The following topics are dealt with: network protocols and security issues; gaming technologies for education; video streaming issues; handling of video, audio and 3D GIS data; models and methods for higher education;...
The following topics are dealt with: network protocols and security issues; gaming technologies for education; video streaming issues; handling of video, audio and 3D GIS data; models and methods for higher education; methodologies for teaching programming skills; technologies and architectures for interactive learning; use of on-line resources for interactive learning; methods and tools for engineering education; agent technology; e-learning environments and tools; use of knowledge management for education purposes; indexing and retrieval issues; issues in knowledge management; and human collaboration and communication issues.
Efforts to develop standards for learning technologies have developed along two distinct strands: standards for data and information models; and standards for components, interfaces and architectures. Standards relati...
详细信息
Efforts to develop standards for learning technologies have developed along two distinct strands: standards for data and information models; and standards for components, interfaces and architectures. Standards relating to architectural frameworks are less well developed, and responsibility for decisions concerning system architecture has been left largely in the hands of developers of proprietary software such as learning management systems. There is growing interest in the development of standards for open architectural frameworks, based on layering, a decomposition technique which is in widespread use in software development. As interoperability and reusability are key concerns for developers of e-learning systems, the choice of an appropriate layering strategy is crucial, and this paper illustrates how a reuse-based layering strategy (as opposed to a more typical responsibility-based strategy) might be applied to e-learning systems in order to enhance reuse and interoperability.
A collaboration project with SENGATEC has resulted in a platform for distributed real-time programming which consists of an open source virtual machine for distributed real-time control, named rt-dvml and a toolset em...
详细信息
ISBN:
(纸本)0780385136
A collaboration project with SENGATEC has resulted in a platform for distributed real-time programming which consists of an open source virtual machine for distributed real-time control, named rt-dvml and a toolset ems-drd, intended to help application engineers to configure and to develop distributed control applications. Driven by Internet technologies, new commercial requirements like concurrent manufacturing and progress in computer architecture, it is now evident that future automation systems will be based on cluster technology: up to several hundred embedded controllers with different architectures and performance will be needed for the goal of just-in-time and just-on-demand production. The search for the "right" architecture for a virtual machine (VM) which meets all real-time requirements, the different available features (memory sizes, performance) for the targets and the simplicity of the model are the driving forces throughout the development stage of our platform, not to mention the usability tests we have done in parallel to create a user-friendly platform. The rt-dvm turns a heterogeneous world of embedded controllers into a homogeneous world of one machine with a small set of orthogonal commands. Every other higher level control concept can be built on our VM. The actual underlying technology is the open source software Linux and RT-Linux (FSMLabs). The development platform ems-drd is based on two premises: the simplicity of the operation and the modularity of the entire program package. Through that it offers enterprises in flexible form the potential to integrate system know-how over the rt-dvm into their own processes. The features and strengths of this new approach to distributed real-time programming will be demonstrated in the exhibition area of INDIN'04. Further information can be found on http://***
Jackson's problem frames provide a means of analysing and decomposing problems. They emphasise the world outside the computer helping the developer to focus on the problem domain instead of drifting into inventing...
详细信息
Jackson's problem frames provide a means of analysing and decomposing problems. They emphasise the world outside the computer helping the developer to focus on the problem domain instead of drifting into inventing solutions. The intention is to delay consideration of the solution space until a good understanding of the problem is gained. In contrast, early consideration of a solution architecture is common practice in software development. Software is usually developed by including existing components and/or reusing existing frameworks and architectures. This has the advantage of shortening development time through reuse, and increasing the robustness of a system through the application of tried and tested solutions. In This work, we show how these two views can be reconciled and demonstrate how a choice of architecture can facilitate problem analysis, decomposition and subsequent recomposition, within the problem frames framework. In particular, we introduce architectural frames - combinations of architectural styles and problem frames - and illustrate their use by applying them to two problems from the literature.
In this paper, we investigate the core-switch mapping (CSM) problem that optimally maps cores onto an NoC architecture such that either the energy consumption or the congestion is minimized. We propose a many-to-many ...
详细信息
ISBN:
(纸本)0769522319
In this paper, we investigate the core-switch mapping (CSM) problem that optimally maps cores onto an NoC architecture such that either the energy consumption or the congestion is minimized. We propose a many-to-many core-switch mapping (mCSM) that allows a switch (core) to have multiple connections to its adjacent cores (switches). We also present decomposition methods that can obtain the suboptimal solutions with enhanced computational efficiency. Our work is the first to provide an exact mixed-integer linear programming (MILP) formulation for the complete CSM problems, including the optimal choice of core placements, switches for each core, and network interfaces for communication flows. Experiments with four random benchmarks show that 4:4 mCSM achieves 81.2% of energy savings and 2.5% of bandwidth savings compared with one-to-one mapping. They also show that, for one-to-one mapping, our optimal solutions obtained by the full MILP save 34.8% of energy consumption and 34.4% of bandwidth requirement compared with those from the existing algorithms.
Over the last few years, we have seen the transformation of the traditional monolithic enterprise, in which all operations were performed in-house, to the extended enterprise, which consists of a network of collaborat...
详细信息
Over the last few years, we have seen the transformation of the traditional monolithic enterprise, in which all operations were performed in-house, to the extended enterprise, which consists of a network of collaborating entities. Global operations, outsourcing, and increasing specialization have all contributed to this trend. One challenge facing the extended enterprise is how to reconnect the information flows and business processes that were disconnected as the enterprise disaggregated. The emergence of web services, service-oriented architectures, and business process modeling and execution standards are helping to address this challenge. Our contention is that the next phase of evolution is the rise of the intelligent enterprise, which is characterized by being able to adapt quickly to changes in its operating environment. The intelligent enterprise monitors its own business processes and its interactions with customers, partners, suppliers, and collaborators; it understands how this information relates to its business objectives; and it acts to control and optimize its operations to meet its business objectives. Decisions are made quickly and accurately to modify business processes on the fly, dynamically allocate resources, or change business partners (e.g., suppliers, service providers) and partnerships (e.g., establish new service level agreements). This talk will describe challenges in managing the business operations of an intelligent enterprise. While a plethora of tools exist for managing the IT infrastructure (servers, storage, and network resources) of the enterprise, there is little systematic support today for the closed loop management and control of business operations. We will describe technology approaches to intelligent business operations management that we are pursuing at HP Labs., the progress we have made, and some open research questions.
The following topics are dealt with: openarchitectures and networkprogramming; resource control in active networks; extensible datapath capabilities; endpoint adaptations; application platforms; and adaptive applica...
The following topics are dealt with: openarchitectures and networkprogramming; resource control in active networks; extensible datapath capabilities; endpoint adaptations; application platforms; and adaptive applications.
By implementing an extensible network protocol stack in the AMP Operating System, we have demonstrated support for fine-grained replacement of low-level network processing components. Furthermore, our compiler technol...
详细信息
ISBN:
(纸本)0780377648
By implementing an extensible network protocol stack in the AMP Operating System, we have demonstrated support for fine-grained replacement of low-level network processing components. Furthermore, our compiler technology approach provides the means to support multiple hardware architectures and a framework for enforcing safety and security properties during runtime code generation. Our preliminary results indicate that our approach is feasible, has comparable per-packet processing costs to static code, and has acceptable per-module loading and code generation costs.
Over the past several years, in response to demands from users that access to networked information and services be both customized and rapid, services and content have increasingly been 'pushed' towards netwo...
详细信息
ISBN:
(纸本)0780377648
Over the past several years, in response to demands from users that access to networked information and services be both customized and rapid, services and content have increasingly been 'pushed' towards network edges by Providers. In turn, this has resulted in an increased need for a software framework that provides an open and systematic way for Providers to deploy and manage such network edge services. We have implemented and tested such a framework in our Lab, called the Telcordia Edge Services Node. Inspired by the foundations built in the IETF OPES-related drafts, it is beneficial to Access, Service, and Content Providers alike. This paper reports on the design, implementation, and lessons-learned from our edge service node framework and management tools.
Active networks are placed at considerable risk by running code that arrives over the network. Careful crafting of authorization policy and stringent enforcement provide considerable protection against such risks. How...
详细信息
ISBN:
(纸本)0780377648
Active networks are placed at considerable risk by running code that arrives over the network. Careful crafting of authorization policy and stringent enforcement provide considerable protection against such risks. However, there still might be reasons why a packet that is executing in accordance with the authorization policy might cause damage. For example, the code might have bugs or may have been improperly configured or the packet might have been unintentionally launched. For the safety of the network, a mechanism is needed that would permit users and networks to find faulty, misconfigured, or misbehaving active code and revoke its ability to execute. This paper I considers the important issues and features of providing for revocation of code and an architecture that will support it in a wide-scale active network. It describes the parameters that identify the entities that issue the revocation notice and the entities that are to be revoked. It also describes an approach for policy composition from multiple entities, which eventually decides whether a revocation notice is authorized to act on a particular piece of code. Finally, this paper presents an innovative approach towards revocation in traditional networks using active networking as the transporting mechanism.
暂无评论