Providing fault tolerance for message passing parallel application on a distributed environment is a rule rather than an exception. A node failure can cause the whole computation to stop and has to be restarted from t...
详细信息
Providing fault tolerance for message passing parallel application on a distributed environment is a rule rather than an exception. A node failure can cause the whole computation to stop and has to be restarted from the beginning if no fault tolerance is available. However, introducing fault tolerance has some overhead on speedup that can be achieved. In this paper, we introduce a new technique called replication with cross-over packets for reliability and to increase fault tolerance over Very Large Scale Grids (VLSG). This technique has two pronged effect of avoiding single point of failure and single link of failure. We incorporate this new technique into the L-BSP model and show the possible speedup of parallel process. We also derive the achievable speedup for some fundamental parallel algorithms using this technique.
Trusted platform model (TPM) is special-purpose integrated circuits built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to confident...
详细信息
Trusted platform model (TPM) is special-purpose integrated circuits built into a variety of platforms to enable strong user authentication and machine attestation-essential to prevent inappropriate access to confidential and sensitive information and to protect against compromised networks. As a necessary component for multifarious platforms, storage device keeps on a mass of data including confidential and secretive information. How to ensure data not to be accessed by unauthorized users effectively, and to guarantee information to be in safe and secure state? Aiming at these problems, we put forward a novel scheme for protecting data on personal computer platform. By combing trusted computing platform, we propose a secure and reliable model for user authentication and data encryption. The model uses storage protocol to establish a password system to encrypt data, and uses TPM to authenticate different users. We also implement this model by adding it into trusted computing platform. The enhanced platform can not only encrypt data per sector drastically, but also exclude those who can't be authenticated. Some external software attacks and physical theft also cut no ice.
In this paper, combined with Tatsuoka 's Rule Space Model and the Attribute hierarchy Method (AHM), Formal Concept Analysis (FCA) is firstly applied into computerized Adaptive Testing (CAT). Based on FCA, an initi...
详细信息
In this paper, combined with Tatsuoka 's Rule Space Model and the Attribute hierarchy Method (AHM), Formal Concept Analysis (FCA) is firstly applied into computerized Adaptive Testing (CAT). Based on FCA, an initiatory and systemic CAT with cognitive diagnosis (CD) is designed, which diagnoses examinees real time. The result of Monte Carlo study shows that examinees ' knowledge states are well diagnosed and the precision in examinees ' abilities estimation is satisfied.
Component-based development has become a recognized technique for building large scale distributed applications. Although the maturity of this technique, there appears to be quite a significant gap between (a) compone...
详细信息
Component-based development has become a recognized technique for building large scale distributed applications. Although the maturity of this technique, there appears to be quite a significant gap between (a) component systems that are rich in advanced features (e.g., component nesting, software connectors, versioning, dynamic architectures), but which have typically only poor or even no runtime support, and (b) component systems with a solid runtime support, but which typically possess only a limited set of the advanced features. In our opinion, this is mainly due to the difficulties that arise when trying to give proper semantics to the features and reify them in development tools and an runtime platform. In this paper, we describe the implementation of the runtime environment for the SOFA 2.0 component model. In particular, we focus on the runtime support of the advanced features mentioned above. The described issues and the solution are not specific only to SOFA 2.0, but they are general and applicable to any other component system aiming at addressing such features.
The QAOOSE 2007 workshop brought together, for half day, researchers working on several aspects related to quantitative evaluation of software artifacts developed with the object-oriented paradigm and related technolo...
ISBN:
(纸本)9783540781943
The QAOOSE 2007 workshop brought together, for half day, researchers working on several aspects related to quantitative evaluation of software artifacts developed with the object-oriented paradigm and related technologies. Ideas and experiences were shared and discussed. This report includes a summary of the technical presentations and subsequent discussions raised by them. Exceptionally this year, one of the founders of the workshop, Horst Zuse, gave a keynote on the Theoretical Foundations of Object-Oriented Measurement. Three out of the four submitted position papers were presented, covering different aspects such as measuring inconsistencies, visualizing metric values, and assessing the subjective quality of systems. In the closing session, the participants discussed open issues and challenges arising from researching in this area and tried to forecast what will be hot research topics in the short and medium terms.
Bloom's taxonomy of the cognitive domain and the SOLO taxonomy are being increasingly widely used in the design and assessment of courses, but there are some drawbacks to their use in computer science. This paper ...
详细信息
ISBN:
(纸本)9781450378420
Bloom's taxonomy of the cognitive domain and the SOLO taxonomy are being increasingly widely used in the design and assessment of courses, but there are some drawbacks to their use in computer science. This paper reviews the literature on educational taxonomies and their use in computer science education, identifies some of the problems that arise, proposes a new taxonomy and discusses how this can be used in application-oriented courses such as programming.
Middleware architectures play a crucial role in determining the overall quality of many distributed applications. Systematic evaluation methods for middleware architectures are therefore important to thoroughly assess...
详细信息
ISBN:
(纸本)9783540488194
Middleware architectures play a crucial role in determining the overall quality of many distributed applications. Systematic evaluation methods for middleware architectures are therefore important to thoroughly assess the impact of design decisions on quality goals. This paper presents MEMS, a scenario-based evaluation approach. MEMS provides a principled way of evaluating middleware architectures by leveraging generic qualitative and quantitative evaluation techniques such as prototyping, testing, rating, and analysis. It measures middleware architectures by rating multiple quality attributes, and the outputs aid the determination of the suitability of alternative middleware architectures to meet an application's quality goals. MEMS also benefits middleware development by uncovering potential problems at early stage, making it cheaper and quicker to fix design problems. The paper describes a case study to evaluate the security architecture of grid middleware architectures for managing secure conversations and access control. The results demonstrate the practical utility of MENIS for evaluating middleware architectures for multiple quality attributes.
Learning Objects is not a new approach in electronic learning system. It has been applied since more than seven years ago. It can be clearly seen in CanCore project [9] in Canada and the emerging of several standards ...
详细信息
作者:
Wentzlaff, InaSpecker, MarkusUniversity Duisburg-Essen
Faculty of Engineering Department of Computer Science Software Engineering Oststraße 99 47057 Duisburg Germany University Duisburg-Essen
Faculty of Engineering Department of Computer Science Interactive Systems and Interaction Design Lotharstraße 65 47057 Duisburg Germany
Using patterns to preserve common problem-solving knowledge is a very popular approach. Each computer science community applies its own techniques to document engineering principles for the handling of recurring softw...
详细信息
ISBN:
(纸本)1595934359
Using patterns to preserve common problem-solving knowledge is a very popular approach. Each computer science community applies its own techniques to document engineering principles for the handling of recurring software development questions using patterns. Thus various pattern collections were evolved for dealing with specific problems of the respective community. As a result comparable patterns or redundant pattern descriptions exist in different collections leading unintentionally to a "reinvention of the wheel" time and again. Taking the development of a chat application as an example, we present an approach for integrating patterns from different softwareengineering disciplines. We transform problem patterns (problem frames) into solution patterns (design patterns) by using a case-based reasoning methodology to achieve a pattern-based software development process which systematically leads from natural language requirements to semi-formal near code level descriptions. We particularly consider non-functional software properties by combining design patterns of human-computer interaction (HCI) with softwareengineering (SE) patterns in order to support the systematic development of user-friendly software applications.
In the service-oriented software environment, interactions between components are highly dependent on the exposed service interfaces. Therefore, designing an appropriate service interface is essential. In this paper, ...
详细信息
暂无评论