Solfec is a computational code aimed at simulation of constrained multibody systems on distributed memory parallel computers. It implements an instance of the Contact Dynamics (CD) method by Moreau and Jean, hence the...
详细信息
Solfec is a computational code aimed at simulation of constrained multibody systems on distributed memory parallel computers. It implements an instance of the Contact Dynamics (CD) method by Moreau and Jean, hence the constraints are handled implicitly. One of the main goals of the software is to provide a user friendly platform for testing formulations and solution methods for the (dynamic) frictional contact problem. It is also meant to serve as a development platform for other aspects of time-stepping methods (e. g. contact detection, time integration, kinematic models). The purpose of this communication is to outline the algorithmic ideas behind Solfec, with an emphasis on the Gauss-Seidel constraints solver, a classical element of CD, efficiently implemented on a distributed memory model. The remaining topics include a dynamic domain decomposition balancing the computational load of the overall algorithm, and an accuracy measure for the frictional contact constraints. Solfec is an open-source software and can be downloaded from http://***/p/solfec. Copyright (C) 2011 John Wiley & Sons, Ltd.
Complex real-time embedded systems require guarantees regarding the assurance of their timing requirements. Such guarantees can be derived using advanced design and analysis methods. Many design solutions address the ...
详细信息
In this paper we try to describe how the Modular Interactive Tiles System (MITS) can be a valuable tool for introducing students to interactive parallel and distributed processing programming. This is done by providin...
详细信息
ISBN:
(纸本)9784990288051
In this paper we try to describe how the Modular Interactive Tiles System (MITS) can be a valuable tool for introducing students to interactive parallel and distributed processing programming. This is done by providing an educational hands-on tool that allows a change of representation of the abstract problems related to designing interactive parallel and distributedsystems. Indeed, MITS seems to bring a series of goals into the education, such as parallel programming, distributedness, communication protocols, master dependency, software behavioral models, adaptive interactivity, feedback, connectivity, topology, island modeling, user and multiuser interaction, which can hardly be found in other tools. Finally, we introduce the system of modular interactive tiles as a tool for easy, fast, and flexible hands-on exploration of these issues, and through examples show how to implement interactive parallel and distributed processing with different software behavioural models such as open loop, randomness based, rule based, user interaction based, AI and ALife based software.
Run-time verification checks whether the active execution traces of an application fulfills its specified behavior and is especially applicable when one needs to consider the actual execution context in the verificati...
详细信息
ISBN:
(纸本)9780769544298
Run-time verification checks whether the active execution traces of an application fulfills its specified behavior and is especially applicable when one needs to consider the actual execution context in the verification. In today's practices, software is more and more distributed over multiple processes, possibly running at different locations. This is supported by middleware that, to some extend, allows implementing applications in a distribution-transparent way. We define four requirements for the effective verification of such software: 1) abstraction of less-critical details of software behavior due to the complexity of software behavior, 2) distribution-transparent specification of software behavior, as software is also implemented in such a way, 3) end-to-end verification of behavior, and 4) automatic generation of verification modules for arbitrary process and distribution structures. The existing runtime verification systems fall in short to fulfill these requirements, therefore their applicability is limited. We develop the E-Chaser runtime verification system to facilitate the verification of distributedsoftware by addressing these requirements. This paper explains the approach and the prototype implementation of E-Chaser based on the Java-RMI technology.
Instrumentation is a critical part of evaluating an enterprise distributed real-time and embedded (DRE) system's performance. Traditional techniques for instrumenting enterprise DRE systems require DRE system deve...
详细信息
Instrumentation is a critical part of evaluating an enterprise distributed real-time and embedded (DRE) system's performance. Traditional techniques for instrumenting enterprise DRE systems require DRE system developers to make design decisions regarding what metrics to collect during early phases of the software lifecycle so these needs can be factored into the system architecture. In many circumstances, however, it is hard for DRE system developers to know this information during early phases of the software lifecycle-especially when metrics come from many heterogeneous sources (such as application-and system-level hardware and software resources) and evaluating performance is traditionally an after-thought. To address these issues, this article presents the design and performance of OASIS, which is SOA-based middleware and tools that dynamically instruments enterprise DRE system without requiring design-time knowledge of which metrics to collect. This article also empirically evaluates OASIS in the context of a representative enterprise DRE system case study from the domain of shipboard computing. Results from applying OASIS to this case study show that its flexibility enables DRE system testers to precisely control instrumentation overhead. We also highlight open challenges in dynamic instrumentation for next-generation enterprise DRE systems.
The paper suggests an attack trees based approach to security analysis of information systems. The approach considers both software-technical and social engineering attacks. It extends the approach to network security...
详细信息
ISBN:
(纸本)9780769543284
The paper suggests an attack trees based approach to security analysis of information systems. The approach considers both software-technical and social engineering attacks. It extends the approach to network security analysis based on software-technical attacks which was suggested earlier by the authors of this paper. The main difference is in generalizing the suggested approach for information systems and in use of different conceptions, models and frameworks related to social-engineering attacks. In particular, we define conceptions of legitimate users and control areas. Besides, social-engineering attacks and attacks that require physical access to control areas are included to the attack trees used for security analysis. The paper also describes a security analysis toolkit based on the approach suggested and experiments with it to define the security level of information system.
The demand of network packet processing is increasing as applications demand more and more bandwidth and computing capability. In this paper, the characteristics of packet processing and multi-core systems are analyze...
详细信息
ISBN:
(纸本)9780769544151
The demand of network packet processing is increasing as applications demand more and more bandwidth and computing capability. In this paper, the characteristics of packet processing and multi-core systems are analyzed. In order to analyze the differences of serial packet processing and parallel packet processing, the packet processing model is proposed. In the end, a DPI experiment on a multi-core system has been carried out to verify the analysis. The results show the proportion of the parallel part and the load balancing of computing resources affect performance.
This Three-Volume-Set constitutes the refereed proceedings of the Second international Conference on softwareengineering and Computer systems, ICSECS 2011, held in Kuantan, Malaysia, in June 2011. The 190 revised ful...
ISBN:
(数字)9783642222030
ISBN:
(纸本)9783642222023
This Three-Volume-Set constitutes the refereed proceedings of the Second international Conference on softwareengineering and Computer systems, ICSECS 2011, held in Kuantan, Malaysia, in June 2011. The 190 revised full papers presented together with invited papers in the three volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on softwareengineering; network; bioinformatics and e-health; biometrics technologies; Web engineering; neural network; parallel and distributed; e-learning; ontology; image processing; information and data management; engineering; software security; graphics and multimedia; databases; algorithms; signal processing; software design/testing; e- technology; ad hoc networks; social networks; software process modeling; miscellaneous topics in softwareengineering and computer systems.
This Three-Volume-Set constitutes the refereed proceedings of the Second international Conference on softwareengineering and Computer systems, ICSECS 2011, held in Kuantan, Malaysia, in June 2011. The 190 revised ful...
ISBN:
(数字)9783642221910
ISBN:
(纸本)9783642221903
This Three-Volume-Set constitutes the refereed proceedings of the Second international Conference on softwareengineering and Computer systems, ICSECS 2011, held in Kuantan, Malaysia, in June 2011. The 190 revised full papers presented together with invited papers in the three volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on softwareengineering; network; bioinformatics and e-health; biometrics technologies; Web engineering; neural network; parallel and distributed e-learning; ontology; image processing; information and data management; engineering; software security; graphics and multimedia; databases; algorithms; signal processing; software design/testing; e- technology; ad hoc networks; social networks; software process modeling; miscellaneous topics in softwareengineering and computer systems.
Achieving an efficient realistic illumination is an important aim of research in computer graphics. In this paper a new parallel global illumination method for hybrid systems based on the hierarchical radiosity method...
详细信息
Achieving an efficient realistic illumination is an important aim of research in computer graphics. In this paper a new parallel global illumination method for hybrid systems based on the hierarchical radiosity method is presented. Our solution allows the exploitation of systems that combine independent nodes with multiple cores per node. Thus, multiple nodes work in parallel in the computation of the global illumination for the same scene. Within each node, all the available computational cores are used through a shared-memory multithreading approach. The good results obtained in terms of speedup on several distributed-memory and shared-memory configurations show the versatility of our hybrid proposal.
暂无评论