there is an imbalance in the supply and demand for computing professionals that has generated shortages in meeting personnel needs within industry. A major program was developed by the U.S. National Science Foundation...
详细信息
ISBN:
(纸本)9781605585048
there is an imbalance in the supply and demand for computing professionals that has generated shortages in meeting personnel needs within industry. A major program was developed by the U.S. National Science Foundation to encourage innovations in undergraduate computing education. there are a variety of new projects that are revitalizing undergraduate computing education. One approach to such revitalization is the introduction of interdisciplinary courses to expand the scope of computing education. the basic idea is to have students from various disciplines work together on computing projects to expand their educational horizons and make computing courses more appealing. this panel brings together research managers with educators who have developed and taught interdisciplinary courses withthese goals in mind. the panelists will share their experiences and solicit new ideas from the audience.
this paper describes a novel, Virtual Device Driver approach to implementing file system extensions under Windows 95. the Virtual Device Drivers provide a system-wide software services without a corresponding hardware...
详细信息
ISBN:
(纸本)1581130864
this paper describes a novel, Virtual Device Driver approach to implementing file system extensions under Windows 95. the Virtual Device Drivers provide a system-wide software services without a corresponding hardware. they are fast and have unrestricted access to the system as well as the ability to communicate with a Win32 application. these features make it an ideal tool for implementing file system extensions. An extension described in this paper is an adaptation feature well studied in file system supporting mobile computing - disconnected operation. the paper lists functional requirements of a file system supporting disconnected operation and describes its design and implementation as a Virtual Device Driver. A number of experiments performed on the implemented prototype confirm the hypothesis that a Virtual Device Driver is viable tool for implementing a file system extension such as disconnected without modifying the native system source code. the implemented prototype system not only met all functionality requirements but also show substantial system performance gains.
People quit saying "computers don't make mistakes" after the Y2K scare that generated billions of dollars in hardware upgrades, and hence the "*** bubble". Computer arithmetic with finite-lengt...
详细信息
ISBN:
(纸本)9781581139648
People quit saying "computers don't make mistakes" after the Y2K scare that generated billions of dollars in hardware upgrades, and hence the "*** bubble". Computer arithmetic with finite-length bit-strings has its limitations and creates concerns. In computational mathematics using computers, it is a pity to abandon rigor just at the point we have reduced the problem to computer algorithms. In fact we need not do so. By using pairs of machine numbers as upper and lower bounds of unknown numbers of interest, and by rounding upper bounds up and lower bounds down, we can modify ordinary floating-point machine arithmetic to produce mathematically rigorous results. this is called "interval arithmetic with outward rounding", and it has been implemented and used for several decades. In particular it has been successfully used in non-trivial computer-aided proofs in mathematical analysis, such as the Kepler conjecture (a problem that was outstanding for more than 300 years) and many others. Practical applications also abound in chemical engineering, structural engineering, economics, aircraft control circuitry design, beam physics, global optimization, differential equations, etc. Rigor in computing depends on the integrity of order relations. Commonly used floating-point hardware can lose that integrity. A few examples are presented and it is shown how we can remedy the situation and regain rigor in computing by using outwardly rounded interval arithmetic.
Cloud computing aims to provide users with instant, on-demand access to large pools of computational resources. Although many organizations and end-users have migrated services and data to the cloud, a number of secur...
详细信息
ISBN:
(纸本)9781450324694
Cloud computing aims to provide users with instant, on-demand access to large pools of computational resources. Although many organizations and end-users have migrated services and data to the cloud, a number of security concerns still exist. In particular, recent researches have highlighted virtual machine (VM) co-residency as a new risk brought to the infrastructure as a service (IaaS) cloud by virtualization technologies which form the core of IaaS platforms. the placement of an attacker's virtual machine (VM) on the same physical server as a victim's VM is the key to successfully launching several harmful side-channel attacks to gain sensitive and valuable information about the co-residing VMs. When such placement manifests in a malicious manner then it is called VM co-residency. In this paper a number of cloud platforms and software tools are evaluated on their suitability as test beds for experimenting on VM co-residency. this study leads to a recommendation for implementing a purpose-built simulator which can be used as a test bed for future research on VM co-residency in the cloud. Copyright 2014 acm.
the proceedings contain 60 papers. the topics discussed include: separating bounded and unbounded asynchrony for autonomous robots: point convergence with limited visibility;on implementing stabilizing leader election...
ISBN:
(纸本)9781450385480
the proceedings contain 60 papers. the topics discussed include: separating bounded and unbounded asynchrony for autonomous robots: point convergence with limited visibility;on implementing stabilizing leader election with weak assumptions on network dynamics;time-optimal self-stabilizing leader election in population protocols;lower bounds on the state complexity of population protocols;comparison dynamics in population protocols;diversity, fairness and sustainability in population protocols;brief announcement: a time and space optimal stable population protocol solving exact majority;a thin self-stabilizing asynchronous unison algorithm with applications to fault tolerant biological networks;and decision power of weak asynchronous models of distributed computing.
Dominated by the behavioral science approach for a long time, information systems research increasingly acknowledges design science as a complementaiy approach. While primarily information systems instantiations, but ...
详细信息
ISBN:
(纸本)9781581139648
Dominated by the behavioral science approach for a long time, information systems research increasingly acknowledges design science as a complementaiy approach. While primarily information systems instantiations, but also constructs and models have been discussed quite comprehensively, the design of methods is addressed rarely. But methods appear to be of utmost importance particularly for organizational engineering. this paper justifies method construction as a core approach to organizational engineering. Based on a discussion of fundamental scientific positions in general and approaches to information systems research in particular, appropriate conceptualizations of 'method' and 'method construction' are presented. these conceptualizations are then discussed regarding their capability of supporting organizational engineering. Our analysis is located on a meta level: Method construction is conceptualized and integrated from a large number of references. Method instantiations or method engineering approaches however are only referenced and not described in detail. Copyright 2005 acm.
In this paper, a framework for task assignment in heterogeneous computing (HC) systems is presented. this framework is based on a learning automata model. the proposed model can be used for dynamic task assignment and...
详细信息
ISBN:
(纸本)1581130864
In this paper, a framework for task assignment in heterogeneous computing (HC) systems is presented. this framework is based on a learning automata model. the proposed model can be used for dynamic task assignment and scheduling and can adapt itself to changes in the hardware or network environment. An important feature of this framework is that it works for any cost metric. this could either be a general metric like minimizing the total execution time, or an application specific metric. the HC system itself is modeled using a task flow graph (TFG) and a processor graph (PG). the TFG models the application while the PG models the network of processors. the learning automata model is constructed by associating every task in the TFG with a variable structure learning automaton [7]. the actions of each of these automata correspond to the nodes in the PG. the objective is to optimize the cost criterion by guiding the learning of the automata. the paper presents different heuristic techniques to achieve this. the performance analysis of these techniques are discussed with reference to a specific cost metric.
Withthe widespread of rich mobile applications, the usage of mobile devices, especially smart phones and tablets, has become popular nowadays. However, battery in the mobile devices often limits continuous usages wit...
详细信息
ISBN:
(纸本)9781450324694
Withthe widespread of rich mobile applications, the usage of mobile devices, especially smart phones and tablets, has become popular nowadays. However, battery in the mobile devices often limits continuous usages with its small size and capacity. therefore, power consumption of mobile devices is a critical issue, not only for extending lifetime use of mobile devices, but also for creating a green IT which is a raising concern in academic and industrial communities. the goal of this paper is to investigate the power consumption of mobile devices and resource usages for various applications. To meet the goal, we have performed a number of experiments and detailed evaluations of resource usages and power consumption for various applications using a number of tools. In addition, we have measured performance metrics for applications either using a mobile device or running in the Amazon cloud. We examine the impact of various factors and provide insights on power consumption for different mobile applications. Copyright 2014 acm.
Graphical User Interfaces (GUIs) of document viewers have gained attention withthe increase on the number of mobile applications that uses it. However, mobile devices are still limited in relation to the available fu...
详细信息
ISBN:
(纸本)9781605581668
Graphical User Interfaces (GUIs) of document viewers have gained attention withthe increase on the number of mobile applications that uses it. However, mobile devices are still limited in relation to the available functionalities for text exhibition. Other limitations of these devices are the memory size, processing capacity and battery. this paper describes a framework for text visualization that safely manages memory traffic for mobile applications that intensively use bitmap font files, such as a document viewer. the main goal is to diversify the functionalities concerning to text exhibition in mobile devices, but also minimizing memory traffic. Copyright 2009 acm.
In this paper we describe a serializer component completely realized in .NET managed code, able to run on a stripped versions of the .NET platform (e.g., COMPACT FRAMEWORK) and still generic enough to be used on .NET ...
详细信息
ISBN:
(纸本)9781581139648
In this paper we describe a serializer component completely realized in .NET managed code, able to run on a stripped versions of the .NET platform (e.g., COMPACT FRAMEWORK) and still generic enough to be used on .NET or other CLI compatible frameworks. Such a component is not normally provided with stock libraries in their compact version, since its implementation is quite tricky when relying on reduced reflection services. However, this component makes easier the development of distributed applications involving mobile devices and desktop computers or mainframes. Our implementation faced several problems ranging from lack of features in the base classes to the interframework portability problem, since the same object could have different implementation. the resulting product shows satisfactory performance figures and has a modular and flexible architecture. Copyright 2005 acm.
暂无评论