Multi-resource allocation for network slicing

F Fossati, S Moretti, P Perny… - IEEE/ACM Transactions …, 2020 - ieeexplore.ieee.org
Among the novelties introduced by 5G networks, the formalization of thenetwork slice'as a
resource allocation unit is an important one. In legacy networks, resources such as link …

No justified complaints: On fair sharing of multiple resources

D Dolev, DG Feitelson, JY Halpern… - proceedings of the 3rd …, 2012 - dl.acm.org
Fair allocation has been studied intensively in both economics and computer science. This
subject has aroused renewed interest with the advent of virtualization and cloud computing …

Automatic detection and analysis of photovoltaic modules in aerial infrared imagery

S Dotenco, M Dalsass, L Winkler… - 2016 IEEE Winter …, 2016 - ieeexplore.ieee.org
Drone-based aerial thermography has become a convenient quality assessment tool for the
precise localization of defective modules and cells in large photovoltaic-power plants …

The context-switch overhead inflicted by hardware interrupts (and the enigma of do-nothing loops)

D Tsafrir - Proceedings of the 2007 workshop on Experimental …, 2007 - dl.acm.org
The overhead of a context switch is typically associated with multitasking, where several
applications share a processor. But even if only one runnable application is present in the …

Hierarchical peer-to-peer networks using lightweight superpeer topologies

M Kleis, EK Lua, X Zhou - 10th IEEE Symposium on Computers …, 2005 - ieeexplore.ieee.org
The use of superpeers has been proposed to improve the performance of both structured
and unstructured peer-to-peer (P2P) networks. In this paper, we study the performance of …

Function splitting, isolation, and placement trade-offs in network slicing

W da Silva Coelho, A Benhamiche… - … on Network and …, 2021 - ieeexplore.ieee.org
We model the network slice provisioning as an optimization problem including novel
mapping and provisioning requirements rising with new radio and core function placement …

Secretly Monopolizing the CPU Without Superuser Privileges.

D Tsafrir, Y Etsion, DG Feitelson - USENIX Security Symposium, 2007 - usenix.org
We describe a “cheat” attack, allowing an ordinary process to hijack any desirable
percentage of the CPU cycles without requiring superuser/administrator privileges …

High-MCC functions in the Linux kernel

A Jbara, A Matan, DG Feitelson - Empirical Software Engineering, 2014 - Springer
Abstract McCabe's Cyclomatic Complexity (MCC) is a widely used metric for the complexity
of control flow. Common usage decrees that functions should not have an MCC above 50 …

Advanced non-distributed operating systems course

Y Wiseman - ACM SIGCSE Bulletin, 2005 - dl.acm.org
The use of Non-Distributed Operating Systems is very common and old. Many researchers
feel that this field of research is outmoded, and therefore put their efforts into Distributed …

Effects of clock resolution on the scheduling of interactive and soft real-time processes

Y Etsion, D Tsafrir, DG Feitelson - Proceedings of the 2003 ACM …, 2003 - dl.acm.org
It is commonly agreed that scheduling mechanisms in general purpose operating systems
do not provide adequate support for modern interactive applications, notably multimedia …