In distributedapplications, multiple objects are cooperated to achieve some objectives. The objects may suffer from kinds of faults. If some object o is fatty, o is rolled back to the checkpoint and objects which hav...
详细信息
ISBN:
(纸本)0818680474
In distributedapplications, multiple objects are cooperated to achieve some objectives. The objects may suffer from kinds of faults. If some object o is fatty, o is rolled back to the checkpoint and objects which have received messages from o are also required to be rolled back. In this paper, we define influential messages whose receivers are required to be rolled back if the senders are rolled back in the object-based computation model. By using the influential messages, an object-based (O) checkpoints are defined to denote semantically consistent global states of the system while inconsistent with the traditional message-based definition. We show how many checkpoints can be reduced by taking only the O-checkpoints.
Deadline handling is a fundamental part of real-time computing but has been practiced in ad hoc forms for decades. A general framework for systematic deadline handling in real-time distributed computer systems is prop...
详细信息
We consider a cascade model of N different processors performing a distributed parallel simulation. The main goal of the study is to show that the long-time dynamics of the system have a cluster behaviour. To attack t...
详细信息
ISBN:
(纸本)3540294988
We consider a cascade model of N different processors performing a distributed parallel simulation. The main goal of the study is to show that the long-time dynamics of the system have a cluster behaviour. To attack this problem we combine two methods: stochastic comparison and Foster-Lyapunov functions.
Work in progress towards modeling shape statistics of multi-object complexes is presented. Constraints defined by the set of objects such as a compact representation of object shape relationships and correlation of sh...
详细信息
ISBN:
(纸本)9780780395763
Work in progress towards modeling shape statistics of multi-object complexes is presented. Constraints defined by the set of objects such as a compact representation of object shape relationships and correlation of shape changes might have advantages for automatic segmentation and group discrimination. We present a concept for statistical multi-object modeling and discuss the major challenges which are a reduction to a small set of descriptive features, calculation of mean and variability via curved statistics, the choice of aligning sets of multiple objects, and the problem of describing the statistics of object pose and object shape and their interrelationship. Shape modeling and analysis is demonstrated with an application to a longitudinal autism study, with shape modeling of sets of 10 subcortical structures in a population of 20 subjects.
Object-oriented frameworks have become a key element in the design of distribution systems. They make the existence of the physical and operating system level resources transparent to the designer and provide the abst...
详细信息
distributed application programmers rely on middleware such as CORBA in order to handle the complexity that arises from the distributed and heterogeneous nature of the underlying computing platform. CORBA, in particul...
详细信息
A distributed control system. controlling the motion of a mechanical system, consists of several intelligent modules, one for each degree of freedom. Each module contains one actuator, one or more sensors and a microe...
详细信息
A distributed control system. controlling the motion of a mechanical system, consists of several intelligent modules, one for each degree of freedom. Each module contains one actuator, one or more sensors and a microelectronics subsystem. The modules together execute the control engineering solution of the actual control theory problem. Typical motion control applications which could benefit from distributed control include industrial robots, vehicles, and tunnel drilling machines. By way of introduction the characteristics of motion control applications are described. Reasons for and trends towards distributing intelligence to actuators and sensors are presented. Due to harsh environments the microelectronic subsystems must be compact and robust. Technical trends facilitating integration of mechanics and microelectronics are described. The following issues are identified as critical when designing distributed control systems: Specification and verification methods or real-time systems;the view of time;consistency constraints;communication system architectures;predictable behaviour and debugging. A state of the art survey is given. Finally the question of how to map the control engineering solution of the actual control theory problem to the intelligent actuators is treated, i.e. choice of suitable allocation strategies, scheduling algorithms and communication system architectures. Fundamental static allocation strategies include master slave application systems (ranging from distributed low level I/O handling to distributed servo functions) and fully distributed application systems (ranging from distributed servo and superior control functions to a fully replicated global servo function).
distributed Key Generation (DKG) protocols are indispensable in the design of any cryptosystem used in communication networks. DKG is needed to generate public/private keys for signatures or more generally for encrypt...
详细信息
ISBN:
(纸本)0769522424
distributed Key Generation (DKG) protocols are indispensable in the design of any cryptosystem used in communication networks. DKG is needed to generate public/private keys for signatures or more generally for encrypting/decrypting messages. One such DKG (due to Pedersen) has recently been generalized to a provably secure protocol by Gennaro et al. We propose and implement an efficient algorithm to compute the (group generator) parameter g required in the DKG protocol. We also implement the DKG due to Gennaro et al. on a network of computers using secure sockets. We run tests which show the efficiency of our implementation.
Interceptors are an emerging middleware technology enabling the addition of specific network-oriented capabilities to distributedapplications. By exploiting interceptors, developers can register code within intercept...
详细信息
Interceptors are an emerging middleware technology enabling the addition of specific network-oriented capabilities to distributedapplications. By exploiting interceptors, developers can register code within interception points, extending the basic middleware mechanisms with specific functionality, e.g. authentication, flow control, caching, etc. Notably, these extensions can be achieved without modifying either the application or the middleware code. In this paper we report the results of our experiences with CORBA request portable interceptors. In particular, we point out (i) the basic mechanisms implementable by these interceptors, i.e. request redirection and piggybacking and (ii) we analyze their limitations. We then propose a proxy-based technique to overcome the interceptors' limitations. Successively, we present a performance analysis carried out on three Java-CORBA platforms currently implementing the portable interceptors specification. Finally, we conclude our work with a case study in which portable interceptors are used to implement the fault-tolerant CORBA client invocation semantic without impacting on the client application code and on the CORBA ORB. We also release fragments of Java code for implementing the described techniques. Copyright (C) 2003 John Wiley Sons, Ltd.
Effective use of computational grids requires up-to-date information about widely-distributed resources within it - a challenging problem given the scale of the grid, and the continously changing state of the resource...
详细信息
ISBN:
(纸本)0769522424
Effective use of computational grids requires up-to-date information about widely-distributed resources within it - a challenging problem given the scale of the grid, and the continously changing state of the resources. We propose non-uniform information dissemination protocols to efficiently propagate information to distributed repositories, without requiring flooding or centralized approaches. Capitalizing on the observation that grid resources are of more interest to nearby users, we disseminate resource information with a frequency and resolution inversely proportional to the distance from the resource. Results indicate a significant reduction in the overhead compared to uniform dissemination to all repositories.
暂无评论