The abundant computing resources available on the Internet has made grid computing over the Internet a viable solution, to scientific problems. The dynamic nature of the Internet necessitates dynamic reconfigurability...
详细信息
The abundant computing resources available on the Internet has made grid computing over the Internet a viable solution, to scientific problems. The dynamic nature of the Internet necessitates dynamic reconfigurability of applications to handle failures and varying loads. Most of the existing grid solutions handle reconfigurability to a limited extent. These systems lack appropriate support to handle the failure of key-components, like coordinators, essential for the computational model. We propose a two layered peer-to-peer middleware, Vishwa, to handle reconfiguration of the application in the face of failure and system load. The two-layers, task management layer and reconfiguration layer, are used in conjunction by the applications to adapt and mask node failures. We show that our system is able to handle the failures of the key-components of a computation model. This is demonstrated in the case studies of two computational models, namely bag of tasks and connected problems, with an appropriate example for each
Some of the key issues in building services for large scale distributedsystems, realizing Vishwa, a peer-to-peer (P2P) middleware architecture for developing grid applications are discussed. Researchers are producing...
详细信息
Some of the key issues in building services for large scale distributedsystems, realizing Vishwa, a peer-to-peer (P2P) middleware architecture for developing grid applications are discussed. Researchers are producing large amounts of scientific data and believe that distributed computations on the data must be scheduled and available to a large number of scientists. It is suggested that the platform must scale up to a large number of nodes and data units in the system and must also be scalable geographically. A scalable, reconfigurable shared-object space over the two-layer architecture can be developed that incorporates mechanisms to maintain replicated data and must also provide a shared-object abstraction over a wide-area distributed system.
Connectors are used to realize component interactions in component systems. Apart from their primary function, which is mediating the communication, their implementation can also support additional features that, whil...
详细信息
The paper recasts the problem of feature location in source code as a decision-making problem in the presence of uncertainty. The main contribution consists in the combination of two existing techniques for feature lo...
详细信息
The paper recasts the problem of feature location in source code as a decision-making problem in the presence of uncertainty. The main contribution consists in the combination of two existing techniques for feature location in source code. Both techniques provide a set of ranked facts from the software, as result to the feature identification problem. One of the techniques is based on a scenario based probabilistic ranking of events observed while executing a program under given scenarios. The other technique is defined as an information retrieval task, based on the latent semantic indexing of the source code. We show the viability and effectiveness of the combined technique with two case studies. A first case study is a replication of feature identification in Mozilla, which allows us to directly compare the results with previously published data. The other case study is a bug location problem in Mozilla. The results show that the combined technique improves feature identification significantly with respect to each technique used independently
A role paradigm conformance model (RPCM) called Typehole model was developed and implemented in Java. It does not use Is-role-of inheritance and is free from the object schizophrenia (OS) problem (OSP). An extended di...
详细信息
Recent advances in wireless technology have enabled the rapid development of wireless sensor networks. Such networks, consisting of ten to thousands of randomly deployed nodes collaborating to achieve a goal, are used...
详细信息
Recent advances in wireless technology have enabled the rapid development of wireless sensor networks. Such networks, consisting of ten to thousands of randomly deployed nodes collaborating to achieve a goal, are used in a variety of applications. We have developed a new framework called TinyMaCLaS(tiny middleware and compositional language for sensor networks) for sensor networks that simplifies the process of developing applications. As a part of this framework, we have developed a COMiS(component oriented middleware for sensor networks). Most of the protocols and middleware argue scalability through simulations. Unfortunately, theoretical analysis does not exist for scalability. We have done theoretical analysis, in order to prove the scalability of our middleware. The paper presents the theoretical analysis, and it can be used for any middleware or protocol.
engineering a large software project involves tracking the impact of development and maintenance changes on the software performance. An approach for tracking the impact is regression benchmarking, which involves auto...
详细信息
engineering a large software project involves tracking the impact of development and maintenance changes on the software performance. An approach for tracking the impact is regression benchmarking, which involves automated benchmarking and evaluation of performance at regular intervals. Regression benchmarking must tackle the nondeterminism inherent to contemporary computersystems and execution environments and the impact of the nondeterminism on the results. On the example of a fully automated regression benchmarking environment for the mono open-source project, we show how the problems associated with nondeterminism can be tackled using statistical methods.
Peer-to-peer (P2P) networks are generally considered to be free havens for pirated content, in particular with respect to music. We describe a solution for the problem of copyright infringement in P2P networks for mus...
详细信息
Regression testing is an important part of software quality assurance. We work to extend regression testing to include regression benchmarking, which applies benchmarking to detect regressions in performance. Given th...
详细信息
暂无评论