Delay, Guillaume Ervedoza, Sylvain Fournié, Michel Haine, Ghislain
We study the numerical approximation of a 2d fluid–structure interaction problem stabilizing the fluid flow around an unstable stationary solution in presence of boundary perturbations. The structure is governed by a finite number of parameters and a feedback control law acts on their accelerations. The existence of strong solutions and the stabili...
Rizzo Aquino, Erika Saqui-Sannes, Pierre de Vingerhoeds, Rob A.
Use case driven analysis is the corner stone of software andsystems modeling in UML and SysML, respectively. A use case diagramidentifies the main functions to be offered by the system and showcasesthe interactions between in-system use cases and out-system users. Iden-tifying and organizing use cases requires good abstraction skills. There-fore, m...
Thi, Minh-Thuyen Pierson, Jean-Marc Da Costa, Georges Stolf, Patricia Nicod, Jean-Marc Rostirolla, Gustavo Haddad, Marwa
As the power demand of datacenters is increasing sharply, a promising solution is to power datacenters locally by renewable energies. However, one of the main challenges when operating such green datacenters is to conciliate the intermittent power supply and the power demand. To deal with this problem, we view the green datacenter as two sub-system...
Todeschi, Grégoire
Les besoins en ressources de calcul sont en forte augmentation depuis plusieurs décennies, que ce soit pour des applications du domaine des réseaux sociaux, du calcul haute performance, ou du big data. Les entreprises se tournent alors vers des solutions d'externalisation de leurs services informatiques comme le Cloud Computing. Le Cloud Computing ...
Benzekri, Abdelmalek Laborde, Romain Oglaza, Arnaud Rammal, Darine Barrère, François
Situation awareness consists of "the perception of the elements in the environment within a volume of time and space, the comprehension of their meaning, and the projection of their status in the near future". Being aware of the security situation is then mandatory to launch proper security reactions in response to cybersecurity attacks. Security I...
Ma, Xiaoyan Liu, Tianyi Liu, Song Kacimi, Rahim Dhaou, Riadh
In this work, we study data collection in unmanned aerial vehicle (UAV) aided mobile wireless sensor networks (WSNs). The network topology is changing under the mobility of the UAV and the sensor nodes, the design of efficient data collection protocols is a major concern. We address such high dynamic network and propose a prioritized-based collisio...
Mnasri, Sami Nasri, Nejah Alrashidi, Malek Van den Bossche, Adrien Val, Thierry
When resolving many-objective problems, multi-objective optimization algorithms encounter several difficulties degrading their performances. These difficulties may concern the exponential execution time, the effectiveness of the mutation and recombination operators or finding the tradeoff between diversity and convergence. In this paper, the issue ...
Da Costa, Georges Pierson, Jean-Marc Fontoura Cupertino, Leandro
Power consumption of servers and applications are of utmost importance as computers are becoming ubiquitous, from smart phones to IoT and full-fledged computers. To optimize their power consumption, knowledge is necessary during execution at different levels: for the Operating System to take decisions of scheduling, for users to choose between diff...
Todeschi, Grégoire Djomgwe Teabe, Boris Tchana, Alain Hagimont, Daniel
In a virtualized server, a page cache (which caches I/O data) is managed in both the hypervisor and the guest Operating System (OS). This leads to a well-known issue called double caching. Double caching is the presence of the same data in both the hypervisor page cache and guest OS page caches. Some experiments we performed show that almost 64% of...
Da Costa, Georges Pierson, Jean-Marc Fontoura Cupertino, Leandro
This article proposes a methodology for constructing and assessing the quality of benchmark-suites dedicated to understand server behavior. Applications are multiple: behavioral models creation, power capping, abnormal behavior detection, model validation. To reach all the operating points of one server, an automatic operating range detection is ne...