Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
Because of lack of infrastructure and Central Authority(CA), secure communication is
a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its
nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET
because the network is managed by the nodes themselves without any fixed infrastructure and centralized
authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using
Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private
key. The traditional PKI protocols require centralized authority and heavy computing power to
manage public and private keys, thus making them not suitable for MANETs. To establish a secure
communication for the MANET nodes, we proposed a lightweight crypto protocol which requires
limited resources, making it suitable for MANETs.
Using NP Problems to Share Keys in Secret-Key Cryptographyiosrjce
Public key cryptography has now become an important means for providing confidentiality by its use
of key distribution, in which users can do private communication with the help of encryption keys. It also
provides digital signatures which allow users to sign keys to verify their identities. But public key cryptography
has its own shortcoming regarding to high cost in keys distribution and excessive computation in encoding and
decoding it.
Whereas private key can omit all above problems but only if we can find a way to share private key
confidentially.
This research presents an innovation, which can be our future approach, using technology so-called NP
problems, of sending or sharing keys to the receiver without any need of the third party. This will provide an
open idea where sender and receiver can share any key for any number of times for encrypting data
confidentially that also helpful in overcoming problem of brute force attack
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyTELKOMNIKA JOURNAL
The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed to improve
security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for
double protection during data transmission. The selected steganographic algorithm is the use of a
combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very
important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed
method of DCT transformation first, proceed with DWT transformation. From the experimental results
obtained better imperceptibility quality, compared with existing methods. To add OTP message security
applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments
conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and
NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all
images is 1.
Colored Image Watermarking Technique Based on HVS using HSV Color ModelIDES Editor
The Human Visual System is found to be less
sensitive to the highly textured area of the image. Moreover,
in all colours the blue is least sensitive to the HVS (Human
Visual System). While working on colored images when using
the mathematical and biological models of HVS, the preferred
colour model must be HSV (Hue, Saturation and Value) colour
model rather than RGB colour model because it most closely
defines how the image is interpreted by HVS. The high visual
transparency in the technique is achieved by making use of
highly textured block in luminance channel for watermark
insertion. Moreover, the choice of selecting appropriate area
for watermark insertion is also influenced by making use of
‘Hue’ property of the image in the chrominance channel to
enhance the visual transparency even more. Watermark is
made highly robust against different types of attacks by
performing the watermark insertion in transformed domain
and making use of the transformation functions such as DWT,
DCT and SVD. The results demonstrated the robustness of
the technique against various types of attacks and comparison
through aforesaid results the technique is proven to be more
robust against previous techniques making use of HSI colour
model.
Lightweight Cryptography for Distributed PKI Based MANETSIJCNCJournal
Because of lack of infrastructure and Central Authority(CA), secure communication is
a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its
nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET
because the network is managed by the nodes themselves without any fixed infrastructure and centralized
authority. In this paper, we created a distributed PUblic Key Infrastructure (PKI) using
Shamir secret sharing mechanism which allows the nodes of the MANET to have a share of its private
key. The traditional PKI protocols require centralized authority and heavy computing power to
manage public and private keys, thus making them not suitable for MANETs. To establish a secure
communication for the MANET nodes, we proposed a lightweight crypto protocol which requires
limited resources, making it suitable for MANETs.
Using NP Problems to Share Keys in Secret-Key Cryptographyiosrjce
Public key cryptography has now become an important means for providing confidentiality by its use
of key distribution, in which users can do private communication with the help of encryption keys. It also
provides digital signatures which allow users to sign keys to verify their identities. But public key cryptography
has its own shortcoming regarding to high cost in keys distribution and excessive computation in encoding and
decoding it.
Whereas private key can omit all above problems but only if we can find a way to share private key
confidentially.
This research presents an innovation, which can be our future approach, using technology so-called NP
problems, of sending or sharing keys to the receiver without any need of the third party. This will provide an
open idea where sender and receiver can share any key for any number of times for encrypting data
confidentially that also helpful in overcoming problem of brute force attack
A Good Performance OTP Encryption Image based on DCT-DWT SteganographyTELKOMNIKA JOURNAL
The security aspect is very important in data transmission. One way to secure data is with
steganography and cryptography. Surely research on this should continue to be developed to improve
security. In this paper, we proposed a combination of steganographic and cryptographic algorithms for
double protection during data transmission. The selected steganographic algorithm is the use of a
combination of DCT and DWT domain transformations. Because the Imperceptibility aspect is a very
important aspect of steganographic techniques, this aspect needs to be greatly improved. In the proposed
method of DCT transformation first, proceed with DWT transformation. From the experimental results
obtained better imperceptibility quality, compared with existing methods. To add OTP message security
applied algorithm to encrypt the message image, before it is inserted. This is evidenced by experiments
conducted on 20 grayscale images measuring 512x512 with performance tests using MSE, PSNR, and
NC. Experimental results prove that DCT-DWT-OTP generates PNSR more than 50 dB, and NC of all
images is 1.
Colored Image Watermarking Technique Based on HVS using HSV Color ModelIDES Editor
The Human Visual System is found to be less
sensitive to the highly textured area of the image. Moreover,
in all colours the blue is least sensitive to the HVS (Human
Visual System). While working on colored images when using
the mathematical and biological models of HVS, the preferred
colour model must be HSV (Hue, Saturation and Value) colour
model rather than RGB colour model because it most closely
defines how the image is interpreted by HVS. The high visual
transparency in the technique is achieved by making use of
highly textured block in luminance channel for watermark
insertion. Moreover, the choice of selecting appropriate area
for watermark insertion is also influenced by making use of
‘Hue’ property of the image in the chrominance channel to
enhance the visual transparency even more. Watermark is
made highly robust against different types of attacks by
performing the watermark insertion in transformed domain
and making use of the transformation functions such as DWT,
DCT and SVD. The results demonstrated the robustness of
the technique against various types of attacks and comparison
through aforesaid results the technique is proven to be more
robust against previous techniques making use of HSI colour
model.
This presentation on Recurrent Neural Network will help you understand what is a neural network, what are the popular neural networks, why we need recurrent neural network, what is a recurrent neural network, how does a RNN work, what is vanishing and exploding gradient problem, what is LSTM and you will also see a use case implementation of LSTM (Long short term memory). Neural networks used in Deep Learning consists of different layers connected to each other and work on the structure and functions of the human brain. It learns from huge volumes of data and used complex algorithms to train a neural net. The recurrent neural network works on the principle of saving the output of a layer and feeding this back to the input in order to predict the output of the layer. Now lets deep dive into this presentation and understand what is RNN and how does it actually work.
Below topics are explained in this recurrent neural networks tutorial:
1. What is a neural network?
2. Popular neural networks?
3. Why recurrent neural network?
4. What is a recurrent neural network?
5. How does an RNN work?
6. Vanishing and exploding gradient problem
7. Long short term memory (LSTM)
8. Use case implementation of LSTM
Simplilearn’s Deep Learning course will transform you into an expert in deep learning techniques using TensorFlow, the open-source software library designed to conduct machine learning & deep neural network research. With our deep learning course, you'll master deep learning and TensorFlow concepts, learn to implement algorithms, build artificial neural networks and traverse layers of data abstraction to understand the power of data and prepare you for your new role as deep learning scientist.
Why Deep Learning?
It is one of the most popular software platforms used for deep learning and contains powerful tools to help you build and implement artificial neural networks.
Advancements in deep learning are being seen in smartphone applications, creating efficiencies in the power grid, driving advancements in healthcare, improving agricultural yields, and helping us find solutions to climate change. With this Tensorflow course, you’ll build expertise in deep learning models, learn to operate TensorFlow to manage neural networks and interpret the results.
And according to payscale.com, the median salary for engineers with deep learning skills tops $120,000 per year.
You can gain in-depth knowledge of Deep Learning by taking our Deep Learning certification training course. With Simplilearn’s Deep Learning course, you will prepare for a career as a Deep Learning engineer as you master concepts and techniques including supervised and unsupervised learning, mathematical and heuristic aspects, and hands-on modeling to develop algorithms. Those who complete the course will be able to:
Learn more at: https://www.simplilearn.com/
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESIJNSA Journal
Similarity coefficients play an important role in many aspects. Recently, several schemes were proposed, but these schemes aimed to compute the similarity coefficients of binary data. In this paper, a novel scheme
which can compute the coefficients of integer is proposed. To the best knowledge of us, this is the first scheme which canesist malicious adversaries attack.
Deep neural networks have shown recent promise in many language-related tasks such as the modelling of conversations. We extend RNN-based sequence to sequence models to capture the long-range discourse across many turns of conversation. We perform a sensitivity analysis on how much additional context affects performance, and provide quantitative and qualitative evidence that these models can capture discourse relationships across multiple utterances. Our results show how adding an additional RNN layer for modelling discourse improves the quality of output utterances and providing more of the previous conversation as input also improves performance. By searching the generated outputs for specific discourse markers, we show how neural discourse models can exhibit increased coherence and cohesion in conversations.
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
This paper presents a novel scheme that provides high level of security and privacy in a Wireless Mesh
Network (WMN). We combine an approach of Network Coding with multiple layered encryption of onion routing for a WMN. An added superior feature provides higher level of security and privacy. Sensitive network information is confined to 1-hop neighborhood which is available anyways in a wireless medium with nodes using a bivariate polynomial. The only routing information divulged to a relay node is about next hop. No plain text is ever transmitted and all data can only be decrypted by its source and destination.Prior work finds it difficult to enforce encryption with network coding without divulging in complete
routing information,hence losing privacy and anonymity. We compare our scheme with other existing approach for several networks. The preliminary results show this work to provide superior security and anonymity at low overhead cost.
Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming
instantaneous network with dynamic topology. Each node simultaneously as both router and
host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to
drained conditions. Low Energy Aware Cluster Hierarchy (LEACH) is a most popular dynamic
clustering protocol for WSN. Deployment in unattended environment, limited memory, limited
power and low computational power of a sensor node make these networks susceptible to
attacks launched by malicious nodes. This paper provides an overview of LEACH protocol and
how LEACH can be compromised by malicious nodes. We propose a attack on LEACH –
Snooze attack. This paper we present a way to simulate this attack on NS-2 which is
demonstrative on throughput. We observe that during simulation throughput drops as an effect
of attack. It is observed that the effect of the attack gets aggregated as we increase the number
of attackers.
Deep neural networks have shown recent promise in many language-related tasks such as the modelling of
conversations. We extend RNN-based sequence to sequence models to capture the long-range discourse
across many turns of conversation. We perform a sensitivity analysis on how much additional context
affects performance, and provide quantitative and qualitative evidence that these models can capture
discourse relationships across multiple utterances. Our results show how adding an additional RNN layer
for modelling discourse improves the quality of output utterances and providing more of the previous
conversation as input also improves performance. By searching the generated outputs for specific
discourse markers, we show how neural discourse models can exhibit increased coherence and cohesion in
conversations.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
This presentation on Recurrent Neural Network will help you understand what is a neural network, what are the popular neural networks, why we need recurrent neural network, what is a recurrent neural network, how does a RNN work, what is vanishing and exploding gradient problem, what is LSTM and you will also see a use case implementation of LSTM (Long short term memory). Neural networks used in Deep Learning consists of different layers connected to each other and work on the structure and functions of the human brain. It learns from huge volumes of data and used complex algorithms to train a neural net. The recurrent neural network works on the principle of saving the output of a layer and feeding this back to the input in order to predict the output of the layer. Now lets deep dive into this presentation and understand what is RNN and how does it actually work.
Below topics are explained in this recurrent neural networks tutorial:
1. What is a neural network?
2. Popular neural networks?
3. Why recurrent neural network?
4. What is a recurrent neural network?
5. How does an RNN work?
6. Vanishing and exploding gradient problem
7. Long short term memory (LSTM)
8. Use case implementation of LSTM
Simplilearn’s Deep Learning course will transform you into an expert in deep learning techniques using TensorFlow, the open-source software library designed to conduct machine learning & deep neural network research. With our deep learning course, you'll master deep learning and TensorFlow concepts, learn to implement algorithms, build artificial neural networks and traverse layers of data abstraction to understand the power of data and prepare you for your new role as deep learning scientist.
Why Deep Learning?
It is one of the most popular software platforms used for deep learning and contains powerful tools to help you build and implement artificial neural networks.
Advancements in deep learning are being seen in smartphone applications, creating efficiencies in the power grid, driving advancements in healthcare, improving agricultural yields, and helping us find solutions to climate change. With this Tensorflow course, you’ll build expertise in deep learning models, learn to operate TensorFlow to manage neural networks and interpret the results.
And according to payscale.com, the median salary for engineers with deep learning skills tops $120,000 per year.
You can gain in-depth knowledge of Deep Learning by taking our Deep Learning certification training course. With Simplilearn’s Deep Learning course, you will prepare for a career as a Deep Learning engineer as you master concepts and techniques including supervised and unsupervised learning, mathematical and heuristic aspects, and hands-on modeling to develop algorithms. Those who complete the course will be able to:
Learn more at: https://www.simplilearn.com/
A NOVEL SECURE COSINE SIMILARITY COMPUTATION SCHEME WITH MALICIOUS ADVERSARIESIJNSA Journal
Similarity coefficients play an important role in many aspects. Recently, several schemes were proposed, but these schemes aimed to compute the similarity coefficients of binary data. In this paper, a novel scheme
which can compute the coefficients of integer is proposed. To the best knowledge of us, this is the first scheme which canesist malicious adversaries attack.
Deep neural networks have shown recent promise in many language-related tasks such as the modelling of conversations. We extend RNN-based sequence to sequence models to capture the long-range discourse across many turns of conversation. We perform a sensitivity analysis on how much additional context affects performance, and provide quantitative and qualitative evidence that these models can capture discourse relationships across multiple utterances. Our results show how adding an additional RNN layer for modelling discourse improves the quality of output utterances and providing more of the previous conversation as input also improves performance. By searching the generated outputs for specific discourse markers, we show how neural discourse models can exhibit increased coherence and cohesion in conversations.
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
This paper presents a novel scheme that provides high level of security and privacy in a Wireless Mesh
Network (WMN). We combine an approach of Network Coding with multiple layered encryption of onion routing for a WMN. An added superior feature provides higher level of security and privacy. Sensitive network information is confined to 1-hop neighborhood which is available anyways in a wireless medium with nodes using a bivariate polynomial. The only routing information divulged to a relay node is about next hop. No plain text is ever transmitted and all data can only be decrypted by its source and destination.Prior work finds it difficult to enforce encryption with network coding without divulging in complete
routing information,hence losing privacy and anonymity. We compare our scheme with other existing approach for several networks. The preliminary results show this work to provide superior security and anonymity at low overhead cost.
Wireless Sensor Network (WSN) consists of large number of sensor nodes capable of forming
instantaneous network with dynamic topology. Each node simultaneously as both router and
host. Number of nodes in a WSN can vary either due to the mobility or death of nodes due to
drained conditions. Low Energy Aware Cluster Hierarchy (LEACH) is a most popular dynamic
clustering protocol for WSN. Deployment in unattended environment, limited memory, limited
power and low computational power of a sensor node make these networks susceptible to
attacks launched by malicious nodes. This paper provides an overview of LEACH protocol and
how LEACH can be compromised by malicious nodes. We propose a attack on LEACH –
Snooze attack. This paper we present a way to simulate this attack on NS-2 which is
demonstrative on throughput. We observe that during simulation throughput drops as an effect
of attack. It is observed that the effect of the attack gets aggregated as we increase the number
of attackers.
Deep neural networks have shown recent promise in many language-related tasks such as the modelling of
conversations. We extend RNN-based sequence to sequence models to capture the long-range discourse
across many turns of conversation. We perform a sensitivity analysis on how much additional context
affects performance, and provide quantitative and qualitative evidence that these models can capture
discourse relationships across multiple utterances. Our results show how adding an additional RNN layer
for modelling discourse improves the quality of output utterances and providing more of the previous
conversation as input also improves performance. By searching the generated outputs for specific
discourse markers, we show how neural discourse models can exhibit increased coherence and cohesion in
conversations.
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology
NeuroCrypto: C++ Implementation of Neural Cryptography with Rijndael CipherSagun Man Singh Shrestha
This work is the software implementation of the concept of neural cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This paper will give a brief introduction to artificial neural networks, cryptography and its types, which will help explain why the two communicating terminals converge to a common key in neural cryptography and will also cover the Rijndael (AES) cipher. This paper is intended to show that such neural key exchange protocol and AES encryption can be practically implemented in a high-level programming language viz. C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software created using Visual C++ (.NET framework) are presented.
Isolation Lemma for Directed Reachability and NL vs. Lcseiitgn
We discuss versions of isolation lemma for problems in NP and NL. We then show that improving the success probability of the isolation lemma is equivalent to some complexity theoretic collapses such as NP is in P/poly and NL is in L/poly. Basic familiarity with complexity classes such as NP, P/poly, NL will be assumed. All the other notions used in the talk will be introduced during the talk.
LISP Language, LISP Introduction, List Processing, LISP Syntax, Lisp Comparison Structures, Lisp Applications. Using of LISP language in Artificial Intelligence
Dynamic Parameterized Problems - Algorithms and Complexitycseiitgn
In this talk, we will discuss the parameterized complexity of various classical graph-theoretic problems in the dynamic framework where the input graph is being updated by a sequence of edge additions and deletions. We will describe fixed-parameter tractable algorithms and lower bounds on the running time of algorithms for these problems.
Killing Agile Software Development : Presented by Rizky Syaiful oGuild .
Last month (June 2016), I helped a well-known higher education institute in Indonesia. I train the lecturers there, so that their students can practice agile software development.
[I show the audience some photos and videos as the proofs]
Can you imagine a condition when all our CS/IT students already get the real experiences of proper Scrum, Automated Testing, etc?
In that imaginary world, agile software development is already the norm! In the other side, there is no more room for Waterfall’s Big-Design-Up-Front style. Because we know that any software problem is inherently a design problem—or complex problem in Cynefin framework. You can’t solve that kind of problem by designing a big-fixed solution up in the front.
And if almost every software development is already agile—as it was visioned back then in 2001 manifesto, why would we still use ‘agile’ term?
We invent words to categorize things. Before ‘agile’ was proposed in the 2001 manifesto, they called it ‘lightweight’. Because it’s different with the previous heavy weight Waterfall.
Now, when I say the word ‘computer’, what would your brain emulate? A mainframe computer? Or a personal computer? Both of them are literally a computing machine. I put my money on personal computer. Because almost everyone see personal computer in daily basis. And they haven’t seen any mainframe computer once in their life.
Just as the dead of ‘personal’ term, in ‘personal computer’—I don’t count PC because that’s an abbreviation—‘agile’ in ‘agile software development’ will also be dead.
Not because it’s bad. On the contrary, that’s because agility the best option for software development.
In 2026 I, believe, we will call it simply as ‘software development’.
Please help the world to reach that kind of utopia, at least by telling your ex-lecturers, “you should teach agile software development properly”.
We should be so proud for standing here. Being a part of agile software development movement, of the 21st century.
Why?
Because a good movement always has a goal,
this agile software development movement also has a clear end.
fluig Fórum Serviços #2 - Integração do fluig com o ProtheusFluig
Nesta edição discutimos sobre a integração do fluig com o Protheus, e apresentamos o passo a passo e as boas práticas para a troca de informações entre o ERP e a plataforma.
Assista o evento: https://youtu.be/ksEnyXnIoRo
fluig Webinar #9 - Como produzir mais e melhor com os mesmos recursos?Fluig
Mais do que um desafio, essa é uma necessidade para o setor de Construção & Projetos. Por isso, no último dia 14 de abril, o fluig apresentou um webinar especial para o segmento. Conduzido pelo especialista Petrus Evangelista, o webinar foi uma excelente oportunidade para entender como a tecnologia fluida pode levar mais eficiência à gestão de processos das construtoras.
Councils in the West of England Council want people's views on future plans for new homes and transport. This presentation by David Turner at the Bristol Planning and Law Conference provides an overview.
The Deputy Director General (Transport Projects) of Transport for NSW gave this presentation at our 2012 Rail Logistics Workshop.
The information was correct at March 19, 2012.
We present a new simulation tool for scale-free networks composed of a high number of nodes. The tool, based on discrete-event simulation, enables the definition of scale-free networks composed of heterogeneous nodes and complex application-level protocols. To satisfy the performance and scalability requirements, the simulator supports both sequential (i.e. monolithic) and parallel/distributed (i.e. PADS) approaches. Furthermore, appropriate mechanisms for the communication overhead-reduction are implemented. To demonstrate the efficiency of the tool, we experiment with gossip protocols on top of scale-free networks generated by our simulator. Results of the simulations demonstrate the feasibility of our approach. The proposed tool is able to generate and manage large scale-free networks composed of thousands of nodes interacting following real-world dissemination protocols.
Alberto Massidda - Scenes from a memory - Codemotion Rome 2019Codemotion
Generating representations is the ultimate act of creativity. Recent advancements in neural networks (and in processing power) brought us the capability to perform regression against complex samples like images and audio. In this presentation we show the underlying mechanics of media generation from latent space representation of abstract visual ideas, real embodiment of “Platonic” concepts, with Variational Autoencoders, Generative Adversarial Networks, neural style transfer and PixelRNN/CNN along with current practical applications like DeepFake.
DAOR - Bridging the Gap between Community and Node Representations: Graph Emb...Artem Lutov
Slides of the presentation given at BigData'19, special session on Information Granulation in Data Science and Scalable Computing.
The fully automatic (i.e., without any manual tuning) graph embedding (i.e., network representation learning, unsupervised feature extraction) performed in near-linear time is presented. The resulting embeddings are interpretable, preserve both low- and high-order structural proximity of the graph nodes, computed (i.e., learned) by orders of magnitude faster and perform competitively to the manually tuned best state-of-the-art embedding techniques evaluated on diverse tasks of graph analysis.
In this paper we deal with the impact of multi and many-core processor architectures on simulation. Despite the fact that modern CPUs have an increasingly large number of cores, most softwares are still unable to take advantage of them. In the last years, many tools, programming languages and general methodologies have been proposed to help building scalable applications for multi-core architectures, but those solutions are somewhat limited. Parallel and distributed simulation is an interesting application area in which efficient and scalable multi-core implementations would be desirable. In this paper we investigate the use of the Go Programming Language to implement optimistic parallel simulations based on the Time Warp mechanism. Specifically, we describe the design, implementation and evaluation of a new parallel simulator. The scalability of the simulator is studied when in presence of a modern multi-core CPU and the effects of the Hyper-Threading technology on optimistic simulation are analyzed.
DIANNE - A distributed deep learning framework on OSGi - Tim Verbelenmfrancis
OSGi Community Event 2016 Presentation by Tim Verbelen (iMinds / imec)
With the current explosion of IoT devices connected to the Internet, the biggest challenge in the near future is how to process and analyze all this generated data, making use of the highly distributed compute infrastructure at hand. A promising approach for data analysis is deep learning, using brain-inspired neural networks for feature extraction and detection. In our research lab, we have developed DIANNE, an OSGi-based framework for creating, deploying and training artificial neural networks in a modular way. Benefiting from OSGi modularity, we can easily distribute (parts of) the neural networks among cloud and edge devices.
Towards Fog-Assisted Virtual Reality MMOG with Ultra-Low LatencyIJCNCJournal
In this paper, we propose a method to realize a virtual reality MMOG (Massively Multiplayer Online Video Game) with ultra-low latency. The basic idea of the proposed method is to introduce a layer consisting of several fog nodes between clients and cloud server to offload a part of the rendering task which is conducted by the cloud server in conventional cloud games. We examine three techniques to reduce the latency in such a fog-assisted cloud game: 1) To maintain the consistency of the virtual game space, collision detection of virtual objects is conducted by the cloud server in a centralized manner; 2) To reflect subtle changes of the line of sight to the 3D game view, each client is assigned to a fog node and the head motion of the player acquired through HMD (Head-Mounted Display) is directly sent to the corresponding fog node; and 3) To offload a part of the rendering task, we separate the rendering of the background view from that of the foreground view, and migrate the former to other nodes including the cloud server. The performance of the proposed method is evaluated by experiments with an AWS-based prototype system. It is confirmed that the proposed techniques achieve the latency of 32.3 ms, which is 66 % faster than the conventional systems.
OW2con'14 - XLcoud, 3D rendering in the cloud, Marius Preda, Institut Mines T...xlcloud
The XLcloud project strives to establish the demonstration of a High Performance Cloud Computing (HPCC) platform based on OpenStack that is designed to run a representative set of compute intensive workloads. This presentation introduces a Use Case based on cloud gaming and 3D visualization. XLcloud is a three-year long collaborative project funded by the French FSN (Fonds national pour la Société Numérique) programme.
Lucas Theis - Compressing Images with Neural Networks - Creative AI meetupLuba Elliott
This talk by Lucas Theis from Twitter/Magic Pony on "Compressing Images with Neural Networks" was presented at the Learning Image Representations event on 30th August at Twitter as part of the Creative AI meetup.
A fast-paced introduction to Deep Learning concepts, such as activation functions, cost functions, backpropagation, and then a quick dive into CNNs. Basic knowledge of vectors, matrices, and elementary calculus (derivatives), are helpful in order to derive the maximum benefit from this session.
Next we'll see a simple neural network using Keras, followed by an introduction to TensorFlow and TensorBoard. (Bonus points if you know Zorn's Lemma, the Well-Ordering Theorem, and the Axiom of Choice.)
Context-Aware Configuration and Management of WiFi Direct Groups for Real Opp...Mattia Campana
My presentation for IEEE MASS17 (https://mass2017.engineering.osu.edu/), October 23, Orlando, Florida (USA).
The presentation is about WFD-GM, a novel communication protocol which exploits the Wi-Fi Direct standard in order to enable the creation of opportunistic networks with commercial smartphones.
A technical deep dive into the DX11 rendering in Battlefield 3, the first title to use the new Frostbite 2 Engine. Topics covered include DX11 optimization techniques, efficient deferred shading, high-quality rendering and resource streaming for creating large and highly-detailed dynamic environments on modern PCs.
A fast-paced introduction to Deep Learning concepts, such as activation functions, cost functions, back propagation, and then a quick dive into CNNs. Basic knowledge of vectors, matrices, and derivatives is helpful in order to derive the maximum benefit from this session.
This presentation made at TI Developer Conference 2008, introduces the options available for developers to create User Interfaces on TI SGX based platforms.
Pascual, Santiago, Antonio Bonafonte, and Joan Serrà. "SEGAN: Speech Enhancement Generative Adversarial Network." INTERSPEECH 2017.
Current speech enhancement techniques operate on the spectral domain and/or exploit some higher-level feature. The majority of them tackle a limited number of noise conditions and rely on first-order statistics. To circumvent these issues, deep networks are being increasingly used, thanks to their ability to learn complex functions from large example sets. In this work, we propose the use of generative adversarial networks for speech enhancement. In contrast to current techniques, we operate at the waveform level, training the model end-to-end, and incorporate 28 speakers and 40 different noise conditions into the same model, such that model parameters are shared across them. We evaluate the proposed model using an independent, unseen test set with two speakers and 20 alternative noise conditions. The enhanced samples confirm the viability of the proposed model, and both objective and subjective evaluations confirm the effectiveness of it. With that, we open the exploration of generative architectures for speech enhancement, which may progressively incorporate further speech-centric design choices to improve their performance.
Porting the Source Engine to Linux: Valve's Lessons Learnedbasisspace
These slides discuss the techniques applied to porting a large, commercial AAA engine from Windows to Linux. It includes the lessons learned along the way, and pitfalls we ran into to help serve as a warning to other developers.
This presentation introduces Deep Learning (DL) concepts, such as neural neworks, backprop, activation functions, and Convolutional Neural Networks, followed by an Angular application that uses TypeScript in order to replicate the Tensorflow playground.
Similar to Multiplayer Online Games over Scale-Free Networks: a Viable Solution? (20)
Identifying intersections among a set of d-dimensional rectangular regions (d-rectangles) is a common problem in many simulation and modeling applications. Since algorithms for computing intersections over a large number of regions can be computationally demanding, an obvious solution is to take advantage of the multiprocessing capabilities of modern multicore processors. Unfortunately, many solutions employed for the Data Distribution Management service of the High Level Architecture are either inefficient, or can only partially be parallelized. In this paper we propose the Interval Tree Matching (ITM) algorithm for computing intersections among d-rectangles. ITM is based on a simple Interval Tree data structure, and exhibits an embarrassingly parallel structure. We implement the ITM algorithm, and compare its sequential performance with two widely used solutions (brute force and sort-based matching). We also analyze the scalability of ITM on shared-memory multicore processors. The results show that the sequential implementation of ITM is competitive with sort-based matching; moreover, the parallel implementation provides good speedup on multicore processors.
Parallel and Distributed Simulation from Many Cores to the Public CloudGabriele D'Angelo
In this tutorial paper, we will firstly review some basic simulation concepts and then introduce the parallel and distributed simulation techniques in view of some new challenges of today and tomorrow. More in particular, in the last years there has been a wide diffusion of many cores architectures and we can expect this trend to continue. On the other hand, the success of cloud computing is strongly promoting the "everything as a service'" paradigm. Is parallel and distributed simulation ready for these new challenges? The current approaches present many limitations in terms of usability and adaptivity: there is a strong need for new evaluation metrics and for revising the currently implemented mechanisms. In the last part of the paper, we propose a new approach based on multi-agent systems for the simulation of complex systems. It is possible to implement advanced techniques such as the migration of simulated entities in order to build mechanisms that are both adaptive and very easy to use. Adaptive mechanisms are able to significantly reduce the communication cost in the parallel/distributed architectures, to implement load-balance techniques and to cope with execution environments that are both variable and dynamic. Finally, such mechanisms will be used to build simulations on top of unreliable cloud services.
From Simulation to Online Gaming: the need for adaptive solutions Gabriele D'Angelo
In many fields such as distributed simulation and online gaming the missing piece is adaptivity. There is a strong need for dynamic and adaptive solutions that can improve performances and react to problems.
Proximity Detection in Distributed Simulation of Wireless Mobile SystemsGabriele D'Angelo
The distributed and the Grid Computing architectures for the simulation of massively populated wireless systems have recently been considered of interest, mainly for cost reasons. Solutions for generalized proximity detection for mobile objects is a relevant problem, with a big impact on the design and the implementation of parallel and distributed simulations of wireless mobile systems. In this paper, a set of solutions based on tailored data structures, new techniques and enhancements of the existing algorithms for generalized proximity detection are proposed and analyzed, to increase the efficiency of distributed simulations. The paper includes the analysis of computation complexity of the proposed solutions and the performance evaluation of a testbed distributed simulation of ad hoc network models. Recent works have shown that the performance of distributed simulation of dynamic complex systems could benefit from a runtime migration mechanism of model entities, which reduces the communication overheads. Such migration mechanisms may interfere with the generalized proximity detection implementations. The analysis performed in this paper illustrates the effects of many possible compositions of the proposed solutions, in a real testbed simulation framework.
Detailed Simulation of Large-Scale Wireless NetworksGabriele D'Angelo
WiFra is a new framework for the detailed simulation of very large-scale wireless networks. It is based on the parallel and distributed simulation approach and provides high scalability in terms of size of simulated networks and number of execution units running the simulation. In order to improve the performance of distributed simulation, additional techniques are proposed. Their aim is to reduce the communication overhead and to maintain a good level of load-balancing. Simulation architectures composed of low-cost Commercial-Off-The-Shelf (COTS) hardware are specifically supported by WiFra. The framework dynamically reconfigures the simulation, taking care of the performance of each part of the execution architecture and dealing with unpredictable fluctuations of the available computation power and communication load on the single execution units. A fine-grained model of the 802.11 DCF protocol has been used for the performance evaluation of the proposed framework. The results demonstrate that the distributed approach is suitable for the detailed simulation of very-large scale wireless networks.
An Adaptive Load Balancing Middleware for Distributed SimulationGabriele D'Angelo
The simulation is useful to support the design and performance evaluation of complex systems, possibly composed by a massive number of interacting entities. For this reason, the simulation of such systems may need aggregate computation and memory resources obtained by clusters of parallel and distributed execution units. Shared computer clusters composed of available Commercial-Off-the-Shelf hardware are preferable to dedicated systems, mainly for cost reasons. The performance of distributed simulations is influenced by the heterogeneity of execution units and by their respective CPU load in background. Adaptive load balancing mechanisms could improve the resources utilization and the simulation process execution, by dynamically tuning the simulation load with an eye to the synchronization and communication overheads reduction. In this work it will be presented the GAIA+ framework: a new load balancing mechanism for distributed simulation. The framework has been evaluated by performing testbed simulations of a wireless ad hoc network model. Results confirm the effectiveness of the proposed solutions.
Concurrent Replication of Parallel and Distributed SimulationsGabriele D'Angelo
Parallel and distributed simulations enable the analysis of complex systems by concurrently exploiting the aggregate computation power and memory of clusters of execution units. In this work we investigate a new direction for increasing both the speedup of a simulation process and the utilization of computation and communication resources. Many simulation-based investigations require to collect independent observations for a correct and significant statistical analysis of results. The execution of many independent parallel or distributed simulation runs may suffer the speedup reduction due to rollbacks under the optimistic approach, and due to idle CPU times originated by synchronization and communication bottlenecks under the conservative approach. We present a parallel and distributed simulation framework supporting concurrent replication of parallel and distributed simulations (CR-PADS), as an alternative to the execution of a linear sequence of multiple parallel or distributed simulation runs. Results obtained from tests executed under variable scenarios show that speedup and resource utilization gains could be obtained by adopting the proposed replication approach in addition to the pure parallel and distributed simulation.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Multiplayer Online Games over Scale-Free Networks: a Viable Solution?
1. Multiplayer Online Games
over Scale-Free Networks:
a Viable Solution?
Gabriele D’Angelo
<gda@cs.unibo.it>
http://www.cs.unibo.it/gdangelo/
joint work with:
Stefano Ferretti
Torremolinos, Malaga (Spain)
DIstributed SImulation & Online gaming (DISIO), 2010
2. Presentation outline
Multiplayer Online Games: scalability and responsiveness
MOGs: a peer-to-peer approach
Scale-free networks
Gossip protocols
Performance evaluation: simulation-based
Performance evaluation: metrics
Experimental evaluation
Conclusions and future work
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 2
3. MOGs: scalability and responsiveness
Scalability and responsiveness are open problems in
Multiplayer Online Games (MOGs)
Several architectures have been proposed to support MOGs:
client/server
mirrored servers
peer-to-peer
Given the distributed nature of this kind of applications, the
dissemination of game events can be very costly
Under the scalability viewpoint the peer-to-peer approach
is very promising
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 3
4. MOGs: a peer-to-peer approach
Each peer locally manages its copy of the game state
The peers are organized in some form of overlay network
The dissemination of game events is obtained by passing
messages through the overlay
What is the best form of overlay?
tree
fully connected graph
random graph
scale-free network
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 4
5. MOGs: a peer-to-peer approach
Each peer locally manages its copy of the game state
The peers are organized in some form of overlay network
The dissemination of game events is obtained by passing
messages through the overlay
What is the best form of overlay?
tree
fully connected graph
random graph
scale-free network
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 5
6. MOGs: a peer-to-peer approach
Each peer locally manages its copy of the game state
The peers are organized in some form of overlay network
The dissemination of game events is obtained by passing
messages through the overlay
What is the best form of overlay?
tree
fully connected graph
random graph
scale-free network
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 6
7. MOGs: a peer-to-peer approach
Each peer locally manages its copy of the game state
The peers are organized in some form of overlay network
The dissemination of game events is obtained by passing
messages through the overlay
What is the best form of overlay?
tree
fully connected graph
random graph
scale-free network
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 7
8. MOGs: a peer-to-peer approach
Each peer locally manages its copy of the game state
The peers are organized in some form of overlay network
The dissemination of game events is obtained by passing
messages through the overlay
What is the best form of overlay?
tree
fully connected graph
random graph
scale-free network
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 8
9. Scale-free networks: definition
A graph can be used to represent a
network and its connectivity
Degree of a node = number of
neighbor nodes attached to it
A scale-free network has a degree
distribution that follows a power law
If pk is the probability that a node has
a degree equal to k then: pk ~ k-α for
some constant value α (usually: 2 < α < 3)
Many examples in the real world: the Web, transmission of
diseases, citation graphs, social networks interactions etc.
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 9
10. Scale-free networks: properties
This means:
a few highly connected nodes (hubs)
a very large number of nodes with a few
connections
networks with a very small diameter
2.5
For example: 2
with 2 < α < 3
1.5
1
the diameter of a network
0.5
with N nodes is ~ ln ln (N) 0
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 10
11. Scale-free networks for MOGs
Our proposal is to implement MOGs using a peer-to-peer
architecture that is partially “unstructured” and “spontaneous”
Some properties of scale-free networks (such as the
diameter) can be very valuable in supporting scalability and
responsiveness
In our view, the dissemination of game events will be
obtained through probabilistic approaches, for example using
gossip protocols
The game events generated at peers are disseminated to the
whole network, using very simple gossip protocols and
without any form of centralization or predefined routing
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 11
12. Gossip protocol #1: probabilistic broadcast
If the message is locally ALGORITHM
generated then it is broadcasted function INITIALIZATION()
to all neighbors, otherwise it is pb ← PROBABILITY_BROADCAST()
decided at random if it will be
broadcasted or ignored
function GOSSIP(msg)
PARAMETERS:
if (RANDOM() < pb or
pb = probability to broadcast a message FIRST_TRANSMISSION())
then
for all nj in Πj do
ADDITIONAL MECHANISMS: SEND(msg, nj)
time to live (ttl) in each message end for
end if
local cache in each node
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 12
13. Gossip protocol #2: fixed probability
For each received message, the ALGORITHM
node randomly selects those edges
through which the message must
function INITIALIZATION()
be propagated
v ← CHOOSE_PROBABILITY()
PARAMETERS:
v = threshold value function GOSSIP(msg)
for all nj in Πj do
if RANDOM() < v then
SEND(msg, nj)
ADDITIONAL MECHANISMS: end if
end for
time to live (ttl) in each message
local cache in each node
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 13
14. Gossip protocol #3: fixed fanout
Each message is sent only to a ALGORITHM
limited number of nodes, the function INITIALIZATION()
receivers are selected at random fanout ← RETRIEVE_FANOUT()
among the neighbors
function GOSSIP(msg)
if fanout ≥ |Πj| then
PARAMETERS: toSend ← Πj
fanout = total number of receivers else
SELECT_NODES()
end if
ADDITIONAL MECHANISMS: for all nj in toSend do
time to live (ttl) in each message SEND(msg, nj)
end for
local cache in each node
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 14
15. Performance evaluation: simulation-based
The following performance evaluation is based on simulation
New features implemented in the Parallel and distributed Scale-
free network Simulator (PaScaS): http://pads.cs.unibo.it
Parameter Value
number of nodes 0-500
message generation exponential distribution
mean = 50 time-steps
cache size (local to each node) 256 slots
message Time To Live (ttl) 6
probability of dissemination (v) 0.5, 0.8, 1 (i.e. 50-80-100%)
fanout value 5 (# of nodes)
probability of broadcast (pb) 0.5, 0.8, 1 (i.e. 50-80-100%)
simulated time (gaming time) 1000 time-steps (after building)
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 15
16. Performance evaluation: metrics
Coverage
percentage of nodes that have received all the messages
that have been produced during the whole game execution
“are the game events received by all gamers?”
Delay
average number of hops (that is time-steps) necessary to
receive a message after its creation
“is the data dissemination really responsive?”
Messages
total number of messages routed in the game execution
“what is the overhead due to the events dissemination?”
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 16
21. Evaluation: number of hops
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 21
22. Evaluation: total number of messages
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 22
23. Conclusions and Future work
The low diameter of scale-free networks is very good for
fast data dissemination
Common gossip protocols are unable to disseminate the whole
event trace and their overhead is very high
Simple mechanisms such as caching of packets, ttl and
protocols tweaking are quite ineffective or with limited
impact on performances (e.g. # of routed messages)
Smarter protocols are necessary:
push / pull approaches for data dissemination
adaptive protocols and behaviors
more information shared among network nodes
Distributed Simulation and Online Gaming (DISIO) 2010 Gabriele D'Angelo 23