Architectures

    Dynamically reconfigurable platforms are becoming more and more interesting to design efficient and flexible systems. In addition, real-time applications must satisfy hard constraints to ensure correct execution. To manage such complex systems (hardware and software), the use of an operating system is now a classical solution. However, defining these systems...

    Provided By IRISA

  • White Papers // Aug 2009

    Supporting Multipoint-to-Point Communications in All-Optical WDM Networks

    The Routing and Wavelength Assignment (RWA) problem for multipoint-to-point communications in all-optical Wavelength Division Multiplexing (WDM) networks is investigated in this paper. Two efficient algorithms, namely Reverse Shortest Path Tree routing (RSPT) and k-Bounded Edge Disjoint Path routing (EDPR), are proposed. The problem of minimizing the total cost while establishing...

    Provided By IRISA

  • White Papers // Feb 2009

    Backup Path Classification Based on Failure Risks for Efficient Backup Path Computation

    The authors propose a new approach exploiting the failure risk (node, link or Shared Risk Link Group) structures to enhance the backup path computation. Upon failure, their approach classifies the backup paths into two categories: operative backup paths and inoperative backup paths. An operative backup path is an active backup...

    Provided By IRISA

  • White Papers // Dec 2008

    A Model-Based Framework for Security Policy Specification, Deployment and Testing

    In this paper, the authors propose a model-driven approach for specifying, deploying and testing security policies in Java applications. First, a security policy is specified independently of the underlying access control language (OrBAC, RBAC). It is based on a generic security meta-model which can be used for early consistency checks...

    Provided By IRISA

  • White Papers // Dec 2008

    Combining Aspect and Model-Driven Engineering Approaches for Software Process Modeling and Simulation

    One major advantage of executable software process models is that once defined, they can be simulated, checked and validated in short incremental and iterative cycles. This also makes them a powerful asset for important process improvement decisions such as resource allocation, deadlock identification and process management. In this paper, the...

    Provided By IRISA

  • White Papers // Mar 2008

    Using MARTE in a Co-Design Methodology

    The model driven architecture is a promising approach aiming to fill the productivity gap due to the increasing technology and time to market pressure. In the field of real time embedded systems, this approach requires the use of well-adapted formalisms in a reliable process that guarantees the quality of the...

    Provided By IRISA

  • White Papers // Apr 2006

    Secure Communications in ATM Networks

    The ATM forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) networks by offering data confidentiality, partner's authentication, etc. This paper describes the architecture of one of the first ATM forum compliant security prototypes being currently developed in...

    Provided By IRISA

  • White Papers // Dec 2011

    Global Vs. Per-Domain Monitoring of Multi-Domain Networks

    Multi-domain monitoring aims at guaranteeing QoS for services crossing several domains. It is often desirable to perform global monitoring to guarantee end-to-end QoS for services across domains and to reduce the monitoring cost. However, global monitoring might be infeasible due to confidentiality constraints. The alternative solution is to perform per-domain...

    Provided By IRISA

  • White Papers // Jan 2010

    Graph Partitioning for Survivability in Multi-Domain Optical Networks

    As optical networking deployments increase, multidomain provisioning and survivability are becoming major concerns. A key challenge in multi-domain survivability is the scalability problem. To address this concern, various solutions have already been proposed based upon topology aggregation schemes. However, these mechanisms do not scale well with increasing domain counts and...

    Provided By IRISA

  • White Papers // Jan 2010

    A Survey of Survivability in Multi-Domain Optical Networks

    Network survivability is becoming an important issue and a topical subject in WDM optical mesh networks. Many works have studied network survivability. However, few works have focused on survivability in multi-domain optical networks. This paper reviews the literature on survivability against failures in multi-domain optical networks. The main objective of...

    Provided By IRISA

  • White Papers // Jan 2011

    Characterization of Embedded Applications for Decoupled Processor Architecture

    Needs for performance on embedded applications will lead to the use of dynamic execution on embedded processors in the next few years. However, complete out-of-order superscalar cores are still expensive in terms of silicon area and power dissipation. In this paper, one study the adequation of a more limited form...

    Provided By IRISA

  • White Papers // Oct 2010

    Individual Vs. Global Radio Resource Management in a Hybrid Broadband Network

    Nowadays, with the abundance of diverse air interfaces in the same operating area, advanced Radio Resource Management (RRM) is vital to take advantage of the available system resources. In such a scenario, a mobile user will be able to connect concurrently to different wireless access networks. In this paper, the...

    Provided By IRISA

  • White Papers // Jun 2010

    High Throughput Data-Compression for Cloud Storage

    As data volumes processed by large-scale distributed data intensive applications grow at high-speed, an increasing I/O pressure is put on the underlying storage service, which is responsible for data management. One particularly difficult challenge, that the storage service has to deal with, is to sustain a high I/O throughput in...

    Provided By IRISA

  • White Papers // Mar 2010

    Combining Processor Virtualization and Component-Based Engineering in C for Heterogeneous Many-Core Platforms

    Embedded system design is driven by strong efficiency constraints in terms of performance, silicon area and power consumption, as well as pressure on the cost and time-to-market. As of today, this forms three tough problems: many-core systems are becoming mainstream, however there is still no decent approach for distributing software...

    Provided By IRISA

  • White Papers // Jun 2011

    Shrinker: Improving Live Migration of Virtual Clusters Over WANs With Distributed Data Deduplication and Content-Based Addressing

    Live virtual machine migration is a powerful feature of virtualization technologies. It enables efficient load balancing, reduces energy consumption through dynamic consolidation, and makes infrastructure maintenance transparent to users. While live migration is available across wide area networks with state of the art systems, it remains expensive to use because...

    Provided By IRISA

  • White Papers // Dec 2008

    Combining Aspect and Model-Driven Engineering Approaches for Software Process Modeling and Simulation

    One major advantage of executable software process models is that once defined, they can be simulated, checked and validated in short incremental and iterative cycles. This also makes them a powerful asset for important process improvement decisions such as resource allocation, deadlock identification and process management. In this paper, the...

    Provided By IRISA

  • White Papers // Jul 2011

    MDE to Manage Communications With and Between Resource-Constrained Systems

    With the emergence of Internet of Things (IoT), many things which typically used to be isolated or operated in small local networks, will be interconnected through the Internet. One main challenge to tackle in IoT is efficient management of communication between things, since things can be very different in terms...

    Provided By IRISA

  • White Papers // Dec 2008

    A Model-Based Framework for Security Policy Specification, Deployment and Testing

    In this paper, the authors propose a model-driven approach for specifying, deploying and testing security policies in Java applications. First, a security policy is specified independently of the underlying access control language (OrBAC, RBAC). It is based on a generic security meta-model which can be used for early consistency checks...

    Provided By IRISA

  • White Papers // Aug 2009

    Supporting Multipoint-to-Point Communications in All-Optical WDM Networks

    The Routing and Wavelength Assignment (RWA) problem for multipoint-to-point communications in all-optical Wavelength Division Multiplexing (WDM) networks is investigated in this paper. Two efficient algorithms, namely Reverse Shortest Path Tree routing (RSPT) and k-Bounded Edge Disjoint Path routing (EDPR), are proposed. The problem of minimizing the total cost while establishing...

    Provided By IRISA

  • White Papers // Feb 2009

    Backup Path Classification Based on Failure Risks for Efficient Backup Path Computation

    The authors propose a new approach exploiting the failure risk (node, link or Shared Risk Link Group) structures to enhance the backup path computation. Upon failure, their approach classifies the backup paths into two categories: operative backup paths and inoperative backup paths. An operative backup path is an active backup...

    Provided By IRISA

  • White Papers // Nov 2010

    Cost Bounds of Multicast Light-Trees in WDM Networks

    Multicast routing in WDM networks is to determine a set of light-paths on a physical topology from a source to a set of destinations involved in a multi-cast communication. The light-tree concept is introduced in to minimize the number of wavelength channels and transceivers used for a multicast session. Branching...

    Provided By IRISA

  • White Papers // Jul 2012

    Export Methods in Fault Detection and Localization Mechanisms

    Monitoring the quality of service in a multi-domain network allows providers to ensure the control of multi-domain service performance. A multi-domain service is a service that crosses multiple domains. In this paper, the authors propose several mechanisms for fault detection and fault localization. A fault is detected when an end-to-end...

    Provided By IRISA

  • White Papers // Apr 2006

    Secure Communications in ATM Networks

    The ATM forum international consortium recently approved the first version of its security specifications aiming to protect communications over Asynchronous Transfer Mode (ATM) networks by offering data confidentiality, partner's authentication, etc. This paper describes the architecture of one of the first ATM forum compliant security prototypes being currently developed in...

    Provided By IRISA

  • White Papers // Jun 2013

    A Single Sediment-Microbial Fuel Cell Powering a Wireless Telecommunication System

    The authors report the ability of a single sediment-Microbial Fuel Cell (MFC) to power Wireless Sensor Network (WSN) nodes. Such a system is able to collect information from sensors and to transmit it to sinks. In particular, the PowWow platform presented here is combining an open and modular hardware design...

    Provided By IRISA

  • White Papers // Mar 2008

    Using MARTE in a Co-Design Methodology

    The model driven architecture is a promising approach aiming to fill the productivity gap due to the increasing technology and time to market pressure. In the field of real time embedded systems, this approach requires the use of well-adapted formalisms in a reliable process that guarantees the quality of the...

    Provided By IRISA

  • White Papers // Jun 2010

    FORUM: A Flexible Data Integration System Based on Data Semantics

    Integrating and sharing information across disparate data sources entails several challenges: relevant data objects are split across multiple sources, often owned by different organizations. The data sources represent, maintain, and export their data using a variety of formats, interfaces and semantics. In the last two decades, much research work in...

    Provided By IRISA

  • White Papers // Sep 2009

    High-Level Model of Dynamically Reconfigurable Architectures

    Dynamically reconfigurable platforms are becoming more and more interesting to design efficient and flexible systems. In addition, real-time applications must satisfy hard constraints to ensure correct execution. To manage such complex systems (hardware and software), the use of an operating system is now a classical solution. However, defining these systems...

    Provided By IRISA

  • White Papers // Nov 2014

    Checkpointing as a Service in Heterogeneous Cloud Environments

    A non-invasive, cloud-agnostic approach is demonstrated for extending existing cloud plat-forms to include checkpoint-restart capability. Most cloud platforms currently rely on each application to provide its own fault tolerance. A uniform mechanism within the cloud itself serves two purposes: direct support for long-running jobs, which would otherwise require a custom...

    Provided By IRISA