Sebastian Litzinger

ORCID: 0000-0003-2200-7337
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Parallel Computing and Optimization Techniques
  • Distributed and Parallel Computing Systems
  • Cloud Computing and Resource Management
  • Interconnection Networks and Systems
  • Internet Traffic Analysis and Secure E-voting
  • Complex Network Analysis Techniques
  • Scheduling and Optimization Algorithms
  • Advanced Steganography and Watermarking Techniques
  • Embedded Systems Design Techniques
  • Efficiency Analysis Using DEA
  • Real-Time Systems Scheduling
  • Digital Media Forensic Detection
  • Opinion Dynamics and Social Influence
  • Advanced Malware Detection Techniques
  • Terrorism, Counterterrorism, and Political Violence
  • Peer-to-Peer Network Technologies
  • Advanced Neural Network Applications
  • Capital Investment and Risk Analysis
  • Metaheuristic Optimization Algorithms Research
  • VLSI and FPGA Design Techniques
  • User Authentication and Security Systems
  • Social Capital and Networks
  • Network Security and Intrusion Detection
  • Network Packet Processing and Optimization
  • Cryptographic Implementations and Security

University of Hagen
2016-2024

We consider the problem of statically scheduling a task graph moldable streaming tasks (i.e., actor network) to multicore or many-core CPU with discrete dynamic voltage and frequency scaling (DVFS). employ an integer linear programming (ILP) approach that combines allocating cores tasks, mapping core subsets, selecting DVFS level for each task, considering all options fusion as provided by cost model, given data throughput latency requirements targeting low energy consumption. also propose...

10.1109/tcad.2020.3013054 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2020-10-02

We extend static scheduling of parallelizable tasks to machines with multiple core types, taking differences in performance and power consumption due task type into account. Next energy minimization for given deadline, i.e. throughput requirement, we consider makespan or average budgets. evaluate our approach by comparing schedules synthetic sets big.LITTLE other schedulers from literature. achieve an improvement up 33%.

10.23919/eusipco.2019.8903180 article EN 2021 29th European Signal Processing Conference (EUSIPCO) 2019-09-01

A special type of social networks is the so-called affiliation network, consisting two modes vertices: actors and events. Up to now, in undirected case, closeness such has been measured by their jointly-attended Indirect contacts attenuated directed links are minor interest networks. These flaws make a veritable estimation of, e.g., possible message transfers amongst questionable. In this contribution, first, we discuss these matters from graph-theoretical point view. Second, so as avoid...

10.3390/e21030277 article EN cc-by Entropy 2019-03-13

Tasks with stochastic runtimes and dependencies are frequently met in multicore applications, but static schedulers need deterministic task as input. We first demonstrate by scheduling experiments that both for binomially geometrically distributed runtimes, which often found taskgraphs, choice of average runtime scheduler input is sufficient to obtain schedules good makespan, i.e. inserting buffers depending on the standard deviation not helpful majority cases. Furthermore, we compute...

10.1109/hpcs48598.2019.9188194 article EN 2019-07-01

Summary Streaming task graphs are high‐level specifications for parallel applications operating on streams of data. For a static graph structure, schedulers can be used to map the tasks onto platform minimize energy consumption given throughput. We introduce dynamic elements into thus specifying which adapt behavior at runtime, example, switching from check‐only active mode. This in turn necessitates runtime system that remap and potentially their degree parallelism case change structure....

10.1002/cpe.6072 article EN cc-by Concurrency and Computation Practice and Experience 2020-11-06

Abstract Design space exploration of a configurable, heterogeneous system for given application with required throughput searches combination cores or softcores different architectures that can be accommodated within the ASIC FPGA area and achieves optimizes power consumption. For soft real-time streaming application, modeled as task graph internally parallelizable tasks, this requires assigning core type quantity DVFS frequency level to each task, which implies runtime energy consumption,...

10.1007/s11265-022-01787-y article EN cc-by Journal of Signal Processing Systems 2022-06-30

We introduce a novel approach for energy-efficient scheduling of data-dependent stream programs with packet types on multicore architectures voltage and frequency scaling. To have the given application meet specific throughput demands while minimizing energy consumption, we enhance existing crown by packet-type dependent parameters. Formulation as an integer linear program generates parametric, multi-scenario schedule table-driven execution. By inspecting at runtime, our online scheduler...

10.1145/3605098.3636081 article EN Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing 2024-04-08

With the advent of Internet-of-Things, sensor data streams are widespread and thus a promising target for network steganography including covert channels. Therefore, we present an approach where sender receiver first build archive values that occur in stream over time interval, then encode bits secret message via belonging to class seen or not. If value’s category does not match required bit value, it is adapted switch its category. The chosen value minimizes distance original...

10.3897/jucs.108811 article EN JUCS - Journal of Universal Computer Science 2024-08-23

Static scheduling of independent, moldable tasks on parallel machines with frequency scaling comprises decisions core allocation, assignment, and ordering, to meet a deadline minimize energy consumption. Constraining some these reduces the solution space, i.e. may increase consumption, but also open path new, near-optimal approaches. We investigate how constraints different steps influence starting an unrestricted scheduler for tasks. The are partly derived from existing schedulers,...

10.1016/j.jpdc.2022.01.004 article EN cc-by Journal of Parallel and Distributed Computing 2022-01-24

Croivn scheduling is a static approach for sets of parallelizable tasks with common deadline, aiming to minimize energy consumption on parallel processors frequency scaling. We demonstrate that crown schedules are robust, i.e. the runtime prolongation one task by moderate percentage does not cause deadline transgression same fraction. In addition, speeding up some scheduled after prolonged task, can still be met at additional consumption. present heuristic perform this re-scaling online....

10.1109/pdp50117.2020.00027 article EN 2020-03-01

Crown scheduling is a static approach for sets of parallelizable tasks with common deadline, aiming to minimize energy consumption on parallel processors frequency scaling. We demonstrate that crown schedules are robust, i. e. the runtime prolongation one task by moderate percentage does not cause deadline transgression same fraction. In addition, speeding up some scheduled after prolonged task, can still be met at additional consumption. present heuristic perform this re-scaling online and...

10.1016/j.sysarc.2021.101999 article EN cc-by Journal of Systems Architecture 2021-01-12

Streaming task graphs are a high-level construct used to specify parallel applications operating on streams of data, and energy-efficient code meeting data throughput requirements can be generated automatically. Tasks themselves, so that two levels parallelism present. Normally, the graph structure is assumed static, static schedulers map (parallel) tasks onto platform minimize energy consumption for given throughput. We propose formulation introduces dynamic elements into structure, thus...

10.1145/3380536.3380544 article EN 2020-02-19

Hash-based message authentication code (HMAC) is a form of cryptographic checksum which frequently used in SSL/TLS. The IETF standard permits several hash function families with possible lengths. Thus, if checksums must be computed for number messages, multi-dimensional optimization problem arises, especially heterogeneous platform like ARM big.LITTLE used. We formulate the as an energy minimization constraints given by deadlines and different power performance profiles functions on core...

10.1109/hpcs48598.2019.9188113 article EN 2019-07-01

Efficiency is the main issue in any data envelopment analysis. Realizing output by a minimum of input or reaching maximum given credo, scale effects often are only sort accessory. In modern economics play prominent role, however. What right size decision making unit (DMU) and how to proceed there. Returns inform DMU about its hitherto disregard show way towards ideal activity size. Combining efficiency aspects scaling leads new DEA-best practice criterion DMUs gives them profound orientation...

10.1051/ro/2022038 article EN cc-by RAIRO - Operations Research 2022-03-01

Higher-radix floating-point representations have the potential for higher performance, lower energy footprint, and reduced gate count in embedded systems when compared to traditional binary numbers. Thus, they might also appear transmission of sensor data values. However, these number formats introduce redundancies, which can be exploited steganographic message transfer. We present a covert channel that exploits this redundancy trade bandwidth against introduced error thus detectability. In...

10.1145/3538969.3544429 article EN Proceedings of the 17th International Conference on Availability, Reliability and Security 2022-08-17

Abstract Terrorism is a scourge of humanity. Thousands people were killed by terrorists in the last years. To understand structure, information flow and leadership terrorist cells must for all societies to prevent future attacks. Network theory can help model such identify leading members therein. This contribution uses graph theoretical approach as basis enriches it an entropy‐driven knowledge processing. After presenting concept two cells, one Bali attack 9/11 attack, are analysed. The...

10.1111/exsy.12720 article EN cc-by-nc-nd Expert Systems 2021-05-25

A social network (SN) is a group of actors and their mutual relations. Sociologists try to answer the question why networked in our society are more successful than others how this networking works. Directed or undirected graphs, hyper- multigraphs suitable means visualize Social networks with directed weighted links among need sophisticated instruments for analyses. We model these as probabilistic conditioned propositions. Then any actor i permits estimation transfer probabilities all j,...

10.2139/ssrn.2780969 article EN SSRN Electronic Journal 2016-01-01

For fixed-application scenarios in embedded soft-realtime computing, the ideal (w.r.t. energy consumption) heterogeneous multi-core CPU design within given chip dimensions can be configured by composing it from pre-layouted, rectangular submodules for each of a number <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">K</i> > 1 core types, where practice is small constant. example, =2 traditional ARM big.LITTLE designs. Nevertheless, even better...

10.1109/access.2023.3248283 article EN cc-by IEEE Access 2023-01-01
Coming Soon ...