Contracts enable mutually suspicious parties to cooperate safely through the exchange of rights. Smart contracts are programs whose behavior enforces the terms of the contract. This paper shows how such contracts can ...
详细信息
ISBN:
(纸本)9783642370366
Contracts enable mutually suspicious parties to cooperate safely through the exchange of rights. Smart contracts are programs whose behavior enforces the terms of the contract. This paper shows how such contracts can be specified elegantly and executed safely, given an appropriate distributed, secure, persistent, and ubiquitous computational fabric. JavaScript provides the ubiquity but must be significantly extended to deal with the other aspects. The first part of this paper is a progress report on our efforts to turn JavaScript into this fabric. To demonstrate the suitability of this design, we describe an escrow exchange contract implemented in 42 lines of JavaScript code.
When an electronic identity management (eIDM) system users seek to communicate with governments using a different eIDM system, both systems should be linked and should understand each other. To achieve this, the Europ...
详细信息
When an electronic identity management (eIDM) system users seek to communicate with governments using a different eIDM system, both systems should be linked and should understand each other. To achieve this, the European Union is working on an interoperability framework.
Journey builds on top of a peer-to-peer network infrastructure to provide load balancing, fault tolerance, and cheat detection based on object-oriented technology.
Journey builds on top of a peer-to-peer network infrastructure to provide load balancing, fault tolerance, and cheat detection based on object-oriented technology.
Web services are promoted as a new model for distributed systems, yet many skeptics see them as simply a poor implementation of traditional remote procedure calls (RPC) or distributed objects. Previous comparisons, wh...
详细信息
Web services are promoted as a new model for distributed systems, yet many skeptics see them as simply a poor implementation of traditional remote procedure calls (RPC) or distributed objects. Previous comparisons, which show Web services to be significantly slower than RPC, are biased because they use a RPC communication style and ignore the document-oriented style that is recommended for Web services. We compare the straightforward design and implementation of a small file server application implemented using proxy-based RMI and document-oriented Web services. We show that Web services outperform RMI when accessing multiple/deeply nested files, especially over high-latency networks. However, the automatically generated Web service interfaces are awkward to use, so we develop a technique for wrapping the Web service to make it as easy to use as the distributed object implementation. This case study provides a more detailed comparison of the relationship between Web services and distributed objects.
This position paper presents the main problems in classical and modern Fuzzy Theory and gives solutions in Formal Concept Analysis for many of these problems. To support the successful cooperation between scientists f...
详细信息
ISBN:
(纸本)9783642218804;9783642218811
This position paper presents the main problems in classical and modern Fuzzy Theory and gives solutions in Formal Concept Analysis for many of these problems. To support the successful cooperation between scientists from the communities of Fuzzy Theory and Formal Concept Analysis the author starts with this position paper an initiative, called "Pragmatics in Fuzzy Theory".
In order to utilize the semantics of object methods to ensure cached object consistency, method group commutativity specifies the conditions under which a group of methods will commute. Method group commutativity is d...
详细信息
In order to utilize the semantics of object methods to ensure cached object consistency, method group commutativity specifies the conditions under which a group of methods will commute. Method group commutativity is determined using a semantic specification of object methods, provided in terms of logical expressions, to create commutativity conjectures that are analyzed using the PVS theorem prover. This analysis results in the creation of a method commutativity specification (MCS), which is used by a distributed caching system to ensure the consistency of method invocations. For greater commutativity, weaker consistency requirements can be specified in the MCS. This base approach is enhanced by optimizations that consider a client's sequential execution of methods and that reduce the amount of data cached by the client. The effectiveness of method group commutativity and associated optimizations is evaluated using Java RMI application benchmarks.
This paper provides an analysis of the design space available to middleware developers in the context of wireless sensor networks (WSN). We identify the weaknesses of current communication abstraction layers and propo...
详细信息
This paper provides an analysis of the design space available to middleware developers in the context of wireless sensor networks (WSN). We identify the weaknesses of current communication abstraction layers and propose alternative implementation techniques that preserve most Of the useful features but minimize the implementation cost in resource constrained wireless sensor nodes. Our proposal includes a whole WSN development framework based on standard distributed objects and a set of specific services designed to support highly dynamic and scalable WSN applications. Copyright (c) 2007 John Wiley & Sons, Ltd.
Metadata harvesting requires timely propagation of up-to-date information from thousands of Repositories over a wide area network. It is desirable to keep the data as fresh as possible while observing the overhead on ...
详细信息
ISBN:
(纸本)9781424434671
Metadata harvesting requires timely propagation of up-to-date information from thousands of Repositories over a wide area network. It is desirable to keep the data as fresh as possible while observing the overhead on the Harvester. An important dimension to be considered is that Repositories vary widely in their update patterns;they may experience different update rates at different times or unexpected changes to update patterns. In this paper, we define data Freshness metrics and propose an adaptive algorithm for the synchronization of the Harvester with the Repositories. The algorithm is based on meeting a desired level of Freshness while incurring the minimum overhead on the Harvester. We present a comparison between different policies for the synchronization within the framework devised. It is shown that the proposed policy outperform the other policies, especially for heterogeneous update patterns.
Metadata harvesting requires timely propagation of up-to-date information from thousands of Repositories over a wide area network. It is desirable to keep the data as fresh as possible while observing the overhead on ...
详细信息
Monitoring, analyzing, and understanding component-based enterprise software systems are challenging tasks. These tasks are essential to solving and preventing performance and quality problems. Obtaining component-lev...
详细信息
Monitoring, analyzing, and understanding component-based enterprise software systems are challenging tasks. These tasks are essential to solving and preventing performance and quality problems. Obtaining component-level interactions that show the relationships between different software entities is a necessary prerequisite for such efforts. This paper focuses on component-based Java applications, currently widely used by the industry. They pose specific challenges while raising interesting opportunities for component-level interaction extraction tools. We present a range of representative approaches for dynamically obtaining and using component interactions. For each approach, we detail the needs it addresses and the technical requirements for building an implementation of the approach. We also take a critical look at the different available implementations of the various techniques presented. We give performance and functional considerations and contrast them against each other by outlining their relative advantages and disadvantages. Based on this data, developers and system integrators can better understand the current state of the art and the implications of choosing or implementing different dynamic interaction extraction techniques.
暂无评论