Design and evaluation of a virtual experimental environment for distributed systems

L Sarzyniec, T Buchert, E Jeanvoine… - 2013 21st Euromicro …, 2013 - ieeexplore.ieee.org
Between simulation and experiments on real-scale testbeds, the combined use of emulation
and virtualization provide a useful alternative for performing experiments on distributed …

Parallel electromagnetic transient simulation of power systems with a high proportion of renewable energy based on latency insertion method

Q Wang, J Xu, K Wang, P Wu… - IET Renewable Power …, 2023 - Wiley Online Library
With the interconnection of regional grids and the increasing penetration of renewable
energy, the order of the power system model is getting higher and higher, which brings great …

Simulation and development of short transparent tests for RAM

S Demidenko, A Van De Goor… - … 10th Asian Test …, 2001 - ieeexplore.ieee.org
Short transparent memory test algorithms for semiconductor memories are presented along
with an evaluation of the space on silicon required for their built-in self-test implementation …

Counter chain: a new block cipher mode of operation

AM El-Semary, MMA Azim - Journal of Information Processing …, 2015 - koreascience.kr
In this paper, we propose a novel block cipher mode of operation, which is known as the
counter chain (CC) mode. The proposed CC mode integrates the cipher block chaining …

Software performance prediction with a time scaling scheduling profiler

N Baltas, T Field - … on Modelling, Analysis, and Simulation of …, 2011 - ieeexplore.ieee.org
We present a new approach to software performance analysis that aims to extend
conventional profiling with some of the predictive capabilities of a performance model. The …

SPCBC: A secure parallel cipher block chaining mode of operation based on logistic chaotic map

AM El-Semary, MMA Azim, H Diab - KSII Transactions on Internet …, 2017 - koreascience.kr
Several block cipher modes of operation have been proposed in the literature to protect
sensitive information. However, different security analysis models have been presented for …

Distem: evaluation of fault tolerance and load balancing strategies in real HPC runtimes through emulation

C Ruiz, J Emeras, E Jeanvoine… - 2016 16th IEEE/ACM …, 2016 - ieeexplore.ieee.org
The era of Exascale computing raises new challenges for HPC. Intrinsic characteristics of
those extreme scale platforms bring energy and reliability issues. To cope with those …

[PDF][PDF] Methods for Emulation of Multi-core CPU Performance

T Buchert, L Nussbaum, J Gustedt - Poznan University of …, 2010 - tomasz.buchert.pl
The evaluation of algorithms and applications for large-scale distributed platforms such as
grids, cloud computing infrastructures, or peer-to-peer systems is a very challenging task …

[PDF][PDF] Real-time online emulation of real applications on SimGrid with Simterpose

L Bessad, M Quinson, S Monnet - 2015 - people.irisa.fr
Dans le cadre de ce stage, nous allons nous intéresser aux applications distribuées. Il s' agit
d'applications dont une partie ou la totalité des ressources n'est pas localisée sur la …

Computational Science of Computer Systems

M Quinson - 2013 - theses.hal.science
Despite their major impact on our modern societies, large scale distributed systems remain
extremely challenging to study and assess as they aggregate million of heterogeneous …