首页 > 最新文献

29th Annual International Computer Software and Applications Conference (COMPSAC'05)最新文献

英文 中文
New method for dispatching waiting logical processors in virtual machine system 虚拟机系统中调度等待逻辑处理器的新方法
H. Umeno, M. Kiyama, T. Fukunaga, Takashige Kubo
A virtual machine system can run multiple conventional operating systems (OSs) in a single real host computer. A virtual machine is a logical computer with almost the same architecture as the host, and may contain several logical processors. A hypervisor is a control program to control this virtual machine system. Traditionally, the hypervisor has to receive an I/O interrupt pending for a waiting logical processor, and to simulate the I/O interrupt, consequently incurring the simulation overhead of the I/O interrupt. To avoid this overhead we present a new method which introduces a new self-wait state different from the conventional wait state, presents a new instruction for the hypervisor to detect the I/O interrupts pending for the logical processors in the self-wait state, and dispatches those logical processors on the detection ahead of the ready queue. This new method has eliminated the simulation overhead of those I/O interrupts, and enhanced the system performance to the near native.
虚拟机系统可以在一台真实主机上运行多个常规操作系统。虚拟机是一台逻辑计算机,其体系结构与主机几乎相同,并且可以包含多个逻辑处理器。管理程序是控制虚拟机系统的控制程序。传统上,管理程序必须接收等待逻辑处理器的I/O中断,并模拟I/O中断,从而导致I/O中断的模拟开销。为了避免这种开销,我们提出了一种新方法,该方法引入了一种不同于传统等待状态的新的自等待状态,为管理程序提供了一条新指令,用于检测处于自等待状态的逻辑处理器的I/O中断,并在检测到的逻辑处理器之前将这些逻辑处理器分派到就绪队列。该方法消除了I/O中断的仿真开销,将系统性能提高到接近本机的水平。
{"title":"New method for dispatching waiting logical processors in virtual machine system","authors":"H. Umeno, M. Kiyama, T. Fukunaga, Takashige Kubo","doi":"10.1109/COMPSAC.2005.112","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.112","url":null,"abstract":"A virtual machine system can run multiple conventional operating systems (OSs) in a single real host computer. A virtual machine is a logical computer with almost the same architecture as the host, and may contain several logical processors. A hypervisor is a control program to control this virtual machine system. Traditionally, the hypervisor has to receive an I/O interrupt pending for a waiting logical processor, and to simulate the I/O interrupt, consequently incurring the simulation overhead of the I/O interrupt. To avoid this overhead we present a new method which introduces a new self-wait state different from the conventional wait state, presents a new instruction for the hypervisor to detect the I/O interrupts pending for the logical processors in the self-wait state, and dispatches those logical processors on the detection ahead of the ready queue. This new method has eliminated the simulation overhead of those I/O interrupts, and enhanced the system performance to the near native.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116046007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Nearest neighbor queries on extensible grid files using dimensionality reduction 使用降维对可扩展网格文件进行最近邻查询
Ryosuke Miyoshi, T. Miura, I. Shioya
Nowadays there have several applications on spatial information which manage high dimensional data. Whenever we examine nearest neighbor search in these applications by multi-dimensional indexing structure, very often we must access all pages if dimensionality exceeds about 10. This is known as curse of dimensionality that says any indexing structure is outperformed by simple linear search. In this investigation, for high dimensional data, we propose a sophisticated access mechanism based on extensible grid files with dimensionality reduction (DR) technique. We analyze error estimation caused by DR and recover the search space on original dimension. We examine nearest neighbor search and discuss some empirical results to show the usefulness of our approach.
目前,在空间信息方面已经出现了几种对高维数据进行管理的应用。当我们通过多维索引结构检查这些应用程序中的最近邻搜索时,如果维度超过10,我们通常必须访问所有页面。这就是所谓的维数诅咒,即任何索引结构的性能都优于简单的线性搜索。本研究针对高维数据,提出了一种基于可扩展网格文件和降维(DR)技术的复杂访问机制。我们分析了DR引起的误差估计,并在原始维度上恢复搜索空间。我们研究了最近邻搜索,并讨论了一些实证结果,以显示我们的方法的有效性。
{"title":"Nearest neighbor queries on extensible grid files using dimensionality reduction","authors":"Ryosuke Miyoshi, T. Miura, I. Shioya","doi":"10.1109/COMPSAC.2005.111","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.111","url":null,"abstract":"Nowadays there have several applications on spatial information which manage high dimensional data. Whenever we examine nearest neighbor search in these applications by multi-dimensional indexing structure, very often we must access all pages if dimensionality exceeds about 10. This is known as curse of dimensionality that says any indexing structure is outperformed by simple linear search. In this investigation, for high dimensional data, we propose a sophisticated access mechanism based on extensible grid files with dimensionality reduction (DR) technique. We analyze error estimation caused by DR and recover the search space on original dimension. We examine nearest neighbor search and discuss some empirical results to show the usefulness of our approach.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125257371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A formal approach to designing a class-subclass structure using a partial-order on the functions 一种使用函数的偏序来设计类-子类结构的形式化方法
S. Kundu, N. Gwee
We present a formal method for designing the class structure based on a partial order on the functions, which is derived from the use-relationship between the functions and the various data items. We can regard this method as an initial step in building a theory of refactoring and design-patterns. Our method can identify the functions which should be factored into subfunctions, including their desired signatures and a reduced use-complexity, in order to simplify the class-subclass structure. A similar remark holds for the decomposition or consolidation of data items as well. We illustrate our method with several examples.
基于函数与各种数据项之间的使用关系,提出了一种基于函数偏序的类结构设计的形式化方法。我们可以将此方法视为构建重构和设计模式理论的第一步。我们的方法可以识别应该分解成子函数的函数,包括它们所需的签名和降低的使用复杂性,以简化类-子类结构。对于数据项的分解或合并也有类似的注释。我们用几个例子来说明我们的方法。
{"title":"A formal approach to designing a class-subclass structure using a partial-order on the functions","authors":"S. Kundu, N. Gwee","doi":"10.1109/COMPSAC.2005.23","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.23","url":null,"abstract":"We present a formal method for designing the class structure based on a partial order on the functions, which is derived from the use-relationship between the functions and the various data items. We can regard this method as an initial step in building a theory of refactoring and design-patterns. Our method can identify the functions which should be factored into subfunctions, including their desired signatures and a reduced use-complexity, in order to simplify the class-subclass structure. A similar remark holds for the decomposition or consolidation of data items as well. We illustrate our method with several examples.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"62 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113962382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Scoped broadcast in dynamic peer-to-peer networks 动态点对点网络中的范围广播
Hung-Chang Hsiao, C. King
Scoped broadcast disseminates a message to all the nodes within a designated physical/logical region in an overlay network. It can be a basic building block for applications such as information search, data broadcasting, and overlay structure diagnostic. In this paper, we study scoped broadcast in peer-to-peer (P2P) overlay networks based on distributed hash tables (DHT). Since P2P networks have very dynamic behavior due to peer joining and departure, it is interesting to know how many peers can be reached with one scoped broadcast. This depends mainly on the cost we would like to pay for maintaining the geometric structure of the DHT-based overlay. The maintenance cost is affected primarily by the failure detection and failure recovery mechanisms. We evaluated the effects of maintenance overhead on scoped broadcast via extensive simulations. The evaluation shows that it is important to exploit fresh nodes as the neighbors of a node. In addition, cooperative failure discovery and recovery can efficiently and effectively disseminate scoped broadcast messages.
范围广播将消息传播到覆盖网络中指定物理/逻辑区域内的所有节点。它可以作为信息搜索、数据广播和覆盖结构诊断等应用程序的基本构建块。本文研究了基于分布式哈希表(DHT)的P2P覆盖网络中的范围广播。由于P2P网络由于节点的加入和离开而具有非常动态的行为,因此了解一次范围广播可以到达多少个节点是很有趣的。这主要取决于我们想要为维护基于dht的覆盖层的几何结构而支付的成本。维护成本主要受故障检测和故障恢复机制的影响。我们通过广泛的模拟评估了维护开销对范围广播的影响。结果表明,利用新节点作为节点的邻居是非常重要的。此外,协同故障发现和恢复可以高效有效地传播有范围的广播消息。
{"title":"Scoped broadcast in dynamic peer-to-peer networks","authors":"Hung-Chang Hsiao, C. King","doi":"10.1109/COMPSAC.2005.134","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.134","url":null,"abstract":"Scoped broadcast disseminates a message to all the nodes within a designated physical/logical region in an overlay network. It can be a basic building block for applications such as information search, data broadcasting, and overlay structure diagnostic. In this paper, we study scoped broadcast in peer-to-peer (P2P) overlay networks based on distributed hash tables (DHT). Since P2P networks have very dynamic behavior due to peer joining and departure, it is interesting to know how many peers can be reached with one scoped broadcast. This depends mainly on the cost we would like to pay for maintaining the geometric structure of the DHT-based overlay. The maintenance cost is affected primarily by the failure detection and failure recovery mechanisms. We evaluated the effects of maintenance overhead on scoped broadcast via extensive simulations. The evaluation shows that it is important to exploit fresh nodes as the neighbors of a node. In addition, cooperative failure discovery and recovery can efficiently and effectively disseminate scoped broadcast messages.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127747335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Extended symbolic transition graphs with assignment 带赋值的扩展符号转换图
Weijia Deng, Huimin Lin
An extension of symbolic transition graphs with assignment is proposed which combines the advantages of both the assignment-before-action and the assignment-after-action approaches: like the former it allows a simple set of rules to be designed for generating finite symbolic graphs from regular value-passing process descriptions; like the later it avoids creating multiple copies in the graph for a recursive process definition. Experiences show that, in most cases, considerable reductions in verification time and space can be achieved using the new approach.
提出了一种具有赋值的符号转移图的扩展,它结合了行动前赋值和行动后赋值方法的优点:与前者一样,它允许设计一组简单的规则来从规则的值传递过程描述生成有限的符号图;与后者一样,它避免在图中为递归过程定义创建多个副本。经验表明,在大多数情况下,使用新方法可以大大减少核查时间和空间。
{"title":"Extended symbolic transition graphs with assignment","authors":"Weijia Deng, Huimin Lin","doi":"10.1109/COMPSAC.2005.76","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.76","url":null,"abstract":"An extension of symbolic transition graphs with assignment is proposed which combines the advantages of both the assignment-before-action and the assignment-after-action approaches: like the former it allows a simple set of rules to be designed for generating finite symbolic graphs from regular value-passing process descriptions; like the later it avoids creating multiple copies in the graph for a recursive process definition. Experiences show that, in most cases, considerable reductions in verification time and space can be achieved using the new approach.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133980605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The vital few versus the trivial many: examining the Pareto principle for software 重要的少数vs微不足道的许多:检查软件的帕累托原则
Mechelle Gittens, Y. Kim, David Godwin
This paper discusses the Pareto principle as it relates to the distribution of software defects in code. We look at evidence in the context of both the software test team, and users of the software. We also investigate two related principles. The first principle is that the distribution of defects in code relates to the distribution of complexity in code. The second principle is that how we define complexity relates to the distribution of defects in code. We present this work as an empirical study of three general hypotheses investigated for large production-level software; we show that the essence of the principle holds, while precise percentages do not.
本文讨论了帕累托原则,因为它与代码中软件缺陷的分布有关。我们在软件测试团队和软件用户的上下文中查看证据。我们还研究了两个相关的原则。第一个原则是代码中缺陷的分布与代码中复杂性的分布相关。第二个原则是我们如何定义复杂性与代码中缺陷的分布有关。我们将这项工作作为对大型生产级软件调查的三个一般假设的实证研究;我们表明,原则的本质是成立的,而精确的百分比则不是。
{"title":"The vital few versus the trivial many: examining the Pareto principle for software","authors":"Mechelle Gittens, Y. Kim, David Godwin","doi":"10.1109/COMPSAC.2005.153","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.153","url":null,"abstract":"This paper discusses the Pareto principle as it relates to the distribution of software defects in code. We look at evidence in the context of both the software test team, and users of the software. We also investigate two related principles. The first principle is that the distribution of defects in code relates to the distribution of complexity in code. The second principle is that how we define complexity relates to the distribution of defects in code. We present this work as an empirical study of three general hypotheses investigated for large production-level software; we show that the essence of the principle holds, while precise percentages do not.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134382180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Novelty detection for a neural network-based online adaptive system 基于神经网络的在线自适应系统新颖性检测
Yan Liu, B. Cukic, Edgar Fuller, S. Gururajan, S. Yerramalla
The appeal of including biologically inspired soft computing systems such as neural networks in complex computational systems is in their ability to cope with a changing environment. Unfortunately, continual changes induce uncertainty that limits the applicability of conventional verification and validation (V&V) techniques to assure the reliable performance of such systems. At the system input layer, novel data may cause unstable learning behavior, which may contribute to system failures. Thus, the changes at the input layer must be observed, diagnosed, accommodated and well understood prior to system deployment. Moreover, at the system output layer, the uncertainties/novelties existing in the neural network predictions also need to be well analyzed and detected during system operation. Our research tackles the novelty detection problem at both layers using two different methods. We use a statistical learning tool, support vector data description (SVDD), as a one-class classifier to examine the data entering the adaptive component and detect unforeseen patterns that may cause abrupt system functionality changes. At the output layer, we define a reliability-like measure, the validity index. The validity index reflects the degree of novelty associated with each output and thus can be used to perform system validity checks. Simulations demonstrate that both techniques effectively detect unusual events and provide validation inferences in a near-real time manner.
在复杂的计算系统中加入受生物学启发的软计算系统(如神经网络)的吸引力在于它们能够应对不断变化的环境。不幸的是,持续的变化会导致不确定性,从而限制了常规验证和确认(V&V)技术的适用性,以确保此类系统的可靠性能。在系统输入层,新的数据可能导致不稳定的学习行为,这可能导致系统故障。因此,必须在系统部署之前对输入层的变化进行观察、诊断、适应和充分理解。此外,在系统输出层,也需要在系统运行过程中很好地分析和检测神经网络预测中存在的不确定性/新颖性。我们的研究使用两种不同的方法解决了这两层的新颖性检测问题。我们使用统计学习工具,支持向量数据描述(SVDD)作为单类分类器来检查进入自适应组件的数据,并检测可能导致系统功能突然变化的不可预见的模式。在输出层,我们定义了一个类似于信度的度量,即有效性指标。有效性指标反映了与每个输出相关联的新颖性程度,因此可用于执行系统有效性检查。仿真结果表明,两种技术都能有效地检测异常事件,并以接近实时的方式提供验证推断。
{"title":"Novelty detection for a neural network-based online adaptive system","authors":"Yan Liu, B. Cukic, Edgar Fuller, S. Gururajan, S. Yerramalla","doi":"10.1109/COMPSAC.2005.113","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.113","url":null,"abstract":"The appeal of including biologically inspired soft computing systems such as neural networks in complex computational systems is in their ability to cope with a changing environment. Unfortunately, continual changes induce uncertainty that limits the applicability of conventional verification and validation (V&V) techniques to assure the reliable performance of such systems. At the system input layer, novel data may cause unstable learning behavior, which may contribute to system failures. Thus, the changes at the input layer must be observed, diagnosed, accommodated and well understood prior to system deployment. Moreover, at the system output layer, the uncertainties/novelties existing in the neural network predictions also need to be well analyzed and detected during system operation. Our research tackles the novelty detection problem at both layers using two different methods. We use a statistical learning tool, support vector data description (SVDD), as a one-class classifier to examine the data entering the adaptive component and detect unforeseen patterns that may cause abrupt system functionality changes. At the output layer, we define a reliability-like measure, the validity index. The validity index reflects the degree of novelty associated with each output and thus can be used to perform system validity checks. Simulations demonstrate that both techniques effectively detect unusual events and provide validation inferences in a near-real time manner.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124752335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Software Test Selection Patterns and Elusive Bugs 软件测试选择模式和难以捉摸的bug
W. Howden
Traditional white and black box testing methods are effective in revealing many kinds of defects, but the more elusive bugs slip past them. Model-based testing incorporates additional application concepts in the selection of tests, which may provide more refined bug detection, but does not go far enough. Test selection patterns identify defect-oriented contexts in a program. They also identify suggested tests for risks associated with a specified context. A context and its risks is a kind of conceptual trap designed to corner a bug. The suggested tests will find the bug if it has been caught in the trap.
传统的白盒和黑盒测试方法在揭示多种缺陷方面是有效的,但是更难以捉摸的bug会溜过它们。基于模型的测试在测试的选择中包含了额外的应用程序概念,这可能提供更精细的错误检测,但还远远不够。测试选择模式识别程序中面向缺陷的上下文。它们还确定与特定上下文相关的风险的建议测试。上下文及其风险是一种概念陷阱,旨在将错误置于角落。建议的测试将发现在陷阱中捕获的错误。
{"title":"Software Test Selection Patterns and Elusive Bugs","authors":"W. Howden","doi":"10.1109/COMPSAC.2005.143","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.143","url":null,"abstract":"Traditional white and black box testing methods are effective in revealing many kinds of defects, but the more elusive bugs slip past them. Model-based testing incorporates additional application concepts in the selection of tests, which may provide more refined bug detection, but does not go far enough. Test selection patterns identify defect-oriented contexts in a program. They also identify suggested tests for risks associated with a specified context. A context and its risks is a kind of conceptual trap designed to corner a bug. The suggested tests will find the bug if it has been caught in the trap.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124832206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Exception handling in coordination-based mobile environments 基于协调的移动环境中的异常处理
A. Iliasov, A. Romanovsky
Mobile agent systems have many attractive features including asynchrony, openness, dynamicity and anonymity, which makes them indispensable in designing complex modern applications that involve moving devices, human participants and software. To be comprehensive this list should include fault tolerance, yet as our analysis shows, this property is, unfortunately, often overlooked by middleware designers. A few existing solutions for fault tolerant mobile agents are developed mainly for tolerating hardware faults without providing any general support for application-specific recovery. In this paper we describe a novel exception handling model that allows application-specific recovery in coordination-based systems consisting of mobile agents. The proposed mechanism is general enough to be used in both loosely-and tightly-coupled communication models. The general ideas behind the mechanism are applied in the context of the Lime middleware.
移动代理系统具有异步性、开放性、动态性和匿名性等特点,这使得它在设计涉及移动设备、人类参与者和软件的复杂现代应用中不可或缺。为了全面起见,这个列表应该包括容错性,但正如我们的分析所示,不幸的是,中间件设计人员经常忽略这个属性。现有的一些容错移动代理解决方案主要是为了容错硬件故障而开发的,而没有为特定于应用程序的恢复提供任何通用支持。在本文中,我们描述了一种新的异常处理模型,该模型允许在由移动代理组成的基于协调的系统中进行特定于应用程序的恢复。所提出的机制足够通用,可用于松耦合和紧耦合的通信模型。该机制背后的一般思想应用于Lime中间件的上下文中。
{"title":"Exception handling in coordination-based mobile environments","authors":"A. Iliasov, A. Romanovsky","doi":"10.1109/COMPSAC.2005.73","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.73","url":null,"abstract":"Mobile agent systems have many attractive features including asynchrony, openness, dynamicity and anonymity, which makes them indispensable in designing complex modern applications that involve moving devices, human participants and software. To be comprehensive this list should include fault tolerance, yet as our analysis shows, this property is, unfortunately, often overlooked by middleware designers. A few existing solutions for fault tolerant mobile agents are developed mainly for tolerating hardware faults without providing any general support for application-specific recovery. In this paper we describe a novel exception handling model that allows application-specific recovery in coordination-based systems consisting of mobile agents. The proposed mechanism is general enough to be used in both loosely-and tightly-coupled communication models. The general ideas behind the mechanism are applied in the context of the Lime middleware.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125497995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Self-configuring communication middleware model for multiple network interfaces 多网络接口自配置通信中间件模型
N. Mohamed
Communication middleware such as MuniCluster provides high-level communication mechanisms for networked applications through hiding the low-level communication details from the applications. The MuniCluster model provides mechanisms to enhance the network performance properties through message separations and parallel transfer. However, the configurations of such its services require various measurements and setups to efficiently utilize the availability of the multiple network interfaces. In this paper we introduce and evaluate a self-configuring model that allows applications to transparently utilize the existence of multiple network interfaces and networks. Here we present enhancements to the MuniCluster model by adding the self-configuration mechanism. Using network resource discovery and deciding on how to efficiently utilize the multiple networks, the model enhances overall communications performance. The proposed techniques deal with the heterogeneity of interfaces and networks to enhance communication performance transparent form the applications.
通信中间件(如MuniCluster)通过向应用程序隐藏低级通信细节,为网络应用程序提供高级通信机制。MuniCluster模型提供了通过消息分离和并行传输来增强网络性能的机制。然而,这种服务的配置需要各种测量和设置,以有效地利用多个网络接口的可用性。在本文中,我们介绍并评估了一个自配置模型,该模型允许应用程序透明地利用存在的多个网络接口和网络。这里我们通过添加自配置机制来增强MuniCluster模型。该模型利用网络资源发现和决定如何有效利用多个网络,提高了整体通信性能。所提出的技术处理接口和网络的异构性,以提高应用程序的透明性。
{"title":"Self-configuring communication middleware model for multiple network interfaces","authors":"N. Mohamed","doi":"10.1109/COMPSAC.2005.138","DOIUrl":"https://doi.org/10.1109/COMPSAC.2005.138","url":null,"abstract":"Communication middleware such as MuniCluster provides high-level communication mechanisms for networked applications through hiding the low-level communication details from the applications. The MuniCluster model provides mechanisms to enhance the network performance properties through message separations and parallel transfer. However, the configurations of such its services require various measurements and setups to efficiently utilize the availability of the multiple network interfaces. In this paper we introduce and evaluate a self-configuring model that allows applications to transparently utilize the existence of multiple network interfaces and networks. Here we present enhancements to the MuniCluster model by adding the self-configuration mechanism. Using network resource discovery and deciding on how to efficiently utilize the multiple networks, the model enhances overall communications performance. The proposed techniques deal with the heterogeneity of interfaces and networks to enhance communication performance transparent form the applications.","PeriodicalId":419267,"journal":{"name":"29th Annual International Computer Software and Applications Conference (COMPSAC'05)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116166844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
29th Annual International Computer Software and Applications Conference (COMPSAC'05)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1