scholarly journals Process Scheduling in Heterogeneous Multicore System using Agent based Graph Coloring Algorithm

2019 ◽  
Vol 8 (3) ◽  
pp. 8449-8452

In any heterogeneous multicore system, there are numerous amount of processors with different platform and all the processing units are fabricated on a common single unit preferably on a System on Chip. As there is a tremendous amount of parallelism encompassed in a multicore system, proper utilization of the cores is a big challenge in the current era. Hence a more automated software approach is required like an agent based graph coloring algorithm to find the free processor and schedule the tasks on the respective cores. Predominantly the entire process of scheduling the tasks on multicore system is based on arrival time of process. This paper incorporates the scheduling on the linux 2.6.11 kernel and GEMS simulator for multicore implementation. The core utilization in this type of agent scheduling is 50% more than the existing scheduling mechanism

2018 ◽  
Vol 65 (8) ◽  
pp. 1094-1098 ◽  
Author(s):  
Antonio Pullini ◽  
Francesco Conti ◽  
Davide Rossi ◽  
Igor Loi ◽  
Michael Gautschi ◽  
...  

2018 ◽  
pp. 135-143
Author(s):  
Eysymont Alexey L. ◽  
Chernikov Anton V. ◽  
Kosorukov Dmitry E. ◽  
Nasonov Ilya I. ◽  
Komlev Arseny A.

2021 ◽  
Vol 54 (5) ◽  
pp. 1-36
Author(s):  
Subodha Charles ◽  
Prabhat Mishra

With the advances of chip manufacturing technologies, computer architects have been able to integrate an increasing number of processors and other heterogeneous components on the same chip. Network-on-Chip (NoC) is widely employed by multicore System-on-Chip (SoC) architectures to cater to their communication requirements. NoC has received significant attention from both attackers and defenders. The increased usage of NoC and its distributed nature across the chip has made it a focal point of potential security attacks. Due to its prime location in the SoC coupled with connectivity with various components, NoC can be effectively utilized to implement security countermeasures to protect the SoC from potential attacks. There is a wide variety of existing literature on NoC security attacks and countermeasures. In this article, we provide a comprehensive survey of security vulnerabilities in NoC-based SoC architectures and discuss relevant countermeasures.


Author(s):  
Yifeng Zhang ◽  
Xiaoqing Li ◽  
Te-Wei Wang

Online social networks (OSNs) are quickly becoming a key component of the Internet. With their widespread acceptance among the general public and the tremendous amount time that users spend on them, OSNs provide great potentials for marketing, especially viral marketing, in which marketing messages are spread among consumers via the word-of-mouth process. A critical task in viral marketing is influencer identification, i.e. finding a group of consumers as the initial receivers of a marketing message. Using agent-based modeling, this paper examines the effectiveness of tie strength as a criterion for influencer identification on OSNs. Results show that identifying influencers by the number of strong connections that a user has is superior to doing so by the total number of connections when the strength of strong connections is relatively high compared to that of weak connections or there is a relatively high percentage of strong connections between users. Implications of the results are discussed.


Sign in / Sign up

Export Citation Format

Share Document