What constitutes an enterprise architecture framework is a contested subject. The contents of present enterprise architecture frameworks thus differ substantially. This paper aims to alleviate the confusion regarding ...
详细信息
What constitutes an enterprise architecture framework is a contested subject. The contents of present enterprise architecture frameworks thus differ substantially. This paper aims to alleviate the confusion regarding which framework contains what by proposing a meta framework for enterprise architecture frameworks. By using this meta framework, decision makers are able to express their requirements on what their enterprise architecture framework must contain and also to evaluate whether the existing frameworks meets these requirements. An example classification of common EA frameworks illustrates the approach.
Sandbox security model is extremely useful for secure execution of untrusted applications. Many sandbox model based security systems proposed so far provide security by intercepting system calls invoked by application...
详细信息
Sandbox security model is extremely useful for secure execution of untrusted applications. Many sandbox model based security systems proposed so far provide security by intercepting system calls invoked by applications and controlling their execution. However, a problem in existing sandbox based systems is the amount of overhead required for security checks performed after system call interception. In addition, it is difficult for computer novices to manage their security systems because the system settings are complex. In this paper, a function was proposed and implemented to monitor only the file access in Microsoft Windows environment. Test result shows that this function could protect files from unallowed access and then minimize the overhead of application execution time.
Multiprocessor embedded software presents major challenges including the increased complexity and stringent performance requirements raised by parallel processing capability. Although component-based approaches can gr...
详细信息
Multiprocessor embedded software presents major challenges including the increased complexity and stringent performance requirements raised by parallel processing capability. Although component-based approaches can greatly alleviate the complexity problem, traditional approaches do not provide adequate support for performance requirements on multiprocessors. In this paper, we extend component-based approaches for performance-aware design and analysis of multiprocessor embedded software. The proposed approach begins with a component model that is able to capture concurrent and performance-critical behavior based on UML activity diagrams. It then identifies and exploits potential sources of concurrency within components to produce a multithreaded software design targeted at multiprocessors. We also provide a schedulability analysis that can be used for validating multithreaded software design from a temporal perspective.
This paper extends the PhD work of Mossi [1] devoted to the coupling of 1D and 3D models of airflow in tunnel networks. It presents an improved method to couple dynamically 1D and 3D models. This approach is important...
详细信息
The transactional memory programming paradigm is gaining momentum as the approach of choice for replacing locks in concurrent programming. Combining sequences of concurrent operations into atomic transactions seems to...
详细信息
The transactional memory programming paradigm is gaining momentum as the approach of choice for replacing locks in concurrent programming. Combining sequences of concurrent operations into atomic transactions seems to promise a great reduction in the complexity of both programming and verification, by making parts of the code appear to be sequential without the need to program fine-grained locks. software transactional memory offers to deliver a transactional programming environment without the need for costly modifications in processor design. However, the story of software transactional memory reminds one of garbage collection in its time: performance is improving, and the semantics are becoming clearer, yet there is still a long road ahead, a road strewn with stones below and crows hovering above, predicting its demise. This talk will try to take a sober look at software transactional memory, its history, the state of research today, and what we can expect to achieve it in the foreseeable future.
Good IT decision making is a highly desirable property that can be furthered by the use of enterprise architecture, an approach to IT management using diagrammatic models. In order to support decision making, the mode...
详细信息
Good IT decision making is a highly desirable property that can be furthered by the use of enterprise architecture, an approach to IT management using diagrammatic models. In order to support decision making, the models must contain only relevant information since creation of enterprise architecture models often is a demanding task. This paper suggests a method for constructing an enterprise architecture model framework where enterprises in need of architecture and rational decision making are designated. The paper also describes the outcome of the method at a case for a Swedish utility company, Vattenfall AB.
Reliability has recently become an important issue in PC cluster technology. This research proposes a softwaredistributed shared memory system, named SCASH-FT, as an execution platform for high performance and highly...
详细信息
Reliability has recently become an important issue in PC cluster technology. This research proposes a softwaredistributed shared memory system, named SCASH-FT, as an execution platform for high performance and highly reliable parallel system for commodity PC clusters. To achieve fault tolerance, each node has redundant page data that allows recovery from node failure using SCASH-FT. All page data is checkpointed and duplicated to another node when a user explicitly calls the checkpoint function. When failure occurs, SCASH-FT invokes the rollback function by restarting an execution from the last checkpoint data. SCASH-FT takes charge of processes such as detecting failure and restarting execution. So, all you have to do is just adding checkpoint function calls in the source code to determine the timing of each checkpoint. Evaluation results show that the checkpoint cost and the rollback penalty depend on the data access pattern and the checkpoint frequency. Thus, users can control their application performance by adjusting checkpoint frequency.
Symbiotic robotics is a discipline within collective robotics that is concerned with artificial multi-cellular robot-organisms that define their morphological structure by aggregation through self-assembling and they ...
详细信息
Progressive edge-growth (PEG) algorithm is a good candidate to generate tanner graphs with a large girth by establishing edges or connections between symbol and check nodes in an edge-by-edge manner. In this paper, we...
详细信息
Progressive edge-growth (PEG) algorithm is a good candidate to generate tanner graphs with a large girth by establishing edges or connections between symbol and check nodes in an edge-by-edge manner. In this paper, we propose an extended PEG algorithm for constructing low-density parity-check (LDPC) codes with very high rate when given a lower bound of girth. Simulation results show the bit error rates of constructed LDPC codes with very high rate or large girth.
暂无评论