Graceful Degradation
1 Follower
Recent papers in Graceful Degradation
In this paper, a methodology for the development of fault-tolerant adders based on the radix 2 signed digit (SD) representation is presented. The use of a number representation characterized by a carry propagation confined to neighbor... more
With the increasing complexity of multiprocessor and distributed processing systems, the need to develop efficient and accurate modeling methods is evident. Fault tolerance and degradable performance of such systems has given rise to... more
A conflict resolution algorithm may prevent air traffic accidents by providing procedures to maintain traffic separation between aircraft when their position cannot be accurately determined.
Wireless sensor networks have been used to gather data and information in many diverse application settings. The capacity of such networks remains a fundamental obstacle toward the adaptation of sensor network systems for advanced... more
We report our experience in implementing UbiCrawler, a scalable distributed web crawler, using the Java programming language. The main features of Ubi-Crawler are platform independence, fault tolerance, a very effective assignment... more
Real-time evaluation of distributed contact forces between rigid or deformable 3D objects is a key ingredient of 6-DoF force-feedback rendering. Unfortunately, at very high temporal rates, there is often insufficient time to resolve... more
Packet-based on-chip networks are increasingly being adopted in complex System-on-Chip (SoC) designs supporting numerous homogeneous and heterogeneous functional blocks. These Network-on-Chip (NoC) architectures are required to not only... more
Data fusion is an important component of applications for systems that use correlated data from multiple sources to determine the state of a system. As the state of the system being monitored and available resources change, the general... more
In this paper, we present an efficient and fault-tolerant algorithm for generating quorums to solve the distributed mutual exclusion problem. The algorithm uses a logical tree organization of the network to generate tree quorums, which... more
Modern digital IC designs have a critical operating point, or "wall of slack", that limits voltage scaling. Even with an errortolerance mechanism, scaling voltage below a critical voltage -so-called overscaling -results in more timing... more
Reconfiguration-Based Fault-Tolerance is one approach for developing dependable safety-critical embedded applications. This approach, compared to traditional hardware and software redundancy, is a promising technique that may achieve the... more
In the new era of Ambient Intelligence, Wireless Sensor Networks (WSNs) are seen to bridge the gap between physical world and the Internet, making a large amount of information accessible anywhere, anytime. Over the last few years, WSNs... more
The next generation of communications satellites may be designed as a fast packet-switched constellation of spacecraft able to withstand substantial bandwidth capacity fluctuation ranging from unstable weather phenomena to intentional... more
Adaptability and graceful degradation are important features in distributed systems. Yet, consensus and other agreement protocols, basic building blocks of reliable distributed systems, lack these features and must perform expensive... more
Though there are a few examples of scanning phased array antennas that have flown successfully in space, the quest for ldquolow costrdquo high-efficiency large-aperture microwave phased arrays continues. Fixed and mobile applications that... more
This work is concerned with the problem of designing robust, vector quantizer (VQ)-based communication systems for operation over time-varying Gaussian channels. Transmission energy allocation to VQ codeword bits, according to their error... more
The performance of the ABB CSF 672-11000 multichip thyristor has been studied under wide pulse conditions. The thyristor consists of four symmetric 2.8 kV, 47 mm diameter chips in a single compact package. The gate driver is optically... more
In applications such as processor-memory interconnect, I/O networks, and router switch fabrics, an interconnection network must be scalable to thousands of high-bandwidth terminals while at the same time being economical in small... more
Given the emergence of new and varied energy producers, consumers, and combinations thereof, software processes and services that work on our behalf must adopt the qualities of intelligent distributed systems to address challenges... more
AbstractÐReal-time middleware services must guarantee predictable performance under specified load and failure conditions, and ensure graceful degradation when these conditions are violated. Guaranteed predictable performance typically... more
We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on... more
Some of the important characteristics and requirements of packet video are discussed. A layered packet video coding algorithm based on a progressive transmission scheme is presented. The algorithm provides good compression and can handle... more
Real-time evaluation of distributed contact forces for rigid or deformable 3D objects is important for providing multi-sensory feedback in emerging real-time applications, such as 6-DoF haptic force-feedback rendering. Unfortunately, at... more
Hybrid brain-computer interfaces (BCIs) are representing a recent approach to develop practical BCIs. In such a system disabled users are able to use all their remaining functionalities as control possibilities in parallel with the BCI.... more
In most cooperating teams of robots each robot has about the same set of sensors. Distributed sensor fusion is a technique that enables a team to take advantage of this redundancy to get a more complete view of the world with a better... more
Disruption from service caused by DDoS attacks is an immense threat to Internet today. These attacks can disrupt the availability of Internet services completely, by eating either computational or communication resources through sheer... more
The deployment of mobile multimedia broadcast services like Mobile TV over cellular networks has just started. The coverage in terms of delivered quality per receiver is an important measure to evaluate the experienced quality. In order... more
The bitstream structure of layered media formats such as Scalable Video Coding (SVC) or Multiview Video Coding (MVC) opens up new opportunities for their distribution in Mobile TV services. Features like graceful degradation or the... more
We describe a general architecture for intrusion-tolerant enterprise systems and the implementation of an intrusion-tolerant Web server as a specific instance. The architecture comprises functionally redundant COTS servers running on... more
The recent interest in sensor networks has led to a number of routing schemes that use the limited resources available at sensor nodes more efficiently. These schemes typically try to find the minimum energy path to optimize energy usage... more
This paper presents a novel multi-band CELP coder with the following characteristics: wideband coding (6.5 kHz), variable bit rate (VBR) coding (10-24 kbps), low-delay (10 ms), embeddibility, and perceptually based dynamic bit allocation.... more
This paper proposes a number of improvements for the switching table used by the Self Adaptive cache Memories (SAM) method, as described in [1]. The Switching Table is used for maintaining performance in a continuously degrading memory.... more
In this paper, we extend our work in [4] which employed Partial Reed-Solomon (PRS) Codes at coding rates near channel capacity on a Binary Erasure Channel (BEC). We demonstrated that an appropriately designed PRS code outperforms the... more
Image warping refers to the 2-D resampling of a source image onto a target image. In the general case, this requires costly 2-D filtering operations. Simplifications are possible when the warp can be expressed as a cascade of... more
In this paper, we describe a fault-tolerant model for reasoning using forward chaining for predicate logic rules and facts with coarse-coded distributed representations of instantiated predicates in a connectionist frame work. Distributed... more
Interactive simulation is made possible in many applications by simplifying or culling the finer details that would make real-time performance impossible. This paper examines detail simplification in the specific problem of collision... more
CORBA is an important standard middleware used in the development of distributed applications. It has also been used with distributed real-time applications, through its extension for real-time systems, RT-CORBA. RT-CORBA includes many... more