We describe an algorithm for solving MDPs with large state and action spaces, represented as factored MDPs with factored action spaces. Classical algorithms for solving MDPs are not effective since they require enumer...
详细信息
In ad hoc networks, each node utilizes its limited resources to carry out the collective operation of the network. It is not always in the best interests of the network's nodes to demand the continuous participati...
详细信息
In ad hoc networks, each node utilizes its limited resources to carry out the collective operation of the network. It is not always in the best interests of the network's nodes to demand the continuous participation of all nodes in the network operations. We propose an energy dependent participation (EDP) scheme, where a node periodically re-evaluates its participation in the network based on the residual energy in its battery. More importantly, a node gives special consideration to supporting the communication needs of its active network applications and preventing further network partitioning. EDP's localized partition checking algorithm is particularly well suited for the zone routing protocol, where the link-state information is proactively maintained within each node's local zone and routes to faraway nodes are reactively obtained via global queries. Through simulations, we evaluate the impact of our proposed scheme on battery life and network connectivity. Our results suggest that the EDP scheme can increase the usable lifetime of a battery-constraint ad hoc network by over 50%.
As processing and time requirements of computer systems increase over the borders of single processor architectures, it is becoming more and more attractive to use distributed computing with additional real-time capab...
详细信息
As processing and time requirements of computer systems increase over the borders of single processor architectures, it is becoming more and more attractive to use distributed computing with additional real-time capabilities. In several cases, traditional programming languages have become insufficient to build distributed systems easily, especially when real-time issues and basic software quality factors are concerned. In this paper, a concurrent, object-oriented, distributed real-time programming language, CPL, with a supportive run-time system, namely the CORD-RTS, is introduced and new language features are described. The new language provides an efficient solution for command and control systems by embedding distribution and real-time issues within new language constructs. The language preprocessor translates these language constructs into portable C++ code to establish run-time connection with the RTS, which provides real-time communication between distributed objects.
With the increasing demand for distributed real-time systems, the need for programming tools and execution platforms useful in development of such application systems is widely recognized. This paper presents CORD-RTS...
详细信息
With the increasing demand for distributed real-time systems, the need for programming tools and execution platforms useful in development of such application systems is widely recognized. This paper presents CORD-RTS, an efficient middleware architecture that provides support for real-time distributed object programming. The communication infrastructure and various components of the middleware, which support several modes of interactions among distributed real-time objects, along with its real-time features and services, are discussed in detail.
In 1996, USC switched its core two-semester softwareengineering course from a hypothetical-project, homework-and-exam course based on the Bloom taxonomy of educational objectives (knowledge, comprehension, applicatio...
For the past 6 years, we have been teaching a two-semester softwareengineering project course. The students organize into 5-person teams and develop largely web-based electronic services projects for real USC campus ...
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels. These methods are not complete and ar...
详细信息
Testing for software security is a lengthy, complex and costly process. Currently, security testing is done using penetration analysis and formal verification of security kernels. These methods are not complete and are difficult to use. Hence it is essential to focus testing effort in areas that have a greater number of security vulnerabilities to develop secure software as well as meet budget and time constraints. We propose a testing strategy based on a classification of vulnerabilities to develop secure and stable systems. This taxonomy will enable a system testing and maintenance group to understand the distribution of security vulnerabilities and prioritize their testing effort according to the impact the vulnerabilities have on the system. This is based on Landwehr's (1994) classification scheme for security flaws and we evaluated it using a database of 1360 operating system vulnerabilities. This analysis indicates vulnerabilities tend to be focused in relatively few areas and associated with a small number of softwareengineering issues.
Adaptive Quality-of-Service management is critical for enabling effective collaboration between distributed clients in a heterogeneous (wired and wireless) environment. This is because both client profiles (capabiliti...
详细信息
Adaptive Quality-of-Service management is critical for enabling effective collaboration between distributed clients in a heterogeneous (wired and wireless) environment. This is because both client profiles (capabilities, interests and resources) and system resources can be significantly different and highly dynamic. This paper presents the design and prototype implementation of an adaptive QoS management framework for collaborative multimedia applications in distributed, heterogeneous environments. The overall goal of the framework is to locally adapt the shared information to meet the capabilities, interests and current state of each collaborating client while preserving the semantic content of the information to maintain effective sharing. Transformations investigated in this paper include gradual gradations and modality transformations. The framework builds on a publisher-subscriber messaging substrate that uses semantic profiles and provides each client with direct and immediate access to all information defined by its needs and capabilities, without having to maintain and update global rosters. It interfaces with the Simple Network Management Protocol (SNMP) to determine the state of the network by directly querying network elements. An experimental evaluation of the framework for wired and wireless clients is also presented.
Overlap of computations and communications is an effective mechanism to improve the performance of parallel/distributed applications significantly. This overlap can be achieved efficiently by using data partitioning a...
详细信息
Overlap of computations and communications is an effective mechanism to improve the performance of parallel/distributed applications significantly. This overlap can be achieved efficiently by using data partitioning and properly scheduling the data transfer. Various asynchronous communication primitives, that are provided by most message passing tools (e.g. PVM, MPI), can be used to implement the required. Here, we present a design model, the Distributed software Design Model (DSDM) and show how it can be applied to optimize parallel/distributed applications. We show through several examples, the Master-Slave Merge Sorting Application and the astrophysical N-Body Problem, how the DSDM can be used to develop efficient and optimized implementations of parallel and distributed algorithms.
暂无评论