Type-safe high-level languages such as Java have not yet found their way into the domain of deeply embedded systems, even though numerous attempts have been made to make these languages cost attractive. One major chal...
详细信息
We present an approach to the generation of realistic synthetic workloads for use in benchmarking of (massively) multiplayer online gaming infrastructures. Existing techniques are either too simple to be realistic or ...
详细信息
ISBN:
(纸本)9781467345781
We present an approach to the generation of realistic synthetic workloads for use in benchmarking of (massively) multiplayer online gaming infrastructures. Existing techniques are either too simple to be realistic or are too specific to a particular network structure to be used for comparing different networks with each other. Desirable properties of a workload are reproducibility, realism and scalability to any number of players. We achieve this by simulating a gaming session with AI players that are based on behavior trees. The requirements for the AI as well as its parameters are derived from a real gaming session with 16 players. We implemented the evaluation platform including the prototype game Planet PI4. A novel metric is used to measure the similarity between real and synthetic traces with respect to neighborhood characteristics. In our experiments, we compare real trace files, workload generated by two mobility models and two versions of our AI player. We found that our AI players recreate the real workload characteristics more accurately than the mobility models.
In the domain of dynamically evolving distributedsystems composed of autonomous and (self-) adaptive components, the task of systematically managing the design complexity of their communication and composition is a p...
详细信息
In the domain of dynamically evolving distributedsystems composed of autonomous and (self-) adaptive components, the task of systematically managing the design complexity of their communication and composition is a pressing issue. This stems from the dynamic nature of such systems, where components and their bindings may appear and disappear without anticipation. To address this challenge, we propose employing separation of concerns via a mechanism of dynamic implicit bindings with implicit communication. This way, we strive for dynamically formed, implicitly interacting groups - ensembles - of autonomous components. In this context, we introduce the DEECo component model, where such bindings, as well as the associated communication, are managed in an automated way, enabling transparent handling of the dynamic changes in the system.
The advantage of textual use-cases is that they can be easily understood by stakeholders and domain experts. However, since use-cases typically rely on a natural language, they cannot be directly subject to a formal v...
详细信息
The advantage of textual use-cases is that they can be easily understood by stakeholders and domain experts. However, since use-cases typically rely on a natural language, they cannot be directly subject to a formal verification. In this paper, we present the FOAM method which features simple user-definable annotations, inserted into a use-case to make its semantics more suitable for verification. Subsequently a model-checking tool verifies temporal invariants associated with the annotations. This way, FOAM allows for harnessing the benefits of model-checking while still keeping the use-cases understandable for non-experts.
Over the years, software functional size measurement has become a viable tool to determine the effort and time needed to carry out a software project. This growth has led to an increased interest, as shown in several ...
详细信息
Over the years, software functional size measurement has become a viable tool to determine the effort and time needed to carry out a software project. This growth has led to an increased interest, as shown in several studies, as well as to the development and optimization of functional size measurement units. IFPUG Function Points since their development have been the most widely used functional size estimation approach. However, during recent years, a new method, called COSMIC FFP, has emerged as a second generation unit for functional software measurement, and has brought new features and benefits. The aim of this paper is to study the error that is introduced together with the interpretation of the unit application rules, thereby focusing on COSMIC CFPs. Due to subjectivity and degrees of freedom, this error can lead to great measurement dispersions. We have analyzed these dispersions, based upon a study that we have performed at our university, together with a group of Master students.
This paper proposes a prediction engine designed for non-dedicated clusters, which is able to estimate the turnaround time for parallel applications, even in the presence of serial workload of the workstation owner. T...
详细信息
This paper proposes a prediction engine designed for non-dedicated clusters, which is able to estimate the turnaround time for parallel applications, even in the presence of serial workload of the workstation owner. The prediction engine can be configured to work with three different estimation kernels: a Historical kernel, a Simulation kernel based on analytical models and an integration of both, named Hybrid kernel. These estimation proposals were integrated into a scheduling system, named CISNE, which can be executed in an on-line or off-line mode. The accuracy of the proposed estimation methods was evaluated in relation to different job scheduling policies in a real and a simulated cluster environment. In both environments, we observed that the Hybrid system gives the best results because it combines the ability of a simulation engine to capture the dynamism of a non-dedicated environment together with the accuracy of the historical methods to estimate the application runtime considering the state of the resources.
Increasing automation of business processes and industrial demand for complex workflow features have led to the development of more flexible and agile workflow concepts. One of those concepts is the use of goal-orient...
详细信息
The cognitively impaired population is very sensitive to issues of abstraction, which presents the application designer with the challenge of tailoring navigational information to each specific user and context. COCA-...
详细信息
Providing incentives for user contribution has been one of the primary design goals of Peer-to-Peer systems. The newly-emerged BitTorrent private communities adopt Sharing Ratio Enforcement (SRE) on top of BitTorrent&...
详细信息
Recent trends in secure operatingsystems indicate that an object-capability system is the security model with preeminent characteristics and practicality. Unlike traditional operatingsystems, which use a single glob...
详细信息
暂无评论