Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Computer and Systems Architecture

Institution
Keyword
Publication
Publication Type

Articles 1 - 24 of 24

Full-Text Articles in Computer Engineering

What Is Rcu, Fundamentally?, Paul E. Mckenney, Jonathan Walpole Dec 2007

What Is Rcu, Fundamentally?, Paul E. Mckenney, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Read-copy update (RCU) is a synchronization mechanism that was added to the Linux kernel in October of 2002. RCU achieves scalability improvements by allowing reads to occur concurrently with updates. In contrast with conventional locking primitives that ensure mutual exclusion among concurrent threads regardless of whether they be readers or updaters, or with reader-writer locks that allow concurrent reads but not in the presence of updates, RCU supports concurrency between a single updater and multiple readers. RCU ensures that reads are coherent by maintaining multiple versions of objects and ensuring that they are not freed up until all pre-existing read-side …


Self-Organizing Neural Architectures And Cooperative Learning In A Multiagent Environment, Dan Xiao, Ah-Hwee Tan Dec 2007

Self-Organizing Neural Architectures And Cooperative Learning In A Multiagent Environment, Dan Xiao, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Temporal-Difference–Fusion Architecture for Learning, Cognition, and Navigation (TD-FALCON) is a generalization of adaptive resonance theory (a class of self-organizing neural networks) that incorporates TD methods for real-time reinforcement learning. In this paper, we investigate how a team of TD-FALCON networks may cooperate to learn and function in a dynamic multiagent environment based on minefield navigation and a predator/prey pursuit tasks. Experiments on the navigation task demonstrate that TD-FALCON agent teams are able to adapt and function well in a multiagent environment without an explicit mechanism of collaboration. In comparison, traditional Q-learning agents using gradient-descent-based feedforward neural networks, trained with the …


Performance Testing An Inline Network Intrusion Detection System Using Snort, Richard Wagoner Nov 2007

Performance Testing An Inline Network Intrusion Detection System Using Snort, Richard Wagoner

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science and Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Richard Wagoner on November 16, 2007.


Optical Reading And Playing Of Sound Signals From Vinyl Records, Arnold Hensman, Kevin Casey Oct 2007

Optical Reading And Playing Of Sound Signals From Vinyl Records, Arnold Hensman, Kevin Casey

Conference Papers

While advanced digital music systems such as compact disk players and MP3 have become the standard in sound reproduction technology, critics claim that conversion to digital often results in a loss of sound quality and richness. For this reason, vinyl records remain the medium of choice for many audiophiles involved in specialist areas. The waveform cut into a vinyl record is an exact replica of the analogue version from the original source. However, while some perceive this media as reproducing a more authentic quality then its digital counterpart, there is an absence a safe playback system. Contact with the stylus …


A Two-Phase Approach To Interactivity Enhancement For Large-Scale Distributed Virtual Environments, Nguyen Binh Duong Ta, Suiping Zhou Oct 2007

A Two-Phase Approach To Interactivity Enhancement For Large-Scale Distributed Virtual Environments, Nguyen Binh Duong Ta, Suiping Zhou

Research Collection School Of Computing and Information Systems

Distributed virtual environments (DVEs) are distributed systems that allow multiple geographically distributed clients (users) to interact simultaneously in a computer-generated, shared virtual world. Applications of DVEs can be seen in many areas nowadays, such as online games, military simulations, collaborative designs, etc. To support large-scale DVEs with real-time interactions among thousands or even more distributed clients, a geographically distributed server architecture (GDSA) is generally needed, and the virtual world can be partitioned into many distinct zones to distribute the load among the servers. Due to the geographic distributions of clients and servers in such architectures, it is essential to efficiently …


Inventions On Auto-Configurable Gui-A Triz Based Analysis, Umakant Mishra Sep 2007

Inventions On Auto-Configurable Gui-A Triz Based Analysis, Umakant Mishra

Umakant Mishra

A GUI is intended for the end user but designed by the developer. Even the experienced developer cannot realistically anticipate what options will be required by the users at a future point of time. Besides, even a well-designed GUI may not be felt convenient to all categories of users as the skill, expertise and requirement of the users vary from each other.

Although the user can best describe his requirement and therefore can best configure the GUI, it is not advisable for the user to spend time and effort to configure the GUI. The user interface needs to be customized …


Inventions On User Configurable Gui- A Triz Based Analysis, Umakant Mishra Sep 2007

Inventions On User Configurable Gui- A Triz Based Analysis, Umakant Mishra

Umakant Mishra

The graphic user interface is a revolutionary development over the prior art technique of the command line interface. Using GUI the user can do even complex operations through simple means like clicking buttons or dragging various graphic elements.

Ideally the GUI should contain all those buttons (or menu items or other GUI elements) and only those buttons (or menu items or other GUI elements) that the user needs. Besides the GUI elements should not obscure the display of data, should take no time for searching and should create no confusion in any level of user. Generally the GUI elements are …


Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor Jul 2007

Building National Digital Infrastructure: A Case Study Of Semiconductor Complex Limited, Deepak Kappor

Business Review

The digital revolution and the rapid technology developments thereafter created a real danger of the modem world getting divided into a new type of 'digital-haves and digital-have not's'. It was feared that developing countries like India may not be able to reap the benefits of the 'information age' because of the ever widening gap in technology and relevant infrastructure. As a strategic step to bridge the growing digital divide between India and the technologically advanced economies, the Government of India (GO I) decided to set up Semiconductor Complex Limited (SCL) in the year 1983 to develop Indian capabilities in the …


Distributed Web Services Firewall, Hesham Samy Sabry Jun 2007

Distributed Web Services Firewall, Hesham Samy Sabry

Archived Theses and Dissertations

No abstract provided.


Automated Selection Of Legacy Systems Soa Modernization Strategies Using Decision Theory, Rafik Amir Salama Jun 2007

Automated Selection Of Legacy Systems Soa Modernization Strategies Using Decision Theory, Rafik Amir Salama

Archived Theses and Dissertations

No abstract provided.


Real-Time On-Line Space Research Laboratory Environment Monitoring With Off-Line Trend And Prediction Analysis, Kenol Jules, Paul P. Lin Jun 2007

Real-Time On-Line Space Research Laboratory Environment Monitoring With Off-Line Trend And Prediction Analysis, Kenol Jules, Paul P. Lin

Mechanical Engineering Faculty Publications

With the International Space Station currently operational, a significant amount of acceleration data is being down-linked, processed and analyzed daily on the ground on a continuous basis for the space station reduced gravity environment characterization, the vehicle design requirements verification and science data collection. To help understand the impact of the unique spacecraft environment on the science data, an artificial intelligence monitoring system was developed, which detects in near real time any change in the reduced gravity environment susceptible to affect the on-going experiments. Using a dynamic graphical display, the monitoring system allows science teams, at any time and any …


Evaluating Software Engineering Processes In Commercial And Community Open Source Projects, Tony Wasserman, Eugenio Capra Apr 2007

Evaluating Software Engineering Processes In Commercial And Community Open Source Projects, Tony Wasserman, Eugenio Capra

Tony Wasserman

We describe a current study for obtaining information about management of commercial and community open source projects. We have interviewed and surveyed leaders of more than 75 open source projects. Questions focused on the styles of leadership and communication, with a technical focus on testing and quality assurance processes. This paper describes the methods used to identify and contact subjects, as well as the questions posed and some results.


Nesting System With Quantization And Knowledge Base Applied, Leszek Koszalka, Grzegorz Chmaj Apr 2007

Nesting System With Quantization And Knowledge Base Applied, Leszek Koszalka, Grzegorz Chmaj

Electrical & Computer Engineering Faculty Research

Nesting algorithms deal with placing two dimensional shapes on the given canvas. In this paper a binary way of solving the nesting problem is proposed. Geometric shapes are quantized into binary form, which is used to operate on them. After finishing nesting they are converted back into original geometrical form. Investigations showed, that there is a big influence of quantization accuracy for the nesting effect. However, greater accuracy results with longer time of computation. The proposed knowledge base system is able to strongly reduce the computational time.


Exploring Hardware Based Primitives To Enhance Parallel Security Monitoring In A Novel Computing Architecture, Stephen D. Mott Mar 2007

Exploring Hardware Based Primitives To Enhance Parallel Security Monitoring In A Novel Computing Architecture, Stephen D. Mott

Theses and Dissertations

This research explores how hardware-based primitives can be implemented to perform security-related monitoring in real-time, offer better security, and increase performance compared to software-based approaches. In doing this, we propose a novel computing architecture, derived from a contemporary shared memory architecture, that facilitates efficient security-related monitoring in real-time, while keeping the monitoring hardware itself safe from attack. This architecture is flexible, allowing security to be tailored based on the needs of the system. We have developed a number of hardware-based primitives that fit into this architecture to provide a wide array of monitoring capabilities. A number of these primitives provide …


A Framework For Requirements Engineering Support For Service Providers, Yohana Saad Soliman Nassim Feb 2007

A Framework For Requirements Engineering Support For Service Providers, Yohana Saad Soliman Nassim

Archived Theses and Dissertations

No abstract provided.


Sampled Fiber Gratings For High-Resolution And High-Speed Photonic Signal Processing, Mingya Shen, Kamal Alameh Jan 2007

Sampled Fiber Gratings For High-Resolution And High-Speed Photonic Signal Processing, Mingya Shen, Kamal Alameh

Research outputs pre 2011

A novel sampled grating for high-resolution, highspeed signal processing is presented. Simulation based on Sinc2 sampled and rational sampled fiber grating modeling show that a large number of sub-ps time delay steps are attainable, corresponding to a sampling frequency in excess of 1THz. Design method is described for deriving sampling functions that meet specific true-time-delay profile requirements.


Success? The Impact Of Involving Customers In E-Commerce Development, Julian Terry, Craig Standing Jan 2007

Success? The Impact Of Involving Customers In E-Commerce Development, Julian Terry, Craig Standing

Research outputs pre 2011

In e-commerce, customers have become Information System users. In this environment of non-mandatory usage, remote, untrained users need to quickly feel comfortable and satisfied with a site encounter. Throughout the literature for four decades, a commonly cited factor pertaining to system success has been user participation in the systems development process. Among other things this is likely to lead to increased user satisfaction and the perceived usefulness of the application. This study uses findings from thirty cases of recently completed e-commerce sites in which project leaders accounts of customer participation in e-commerce development activities are analysed, along with their perceptions …


Personal Information Management. A Framework For Development Of Personalisable Web Based Services, Christopher Fuchs Jan 2007

Personal Information Management. A Framework For Development Of Personalisable Web Based Services, Christopher Fuchs

Theses

The thesis research proposed herein will model, analyse and implement strategies for the development of personalised services. The goal of the research work is to design and implement a framework which supports developers by minimising the effort required in implementing personalised services. This includes the ability to react to localisation changes and to present proper information. An overall design goal is the independency of most components from each other which will be attained through the use of standard technologies and protocols and the consistent use of a component model. The result will include the proposed framework and the analyses of …


Filling The Ontology Space For Coalition Battle Management Language, Charles Turnitsa, Curtis Blais, Andreas Tolk Jan 2007

Filling The Ontology Space For Coalition Battle Management Language, Charles Turnitsa, Curtis Blais, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

The Coalition Battle Management Language is a language for representing and exchanging plans, orders, and reports across live, constructive and robotic forces in multi-service, multi-national and multi-organizational operations. Standardization efforts in the Simulation Interoperability Standards Organization seek to define this language through three parallel activities: (1) specify a sufficient data model to unambiguously define a set of orders using the Joint Command, Control, and Consultation Information Exchange Data Model (JC3IEDM) as a starting point; (2) develop a formal grammar (lexicon and production rules) to formalize the definition of orders, requests, and reports; (3) develop a formal battle management ontology to …


Byzantine Fault Tolerant Coordination For Web Services Atomic Transactions, Wenbing Zhao Jan 2007

Byzantine Fault Tolerant Coordination For Web Services Atomic Transactions, Wenbing Zhao

Electrical and Computer Engineering Faculty Publications

In this paper, we present the mechanisms needed for Byzantine fault tolerant coordination of Web services atomic transactions. The mechanisms have been incorporated into an open-source framework implementing the standard Web services atomic transactions specification. The core services of the framework, namely, the activation service, the registration service, the completion service, and the distributed commit service, are replicated and protected with our Byzantine fault tolerance mechanisms. Such a framework can be useful for many transactional Web services that require high degree of security and dependability.


Directflow: A Domain-Specific Language For Information-Flow Systems, Andrew P. Black, Chuan-Kai Lin Jan 2007

Directflow: A Domain-Specific Language For Information-Flow Systems, Andrew P. Black, Chuan-Kai Lin

Computer Science Faculty Publications and Presentations

Programs that process streams of information are commonly built by assembling reusable information-flow components. In some systems the components must be chosen from a pre-defined set of primitives; in others the programmer can create new custom components using a general-purpose programming language. Neither approach is ideal: restricting programmers to a set of primitive components limits the expressivity of the system, while allowing programmers to define new components in a general-purpose language makes it difficult or impossible to reason about the composite system. We advocate defining information-flow components in a domain-specific language (DSL) that enables us to infer the properties of …


Using Flossmole Data In Determining Business Readiness Ratings, Tony Wasserman, Ashutosh Das Dec 2006

Using Flossmole Data In Determining Business Readiness Ratings, Tony Wasserman, Ashutosh Das

Tony Wasserman

This paper is a preliminary report on using FLOSSmole data retrieved from open source repositories (forges) to calculate Business Readiness Rating scores.


Methods And Tools For Developing Interactive Information Systems: An Historical Perspective, Tony Wasserman Dec 2006

Methods And Tools For Developing Interactive Information Systems: An Historical Perspective, Tony Wasserman

Tony Wasserman

This paper describes the evolution of hardware and software technology over the past three decades, focusing on approaches for building interactive information systems and web applications. Successive generations of technology have used advances in hardware and software technology, along with increasingly sophisticated development methods and tools, to reduce development times and to produce a better user experience. After describing the key technology characteristics of each generation, this paper also describes the evolution of a specific methodology, User Software Engineering, from its origins in the 1970’s to its applicability to the development of modern applications.


A Busy-Tone Based Mac Scheme For Wireless Ad Hoc Networks Using Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu Dec 2006

A Busy-Tone Based Mac Scheme For Wireless Ad Hoc Networks Using Directional Antennas, Hong-Ning Dai, Kam-Wing Ng, Min-You Wu

Hong-Ning Dai

Applying directional antennas in wireless ad hoc networks offers numerous benefits, such as extended communication range, increased spatial reuse, improved capacity and suppressed interference. However, directional antennas can cause new location-dependent carrier sensing problems, such as new hidden terminal and deafness problems, which can cause severe penalties to the performance. Recently, a few schemes have been proposed to tackle these problems. However, these methods can provide limited solutions on the hidden terminal and deafness problems. We propose a new MAC protocol, termed the busy-tone based directional medium access control (BT-DMAC) protocol. When the transmission is in progress, the sender and …