Validated methods for initial value problems for ordinary differential equations produce bounds that are guaranteed to contain the true solution of a problem. When computing such bounds, these methods verify that a un...
详细信息
Validated methods for initial value problems for ordinary differential equations produce bounds that are guaranteed to contain the true solution of a problem. When computing such bounds, these methods verify that a unique solution to the problem exists in the interval of integration and compute a priori bounds for the solution in this interval. A major difficulty in this verification phase is how to take as large a stepsize as possible, subject to some tolerance requirement. We propose a high-order enclosure method for proving existence and uniqueness of the solution and computing a priori bounds.
In order to satisfy, the complex and various demands of the customers, telecommunication networks must provide their services rapidly and flexibly, with the support of efficient service and network management systems....
详细信息
ISBN:
(纸本)0769512305
In order to satisfy, the complex and various demands of the customers, telecommunication networks must provide their services rapidly and flexibly, with the support of efficient service and network management systems. To fulfill these requirements, TINA has appeared as a concept for the advanced telecommunication system using information technology such as distributed processing, object oriented modeling. We mention some problems of developing applications in the TINA service management layer. To solve the problems, we propose the advanced architecture called OMS (object management system), which consists of three managers (data manager, data access manager and metadata registry manager). OMS separates the application layer and the middleware such as ODBC and JDBC. And the application layer and OMS are connected by distributed object middleware based on CORBA. Also in order to manage efficiently managed objects stored in different repositories, we have implemented metadata registry by using the metadata concept.
We present the design, implementation and evaluation of a framework that uses JavaSpaces [1] to support this type of opportunistic adaptive parallel/distributed computing over networked clusters in a non-intrusive man...
详细信息
We present the design, implementation and evaluation of a framework that uses JavaSpaces [1] to support this type of opportunistic adaptive parallel/distributed computing over networked clusters in a non-intrusive manner. The framework targets applications exhibiting coarse-grained parallelism and has three key features: (1) portability across heterogeneous platforms, (2) minimal configuration overheads for participating nodes, and (3) automated system state monitoring (using SNMP) to ensure nonintrusive behavior. Experimental results presented in this paper demonstrate that for applications that can be broken into coarse-grained, relatively independent tasks, the opportunistic adaptive parallel computing framework can provide performance gains. Furthermore, the results indicate that monitoring and reacting to the current system state minimizes the intrusiveness of the framework.
The growth of the Internet and the advent of the computational "Grid" have made it possible to develop and deploy advanced computational collaboratories. These systems build on high-end computational resourc...
详细信息
The growth of the Internet and the advent of the computational "Grid" have made it possible to develop and deploy advanced computational collaboratories. These systems build on high-end computational resources and communication technologies underlying the Grid, and provide seamless and collaborative access to particular resources, services or applications. Integrating these "focused" collaboratories presents significant challenges. Key among these is the design and development of robust middleware support that addresses scalability, service discovery, security and access control, and interaction and collaboration management for consistent access. The authors first investigate the architecture of such a middleware that enables global (Web-based) access to collaboratories. They then present the design and implementation of a middleware substrate that enables a peer-to-peer integration of and global (collaborative) access to geographically distributed instances of the DISCOVER computational collaboratory for interaction and steering.
As every information system becomes connected to every other information system, they form the so-called "information utility". This is the domain in which contemporary distributedsystems have to operate. N...
详细信息
As every information system becomes connected to every other information system, they form the so-called "information utility". This is the domain in which contemporary distributedsystems have to operate. New applications have to be evolved on this platform of existing systems that may hold inconsistent information. Consequently, solutions need to be able work in a world of only partially correct information. In this paper, we discuss means whereby architects, designers and engineers may, in this context of information inconsistency, develop new business solutions and reason about their validity. In particular we describe the properties of inter-enterprise system architectures for applications working with partially replicated and partially consistent information. These must be able to operate under reversible assumptions and to undo operations as a consequence of reversing assumptions. We have developed exemplary architectures that exhibit these properties, used them to investigate the concept of inconsistency-tolerant components and begun to devise methods of building inter-enterprise applications from such components. This approach, we conjecture, makes reasoning about the validity of proposed inter-enterprise scale solutions more straightforward and thus increases the speed with which new solutions can be deployed. We are evaluating these ideas now, by building, along with our industrial collaborators, realistic enterprise-scale demonstrations in the domains of Finance and Defence.
This paper reports on an ongoing research project aimed at designing and deploying a COMA Commodity Grid (COG) Kit. The overall goal of this project is to explore how commodity distributed computing technologies and s...
详细信息
Recent significant advances in artificial intelligence have led to the emergence of new concepts of soft computing genetic programming, evolutionary engineering, hybrid intelligent systems, and artificial life. EE des...
详细信息
ISBN:
(纸本)0769511651
Recent significant advances in artificial intelligence have led to the emergence of new concepts of soft computing genetic programming, evolutionary engineering, hybrid intelligent systems, and artificial life. EE design relies on evolutionary algorithms to construct or evolve complex systems. This paper is intended to highlight the concept of evolutionary engineering, the motivations behind the use of EE in building complex systems, and a step by step methodology for designing such systems. Finally, we emphasize on a typical example of "Brain Building design project using EE: the CAM Brain Machine.
Broadband integrated services digital networks (B-ISDN) are aimed to transport both real-time traffic and non real-time traffic. Many of these applications require quality of service (QoS) guarantees. In the literatur...
详细信息
ISBN:
(纸本)0769511864
Broadband integrated services digital networks (B-ISDN) are aimed to transport both real-time traffic and non real-time traffic. Many of these applications require quality of service (QoS) guarantees. In the literature, not much work is found to provide QoS guarantees based on fault tolerance. Reliability of network links is considered as one of the parameters when providing QoS guarantees to applications. Considering reliability of network links as a parameter for QoS guarantees gives the applications more flexibility in choosing the network resources. A new terminology for dispersity routing is presented which will be useful in providing QoS guarantees based on reliability. Dispersity routing transmits the traffic along multiple paths. Also, a reliable backup resource allocation method is presented that can be used in the context of dispersity routing for fault tolerant real-time networks. An assumption is made that higher capacity is assigned to the links which are more reliable. This will help in availability of resources for a longer period of time. Also, reliability of links is considered to compute multiple paths along with shortest path metric.
Estimation of the defect content is important to enable quality control throughout the software development process. Capture-recapture methods and curve fitting methods have been suggested as tools to estimate the def...
详细信息
ISBN:
(纸本)0769513069
Estimation of the defect content is important to enable quality control throughout the software development process. Capture-recapture methods and curve fitting methods have been suggested as tools to estimate the defect content after a review. The methods are highly reliant on the quality of the data. If the number of reviewers is fairly small, it becomes difficult or even impossible to get reliable estimates. This paper presents a comprehensive study of estimates based on two reviewers, using real data from reviews. Three experience-based defect content estimation methods are evaluated vs. methods that use data only from the current review. Some models are possible to distinguish from each other in terms of statistical significance. In order to gain an even better understanding, the best models are compared subjectively. It is concluded that the experience-based methods provide some good opportunities to estimate the defect content after a review.
We describe our work in implementing business-to-business (B2B) contracts using Microsoft's BizTalk. BizTalk is a Microsoft product for the development of XML based document messaging systems specifically for e-co...
详细信息
ISBN:
(纸本)0769509819
We describe our work in implementing business-to-business (B2B) contracts using Microsoft's BizTalk. BizTalk is a Microsoft product for the development of XML based document messaging systems specifically for e-commerce. We have developed a B2B enterprise model that supports a wide range of economic transactions associated with intangible goods and services. This model guides implementation of our business contract architecture software. The model identifies specific roles such as a repository for contract schemas and instances, auditor, monitor and enforcer. A contract scenario is used to illustrate the architecture and concepts described. We go into detail on the BizTalk implementation of contracts and show how a contract can be used as the basis for policies and plans that govern the behavior of the parties involved in the contract.
暂无评论