Extensions to the actor model have been proposed to ease the development of mobile ad hoc applications. However, programming in the actor model is still difficult as it does not provide abstractions to synchronously c...
详细信息
ISBN:
(纸本)9781605583648
Extensions to the actor model have been proposed to ease the development of mobile ad hoc applications. However, programming in the actor model is still difficult as it does not provide abstractions to synchronously coordinate multiple actors. Thus, when programmers want to coordinate two or more actors they have to do it by hand. Additionally, programmers need to write failure recovery code for failures caused by the concurrent access to the actors they are using. Coding this manually is error prone and might even be not feasible. We propose a language abstraction based on software transactional memory to coordinate actors. We show that the integration of software transactional memory with the actor model makes writing failure recovery code superuous. Moreover, we show that our system even handles those cases where manually writing the failure recovery code is not feasible. Copyright 2008 ACM.
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time ...
详细信息
ISBN:
(纸本)9780980326727
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time and the high cost in renting a fixed number of servers. We present its system architecture and describe its implementation in details. An experimental high-definition movie streaming site was setup using our content delivery grid system to demonstrate its capabilities with performance analysis.
We propose a novel execution model for the implicitly parallel execution of data parallel programs in the presence of general I/O operations. This model is called hybrid because it combines the advantages of the stand...
详细信息
Network Intrusion Detection Systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be re...
详细信息
ISBN:
(纸本)1601320752
Network Intrusion Detection Systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be regarded as classification problem, we use Artificial Neural networks for detection. Using a benchmark study and set from the KDD (Knowledge Data Discovery and Data Mining) competition designed by DARPA and Multi-layered perceptron neural network, this Paper will aim to solve a multi class problem using MLP in to distinguish the attack records from normal ones, and also identify the attack type. In addition, it shows how to use Tikhonov regularization parameter to optimize the optimal network architecture in order to increase the system performance. The results show that the designed system is capable of classifying records with 98.34% accuracy with two hidden layers of neuron. Finally, the performance of the benchmark study is compared with our results.
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected err...
详细信息
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected error for some binary symmetric and non-symmetric channels protected by appropriate codes. In detail, communication via different binary symmetric channels (BSCs), generalized erasure channels and symmetrized binary non symmetric channels (BNSCs) is investigated. Simple upper bounds are given, relating the new formulas to that one of the BSC Finally the results in connection with an inequality for proper codes are applied to multi wavelength optical transmission through channels generated by semiconductor lasers.
Shape-generic programming and high run time performance do match if generic source code is systematically specialised into nongeneric executable code. However, as soon as we drop the assumption of whole-world knowledg...
详细信息
With single thread performance starting to plateau, HW architects have turned to chip level multiprocessing (CMP) to increase processing power. All major microprocessor companies are aggressively shipping multi-core p...
详细信息
ISBN:
(纸本)1595936025
With single thread performance starting to plateau, HW architects have turned to chip level multiprocessing (CMP) to increase processing power. All major microprocessor companies are aggressively shipping multi-core products in the mainstream computing market. Moore's law will largely be used to increase HW thread-level parallelism through higher core counts in a CMP environment. CMPs bring new challenges into the design of the software system stack. In this tutorial, we talk about the shift to multi-core processors and the programming implications. In particular, we focus on transactional programming. Transactions have emerged as a promising alternative to lock-based synchronization that eliminates many of the problems associated with lock-based synchronization. We discuss the design of both hardware and software transactional memory and quantify the tradeoffs between the different design points. We show how to extend the Java and C languages with transactional constructs, and how to integrate transactions with compiler optimizations and the language runtime (e.g., memory manager and garbage collection).
We present novel concepts, technologies and potentials of optical data communication, especially for future computer architectures. The WDM (wavelength division multiplexing) and the optical wiring technologies are ex...
详细信息
This paper revisits a problem that was identified by Kramer and Magee: placing a system in a consistent state before and after runtime changes. We show that their notion of quiescence as a necessary and sufficient con...
详细信息
暂无评论