Open Access. Powered by Scholars. Published by Universities.®

Computer and Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1531 - 1560 of 1644

Full-Text Articles in Computer and Systems Architecture

An Intelligent System For Monitoring The Microgravity Environment Quality On-Board The International Space Station, Paul P. Lin, Kenol Jules Oct 2002

An Intelligent System For Monitoring The Microgravity Environment Quality On-Board The International Space Station, Paul P. Lin, Kenol Jules

Mechanical Engineering Faculty Publications

An intelligent system for monitoring the microgravity environment quality on-board the International Space Station is presented. The monitoring system uses a new approach combining Kohonen's self-organizing feature map, learning vector quantization, and a back propagation neural network to recognize and classify the known and unknown patterns. Finally, fuzzy logic is used to assess the level of confidence associated with each vibrating source activation detected by the system.


A Lessons Learned Repository For Computer Forensics, Warren Harrison, George Heuston, Mark Morrissey, David Aucsmith, Sarah Mocas, Steve Russelle Oct 2002

A Lessons Learned Repository For Computer Forensics, Warren Harrison, George Heuston, Mark Morrissey, David Aucsmith, Sarah Mocas, Steve Russelle

Computer Science Faculty Publications and Presentations

The Law Enforcement community possesses a large, but informal, community memory with respect to digital forensics. Large, because the experiences of every forensics technician and investigator contribute to the whole. Informal because there is seldom an explicit mechanism for disseminating this wisdom except “over the water cooler”. As a consequence, the same problems and mistakes continue to resurface and the same solutions are re-invented. In order to better exploit this informal collection of wisdom, the key points of each experience can be placed into a Repository for later dissemination. We describe a web-based Lessons Learned Repository (LLR) that facilitates contribution …


Information Security System Rating And Ranking, Rayford B. Vaughn Jr., Ambareen Sira, David A. Dampier May 2002

Information Security System Rating And Ranking, Rayford B. Vaughn Jr., Ambareen Sira, David A. Dampier

Computer Sciences and Electrical Engineering Faculty Research

The term assurance has been used for decades in trusted system development to express the notion of confidence in the strength of a specific system or system of systems. The unsolved problem that security engineers must struggle with is the adoption of measures or metrics that can reliably depict the assurance associated with a specific hardware and software architecture. This article reports on a recent attempt to focus needs in this area and suggests various categories of information assurance metrics that may be helpful to an organization that is deciding which set is useful for a specific application.


Establishing A Lan Network For Designing And Analyzing Of Manufacturing Products, Yuqiu You Apr 2002

Establishing A Lan Network For Designing And Analyzing Of Manufacturing Products, Yuqiu You

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Science & Technology at Morehead State University in partial fulfillment of the requirements for the Degree of Master of Science by Yuqiu You in Spring of 2002.


A Simulation Program For Electronics Skill Knowledge Instruction At A Selected Community College In Taiwan, Hung-Jen Chen Jan 2002

A Simulation Program For Electronics Skill Knowledge Instruction At A Selected Community College In Taiwan, Hung-Jen Chen

Dissertations and Theses @ UNI

Since computers came into existence, simulations have been associated with it as the two inseparable media, simulations and computers, have had a mutually beneficial effect. With the advent of the flexible microcomputer, simulation has been widely used. In recent years, computer technology has infiltrated every sector in society, especially the educational system and industrial operations where simulations are essential for satisfying both instructional and industrial needs. Simulation effectiveness research has been mixed in both the educational system and industries. Therefore, it is still necessary to evaluate how effective computer simulation is as an instructional method or strategy.

This study was …


Model Scheme A Good Fit For C4isr, Andreas Tolk Jan 2002

Model Scheme A Good Fit For C4isr, Andreas Tolk

Computational Modeling & Simulation Engineering Faculty Publications

No abstract provided.


Thread Transparency In Information Flow Middleware, Rainer Koster, Andrew P. Black, Jie Huang, Jonathan Walpole, Calton Pu Jan 2002

Thread Transparency In Information Flow Middleware, Rainer Koster, Andrew P. Black, Jie Huang, Jonathan Walpole, Calton Pu

Computer Science Faculty Publications and Presentations

Existing middleware is based on control-flow centric interaction models such as remote method invocations, poorly matching the structure of applications that process continuous information flows. Difficulties cultiesin building this kind of application on conventional platforms include flow-specific concurrency and timing requirements, necessitating explicit management of threads, synchronization, and timing by the application programmer. We propose Infopipes as a high-level abstraction for information flows, and we are developing a middleware framework that supports this abstraction. Infopipes transparently handle complexities associated with control flow and multi-threading. From high-level configuration descriptions the platform determines what parts of a pipeline require separate threads or …


Reifying Communication At The Application Level, Andrew P. Black, Jie Huang, Jonathan Walpole Oct 2001

Reifying Communication At The Application Level, Andrew P. Black, Jie Huang, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Middleware, from the earliest RPC systems to recent Object-Oriented Remote Message Sending (RMS) systems such as Java RMI and CORBA, claims transparency as one of its main attributes. Coulouris et al. define transparency as “the concealment from the … application programmer of the separation of components in a distributed system.” They go on to identify eight different kinds of transparency.

We considered titling this paper “Transparency Considered Harmful”, but that title is misleading because it implies that all kinds of transparency are bad. This is not our view. Rather, we believe that the choice of which transparencies should be offered …


A Scalable Durable Grid Event Service, Geoffrey C. Fox, Shrideep Pallickara Jan 2001

A Scalable Durable Grid Event Service, Geoffrey C. Fox, Shrideep Pallickara

Electrical Engineering and Computer Science - All Scholarship

It is interesting to study the system and software architecture of environments, which integrate the evolving ideas of computational grids, distributed objects, web services, peer-to-peer networks and message oriented middleware. Such peer-to-peer (P2P) Grids should seamlessly integrate users to themselves and to resources, which are also linked to each other. We can abstract such environments as a distributed system of "clients" which consist either of "users" or "resources" or proxies thereto. These clients must be linked together in a flexible fault tolerant efficient high performance fashion. In this paper, we study the messaging or event system -- termed GES or …


Translucent Optical Wdm Networks For The Next-Generation Backbone Networks, Byrav Ramamurthy, Srinath Yaragorla, Xi Yang Jan 2001

Translucent Optical Wdm Networks For The Next-Generation Backbone Networks, Byrav Ramamurthy, Srinath Yaragorla, Xi Yang

CSE Conference and Workshop Papers

This paper proposes an alternate approach to fully transparent and fully opaque optical networks for operating a wavelength routed optical network. In this paper, the architecture of the regeneration node that performs sparse regeneration (or translucency) is discussed. The regeneration demands generated from call blocking and signal quality requirements are addressed. Two implementation strategies for incorporating sparse regeneration are introduced and their relative merits are studied.


Rate-Matching Packet Scheduler For Real-Rate Applications, Kang Li, Jonathan Walpole, Dylan Mcnamee, Calton Pu, David Steere Jan 2001

Rate-Matching Packet Scheduler For Real-Rate Applications, Kang Li, Jonathan Walpole, Dylan Mcnamee, Calton Pu, David Steere

Computer Science Faculty Publications and Presentations

A packet scheduler is an operating system component that controls the allocation of network interface bandwidth to outgoing network flows. By deciding which packet to send next, packet schedulers not only determine how bandwidth is shared among flows, but also play a key role in determining the rate and timing behavior of individual flows. The recent explosion of rate and timing-sensitive flows, particularly in the context of multimedia applications, has focused new interest on packet schedulers. Next generation packet schedulers must not only ensure separation among flows and meet real-time performance constraints, they must also support dynamic fine-grain reallocation of …


Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart Dec 2000

Configuring Client Software Using Remote Notification Us:6219698, Robert Iannucci, Chris Weikart

Robert A Iannucci

No abstract provided.


E-Commerce Technology Forsafe Money Transaction Over The Net, Noor Jahan Haque, Raman Attri Jun 2000

E-Commerce Technology Forsafe Money Transaction Over The Net, Noor Jahan Haque, Raman Attri

Raman K. Attri

The Buzz word E-commerce has revolutionized the way the business and money transactions used to work in the past. It is the latest impact of software arena in the field of banking, business and purchasing. The term also refers to online stock and bond transactions and buying and downloading software without ever going near a store. In addition, e-commerce includes business-to-business connections that make purchasing easier for big corporations. This paper mainly concentrates on technology revolution behind the transaction of money over the net. There are still doubts and questions from business and corporate users on the safety aspects of …


Aspects Of Information Flow, Andrew P. Black, Jonathan Walpole Jun 2000

Aspects Of Information Flow, Andrew P. Black, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Along with our colleagues at the Oregon Graduate Institute and Georgia Institute of Technology, we have recently been experimenting with real-rate systems, that is, systems that are required to move data from one place to another at defined rates, such as 30 items per second. Audio conferencing or streaming video systems are typical: they are required to deliver video or audio frames from a source (a server or file system) in one place to a sink (a display or a sound generator) in another; the frames must arrive periodically, with constrained latency and jitter. We have successfully built such systems …


Application Of Control Theory To Modeling And Analysis Of Computer Systems, Molly H. Shor, Kang Li, Jonathan Walpole, David Steere, Calton Pu Jun 2000

Application Of Control Theory To Modeling And Analysis Of Computer Systems, Molly H. Shor, Kang Li, Jonathan Walpole, David Steere, Calton Pu

Computer Science Faculty Publications and Presentations

Experimentally, we show that Transmission Control Protocol (TCP)’s congestion control algorithm results in dynamic behavior similar to a stable limit cycle (attractor) when data from TCP flow into a fixed-size buffer and data is removed from the buffer at a fixed service rate. This setup represents how TCP buffers packets for transmission onto the network, with the network represented by a fixed-size buffer with a fixed service rate. The closed trajectory may vary slightly from period to period due to the discrete nature of computer systems. The size of the closed trajectory is a function of the network’s buffer size …


Supervised Adaptive Resonance Theory And Rules, Ah-Hwee Tan Jan 2000

Supervised Adaptive Resonance Theory And Rules, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Supervised Adaptive Resonance Theory is a family of neural networks that performs incremental supervised learning of recognition categories (pattern classes) and multidimensional maps of both binary and analog patterns. This chapter highlights that the supervised ART architecture is compatible with IF-THEN rule-based symbolic representation. Specifi­cally, the knowledge learned by a supervised ART system can be readily translated into rules for interpretation. Similarly, a priori domain knowl­edge in the form of IF-THEN rules can be converted into a supervised ART architecture. Not only does initializing networks with prior knowl­edge improve predictive accuracy and learning efficiency, the inserted symbolic knowledge can also …


Accessing Timesheets Via Internet Through Asp And Odbc, Varshi Challa Jan 2000

Accessing Timesheets Via Internet Through Asp And Odbc, Varshi Challa

Theses Digitization Project

The purpose of this project is to develop a computerized timesheet application. Using this application, an employee of a company can log onto the company's Web site and fill out a timesheet from anywhere in the world. The project involved automating timesheet data entry and approval procedures using contemporary technologies like Active Server Pages (ASP), JavaScript, VB Script, Component Object Model (COM), Components and Open Database connectivity (ODBC).


The Application Of Object-Oriented Techniques To Preliminary Design Problems, Patrick S. Mackessy Jan 2000

The Application Of Object-Oriented Techniques To Preliminary Design Problems, Patrick S. Mackessy

Theses: Doctorates and Masters

Preliminary structural design is an early stage in building design during which the engineer formulates and assesses a number of different structural schemes. It is conceptual in nature and involves decision making, which relies on heuristics. Whilst preliminary structural design has not been well supported by PC software, recent research has indicated the potential for knowledge-based, object-oriented systems to assist in the area. This thesis explores the issues that arise when object-oriented techniques arc used to develop knowledge-based software. lt reviews certain basic principles of structural design, methods of representing structural design knowledge and earlier approaches to the design of …


Master Of Science Degree Programs On Campus Or Online, Nova Southeastern University Jan 2000

Master Of Science Degree Programs On Campus Or Online, Nova Southeastern University

College of Engineering and Computing Course Catalogs

No abstract provided.


Work In Progress: Automating Proportion/Period Scheduling, David Steere, Jonathan Walpole, Calton Pu Dec 1999

Work In Progress: Automating Proportion/Period Scheduling, David Steere, Jonathan Walpole, Calton Pu

Computer Science Faculty Publications and Presentations

The recent effort to define middleware capable of supporting real-time applications creates the opportunity to raise the level of abstraction presented to the programmer. We propose that proportion/period is a better abstraction for specifying resource needs and allocation than priorities. We are currently investigating techniques to address some issues that are restricting use of proportion/period scheduling to research real-time prototypes. In particular, we are investigating techniques to automate the task of selecting proportion and period, and that allow proportion/period to incorporate job importance under overload conditions.


The Internet Name Game And The Nonprofit Solution, Roger A. Lohmann Oct 1999

The Internet Name Game And The Nonprofit Solution, Roger A. Lohmann

Faculty & Staff Scholarship

This paper is a case study of the campaign to create a new internet names authority to handle the assignment of internet domain names. Almost everyone knows by now that the Internet was originally a defense research project, which morphed into a research network for scientists and then into a tool of higher education and eventually into the commercial and general household utility we know today. In terms familiar to nonprofit research community what began in the state sector, expanded into the third sector and then into the market and household sectors and the consumer economy. There is a second …


Fine-Grain Period Adaptation In Soft Real-Time Environments, David Steere, Joshua Gruenberg, Dylan Mcnamee, Calton Pu, Jonathan Walpole Sep 1999

Fine-Grain Period Adaptation In Soft Real-Time Environments, David Steere, Joshua Gruenberg, Dylan Mcnamee, Calton Pu, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Reservation-based scheduling delivers a proportion of the CPU to jobs over a period of time. In this paper we argue that automatically determining and assigning this period is both possible and useful in general purpose soft real-time environments such as personal computers and information appliances. The goal of period adaptation is to select the period over which a job is guaranteed to receive its portion of the CPU dynamically and automatically. The choice of period represents a trade-off between the amount of jitter observed by the job and the overall efficiency of the system. Secondary effects of period include quantization …


Qos Scalability For Streamed Media Delivery, Charles Krasic, Jonathan Walpole Sep 1999

Qos Scalability For Streamed Media Delivery, Charles Krasic, Jonathan Walpole

Computer Science Faculty Publications and Presentations

Applications with real-rate progress requirements, such as mediastreaming systems, are difficult to deploy in shared heterogenous environments such as the Internet. On the Internet, mediastreaming systems must be capable of trading off resource requirements against the quality of the media streams they deliver, in order to match wide-ranging dynamic variations in bandwidth between servers and clients. Since quality requirements tend to be user- and task-specific, mechanisms for capturing quality of service requirements and mapping them to appropriate resource-level adaptation policies are required. In this paper, we describe a general approach for automatically mapping user-level quality of service specifications onto resource …


An Investigation Into The Causes And Effects Of Legacy Status In A System With A View To Assessing Both Systems Currently In Use And Those Being Considered For Introduction, Patricia O'Byrne Apr 1999

An Investigation Into The Causes And Effects Of Legacy Status In A System With A View To Assessing Both Systems Currently In Use And Those Being Considered For Introduction, Patricia O'Byrne

Other resources

This dissertation analyses the area of legacy systems and determines the effects that are exhibited in legacy systems, presenting them in a legacy effect determination framework, so that management can ascertain whether the system they have is a legacy system. An analysis of legacy causal criteria is carried out, resulting in a table of legacy causes. A new definition of legacy systems is put forward, by defining legacy status as a status held by a legacy system. “A system exhibits legacy status if it is deficient in terms of its suitability to the business, its platform suitability or application software …


An Improved Asynchronous Implementation Of A Fast Fourier Transform Architecture For Space Applications, David J. Barnhart Mar 1999

An Improved Asynchronous Implementation Of A Fast Fourier Transform Architecture For Space Applications, David J. Barnhart

Theses and Dissertations

A second-generation fully asynchronous Fast Fourier Transform (FFT) processor for space applications is developed in this thesis. A high-performance patented FFT architecture invented by Suter and Stevens was used as the basis for a 16-point FFT (FFT-16) processor design. A brief derivation of the architecture, the asynchronous design methodologies used and space-based integrated circuit issues are presented. The Synopsys VLSI CAD system and a radiation tolerant design library developed by the Air Force Research Laboratory were used to implement the design. A critical building block of the FFT-16, the FFT-4, was fabricated as a cost-effective method to validate the cell …


A Scalable Multiprocessor, Charles Yarbrough Jan 1999

A Scalable Multiprocessor, Charles Yarbrough

Honors Capstone Projects and Theses

No abstract provided.


Enterprise Business Objects : Design And Implementation Of A Business Object Framework, Kai-Uwe Schafer Jan 1999

Enterprise Business Objects : Design And Implementation Of A Business Object Framework, Kai-Uwe Schafer

Theses

Software components representing business entities like customer or purchase order introduce a new way of Online Transaction Processing to business applications. Collaborating business objects allow to complete whole business processes as a single distributed transaction, instead of dividing it into queued steps, which sometimes even require user intervention. This IS due to the fact that business objects contain both business data and logic and that they incorporate multiple databases from different vendors and different geographic locations in a single transaction.

Business objects cannot be used as stand-alone components, but require a framework of services that manage persistence, concurrent transactions, and …


Compute As Fast As The Engineers Can Think! Utrafast Computing Team Final Report, Robert T. Biedron, P. Mehrotra, Michael L. Nelson, M. L. Preston, J. J. Rehder, J. L. Rogersm, D. H. Rudy, J. Sobieski, O. O. Storaasli Jan 1999

Compute As Fast As The Engineers Can Think! Utrafast Computing Team Final Report, Robert T. Biedron, P. Mehrotra, Michael L. Nelson, M. L. Preston, J. J. Rehder, J. L. Rogersm, D. H. Rudy, J. Sobieski, O. O. Storaasli

Computer Science Faculty Publications

This report documents findings and recommendations by the Ultrafast Computing Team (UCT). In the period 10-12/98, UCT reviewed design case scenarios for a supersonic transport and a reusable launch vehicle to derive computing requirements necessary for support of a design process with efficiency so radically improved that human thought rather than the computer paces the process. Assessment of the present computing capability against the above requirements indicated a need for further improvement in computing speed by several orders of magnitude to reduce time to solution from tens of hours to seconds in major applications. Evaluation of the trends in computer …


Adaptive Resource Management Via Modular Feedback Control, Ashvin Goel, David Steere, Calton Pu, Jonathan Walpole Jan 1999

Adaptive Resource Management Via Modular Feedback Control, Ashvin Goel, David Steere, Calton Pu, Jonathan Walpole

Computer Science Faculty Publications and Presentations

A key feature of tomorrow’s operating systems and runtime environments is their ability to adapt. Current state of the art uses an ad-hoc approach to building adaptive software, resulting in systems that can be complex, unpredictable and brittle. We advocate a modular and methodical approach for building adaptive system software based on feedback control. The use of feedback allows a system to automatically adapt to dynamically varying environments and loads, and allows the system designer to utilize the substantial body of knowledge in other engineering disciplines for building adaptive systems. We have developed a toolkit called SWiFT that embodies this …


Architectural Optimization Of Digital Libraries, Aileen O. Biser Aug 1998

Architectural Optimization Of Digital Libraries, Aileen O. Biser

Computer Science Theses & Dissertations

This work investigates performance and scaling issues relevant to large scale distributed digital libraries. Presently, performance and scaling studies focus on specific implementations of production or prototype digital libraries. Although useful information is gained to aid these designers and other researchers with insights to performance and scaling issues, the broader issues relevant to very large scale distributed libraries are not addressed. Specifically, no current studies look at the extreme or worst case possibilities in digital library implementations. A survey of digital library research issues is presented. Scaling and performance issues are mentioned frequently in the digital library literature but are …