Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Series

1997

Institution
Keyword
Publication

Articles 1 - 30 of 52

Full-Text Articles in Computer Engineering

Flow And Congestion Control For Internet Streaming Applications, Shanwei Cen, Calton Pu, Jonathan Walpole Dec 1997

Flow And Congestion Control For Internet Streaming Applications, Shanwei Cen, Calton Pu, Jonathan Walpole

Computer Science Faculty Publications and Presentations

The emergence of streaming multimedia players provides users with low latency audio and video content over the Internet. Providing high-quality, best-effort, real-time multimedia content requires adaptive delivery schemes that fairly share the available network bandwidth with reliable data protocols such as TCP. This paper proposes a new flow and congestion control scheme, SCP (Streaming Control Protocol) , for real-time streaming of continuous multimedia data across the Internet. The design of SCP arose from several years of experience in building and using adaptive real-time streaming video players. SCP addresses two issues associated with real-time streaming. First, it uses a congestion control …


Searches For Scalar Top And Scalar Bottom Quarks At Lep2, Barate, R.; Et Al., M. Thulasidas Nov 1997

Searches For Scalar Top And Scalar Bottom Quarks At Lep2, Barate, R.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

Searches for scalar top and bottom quarks have been performed with data collected by the ALEPH detector at LEP. The data sample consists of 21.7 pb−1 taken at √ s = 161, 170, and 172 GeV and 5.7 pb−1 taken at √ s = 130 and 136 GeV. No evidence for scalar top quarks or scalar bottom quarks was found in the channels ˜t → cχ, ˜t → bℓν˜, and b˜ → bχ. For the channel ˜t → cχ a limit of 67 GeV/c 2 has been set on the scalar top quark mass, independent of the mixing angle between …


Modeling And Comparison Of Wormhole Routed Mesh And Torus Networks, Ronald I. Greenberg, Lee Guan Oct 1997

Modeling And Comparison Of Wormhole Routed Mesh And Torus Networks, Ronald I. Greenberg, Lee Guan

Computer Science: Faculty Publications and Other Works

2D-mesh and torus networks have often been proposed as the interconnection pattern for parallel computers. In addition, wormhole routing has increasingly been advocated as a method of reducing latency. Most analysis of wormhole routed networks, however, has focused on the torus and the broader class of k-ary n-cubes to which it belongs. This paper presents a performance model for the wormhole routed mesh, and it compares the performance of the mesh and torus based on theoretical and empirical analyses.


A Measurement Of The Qcd Colour Factors And A Limit On The Light Gluino, Barate, R.; Et Al., M. Thulasidas Sep 1997

A Measurement Of The Qcd Colour Factors And A Limit On The Light Gluino, Barate, R.; Et Al., M. Thulasidas

Research Collection School Of Computing and Information Systems

Using data collected from 1992 to 1995 with the ALEPH detector at LEP, a measurement of the colour factor ratios CA/CF and TF /CF and the strong coupling constant αs = CFαs(MZ)/(2π) has been performed by fitting theoretical predictions simultaneously to the measured differential two-jet rate and angular distributions in four-jet events. The result is found to be in excellent agreement with QCD, {fx4-1} Fixing CA/CF and TF/CF to the QCD values permits a determination of αs(MZ) and ηf, the number of active flavours. With this measurement the existence of a gluino with mass below 6.3 GeV/c2 is excluded at …


An Improved Analytical Model For Wormhole Routed Networks With Application To Butterfly Fat-Trees, Ronald I. Greenberg, Lee Guan Aug 1997

An Improved Analytical Model For Wormhole Routed Networks With Application To Butterfly Fat-Trees, Ronald I. Greenberg, Lee Guan

Computer Science: Faculty Publications and Other Works

A performance model for wormhole routed interconnection networks is presented and applied to the butterfly fat-tree network. Experimental results agree very closely over a wide range of load rate. Novel aspects of the model, leading to accurate and simple performance predictions, include (1) use of multiple-server queues, and (2) a general method of correcting queuing results based on Poisson arrivals to apply to wormhole routing. These ideas can also be applied to other networks.


Dynamic Load Distribution In Mist, K. Al-Saqabi, R. M. Prouty, Dylan Mcnamee, Steve Otto, Jonathan Walpole Jul 1997

Dynamic Load Distribution In Mist, K. Al-Saqabi, R. M. Prouty, Dylan Mcnamee, Steve Otto, Jonathan Walpole

Computer Science Faculty Publications and Presentations

This paper presents an algorithm for scheduling parallel applications in large-scale, multiuser, heterogeneous distributed systems. The approach is primarily targeted at systems that harvest idle cycles in general-purpose workstation networks, but is also applicable to clustered computer systems and massively parallel processors. The algorithm handles unequal processor capacities, multiple architecture types and dynamic variations in the number of processes and available processors. Scheduling decisions are driven by the desire to minimize turnaround time while maintaining fairness among competing applications. For efficiency, the virtual processors (VPs) of each application are gang scheduled on some subset of the available physical processors.


A Toolkit For Specializing Production Operating System Code, Crispin Cowan, Dylan Mcnamee, Andrew P. Black, Calton Pu, Jonathan Walpole, Charles Krasic, Perry Wagle, Qian Zhang Jun 1997

A Toolkit For Specializing Production Operating System Code, Crispin Cowan, Dylan Mcnamee, Andrew P. Black, Calton Pu, Jonathan Walpole, Charles Krasic, Perry Wagle, Qian Zhang

Computer Science Faculty Publications and Presentations

Specialization has been recognized as a powerful technique for optimizing operating systems. However, specialization has not been broadly applied beyond the research community because the current techniques, based on manual specialization, are time-consuming and error-prone. This paper describes a specialization toolkit that should help broaden the applicability of specializing operating systems by assisting in the automatic generation of specialized code, and {\em guarding} the specialized code to ensure the specialized system continues to be correct. We demonstrate the effectiveness of the toolkit by describing experiences we have had applying it in real, production environments. We report on our experiences with …


Predictable File Access Latency For Multimedia, Dan Revel, Crispin Cowan, Dylan Mcnamee, Calton Pu, Jonathan Walpole May 1997

Predictable File Access Latency For Multimedia, Dan Revel, Crispin Cowan, Dylan Mcnamee, Calton Pu, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Multimedia applications are sensitive to I/O latency and jitter when accessing data in secondary storage. Transparent adaptive prefetching (TAP) uses software feedback to provide multimedia applications with file system quality of service (QoS) guarantees. We are investigating how QoS requirements can be communicated and how they can be met by adaptive resource management. A preliminary test of adaptive prefetching is presented.


Mlpq: A Linear Constraint Database System With Aggregate Operators, Yiming Li Apr 1997

Mlpq: A Linear Constraint Database System With Aggregate Operators, Yiming Li

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

In this project report, I will discuss a Multiple Linear Programming Query (MLPQ) system and the theoretical background of this system.The MPLQ system is developed to solve some realistic problems involving both linear programming (UP) techniques and linear constraint databases (LCDBs) theory. The MLPQ system is aimed at providing a mechanism of bridging these two important areas. system basically consists of three parts which are a linear constraint database, an LP solver, and an interface between the LCDB and the LP solver. The LCDB of the MLPQ system contains multiple linear programming problems. The LP solver used in the MPLQ …


Alchourron's Defeasible Conditionals And Defeasible Reasoning, Fernando Tohme, Ronald P. Loui Jan 1997

Alchourron's Defeasible Conditionals And Defeasible Reasoning, Fernando Tohme, Ronald P. Loui

All Computer Science and Engineering Research

No abstract provided.


A Global Computing Environment For Networked Resources, Haluk Topcuoglu, Salim Hariri Jan 1997

A Global Computing Environment For Networked Resources, Haluk Topcuoglu, Salim Hariri

Electrical Engineering and Computer Science - All Scholarship

Current advances in high-speed networks and WWW technologies have made network computing a cost-effective, high-performance computing alternative. New software tools are being developed to utilize efficiently the network computing environment. Our project, called Virtual Distributed Computing Environment (VDCE), is a high-performance computing environment that allows users to write and evaluate networked applications for different hardware and software configurations using a web interface. In this paper we present the software architecture of VDCE by emphasizing application development and specification, scheduling, and execution/runtime aspects.


Mobile Unity: A Language And Logic For Concurrent Mobile Systems, Peter J. Mccann, Gruia-Catalin Roman Jan 1997

Mobile Unity: A Language And Logic For Concurrent Mobile Systems, Peter J. Mccann, Gruia-Catalin Roman

All Computer Science and Engineering Research

Traditionally, a distributed system has been viewed as a collection of fixed computational elements connected by a static network. Prompted by recent advances in wireless communications rechnology, the emerging field of mobile computing is challenging these assumptions by providing mobile hosts with connectivity that may change over time, raising the possibility that hosts may be called upon to operate while only weakly connected to or while completely disconnected from other hosts. We define a concurrent mobile system as one where independently executing coponents may migrate through some space during the course of the computation, and where the pattern of connectivity …


Building Interactive Distributed Applications In C++ With The Programmers' Playground, Kenneth J. Goldman, Joe Hoffert, T. Paul Mccartney, Jerome Plun, Todd Rogers Jan 1997

Building Interactive Distributed Applications In C++ With The Programmers' Playground, Kenneth J. Goldman, Joe Hoffert, T. Paul Mccartney, Jerome Plun, Todd Rogers

All Computer Science and Engineering Research

The objective of The Programmers' Playground, described in this manual, is to provide a development environment and underlying support for end-user construction of distributed multimedia applications from reusable self-describing software components. Playground provides a set of software tools and a methodology for simplifying the design and construction of applications that interact with each other and with people in a distributed computer system. This manual explains how to write interactive distributed applications using Playground. The only background necessary to get started is an understanding of basic data structures and control constructs in C++. If you already know C++, then with the …


Exact Learning Of Discretized Geometric Concepts, Nader H. Bshouty, Paul W. Goldberg, Sally A. Goldman, H. David Mathias Jan 1997

Exact Learning Of Discretized Geometric Concepts, Nader H. Bshouty, Paul W. Goldberg, Sally A. Goldman, H. David Mathias

All Computer Science and Engineering Research

We first present an algorithm that uses membership and equivalence queries to exactly identify a discretized geometric concept defined by the unioin of m axis-parallel boxes in d-dimensional discretized Euclidean space where each coordinate can have n discrete values. This algorithm receives at most md counterexamples and uses time and membership queries polynomial in m and log(n) for any constant d. Furthermore, all equivalence queries can be formulated as the union of O(mdlog(m)) axis-parallel boxes. Next, we show how to extend our algorithm to efficiently learn, from only equivalence queries, any discretized geometric concept generated from any number of halfspaces …


Learning With Unreliable Boundary Queries, Avrim Blum, Prasad Chalasani, Sally A. Goldman, Donna K. Slonim Jan 1997

Learning With Unreliable Boundary Queries, Avrim Blum, Prasad Chalasani, Sally A. Goldman, Donna K. Slonim

All Computer Science and Engineering Research

We introduce a model for learning from examples and membership queries in situations where the boundary between positive and negative examples is somewhat ill-defined. In our model, queries near the boundary of a target concept may receive incorrect or "don't care" responses, and the distribution of examples has zero probability mass on the boundary region. The motivation behind our model is that in many cases the boundary between positive and negative examples is complicated or "fuzzy." However, one may still hope to learn successfully, because the typical examples that one sees to not come from that region. We present several …


Reasoning About Code Mobility With Mobile Unity, Gian Pietro Picco, Gruia-Catalin Roman, Peter J. Mccann Jan 1997

Reasoning About Code Mobility With Mobile Unity, Gian Pietro Picco, Gruia-Catalin Roman, Peter J. Mccann

All Computer Science and Engineering Research

Advancements in network technology have led to the emergence of new computing paradigms that challenge established programming practices by employing weak forms of consistency and dynamic forms of binding. Code mobility, for instance, allows for invocation-time binding between a code fragment and the location where it executes. Similarly, mobile computing allows hosts (and the software they execute) to alter their physical location. Despite apparent similarities, the two paradigms are distinct in their treatment of location and movement. This paper seeks to uncover a common foundation for the two paradigms by exploring the manner in which stereotypical forms of code mobility …


Sequence Assembly Validation By Restriction Digest Fingerprint Comparison, Eric C. Rouchka, David J. States Jan 1997

Sequence Assembly Validation By Restriction Digest Fingerprint Comparison, Eric C. Rouchka, David J. States

All Computer Science and Engineering Research

DNA sequence analysis depends on the accurate assembly of fragment reads for the determination of a consensus sequence. Genomic sequences frequently contain repeat elements that may confound the fragment assembly process, and errors in fragment assembly, and errors in fragment assembly may seriously impact the biological interpretation of the sequence data. Validating the fidelity of sequence assembly by experimental means is desirable. This report examines the use of restriction digest analysis as a method for testing the fidelity of sequence assembly. Restriction digest fingerprint matching is an established technology for high resolution physical map construction, but the requirements for assembly …


Dialogue And Deliberation, Ronald P. Loui, Diana M. Moore Jan 1997

Dialogue And Deliberation, Ronald P. Loui, Diana M. Moore

All Computer Science and Engineering Research

Formal accounts of negotiation tend to invoke the strategic models of conflict which have been impressively developed by game theorists in this half-century. For two decades, however, research on artificial intelligence (AI) has produced a different formal picture of the agent and of the rational deliberations of agents. AI's models are not based simply on intensities of preference and quantities of probability. AI's models consider that agents use language in various ways, that agents use and convey knowledge, that agents plan, search, focus, and argue. Agents can choose their language, apply their knowledge, change their plans, continue their search, shift …


Noise-Tolerant Parallel Learning Of Geometric Concepts, Nader H. Bshouty, Sally A. Goldman, H. David Mathias Jan 1997

Noise-Tolerant Parallel Learning Of Geometric Concepts, Nader H. Bshouty, Sally A. Goldman, H. David Mathias

All Computer Science and Engineering Research

We present several efficient parallel algorithms for PAC-learning geometric concepts in a constant-dimensional space. The algorithms are robust even against malicious classification noise of any rate less than 1/2. We first give an efficient noise-tolerant parallel algorithm to PAC-learn the class of geometric concepts defined by a polynomial number of (d-1)-dimensional hyperplanes against an arbitrary distribution where each hyperplane has a slope from a set of known slopes. We then describe how boosting techniques can be used so that our algorithms' dependence on {GREEK LETTER} and {DELTA} does not depend on d. Next we give an efficient noise-tolerant parallel algorithm …


A Theoretical And Empirical Study Of A Noise-Tolerant Algorithm To Learn Geometric Patterns, Sally A. Goldman, Stephen D. Scott Jan 1997

A Theoretical And Empirical Study Of A Noise-Tolerant Algorithm To Learn Geometric Patterns, Sally A. Goldman, Stephen D. Scott

All Computer Science and Engineering Research

Developing the ability to recognize a landmark from a visual image of a robot's current location is a fundamental problem in robotics. We describe a way in which the landmark matching problem can be mapped to that of learning a one-dimensional geometric pattern. The first contribution of our work is an efficient noise-tolerant algorithm (designed using the statistical query model) to PAC-learn the class of one-dimensional geometric patterns. The second contribution of our work is an empirical study of our algorithm that provides at least some evidence that statistical query algorithms may be valuable for use in practice for handling …


Noise-Tolerant Distribution-Free Learning Of General Geometric Concepts, Nader H. Bshouty, Sally A. Goldman, H. David Mathias, Subhash Suri, Hisao Tamaki Jan 1997

Noise-Tolerant Distribution-Free Learning Of General Geometric Concepts, Nader H. Bshouty, Sally A. Goldman, H. David Mathias, Subhash Suri, Hisao Tamaki

All Computer Science and Engineering Research

We present an efficient algorithm for PAC-learning a very general class of geometric concepts over Rd for fixed d. More specifically, let T be any set of s halfspaces. Let x = (x1,...,xd) be an arbitrary point in Rd. With each t Є T we associate a boolean indicator function It(x) which is 1 if and only if x is in the halfspace t. The concept class Cds that we study consists of all concepts formed by any boolean function over It1, ...Its for ti Є T. This class is much more general than any geometric concept class known to …


An Error Control Scheme For Large-Scale Multicast Applications, Christos Papadopoulos, Guru Parulkar, George Varghese Jan 1997

An Error Control Scheme For Large-Scale Multicast Applications, Christos Papadopoulos, Guru Parulkar, George Varghese

All Computer Science and Engineering Research

Retransmission based error control for large scale multicast applications is difficult because of two main problems: request implosion and lack of local recovery. Existing schemes (SRM, RMTP, TMTP, LBRRM) have good solutions to request implosion, but only approximate solutions (e.g., based on scoped multicast) for the local recovery problem. Our scheme achieves finer grain fault recovery by exploiting new forwarding services that allow us to create a dynamic hierarchy of receivers. We use a new paradigm, where routers provide a more refined form of multicasting (that may be useful to other applications), that enables local recovery. The new services, however, …


Reducing Web Latencies Using Precomputed Hints, Girish P. Chandranmenon, George Varghese Jan 1997

Reducing Web Latencies Using Precomputed Hints, Girish P. Chandranmenon, George Varghese

All Computer Science and Engineering Research

Current network technology is bandwidth-rich but latency-poor; thus round-trip delays will dominate access latency for web traffic. We describe four new techniques that reduce the round-trips needed for web accesses. The techniques are based on the paradigm of preprocessing a web page to collect information about links and inline data in the page. Stored Address Binding almost always eliminates the DNS lookup (which can cost seconds) at the start of a transaction. In Informed Server Proxying, a server tells its client that it has cached pages referenced in a page the client just retrieved; this allows the client to retrieve …


An Architecture For Monitoring Visualization And Control Of Gigabit Networks, Guru Parulkar, Douglas Schmidt, Eileen Kraemer, Jonathan Turner, Anshul Kantawala Jan 1997

An Architecture For Monitoring Visualization And Control Of Gigabit Networks, Guru Parulkar, Douglas Schmidt, Eileen Kraemer, Jonathan Turner, Anshul Kantawala

All Computer Science and Engineering Research

We propose a network monitoring, visualization and control system (NMVC) that ensures adequate quality of service to network users while maintaining high network resource utilization. The main components of our system are a network probe, an endsystem probe, software network management agents that provide extensible multi-attribute event filtering for highly scalable data/event collection, network operation centers (NOCs) which can remotely install and (re)configure these agents, efficient online event ordering algorithms that can help synthesize and display a consistent view of network health, status and performance and a View Choreographer that allows management applications and administrators to specify the mapping of …


Euphoria Reference Manual, T. Paul Mccartney, Kenneth J. Goldman Jan 1997

Euphoria Reference Manual, T. Paul Mccartney, Kenneth J. Goldman

All Computer Science and Engineering Research

EUPHORIA is a user interface management system that enables end-users to create direct manipulation graphical user interfaces (GUIs) through interactive drawing. Used in conjunction with The Programmers' Playground, a distributed programming environment, end-users can dynamically create and associate GUI components with an underlying application without programming, This document describes EUPHORIA's functionality.


Costs Of Constraint Based Networks On A Sphere, Hongzhou Ma, Jonathan Turner Jan 1997

Costs Of Constraint Based Networks On A Sphere, Hongzhou Ma, Jonathan Turner

All Computer Science and Engineering Research

This paper estimates the link costs of constraint based nonblocking ATM networks on a sphere. Analytical results are obtained when switches are uniformly distributed on the surface of a unit sphere and every switch has source and sink capacity of one, and the results are compared with simulations.


An Algorithm For Message Delivery In A Micromobility Environment, Amy L. Murphy, Gruia-Catalin Roman, George Varghese Jan 1997

An Algorithm For Message Delivery In A Micromobility Environment, Amy L. Murphy, Gruia-Catalin Roman, George Varghese

All Computer Science and Engineering Research

With recent advances in wireless communication and the ubiquity of laptops, mobile computing has become an important research area. An essential problem in mobile computing is the delivery of a message from a source to either a single mobile node, unicast, or to a group of mobile nodes, multicast. Standard solutions proposed for macromobility (Mobile IP) and micromobility (cellular phones) for the unicast problem rely on tracking the mobile node. Tracking solutions scale badly when mobile nodes move frequently, and do not generalize well to multicast delivery. Our paper proposes a new message delivery algorithm for micromobility based on a …


Symmetrical Routes And Reverse Path Congestion Control, Rajib Ghosh, George Varghese Jan 1997

Symmetrical Routes And Reverse Path Congestion Control, Rajib Ghosh, George Varghese

All Computer Science and Engineering Research

We describe new mechanisms to deal with asymmetries that arise in routing protocols. We show how to avoid route asymmetries (due to non-unique shortest paths) by adding random integer link costs. We show in detail how RIP can be modified to avoid route asymmetry with high probability, without affecting either its efficiency or performance metrics such as convergence time. Symmetrical intra-domain routing also makes possible a new form of congestion control that we call Reverse Path Congestion Control (RPCC). We show, using simulations, that RPCC can augment existing TCP congestion control mechanisms to improve start up behavior and to avoid …


Enhancements To 4.4 Bsd Unix For Efficient Networked Multimedia In Project Mars, Milind M. Buddhikot, Xin Jane Chen, Dakang Wu, Guru M. Parulkar Jan 1997

Enhancements To 4.4 Bsd Unix For Efficient Networked Multimedia In Project Mars, Milind M. Buddhikot, Xin Jane Chen, Dakang Wu, Guru M. Parulkar

All Computer Science and Engineering Research

Cluster based architectures that employ high performance inexpensive Personal Computers (PCs) interconnected by high speed commodity interconnect have been recognized as a cost-effective way of building high performance scalable Multimedia-On-Demand (MOD) storage servers [4, 5, 7, 9]. Typically, the PCs in these architectures run operating systems such as UNIX that have traditionally been optimized for interactive computing. They do not provide fast disk-to-network data paths and guaranteed CPU and storage access. This paper reports enhancements to the 4.4 BSD UNIX system carried out to rectify these limitations in the context of our Project Massively-parallel And Real-time Storage (MARS) [7]. We …


An Introduction To Mobile Unity, Gruia-Catalin Roman, Peter J. Mccann Jan 1997

An Introduction To Mobile Unity, Gruia-Catalin Roman, Peter J. Mccann

All Computer Science and Engineering Research

Traditionally, a distributed system has been viewed as a collection of fixed computational elements connected by a static network. Prompted by recent advances in wireless communications rechnology, the emerging field of mobile computing is challenging these assumptions by providing mobile hosts with connectivity that may change over time, raising the possibility that hosts may be called upon to operate while only weakly connected to or while completely disconnected from other hosts. We define a concurrent mobile system as one where independently executing coponents may migrate through some space during the course of the computation, and where the pattern of connectivity …