the proceedings contain 82 papers. the topics discussed include: a new list scheduling method based on structural properties of task graphs;network based genetic algorithm;a memory management architecture for a mobile...
ISBN:
(纸本)0769505716
the proceedings contain 82 papers. the topics discussed include: a new list scheduling method based on structural properties of task graphs;network based genetic algorithm;a memory management architecture for a mobile computing environment;domination in bounded interval tolerance graphs;a constant queue partial permutation routing algorithm for cube-connected-cycles multicomputer systems;packet loss detection scheme for retransmission-based real-time data transfer;a totally ordered and secure multicast protocol for distributed virtual environment;access control model in object-oriented systems;concurrent exception handling in a distributed object-oriented computing environment;and a generalized approach for transferring data-types with arbitrary communication libraries.
Iii a distributed object-oriented computing environment, many exceptions would occur because many objects nln concurrently on several computers connected by a network. therefore, exceptions in distributed applications...
ISBN:
(纸本)0769505716
Iii a distributed object-oriented computing environment, many exceptions would occur because many objects nln concurrently on several computers connected by a network. therefore, exceptions in distributed applications will be more complex than those in ordinary (not distributed) applications. In this paper, we introduce an exception handling framework into our distributed object-oriented computing environment (DOOCE). In particular, we focus on handling the multiple exceptions which are propagated from concurrent active objects in our system. the exception handling in DOOCE provides two models, termination model and resumption model and can handle the occurring multiple exceptions. Programmers have the flexibility of either handling all exceptions individually or grouping all exceptions together and handling them as a single. Furthermore, we propose a "notification message" as an approach to perform an exception occurred during the parallel computation.
In this paper we proposed a heuristic-scheduling algorithm, called Competence Based method (CBM), to dynamically distribute workload for task allocation problem in a Web/Java-based computing environment. CBM is design...
详细信息
ISBN:
(纸本)0769505686
In this paper we proposed a heuristic-scheduling algorithm, called Competence Based method (CBM), to dynamically distribute workload for task allocation problem in a Web/Java-based computing environment. CBM is designed to meet four properties of Web computing: heterogeneity scalability centralization, and non-dedication host. CBM can be applied to both independent and dependent links scheduling problems. Compared,viththe competing algorithms the experimental results show that the proposed CBM performs faster in parallel time and is close to the optimal one.
the process of development of network computing towards the 21st century is explained. In order to make clear the key technologies required for the development of network computing, the logical model of the system is ...
ISBN:
(纸本)0769505686
the process of development of network computing towards the 21st century is explained. In order to make clear the key technologies required for the development of network computing, the logical model of the system is represented by a six-layer model and the key technologies corresponding to each layer are introduced. For the future development of the information society, the importance and the technologies concerning thin computers and the new platform constructed by the unification of the Internet and broadcasting are also discussed. Finally, the future trends of EC (Electronic Commerce) is envisioned.
In this paper, we examine the suitability of CORBA-based solutions for meeting application requirements in the field of distributedparallel programming. We outline concepts defined within CORBA which are helpful for ...
详细信息
ISBN:
(纸本)0769505686
In this paper, we examine the suitability of CORBA-based solutions for meeting application requirements in the field of distributedparallel programming. We outline concepts defined within CORBA which are helpful for the development of parallel applications, and we describe which programming techniques are at hand for this purpose. Subsequently, we present an Object Group Service which facilitates the development of CORBA-based, distributed and parallel software applications. Moreover, we introduce some basic ideas of how the Unified modeling Language (UML) can be used for modeling parallel applications.
this paper describes the New Strategic Information Model, an Information model that can accommodate sudden changes to the external environment of a Manufacturing enterprise. the model optimizes the whole enterprise ac...
ISBN:
(纸本)0769505716
this paper describes the New Strategic Information Model, an Information model that can accommodate sudden changes to the external environment of a Manufacturing enterprise. the model optimizes the whole enterprise activities from a strategic point of view. the new strategic information model consists of two (sub) models viz. Real-time Oriented Plane Information Model and Higher Dimensional Optimization Model. this paper focuses on the concept forming and features of the model. Application and the results of this model on an oil manufacturing and logistic enterprise is also discussed. And this system won the award of "Software Product of the Year '99" as the best computer system in Japan.
Withthe explosion of the Internet, we are evolving a worldwide network computing environment. At this point, the surged challenge is the next evolutionary technology for the Internet-oriented applications. A KODAMA (...
ISBN:
(纸本)0769505716
Withthe explosion of the Internet, we are evolving a worldwide network computing environment. At this point, the surged challenge is the next evolutionary technology for the Internet-oriented applications. A KODAMA (Kyushu university Open & distributed Autonomous Multi-Agent) system is deployed for this demand. KODAMA system can interconnect disparate and distributed agents together to solve some problem whose solution is typically beyond any singular agent's capabilities the key aspects of KODAMA agents are their autonomy, collaboration, flexibility: as well as stability. To obtain all these features, appropriate scheme of collaboration among agents is clearly critical. Our new approach focuses on both raising the level of abstraction at which agents cooperate with each other, and hiding the implementation derails of communications from agents.
In recent years, the rapid progress of hardware technology has enabled people to use mobile terminals away from the office or home withthe use of cellular phones. However there are not a little remaining issues which...
ISBN:
(纸本)0769505716
In recent years, the rapid progress of hardware technology has enabled people to use mobile terminals away from the office or home withthe use of cellular phones. However there are not a little remaining issues which are narrow bandwidth of wireless communications, the limited battery duration of mobile terminals, and others. this paper proposes a common memory management mechanism for mobile terminals and servers called Memory Management Architecture for Mobile computing Environment (MMM). MMM allocates a part of the memory of a mobile terminal and a part of the memory of a server as common memory and maintains the consistency of the common memory areas. We evaluate MMM using sample application program models against traditional memory. the result shows that MMM can reduce wireless traffic to maintain consistency, and that depending on the charge policy, a different prefetching scheme is efficient in minimizing communication cost.
Digital watermarking techniques can protect images intellectual property right efficiently. A new digital watermarking technique is presented in this paper, which can meet all the requirements of the image watermarkin...
详细信息
ISBN:
(纸本)0769505716
Digital watermarking techniques can protect images intellectual property right efficiently. A new digital watermarking technique is presented in this paper, which can meet all the requirements of the image watermarking. this methodology uses a quadtree to record the information of a protected host image and the related watermark. the quadtree can help the processing of watermark casting and watermark verification successfully. Besides that, from the experimental results, we show that the proposed scheme can robustly recover recognizable watermarks from variety of attacked host images.
the proceedings contain 51 papers. the special focus in this conference is on System Software and Algorithms. the topics include: Charon message-passing toolkit for scientific computations;dynamic slicing of concurren...
ISBN:
(纸本)3540414290
the proceedings contain 51 papers. the special focus in this conference is on System Software and Algorithms. the topics include: Charon message-passing toolkit for scientific computations;dynamic slicing of concurrent programs;an efficient run-time scheme for exploiting parallelism on multiprocessor systems;characterization and enhancement of static mapping heuristics for heterogeneous systems;optimal segmented scan and simulation of reconfigurable architectures on fixed connection networks;reducing false causality in causal message ordering;the working-set based adaptive protocol for software distributed shared memory;evaluation of the optimal causal message ordering algorithm;register efficient mergesorting;applying patterns to improve the performance of fault tolerant CORBA;design, implementation and performance evaluation of a high performance CORBA group membership protocol;analyzing the behavior of event dispatching systems through simulation;a domain-specific semi-automatic parallelization tool;practical experiences with java compilation;performance prediction and analysis of parallel out-of-core matrix factorization;integration of task and data parallelism;parallel and distributed computational fluid dynamics;parallel congruent regions on a mesh-connected computer;can scatter communication take advantage of multidestination message passing?;a first class design constraint for future architectures;embedded computing;instruction level distributed processing;speculative multithreaded processors;a fast tree-based barrier synchronization on switch-based irregular networks;meta-data management system for high-performance large-scale scientific data access and parallel sorting algorithms with sampling techniques on clusters with processors running at different speeds.
暂无评论