This volume contains the proceedings of ICALP 88, held at Tampere University of Technology, Finland, July 11-15, 1988. ICALP 88 is the 15th international Colloquium on Automata, Languages and Programming in a series o...
详细信息
ISBN:
(数字)9783540392910
ISBN:
(纸本)9783540194880
This volume contains the proceedings of ICALP 88, held at Tampere University of Technology, Finland, July 11-15, 1988. ICALP 88 is the 15th international Colloquium on Automata, Languages and Programming in a series of meetings sponsored by the European Association for Theoretical Computer Science (EATCS). It is a broadly based conference covering all aspects of theoretical computer science including topics such as computability, automata, formal languages, analysis of algorithms, computational complexity, data types and data structures, theory of data bases and knowledge bases, semantics of programming languages, program specification, transformation and verification, foundations of logic programming, theory of logical design and layout, parallel and distributed computation, theory of concurrency, symbolic and algebraic computation, term rewriting systems, cryptography, and theory of robotics.
Summary form only given. systems built from commodity processors dominate high-performance computing, with systems containing thousands of processors now being deployed. As node counts for multi-teraflop systems grow ...
详细信息
Summary form only given. systems built from commodity processors dominate high-performance computing, with systems containing thousands of processors now being deployed. As node counts for multi-teraflop systems grow to tens of thousands, with proposed petaflop system likely to contain hundreds of thousands of nodes, and with a tsunami of new experimental and computational. The mean time before failure (MTBF) for the individual components (i.e., processors, disks, memories, power supplies, fans and networks) is high. In contrast to parallelsystems, distributedsoftware for networks, whether transport protocols or Web/Grid services, are designed to be resilient to component failures. Our thesis is that these "two worlds" of software-distributedsystems and parallelsystems. In this paper, we describe possible approaches for the design and effective use of large-scale systems. The approaches range from intelligent hardware monitoring and adaptation, through low-overhead recovery schemes, statistical sampling and differential scheduling and to alternative models of system software, including evolutionary adaptation.
This paper addresses the issue of how to support cloud computing in thin-client/server computing model. We describe the design and implementation of the multiple-application-server thin-client/server computing (MAS TC...
详细信息
This paper addresses the issue of how to support cloud computing in thin-client/server computing model. We describe the design and implementation of the multiple-application-server thin-client/server computing (MAS TC/S) model that allows users with thin-client devices to roam around a wide area network whilst experiencing transparent working environments. MAS TC/S can be applied to a wide variety of applications in wide area network, such as pervasive software rental, service-oriented infrastructure for an Internet service provider, and office automation for transnational corporations. The MAS TC/S architecture model comprises five major components: the display protocol, the multiple-application-server topology, the application-server discovery protocol, the distributed file system, and the network input/output protocol. We discuss problems and present solutions in the design of each constituent component. A prototype of the MAS TC/S that spans the campuses of two universities in Taiwan has been built - we also report our experiences in constructing this prototype.
Currently there exist many kinds of semantic Web Service models on the internet. They are heterogeneous so that it is hard to understand and interoperate each other. In this paper, we study several mainstream semantic...
详细信息
ISBN:
(纸本)9780769543499
Currently there exist many kinds of semantic Web Service models on the internet. They are heterogeneous so that it is hard to understand and interoperate each other. In this paper, we study several mainstream semantic Web Service models, and extract meta-models for each from the perspective of semantic Web Service discovery. Based on this, we propose the universal meta-model for semantic Web Service registration within the background of meta-model framework for interoperability (MFI, ISO/IEC19763). Some cases are studied and infrastructure supporting our work is demonstrated. The work in the paper may be regarded as an extension to UDDI on service semantics facet, and has been proposed to ISO as ISO/IEC 19763 Part 7.
Traditional authorization mechanisms based on the request-response model are generally supported by point-to-point communication between applications and authorization servers. As distributed applications increase in ...
详细信息
Traditional authorization mechanisms based on the request-response model are generally supported by point-to-point communication between applications and authorization servers. As distributed applications increase in size and complexity, an authorization architecture based on point-to-point communication becomes fragile and difficult to manage. This paper presents the use of the publish-subscribe (pub-sub) model for delivering authorization requests and responses between the applications and the authorization servers. Our analysis suggests that using the pub-sub architecture improves authorization system availability and reduces system administration overhead. We evaluate our design using a prototype implementation, which confirms the improvement in availability. Although the response time is also increased, this impact can be reduced by bypassing the pub-sub channel when returning authorizations or by caching coupled with local inference of authorization decisions based on previously cached authorizations.
Real-time applications continue to increase in importance as they are employed in various critical areas, such as command and control systems. These applications have traditionally required custom-made systems to exec...
详细信息
Real-time applications continue to increase in importance as they are employed in various critical areas, such as command and control systems. These applications have traditionally required custom-made systems to execute them. Recently, with the widespread use of increasingly powerful commercial off-the-shelf (COTS) products, some real-time system designers have started a shift from custom development to COTS-based systems to achieve lower costs and more flexible systems. This research investigates the problem of allocating real-time applications to a set of COTS heterogeneous machines connected together by a COTS high-speed network. The heuristics were implemented on the High Performance distributed Computing Program's (HiPer-D) Naval Surface Warfare Center (NSWC) testbed. At the specification of NSWC, the goal of this study is to design static resource allocation heuristics that balance the utilization of the computation and network resources in the HiPer-D system based on the system information provided. The broader goal is to maximize the time before dynamic reallocation is required for managing an increased workload at runtime.
An encryption solution completed in a DTS is introduced. This solution consists of system management for cipher key and E2EE. For cipher key management, a server is used in the system. The E2EE is designed on the basi...
详细信息
An encryption solution completed in a DTS is introduced. This solution consists of system management for cipher key and E2EE. For cipher key management, a server is used in the system. The E2EE is designed on the basis of a platform using OMAP5910 as a primary processor. Interface for information exchange is depicted in brief.
The idea and implementation of a testbed are essen-tial steps in assessing and improving the functionality of wireless systems in real-time scenarios. In this research, we proposed a testbed for establishing a secure ...
详细信息
ISBN:
(数字)9798350349658
ISBN:
(纸本)9798350349665
The idea and implementation of a testbed are essen-tial steps in assessing and improving the functionality of wireless systems in real-time scenarios. In this research, we proposed a testbed for establishing a secure wireless connection for data security. The proposed testbed's software-defined radios (SDRs) enable realistic wireless environment modeling and dynamic radio characteristic adjustment. We safely and securely send (transmit) and receive the modulated binary data using our proposed testbed, and we present the results in real-time at the receiving end. In order to mimic real-time 4G and 5G cellular networks, the community of research that handles the wireless system design can benefit greatly from using our proposed testbed as an educational and research tool. Additionally, this can be used to test the solutions, protocols, and algorithms.
Achieving high performance parallel computing requires both a large scale and reliable system. We describe our design and implementation of the message passing interface, called MPICH-OPeN, for parallel computing over...
详细信息
Achieving high performance parallel computing requires both a large scale and reliable system. We describe our design and implementation of the message passing interface, called MPICH-OPeN, for parallel computing over a peer-to-peer network to address this challenge. Our implementation uses the Condor standalone checkpoint library and the Chandy-Lamport algorithm, for reliability, with extensions to make it decentralized. We use the OPeN architecture with an adaptive peer-to-peer protocol that caches connections between peers according to communication requirements of the parallel processes. We used PlanetLab to compare the performance of our implementation to MPICH-P4 and to measure the impact of dynamic peers on parallel program execution
In his seminal paper in 1979 [1] on memory consistency, Lamport proposed two requirements for a multiprocessor system to be sequentially consistent. The second condition stated that memory "requests from all proc...
详细信息
In his seminal paper in 1979 [1] on memory consistency, Lamport proposed two requirements for a multiprocessor system to be sequentially consistent. The second condition stated that memory "requests from all processors issued to an individual memory module are serviced from a single FIFO queue. Issuing a memory request consists of entering the request on this queue". Recently, the authors have the opportunity to revisit Lamport's conditions in the context of a design study of the IBM Cyclops multiprocessoron-a-chip architecture (known as BG/C) from the system software angle. We find that when a multiprocessor system employs a network to communicate with its shared memory modules - such as in the BG/C architecture - we need to carefully elaborate Lamport's requirements to cover the network. Thus we have refined the Lamport's second requirement along this line and demonstrated that the revised conditions are sufficient for ensuring the sequentially consistent behaviors for a class of BG/C-like architectures.
暂无评论