Scalability

View this topic in
In telecommunications and software engineering, scalability is the ability of a system, network, or process, to handle growing amounts of work in a graceful manner or its ability to be enlarged to accommodate that growth. (Wikipedia.org)






Conferences related to Scalability

Back to Top

2016 IEEE International Conference on Image Processing (ICIP)

Signal processing, image processing, biomedical imaging, multimedia, video, multidemensional.


2015 IEEE International Parallel and Distributed Processing Symposium (IPDPS)

IPDPS is an international forum for engineers and scientists from around the world to present their latest research findings in all aspects of Parallel Processing.

  • 2013 IEEE International Symposium on Parallel & Distributed Processing (IPDPS)

    Parallel and distributed algorithms, focusing on stability, scalability, and fault-tolerance. Applications of parallel and distributed computing, including web, peer-to-peer, cloud, grid, scientific, and mobile computing. Parallel and distributed architectures including instruction-level and thread-level parallelism; petascale and exascale systems designs. Parallel and distributed software, including parallel and multicore programming languages, compilers, runtime systems, operating systems, and middleware for grids and clouds.

  • 2011 IEEE International Parallel & Distributed Processing Symposium (IPDPS)

    IPDPS is an international forum for engineers and scientists from around the world to present their latest research findings in all aspects of parallel computation. In addition to technical sessions of submitted paper presentations, the meeting offers workshops, tutorials, and commercial presentations & exhibits. IPDPS represents a unique international gathering of computer scientists from around the world.


2014 IEEE International Conference On Cluster Computing (CLUSTER)

IEEE Cluster is the main conference on all aspects of cluster computing for computational science

  • 2013 IEEE International Conference on Cluster Computing (CLUSTER)

    The conference will put special focus on campus clusters as the core of the cyberinfrastructure strategy and also campus bridging. Major topics: Systems design/configuration, tools, software, middleware, alogrithms, applications, storage.

  • 2012 IEEE International Conference on Cluster Computing (CLUSTER)

    Systems Design and Configuration Tools, Systems Software, and Middleware Algorithms, Applications and Performance Storage and File Systems

  • 2011 IEEE International Conference on Cluster Computing (CLUSTER)

    Major topics of interest include, but are not limited to: Systems Design and Configuration; Tools, Systems Software, and Middleware; Algorithms, Applications and Performance; Storage and File Systems

  • 2010 IEEE International Conference on Cluster Computing (CLUSTER)

    Cluster2010 welcomes original unpublished paper and poster submissions from researchers in academia, industry, and government, describing innovative research in the field of cluster and high-performance computing.

  • 2009 IEEE International Conference on Cluster Computing (CLUSTER)

    Cluster 2009 welcomes paper and poster submissions on innovative work from researchers in academia, industry, and government, describing original research in the field of cluster computing.

  • 2008 IEEE International Conference on Cluster Computing (CLUSTER)

    Cluster 2008 welcomes paper and poster submissions on innovative work from researchers in academia, industry and government describing original research work in cluster computing. Topics of interest are (but not limited to) Cluster Software and Middleware, Applications, Performance Analysis and Evaluation, and Cluster Management.

  • 2007 IEEE International Conference on Cluster Computing (CLUSTER)

    Cluster 2007 is an open forum where the challenges, technologies and new innovations in all areas of cluster computing are presented and discussed. Papers/Posters, Workshops, Tutorial and Panels provide a wide range of formats for participation. Focus areas include application performance and scalability; interprocessor connectivity and messaging; middleware, resource management, platform deployment and maintenance; and integration with grid computing. With new advancements of cluster architecture componen

  • 2006 IEEE International Conference on Cluster Computing (CLUSTER)


2013 IEEE Symposium on Computers and Communications (ISCC)

Continuing the tradition of this series of symposia, ISCC 2013 will provide an internationaltechnical forum for experts from industry and academia to exchange ideas andpresent results of ongoing research in most state-of-the-art areas of computer and communications.

  • 2012 IEEE Symposium on Computers and Communications (ISCC)

    Continuing its tradition, ISCC 2012 will provide an international technical forum for experts from industry and academia to exchange ideas and present results of ongoing research in many state-of-the-art areas of computers and communications. This year, special focus will be on the challenging issues and opportunities related to the development, operation, analysis, performance and applications of Green Communications and Networking.

  • 2011 IEEE Symposium on Computers and Communications (ISCC)

    Continuing the tradition of this series of symposia, ISCC 2011 will provide an international technical forum for experts from industry and academia to exchange ideas and present results of ongoing research in most state-of-the-art areas of computers and communications. This year, special focus will be on the challenging issues and opportunities related to the development, operation, analysis, performance and applications of Green Communications and Networking.

  • 2010 IEEE Symposium on Computers and Communications (ISCC)

    Continuing the tradition of this series of symposia, ISCC 10 will provide an international technical forum for experts from industry and academia to exchange ideas and present results of ongoing research in most state of the art areas, including the ones listed below. This year, special focus will be on the challenging issues related to the creation, management, dissemination, and communication of information.

  • 2009 IEEE Symposium on Computers and Communications (ISCC)

    interaction between the fields of computers and communications

  • 2008 IEEE Symposium on Computers and Communications (ISCC)


2013 IEEE Thirteenth International Conference on Peer-to-Peer Computing (P2P)

The IEEE International Conference on Peer-to-Peer Computing provides a single-track forum for presenting new research results on all aspects of P2P computing, networking, applications, systems. It is the oldest and largest conference dedicated to P2P, and has been held every year since 2001. P2P'13 opens up also to massively distributed systems, and all aspects where decentralization and autonomic behavior are key aspects of the system.

  • 2012 IEEE Twelfth International Conference on Peer-to-Peer Computing (P2P)

    The P2P'12 conference solicits papers on all aspects of peer-to-peer computing. Of particular interest is research that furthers the state-of-the-art in the design and analysis of peer-to-peer applications and systems, or that investigates real, deployed, peer-to-peer applications or systems. P2P 12 will bring together top researchers and practitioners to discuss the challenges of building large scale distributed systems. This includes traditional peer-to-peer applications such as file sharing or media streaming, but also applications dealing with scalability in different settings such as cloud infrastructures, sensor networks, or mobile environments.

  • 2011 IEEE International Conference on Peer-to-Peer Computing (P2P)

    The P2P'11 conference solicits papers on all aspects of peer-to-peer computing. Of particular interest is research that furthers the state-of-the-art in the design and analysis of peer-to-peer applications and systems, or that investigates real, deployed, large-scale peer-to-peer applications or systems.

  • 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P)

    IEEE P2P'10 is the tenth conference in a series of annual conferences concerned with overlay network technologies and massively distributed systems & applications. Peer-to-Peer systems benefit from and share the resources owned by systems that are distributed around the Internet. Examples of such technologies include peer-to-peer applications and grids, and in general, any large-scale distributed system characterized by decentralization and sharing of resources.

  • 2009 IEEE Ninth International Conference on Peer-to-Peer Computing (P2P)

    overlay network technologies and massively distributed systems & applications

  • 2008 Eighth International Conference on Peer-to-Peer Computing (P2P)

    Research and experience with massively distributed systems and applications. Emphasis on scalability, robustness, and security.


More Conferences

Periodicals related to Scalability

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Networking, IEEE/ACM Transactions on

Network architecture and design, communication protocols, network software, network technologies, network software, network technologies, network services and applications, and network operations and management.


Parallel and Distributed Systems, IEEE Transactions on

IEEE Transactions on Parallel and Distributed Systems (TPDS) is published monthly. Topic areas include, but are not limited to the following: a) architectures: design, analysis, and implementation of multiple-processor systems (including multi-processors, multicomputers, and networks); impact of VLSI on system design; interprocessor communications; b) software: parallel languages and compilers; scheduling and task partitioning; databases, operating systems, and programming environments for ...



Most published Xplore authors for Scalability

Back to Top

Xplore Articles related to Scalability

Back to Top

New technical trends on adjustable speed AC motor drives

Kouki Matsuse; Daiki Matsuhashi Chinese Journal of Electrical Engineering, 2017

Adjustable speed AC Motor drives have been used extensively in modern industry and transportation which calls for electrical and mechanical energy conversion with wide output power range applications. Because of its modularity and scalability, the drive system can be extended to many different application areas. More recently, adjustable speed AC motor drive applications are spreading not only in industry applications, ...


Parallel Algorithms for Forward and Back Substitution in Direct Solution of Sparse Linear Systems

A. Gupta; V. Kumar Proceedings of the IEEE/ACM SC95 Conference, 1995

A few parallel algorithms for solving triangular systems resulting from parallel factorization of sparse linear systems have been proposed and implemented recently. We present a detailed analysis of parallel complexity and scalability of the best of these algorithms and the results of its implementation on up to 256 processors of the Cray T3D parallel computer. It has been a common ...


A hybrid method to detecting failures in mobile sensor networks using localization algorithms

Leonardo G. L. Martins; Raul C. Nunes; João B. S. Martins; Leonardo L. de Oliveira 2013 IEEE 11th International New Circuits and Systems Conference (NEWCAS), 2013

This paper presents a new approach to detect node failures to support fault tolerant application on mobile sensor networks in an optimized way. Our approach takes advantage of localization algorithm message exchanges to implement a failure detector algorithm, optimizing sent messages, reducing energy consumption and contributing to avoid the nodes scalability problem. We analyze a network performance for the Friedman ...


How to exchange security events? Overview and evaluation of formats and protocols

Jessica Steinberger; Anna Sperotto; Mario Golling; Harald Baier 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Network-based attacks pose a strong threat to the Internet landscape. Recent approaches to mitigate and resolve these threats focus on cooperation of Internet service providers and their exchange of security event information. A major benefit of a cooperation is that it might counteract a network-based attack at its root and provides the possibility to inform other cooperative partners about the ...


A scalable and oblivious digital watermarking for images

Wenming Lu; R. Safavi-Naini; T. Uehara; Wanqing Li Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on, 2004

Scalable compression algorithms, such as JPEG, can compress images to different quality or resolution levels so that the target systems with different display capabilities, can display the image. Digital watermarking is widely used for protection of copyright and identification of ownership on digital images. It is desirable to have scalable watermarking systems, where the watermark is detectable when the watermarked ...


More Xplore Articles

Educational Resources on Scalability

Back to Top

eLearning

New technical trends on adjustable speed AC motor drives

Kouki Matsuse; Daiki Matsuhashi Chinese Journal of Electrical Engineering, 2017

Adjustable speed AC Motor drives have been used extensively in modern industry and transportation which calls for electrical and mechanical energy conversion with wide output power range applications. Because of its modularity and scalability, the drive system can be extended to many different application areas. More recently, adjustable speed AC motor drive applications are spreading not only in industry applications, ...


Parallel Algorithms for Forward and Back Substitution in Direct Solution of Sparse Linear Systems

A. Gupta; V. Kumar Proceedings of the IEEE/ACM SC95 Conference, 1995

A few parallel algorithms for solving triangular systems resulting from parallel factorization of sparse linear systems have been proposed and implemented recently. We present a detailed analysis of parallel complexity and scalability of the best of these algorithms and the results of its implementation on up to 256 processors of the Cray T3D parallel computer. It has been a common ...


A hybrid method to detecting failures in mobile sensor networks using localization algorithms

Leonardo G. L. Martins; Raul C. Nunes; João B. S. Martins; Leonardo L. de Oliveira 2013 IEEE 11th International New Circuits and Systems Conference (NEWCAS), 2013

This paper presents a new approach to detect node failures to support fault tolerant application on mobile sensor networks in an optimized way. Our approach takes advantage of localization algorithm message exchanges to implement a failure detector algorithm, optimizing sent messages, reducing energy consumption and contributing to avoid the nodes scalability problem. We analyze a network performance for the Friedman ...


How to exchange security events? Overview and evaluation of formats and protocols

Jessica Steinberger; Anna Sperotto; Mario Golling; Harald Baier 2015 IFIP/IEEE International Symposium on Integrated Network Management (IM), 2015

Network-based attacks pose a strong threat to the Internet landscape. Recent approaches to mitigate and resolve these threats focus on cooperation of Internet service providers and their exchange of security event information. A major benefit of a cooperation is that it might counteract a network-based attack at its root and provides the possibility to inform other cooperative partners about the ...


A scalable and oblivious digital watermarking for images

Wenming Lu; R. Safavi-Naini; T. Uehara; Wanqing Li Signal Processing, 2004. Proceedings. ICSP '04. 2004 7th International Conference on, 2004

Scalable compression algorithms, such as JPEG, can compress images to different quality or resolution levels so that the target systems with different display capabilities, can display the image. Digital watermarking is widely used for protection of copyright and identification of ownership on digital images. It is desirable to have scalable watermarking systems, where the watermark is detectable when the watermarked ...


More eLearning Resources

IEEE-USA E-Books

  • Appendix E: A Complete List of All Statistics with the V$SYSSTAT View

    No abstract.

  • Index

    No abstract.

  • Case Study: Covering Index

    This chapter contains sections titled: Getting to Know the Application Architecture Quantifying the Problems Analyzing Bottlenecks Applying Optimizations/Tunings Verifying the Fixes Moral of the Case Study Recommended Reading Exercises

  • The Vesta Parallel File System

    The Vesta parallel file system is designed to provide parallel file access to application programs running on multicomputers with parallel I/O subsystems. Vesta uses a new abstraction of files: a file is not a sequence of bytes, but rather it can be partitioned into multiple disjoint sequences that are accessed in parallel. The partitioning  -  which can also be changed dynamically  -  reduces the need for synchronization and coordination during the access. Some control over the layout of data is also provided, so the layout can be matched with the anticipated access patterns. The system is fully implemented, and forms the basis for the AIX Parallel I/O File System on the IBM SP2. The implementation does not compromise scalability or parallelism. In fact, all data accesses are done directly to the I/O node that contains the requested data, without any indirection or access to shared metadata. Disk mapping and caching functions are confined to each I/O node, so there is no need to keep data coherent across nodes. Performance measurements show good scalability with increased resources. Moreover, different access patterns are shown to achieve similar performance.

  • Appendix A

    THE DEFINITIVE GUIDEBOOK TO NEXT GENERATION SONET/SDH, OPTICAL NETWORKS, AND NEW DATA COMMUNICATIONS PROTOCOL The next generation SONET/SDH answers the demand for a communications network with improved data QoS, higher data rates, exceptional flexibility, efficiency and scalability, superb protection, and a data-friendly standard, by integrating the simplicity and cost-efficiency of the data network with bandwidth capacity and QoS of the synchronous optical network. Designed for communication specialists who need to understand the implications and implementation requirements of the next generation optical network. Next Generation SONET/SDH: Voice and Data offers an accessible yet comprehensive introduction to this latest version of SONET/SDH. In this, his fourth book on optical networking, Dr. Kartalopoulos explains in simple terms the wealth of new protocols designed to optimize this new optical network, increase its efficiency, and decrease its cost. Featuring only essen ial mathematics and supported by many helpful illustrations, the text: * Explains and references the new SONET/SDH standards * Details the many implications and improvements that the next generation of SONET-over-DWDM will bring * Provides careful explanations of such optical systems as Data-over SONET, Packet-over-SONET, Link Capacity Adjustment Scheme (LCAST), the Generalized Framing Procedure (GFP), Link Access Procedure for SDH (LAPS), Internet and Gigabit Ethernet over SONET, Virtual Concatenation, the Multi-Service Provisioning Platform (MSPP), and the Multi-Service Switching Platform (MSSP). In addition, the book explains other optical networks including the optical transport network (OTN).

  • Case Study: CURSOR_SHARING

    This chapter contains sections titled: The Concept of a Bind Variable Oracle CURSOR_SHARING Parameter Getting to Know the Application Architecture Quantifying Problems Analyzing Bottlenecks Applying Tuning: CURSOR_SHARING = FORCE Applying Tuning: CURSOR_SHARING = SIMILAR Moral of the Case Study Recommended Reading Exercises

  • Why Morphology Matters

    This chapter contains sections titled: 6.1 Introduction, 6.2 Morphology Simplifies Control, 6.3 Morphology Eases Tasks, 6.4 Morphology Increases Evolvability, 6.5 Morphology Affords New Behaviors, 6.6 Morphology Supports Self-Exploration, 6.7 Morphology Creates New Research Questions, 6.8 Morphology Supports Scalability, 6.9 Conclusions, Notes, References

  • Understanding Oracle Architecture

    This chapter contains sections titled: The Version History of Oracle Oracle Processes Oracle Memory Areas Dedicated versus Shared Oracle Server Architecture Performance Sensitive Initialization Parameters Oracle Static Data Dictionary Views Oracle Dynamic Performance (V$) Views Summary Recommended Reading Exercises

  • Intermediate MPI

    This chapter contains sections titled: The Poisson Problem, Topologies, A Code for the Poisson Problem, Using Nonblocking Communications, Synchronous Sends and "Safe" Programs, More on Scalability, Jacobi with a 2-D Decomposition, An MPI Derived Datatype, Overlapping Communication and Computation, More on Timing Programs, Three Dimensions, Common Errors and Misunderstandings, Application: Simulating Vortex Evolution in Superconducting Materials

  • A Scalable Machine Learning Approach to Go

    Go is an ancient board game that poses unique opportunities and challenges for AI and machine learning. Here we develop a machine learning approach to Go, and related board games, focusing primarily on the problem of learning a good evaluation function in a scalable way. Scalability is essential at multiple levels, from the library of local tactical patterns, to the integration of patterns across the board, to the size of the board itself. The system we propose is capable of automatically learning the propensity of local patterns from a library of games. Propensity and other local tactical information are fed into a recursive neural network, derived from a Bayesian network architecture. The network integrates local information across the board and produces local outputs that represent local territory ownership probabilities. The aggregation of these probabilities provides an effective strategic evaluation function that is an estimate of the expected area at the end (or at other stages) of the game. Local area targets for training can be derived from datasets of human games. A system trained using only 9 × 9 amateur game data performs surprisingly well on a test set derived from 19 × 19 professional game data. Possible directions for further improvements are briefly discussed.



Standards related to Scalability

Back to Top

No standards are currently tagged "Scalability"


Jobs related to Scalability

Back to Top