首页 > 最新文献

Proceedings of the 23rd European Conference on Pattern Languages of Programs最新文献

英文 中文
IoT Device Security the Hard(ware) way 物联网设备安全的硬件(硬件)方式
Pub Date : 2018-07-04 DOI: 10.1145/3282308.3282329
Markus Schuss, Johannes Iber, Jürgen Dobaj, Christian Kreiner, C. Boano, K. Römer
Numerous attacks on Internet of Things (IoT) devices have shown that security cannot be neglected, even when building devices with just a few kB of memory. While it is common sense to run regular software updates and use state-of-the-art security on embedded or general purpose systems, this is often not possible with IoT devices. While many of those devices have the facilities to perform over-the-air updates, their memory and processing capabilities limit the use of state-of-the-art cryptography. Additionally, these devices often lack the capabilities to secure the cryptographic keys, the foundation on which the device's security is built, which makes them even more vulnerable to attacks. In this work, we present a pattern that allows even constrained devices to utilize state-of-the-art cryptographic functions, providing the foundation for a secure Internet of Things. The identified pattern presents the following characteristics: (i) confidentiality, by offloading the cryptographic functions and key storage; (ii) authenticity, by signing messages with the securely stored key using hash as well as signature functions, often too complex for such constrained devices on their own; (iii) integrity, a key requirement for connected sensors. As an added benefit, a faster detection of corrupted or tampered updates can also increase the availability of the system. This pattern is primarily targeted at IoT device vendors, who wish to keep their devices secure, by implementing security in hardware.
对物联网(IoT)设备的大量攻击表明,即使构建只有几kB内存的设备,安全性也不容忽视。虽然在嵌入式或通用系统上运行定期软件更新和使用最先进的安全性是常识,但对于物联网设备来说,这通常是不可能的。虽然这些设备中的许多都具有执行无线更新的功能,但它们的内存和处理能力限制了最先进加密技术的使用。此外,这些设备通常缺乏保护加密密钥的能力,而加密密钥是构建设备安全性的基础,这使得它们更容易受到攻击。在这项工作中,我们提出了一种模式,允许甚至受限制的设备利用最先进的加密功能,为安全的物联网提供基础。所识别的模式具有以下特征:(i)机密性,通过卸载加密功能和密钥存储;(ii)真实性,通过使用哈希和签名功能使用安全存储的密钥签名消息,对于这些受约束的设备本身来说,通常过于复杂;(iii)完整性,连接传感器的关键要求。作为一个额外的好处,更快地检测损坏或篡改的更新还可以提高系统的可用性。此模式主要针对希望通过在硬件中实现安全性来保持设备安全的物联网设备供应商。
{"title":"IoT Device Security the Hard(ware) way","authors":"Markus Schuss, Johannes Iber, Jürgen Dobaj, Christian Kreiner, C. Boano, K. Römer","doi":"10.1145/3282308.3282329","DOIUrl":"https://doi.org/10.1145/3282308.3282329","url":null,"abstract":"Numerous attacks on Internet of Things (IoT) devices have shown that security cannot be neglected, even when building devices with just a few kB of memory. While it is common sense to run regular software updates and use state-of-the-art security on embedded or general purpose systems, this is often not possible with IoT devices. While many of those devices have the facilities to perform over-the-air updates, their memory and processing capabilities limit the use of state-of-the-art cryptography. Additionally, these devices often lack the capabilities to secure the cryptographic keys, the foundation on which the device's security is built, which makes them even more vulnerable to attacks. In this work, we present a pattern that allows even constrained devices to utilize state-of-the-art cryptographic functions, providing the foundation for a secure Internet of Things. The identified pattern presents the following characteristics: (i) confidentiality, by offloading the cryptographic functions and key storage; (ii) authenticity, by signing messages with the securely stored key using hash as well as signature functions, often too complex for such constrained devices on their own; (iii) integrity, a key requirement for connected sensors. As an added benefit, a faster detection of corrupted or tampered updates can also increase the availability of the system. This pattern is primarily targeted at IoT device vendors, who wish to keep their devices secure, by implementing security in hardware.","PeriodicalId":136534,"journal":{"name":"Proceedings of the 23rd European Conference on Pattern Languages of Programs","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128202043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Applying Architectural Patterns for Parallel Programming: Solving the Laplace Equation 应用架构模式进行并行编程:求解拉普拉斯方程
Pub Date : 2018-07-04 DOI: 10.1145/3282308.3282335
J. Ortega-Arjona
The Architectural Patterns for Parallel Programming is a collection of patterns related with a method for developing the coordination structure of parallel software systems. These architectural patterns take as input information (a) the available parallel hardware platform, (b) the parallel programming language of this platform, and (c) the analysis of the problem to solve, in terms of an algorithm and data. In this paper, it is presented the application of the architectural patterns along within the Coordination stage, as part of the Pattern-based Parallel Software Design Method, which aims for developing a coordination structure for solving the Laplace Equation. The Coordination stage here takes the information from the Problem Analysis presented in Section 2, selects an architectural pattern for the coordination in Section 3, and provides some elements about its implementationin Section 4.
并行编程的体系结构模式是与开发并行软件系统协调结构的方法相关的模式集合。这些架构模式以(a)可用的并行硬件平台、(b)该平台的并行编程语言和(c)要解决的问题的算法和数据分析作为输入信息。本文介绍了架构模式在协调阶段的应用,作为基于模式的并行软件设计方法的一部分,该方法旨在开发求解拉普拉斯方程的协调结构。这里的协调阶段从第2节中提供的问题分析中获取信息,在第3节中为协调选择一个体系结构模式,并在第4节中提供有关其实现的一些元素。
{"title":"Applying Architectural Patterns for Parallel Programming: Solving the Laplace Equation","authors":"J. Ortega-Arjona","doi":"10.1145/3282308.3282335","DOIUrl":"https://doi.org/10.1145/3282308.3282335","url":null,"abstract":"The Architectural Patterns for Parallel Programming is a collection of patterns related with a method for developing the coordination structure of parallel software systems. These architectural patterns take as input information (a) the available parallel hardware platform, (b) the parallel programming language of this platform, and (c) the analysis of the problem to solve, in terms of an algorithm and data. In this paper, it is presented the application of the architectural patterns along within the Coordination stage, as part of the Pattern-based Parallel Software Design Method, which aims for developing a coordination structure for solving the Laplace Equation. The Coordination stage here takes the information from the Problem Analysis presented in Section 2, selects an architectural pattern for the coordination in Section 3, and provides some elements about its implementationin Section 4.","PeriodicalId":136534,"journal":{"name":"Proceedings of the 23rd European Conference on Pattern Languages of Programs","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128673746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Set of Patterns in Adult Education 一套成人教育模式
Pub Date : 2018-07-04 DOI: 10.1145/3282308.3282327
José Carlos Ciria Cosculluela
Adult learners have specific features that differentiate them from children and the young. This specificity has been overlooked by an overwhelming part of the theoretical and applied research on education, which focuses on the early stages of life. Consequently, adult educators face a scarcity of reference models, guidelines and training materials supporting their daily practice. This paper aims at contributing to fill this gap, by providing advice and spurring methodological and practical discussion. We discuss concerns that have arisen from our experience both as adult educators and adult learners, and propose a set of patterns to tackle them. In particular, we present a self-reference model which has guided our performance as adult educators: the Democratic Learning catalyst. Commitment to Agreement sets up a framework for the adoption of such a model and its adaptation to specific contexts. Leveraging Experience exploits experience, an invaluable asset amassed by adults, putting it at the service of the collective learning process. Awareness of Progress accounts to the participants for the outcomes of the course. It is reassuring and encouraging, strengthens their self-confidence and generates a supportive climate. Lastly, adults' knowledge gets richer and their convictions become more soundly founded by means of Enlightening Discussion.
成人学习者具有与儿童和青少年不同的特定特征。这一特殊性被绝大部分的教育理论和应用研究所忽视,这些研究主要集中在生命的早期阶段。因此,成人教育工作者面临着支持他们日常实践的参考模型、指导方针和培训材料的短缺。本文旨在通过提供建议和促进方法和实践讨论来填补这一空白。我们讨论了从我们作为成人教育者和成人学习者的经验中产生的担忧,并提出了一套解决这些问题的模式。特别是,我们提出了一个自我参考模型,它指导了我们作为成人教育者的表现:民主学习催化剂。《协定承诺》为采用这种模式并使其适应具体情况建立了一个框架。利用经验是利用成年人积累的宝贵财富——经验,使其为集体学习过程服务。进步意识向参与者说明了课程的结果。这是令人安心和鼓舞的,增强了他们的自信,并产生了一种支持的气氛。最后,通过启发性的讨论,成年人的知识变得更加丰富,他们的信念变得更加坚实。
{"title":"A Set of Patterns in Adult Education","authors":"José Carlos Ciria Cosculluela","doi":"10.1145/3282308.3282327","DOIUrl":"https://doi.org/10.1145/3282308.3282327","url":null,"abstract":"Adult learners have specific features that differentiate them from children and the young. This specificity has been overlooked by an overwhelming part of the theoretical and applied research on education, which focuses on the early stages of life. Consequently, adult educators face a scarcity of reference models, guidelines and training materials supporting their daily practice. This paper aims at contributing to fill this gap, by providing advice and spurring methodological and practical discussion. We discuss concerns that have arisen from our experience both as adult educators and adult learners, and propose a set of patterns to tackle them. In particular, we present a self-reference model which has guided our performance as adult educators: the Democratic Learning catalyst. Commitment to Agreement sets up a framework for the adoption of such a model and its adaptation to specific contexts. Leveraging Experience exploits experience, an invaluable asset amassed by adults, putting it at the service of the collective learning process. Awareness of Progress accounts to the participants for the outcomes of the course. It is reassuring and encouraging, strengthens their self-confidence and generates a supportive climate. Lastly, adults' knowledge gets richer and their convictions become more soundly founded by means of Enlightening Discussion.","PeriodicalId":136534,"journal":{"name":"Proceedings of the 23rd European Conference on Pattern Languages of Programs","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126054130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wholeness Egg: Methodology of Designing a 'Living' Workshop by Differentiating a Whole 完整的鸡蛋:通过区分整体来设计一个“有生命的”工作坊的方法论
Pub Date : 2018-07-04 DOI: 10.1145/3282308.3282311
Takashi Iba, K. Munakata
This paper introduces 'Wholeness Egg' as an effective technique for designing 'living' workshops. Christopher Alexander who explored the beauty of architecture emphasized that a creation is about making the design come to life as much as possible. He also put a significant emphasis on the wholeness and the fifteen fundamental properties which can be found in all living structures. Based on his design theory, we invented the Wholeness Egg as a methodology of designing living workshops by grasping the wholeness first and subsequently differentiating it into parts, in the way that it can achieve the properties. This paper presents how a living design is induced on a single egg-shaped diagram, by showing our Pattern-driven Dialogue Workshop as an example. It also shows that the application of this methodology helps people to externalize and open up the individuals' thinking processes and allows them to work collaboratively when designing things. We expect this paper to provide readers with a clear understanding of the Wholeness Egg with a view to using it effectively in their own practices of designing.
本文介绍了“完整鸡蛋”作为设计“生活”车间的有效技术。探索建筑之美的克里斯托弗·亚历山大(Christopher Alexander)强调说:“创造就是要让设计尽可能地活起来。”他还非常强调整体性和所有生命结构都具有的15个基本属性。基于他的设计理论,我们发明了“整体蛋”作为一种设计生活工坊的方法,先抓住整体,再将其分割成各个部分,以达到其属性。本文通过展示我们的模式驱动对话研讨会作为一个例子,展示了如何在单个蛋形图上诱导一个活的设计。它还表明,这种方法的应用有助于人们外化和开放个人的思维过程,并允许他们在设计事物时协同工作。我们希望本文能让读者对“完整蛋”有一个清晰的认识,并能在自己的设计实践中有效地运用它。
{"title":"Wholeness Egg: Methodology of Designing a 'Living' Workshop by Differentiating a Whole","authors":"Takashi Iba, K. Munakata","doi":"10.1145/3282308.3282311","DOIUrl":"https://doi.org/10.1145/3282308.3282311","url":null,"abstract":"This paper introduces 'Wholeness Egg' as an effective technique for designing 'living' workshops. Christopher Alexander who explored the beauty of architecture emphasized that a creation is about making the design come to life as much as possible. He also put a significant emphasis on the wholeness and the fifteen fundamental properties which can be found in all living structures. Based on his design theory, we invented the Wholeness Egg as a methodology of designing living workshops by grasping the wholeness first and subsequently differentiating it into parts, in the way that it can achieve the properties. This paper presents how a living design is induced on a single egg-shaped diagram, by showing our Pattern-driven Dialogue Workshop as an example. It also shows that the application of this methodology helps people to externalize and open up the individuals' thinking processes and allows them to work collaboratively when designing things. We expect this paper to provide readers with a clear understanding of the Wholeness Egg with a view to using it effectively in their own practices of designing.","PeriodicalId":136534,"journal":{"name":"Proceedings of the 23rd European Conference on Pattern Languages of Programs","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115456542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Microservice Patterns for the Life Cycle of Industrial Edge Software 工业边缘软件生命周期的微服务模式
Pub Date : 2018-07-04 DOI: 10.1145/3282308.3282313
Fei Li, J. Fröhlich, D. Schall, Markus Lachenmayr, Christoph Stückjürgen, Sebastian Meixner, F. Buschmann
The Industry 4.0 initiative is pushing traditional production systems and methodologies through fundamental changes. In traditional industries such as manufacturing, utilities, and infrastructure monitoring, customers are demanding more flexibility and greater efficiency. The software that oversees these systems addresses these demands by adopting novel architectural styles and patterns. Industrial edge systems are gaining momentum because they offer superior data security and better response time to field operations. Microservice style has been adopted from cloud services because it improves development efficiency. This paper presents architecture patterns that cover four phases in the life cycle of industrial software. In the deployment phase, DOWNSHIFTING moves microservices from the cloud to the edge. During runtime, MONITORING CONNECTORS oversee properties of microservices at the edge, such as performance and resource usage. When adaptation is needed, EDGE-TO-CLOUD LOAD BALANCING leverages cloud resources to fulfill performance expectations. When a new microservice version is deployed, TEST PROBE enables testing the microservice at the edge without interfering with ongoing operations. This paper is intended for architects, developers and practitioners who are involved in delivering software in industrial edge environments.
工业4.0倡议正在推动传统的生产系统和方法进行根本性的变革。在制造业、公用事业和基础设施监控等传统行业中,客户要求更大的灵活性和更高的效率。监督这些系统的软件通过采用新颖的体系结构风格和模式来满足这些需求。工业边缘系统正在获得动力,因为它们提供卓越的数据安全性和更好的现场操作响应时间。微服务风格从云服务中被采用,因为它提高了开发效率。本文介绍了涵盖工业软件生命周期四个阶段的体系结构模式。在部署阶段,DOWNSHIFTING将微服务从云端移动到边缘。在运行期间,监视连接器监视边缘微服务的属性,例如性能和资源使用情况。当需要适应时,边缘到云负载平衡利用云资源来满足性能期望。当部署新的微服务版本时,TEST PROBE支持在边缘测试微服务,而不会干扰正在进行的操作。本文是为那些参与在工业边缘环境中交付软件的架构师、开发人员和实践者准备的。
{"title":"Microservice Patterns for the Life Cycle of Industrial Edge Software","authors":"Fei Li, J. Fröhlich, D. Schall, Markus Lachenmayr, Christoph Stückjürgen, Sebastian Meixner, F. Buschmann","doi":"10.1145/3282308.3282313","DOIUrl":"https://doi.org/10.1145/3282308.3282313","url":null,"abstract":"The Industry 4.0 initiative is pushing traditional production systems and methodologies through fundamental changes. In traditional industries such as manufacturing, utilities, and infrastructure monitoring, customers are demanding more flexibility and greater efficiency. The software that oversees these systems addresses these demands by adopting novel architectural styles and patterns. Industrial edge systems are gaining momentum because they offer superior data security and better response time to field operations. Microservice style has been adopted from cloud services because it improves development efficiency. This paper presents architecture patterns that cover four phases in the life cycle of industrial software. In the deployment phase, DOWNSHIFTING moves microservices from the cloud to the edge. During runtime, MONITORING CONNECTORS oversee properties of microservices at the edge, such as performance and resource usage. When adaptation is needed, EDGE-TO-CLOUD LOAD BALANCING leverages cloud resources to fulfill performance expectations. When a new microservice version is deployed, TEST PROBE enables testing the microservice at the edge without interfering with ongoing operations. This paper is intended for architects, developers and practitioners who are involved in delivering software in industrial edge environments.","PeriodicalId":136534,"journal":{"name":"Proceedings of the 23rd European Conference on Pattern Languages of Programs","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125411889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A System of Privacy Patterns for Informing Users: Creating a Pattern System 通知用户的隐私模式系统:创建一个模式系统
Pub Date : 2018-07-04 DOI: 10.1145/3282308.3282325
Michael Colesky, Julio C. Caiza
The General Data Protection Regulation mandates data protection in the European Union. This includes data protection by design and having privacy-preserving defaults. This legislation has been in force since May 2018, promising severe consequences for violation. Fulfilling its mandate for data protection is not trivial, though. One approach for realizing this is the use of privacy design patterns. We have recently started consolidating such patterns into useful collections. In this paper we improve a subset of these, constructing a pattern system. This helps to identify contextually appropriate patterns. It better illustrates their application and relation to each other. The pattern system guides software developers, so that they can help users understand how their information system uses personal data. To achieve this, we rewrite our patterns to meet specific requirements. In particular, we add implementability and interconnection, while improving consistency and organization. This results in a system of patterns for informing users.
《通用数据保护条例》规定了欧盟的数据保护。这包括通过设计来保护数据,并具有保留隐私的默认值。该立法自2018年5月起生效,违反者将面临严重后果。不过,履行其数据保护职责并非易事。实现这一点的一种方法是使用隐私设计模式。我们最近开始将这些模式整合为有用的集合。本文对其中的一个子集进行了改进,构建了一个模式系统。这有助于确定适合上下文的模式。它更好地说明了它们的应用和相互关系。模式系统指导软件开发人员,使他们能够帮助用户了解他们的信息系统如何使用个人数据。为了实现这一点,我们重写我们的模式以满足特定的需求。特别是,我们增加了可实现性和互连性,同时改进了一致性和组织性。这就形成了一个通知用户的模式系统。
{"title":"A System of Privacy Patterns for Informing Users: Creating a Pattern System","authors":"Michael Colesky, Julio C. Caiza","doi":"10.1145/3282308.3282325","DOIUrl":"https://doi.org/10.1145/3282308.3282325","url":null,"abstract":"The General Data Protection Regulation mandates data protection in the European Union. This includes data protection by design and having privacy-preserving defaults. This legislation has been in force since May 2018, promising severe consequences for violation. Fulfilling its mandate for data protection is not trivial, though. One approach for realizing this is the use of privacy design patterns. We have recently started consolidating such patterns into useful collections. In this paper we improve a subset of these, constructing a pattern system. This helps to identify contextually appropriate patterns. It better illustrates their application and relation to each other. The pattern system guides software developers, so that they can help users understand how their information system uses personal data. To achieve this, we rewrite our patterns to meet specific requirements. In particular, we add implementability and interconnection, while improving consistency and organization. This results in a system of patterns for informing users.","PeriodicalId":136534,"journal":{"name":"Proceedings of the 23rd European Conference on Pattern Languages of Programs","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125957362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Applying Idioms for Synchronization Mechanisms: Synchronizing communication components for an N Body Simulation 同步机制的习惯用法:为N体仿真同步通信组件
Pub Date : 2018-07-04 DOI: 10.1145/3282308.3282334
J. Ortega-Arjona
The Idioms for Synchronization Mechanisms is a collection of patterns related with the implementation of synchronization mechanisms for the communication components of parallel software systems. The selection of these idioms take as input information (a) the design pattern of the communication components to synchronize, (b) the memory organization of the parallel hardware platform, and (c) the type of communication required. In this paper, it is presented the application of the Idioms for Synchronization Mechanisms to synchronize the communication components for an N Body Simulation, within the Detailed Design stage of the Pattern-based Parallel Software Design Method. In two previous papers, this method has been used in two previous stages: (a) in the Coordination Design stage, selecting the Manager-Workers architectural patterns as the coordination, which depends on the N- Body problem; and (b) in the Communication Design stage, selecting the Remote Rendezvous design pattern as communication, which depends on the memory organization of the parallel hardware platform, and on the architectural pattern previously selected.
同步机制习语是一组与并行软件系统通信组件同步机制实现相关的模式集合。这些习惯用法的选择以(a)通信组件同步的设计模式、(b)并行硬件平台的内存组织以及(c)所需的通信类型作为输入信息。本文介绍了在基于模式的并行软件设计方法的详细设计阶段,应用同步机制的习惯用法来同步N体仿真的通信组件。在之前的两篇论文中,该方法已经在两个阶段使用:(a)在协调设计阶段,选择Manager-Workers架构模式作为协调,这取决于N- Body问题;(b)在通信设计阶段,选择Remote Rendezvous设计模式作为通信,这取决于并行硬件平台的内存组织和先前选择的架构模式。
{"title":"Applying Idioms for Synchronization Mechanisms: Synchronizing communication components for an N Body Simulation","authors":"J. Ortega-Arjona","doi":"10.1145/3282308.3282334","DOIUrl":"https://doi.org/10.1145/3282308.3282334","url":null,"abstract":"The Idioms for Synchronization Mechanisms is a collection of patterns related with the implementation of synchronization mechanisms for the communication components of parallel software systems. The selection of these idioms take as input information (a) the design pattern of the communication components to synchronize, (b) the memory organization of the parallel hardware platform, and (c) the type of communication required. In this paper, it is presented the application of the Idioms for Synchronization Mechanisms to synchronize the communication components for an N Body Simulation, within the Detailed Design stage of the Pattern-based Parallel Software Design Method. In two previous papers, this method has been used in two previous stages: (a) in the Coordination Design stage, selecting the Manager-Workers architectural patterns as the coordination, which depends on the N- Body problem; and (b) in the Communication Design stage, selecting the Remote Rendezvous design pattern as communication, which depends on the memory organization of the parallel hardware platform, and on the architectural pattern previously selected.","PeriodicalId":136534,"journal":{"name":"Proceedings of the 23rd European Conference on Pattern Languages of Programs","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128200264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Security Pattern for Key-Value NoSQL Database Authorization 键值NoSQL数据库授权的安全模式
Pub Date : 2018-07-04 DOI: 10.1145/3282308.3282321
Julio Moreno, E. Fernández, E. Fernández-Medina, M. Serrano
Numerous authorization models have been proposed for relational databases. On the other hand, several NoSQL databases used in Big Data applications use a new model appropriate to their requirements for structure, speed, and large amount of data. This model protects each individual cell in key-value databases by labeling them with authorization rights following a Role-Based Access Control model or similar. We present here a pattern to describe this model as it exists in several Big Data systems.
已经为关系数据库提出了许多授权模型。另一方面,在大数据应用中使用的一些NoSQL数据库使用了一种适合其结构、速度和大数据量要求的新模型。该模型通过按照基于角色的访问控制模型或类似模型标记授权权限来保护键值数据库中的每个单元格。我们在这里提出一个模式来描述这个模型,因为它存在于几个大数据系统中。
{"title":"A Security Pattern for Key-Value NoSQL Database Authorization","authors":"Julio Moreno, E. Fernández, E. Fernández-Medina, M. Serrano","doi":"10.1145/3282308.3282321","DOIUrl":"https://doi.org/10.1145/3282308.3282321","url":null,"abstract":"Numerous authorization models have been proposed for relational databases. On the other hand, several NoSQL databases used in Big Data applications use a new model appropriate to their requirements for structure, speed, and large amount of data. This model protects each individual cell in key-value databases by labeling them with authorization rights following a Role-Based Access Control model or similar. We present here a pattern to describe this model as it exists in several Big Data systems.","PeriodicalId":136534,"journal":{"name":"Proceedings of the 23rd European Conference on Pattern Languages of Programs","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132897014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Applying Design Patterns for Communication Components: Communicating Parallel Layer components for the Fast Fourier Transform 通信组件的设计模式应用:用于快速傅立叶变换的通信并行层组件
Pub Date : 2018-07-04 DOI: 10.1145/3282308.3282336
J. Ortega-Arjona
The Design Patterns for Communication Components is a collection of patterns related with a method for developing the communication sub-systems of parallel software systems. The application of these design patterns take as input information (a) the architectural pattern of the overall parallel software system, (b) the memory organization of the parallel hardware platform, and (c) the type of synchronization required. In this paper, it is presented the application of the Design Patterns for Communication Components to communicate components for a parallel implementation of the the Fast Fourier Transform, within the Communication Design stage of the Pattern-based Parallel Software Design Method. In a previous paper, this method has been used in a previous stage, in the Coordination Design stage, selecting the Parallel Layers architectural patterns as the main coordination, which depends on the features of order in data and algorithm of the Fast Fourier Transform.
通信组件的设计模式是与开发并行软件系统的通信子系统的方法相关的模式集合。这些设计模式的应用将以下信息作为输入:(a)整个并行软件系统的架构模式,(b)并行硬件平台的内存组织,以及(c)所需的同步类型。本文介绍了在基于模式的并行软件设计方法的通信设计阶段,应用通信组件设计模式来通信组件,以实现快速傅里叶变换的并行实现。在之前的文章中,该方法已经在前一阶段,即协调设计阶段使用,选择并行层架构模式作为主要的协调,这取决于数据的顺序特征和快速傅里叶变换的算法。
{"title":"Applying Design Patterns for Communication Components: Communicating Parallel Layer components for the Fast Fourier Transform","authors":"J. Ortega-Arjona","doi":"10.1145/3282308.3282336","DOIUrl":"https://doi.org/10.1145/3282308.3282336","url":null,"abstract":"The Design Patterns for Communication Components is a collection of patterns related with a method for developing the communication sub-systems of parallel software systems. The application of these design patterns take as input information (a) the architectural pattern of the overall parallel software system, (b) the memory organization of the parallel hardware platform, and (c) the type of synchronization required. In this paper, it is presented the application of the Design Patterns for Communication Components to communicate components for a parallel implementation of the the Fast Fourier Transform, within the Communication Design stage of the Pattern-based Parallel Software Design Method. In a previous paper, this method has been used in a previous stage, in the Coordination Design stage, selecting the Parallel Layers architectural patterns as the main coordination, which depends on the features of order in data and algorithm of the Fast Fourier Transform.","PeriodicalId":136534,"journal":{"name":"Proceedings of the 23rd European Conference on Pattern Languages of Programs","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125032201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Patterns for Implementing Uncertainty Propagation 实现不确定性传播的模式
Pub Date : 2018-07-04 DOI: 10.1145/3282308.3282323
Michael Krisper, Johannes Iber, Jürgen Dobaj, Christian Kreiner
In this paper, the design patterns Uncertain Number and Propagation Strategy are presented. They are useful for storing uncertainties of values and propagating them throughout calculations in an application. Uncertain Number represents a numerical value and its respective uncertainty. Propagation Strategy represents the propagation method, to correctly propagate the uncertainty throughout an application. This is done according to the Law of Propagation of Uncertainty as defined in the Guide to Expression of Uncertainty in Measurements. This paper addresses software architects, designers and developers having to work with uncertain data e.g. coming from sensors or other measurements.
本文给出了设计模式、不确定数和传播策略。它们用于存储值的不确定性,并在应用程序的整个计算过程中传播它们。不确定数表示数值及其各自的不确定度。传播策略表示在整个应用程序中正确传播不确定性的传播方法。这是根据测量不确定度表达指南中定义的不确定度传播定律来完成的。本文针对软件架构师、设计人员和开发人员必须处理不确定数据,例如来自传感器或其他测量的数据。
{"title":"Patterns for Implementing Uncertainty Propagation","authors":"Michael Krisper, Johannes Iber, Jürgen Dobaj, Christian Kreiner","doi":"10.1145/3282308.3282323","DOIUrl":"https://doi.org/10.1145/3282308.3282323","url":null,"abstract":"In this paper, the design patterns Uncertain Number and Propagation Strategy are presented. They are useful for storing uncertainties of values and propagating them throughout calculations in an application. Uncertain Number represents a numerical value and its respective uncertainty. Propagation Strategy represents the propagation method, to correctly propagate the uncertainty throughout an application. This is done according to the Law of Propagation of Uncertainty as defined in the Guide to Expression of Uncertainty in Measurements. This paper addresses software architects, designers and developers having to work with uncertain data e.g. coming from sensors or other measurements.","PeriodicalId":136534,"journal":{"name":"Proceedings of the 23rd European Conference on Pattern Languages of Programs","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126354214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 23rd European Conference on Pattern Languages of Programs
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1