Current networked computing platforms make available to users an immense and growing amount of computing power and storage. This should be an exciting time for computing, and it is. To users, it might seem an infinite...
详细信息
ISBN:
(纸本)9781450318327
Current networked computing platforms make available to users an immense and growing amount of computing power and storage. This should be an exciting time for computing, and it is. To users, it might seem an infinitely powerful Internet Computer exists with a manifestation on each of their several computing devices. Fabric aims to provide this high level programming abstraction, yet with an implementation that runs code securely and efficiently on a completely decentralized collection of nodes. The threat model is similar to that of the web, so malicious nodes are assumed to be part of Fabric and to be able to join and then provide code and data to other nodes. The Fabric compiler and run-time system together ensure that information does flow to any node that is not trusted to enforce its confidentiality policy, and that information does not flow from any node that is not trusted to enforce its integrity policy. The inherent compositionality of information flow control then ensures that all information flows across the distributed system respect the information security policies, even though these policies are interpreted and enforced in a decentralized way.
distributed, tangible, collaborative applications involve potentially complex interactions of users, computing platforms, and physical artifacts. Realizing the necessary connections for these interactions can create h...
详细信息
ISBN:
(纸本)9781450322133
distributed, tangible, collaborative applications involve potentially complex interactions of users, computing platforms, and physical artifacts. Realizing the necessary connections for these interactions can create hardware and software dependencies early in development, resulting in a system that is difficult to adapt to design changes. The Ensemble architecture is designed to encourage exploratory development of these systems by limiting the impact of changing components. Ensemble is a product of the exploratory design process it supports, evolving through use in two distinct application domains. The experience gained from these implementations has shaped Ensemble's structure and design priorities, resulting in a component-based architecture that includes: (i) an application framework and graphical user interface support;(ii) a service framework, including service publication and discovery;(iii) local and remote event handling;(iv) distributed user and resource coordination;and (v) a structured configuration language shared by all Ensemble components. Copyright 2013acm.
In the classic asynchronous Byzantine agreement problem, communication is via asynchronous message-passing and the adversary is adaptive with full information. In particular, the adversary can adaptively determine whi...
详细信息
ISBN:
(纸本)9781450320290
In the classic asynchronous Byzantine agreement problem, communication is via asynchronous message-passing and the adversary is adaptive with full information. In particular, the adversary can adaptively determine which processors to corrupt and what strategy these processors should use as the algorithm proceeds;the scheduling of the delivery of messages is set by the adversary, so that the delays are unpredictable to the algorithm;and the adversary knows the states of all processors at any time, and is assumed to be computationally unbounded. Such an adversary is also known as "strong". We present a polynomial expected time algorithm to solve asynchronous Byzantine Agreement with a strong adversary that controls up to a constant fraction of the processors. This is the first improvement in running time for this problem since Ben-Or's exponential expected time solution in 1983. Our algorithm tolerates an adversary that controls up to a 1/500 fraction of the processors.
We investigate a new computing paradigm, called SocialCloud, in which computing nodes are governed by social ties driven from a bootstrapping trust-possessing social graph. We investigate how this paradigm differs fro...
详细信息
All major computing curricula recommendations mention methodological skills and knowledge as an important learning objective in undergraduate and graduate education. None of those curricula recommendations, however, i...
详细信息
The proceedings contain 6 papers. The topics discussed include: IDEA: improving dependability for self-adaptive applications;DPAC: an infrastructure for dynamic program analysis of concurrency java programs;minimal cu...
ISBN:
(纸本)9781450325486
The proceedings contain 6 papers. The topics discussed include: IDEA: improving dependability for self-adaptive applications;DPAC: an infrastructure for dynamic program analysis of concurrency java programs;minimal cut sequence generation for state/event fault trees;towards privacy-preserving computing on distributed electronic health record data;VeriDroid: automating android application verification;and model-based high availability configuration framework for cloud.
Source code and class diagram are artifact sproduced or updated during software development. However, when the scenario in which teams are distributed is considered, the temporal and geographical distances among indiv...
详细信息
ISBN:
(纸本)9781450316569
Source code and class diagram are artifact sproduced or updated during software development. However, when the scenario in which teams are distributed is considered, the temporal and geographical distances among individuals affect communication, creating inconsistencies and ambiguities about the software artifacts. These problems can be minimized by sharing contextual information of actions that occur on cooperation objects. This paper presents the DiSEN-Collabor AR, an approach to deal with context awareness on software artifacts. It provides resources to communicate what individuals have done over the software artifacts. This is possible by capturing contextual information that is represented, stored, processed and displayed. So, awareness elements, artifact context and traceability among software artifacts contribute to increase the understanding of the software artifacts and also the collaboration among distributed teams. Copyright 2013acm.
In this paper, we propose a new distributed dynamic data driven model and strategy to direct and evaluate the interlinked data sets in Dynamic Data Driven Application Systems (DDDAS). The underlying technique is the i...
详细信息
ISBN:
(纸本)9781450316569
In this paper, we propose a new distributed dynamic data driven model and strategy to direct and evaluate the interlinked data sets in Dynamic Data Driven Application Systems (DDDAS). The underlying technique is the introduction of a reinforcement Q-Learning approach including search strategies to determine how to drill and drive a series of highly dependent data in order to increase prediction accuracy and efficiency. In simulation, the new model utilizes individual sensors, distributed databases, and predictors in Dynamic Data Stream Nodes with multiple dimensional variables which can be instantiated to explore the search space, so that search convergence can be improved. We show the effectiveness and applicability of using the technique in the analysis of typhoon rainfall data. The result shows that the proposed approach performed better than traditional linear regression approaches, reducing the error rate by 30. 48%. Copyright 2013acm.
The prevalence of multicore processors and virtualization technology enables parallel soft real-time applications to run in virtualized environment. However, current hypervisors do not provide adequate support for the...
详细信息
In this paper, we describe an approach for teaching parallel and distributedcomputing at the undergraduate level using computational patterns. The goal is to promote higher-level structured design for parallel progra...
详细信息
暂无评论