Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2006

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 11 of 11

Full-Text Articles in Systems Architecture

Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang Nov 2006

Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang

Computer Science Faculty Publications

Previous analytical results on the resilience of unstructured P2P systems have not explicitly modeled heterogeneity of user churn (i.e., difference in online behavior) or the impact of in-degree on system resilience. To overcome these limitations, we introduce a generic model of heterogeneous user churn, derive the distribution of the various metrics observed in prior experimental studies (e.g., lifetime distribution of joining users, joint distribution of session time of alive peers, and residual lifetime of a randomly selected user), derive several closed-form results on the transient behavior of in-degree, and eventually obtain the joint in/out degree isolation probability as a simple …


A Pattern Language For Extensible Program Representation, Andrew P. Black, Daniel Vainsencher Oct 2006

A Pattern Language For Extensible Program Representation, Andrew P. Black, Daniel Vainsencher

Computer Science Faculty Publications and Presentations

For the last 15 years, implementors of multiple view programming environments have sought a single code model that would form a suitable basis for all of the program analyses and tools that might be applied to the code. They have been unsuccessful. The consequences are a tendency to build monolithic, single-purpose tools, each of which implements its own specialized analyses and optimized representation. This restricts the availability of the analyses, and also limits the reusability of the representation by other tools. Unintegrated tools also produce inconsistent views, which reduce the value of multiple views. This article describes a set of …


Three Architectures For Trusted Data Dissemination In Edge Computing, Shen-Tat Goh, Hwee Hwa Pang, Robert H. Deng, Feng Bao Sep 2006

Three Architectures For Trusted Data Dissemination In Edge Computing, Shen-Tat Goh, Hwee Hwa Pang, Robert H. Deng, Feng Bao

Research Collection School Of Computing and Information Systems

Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for users to validate the results—that values in the result tuples are not tampered with, that no qualifying data are left out, that no spurious tuples are introduced, and that a query result is not actually the output from a different query. This paper aims to address the challenges of ensuring data integrity in edge computing. We study three schemes that enable users to check …


A Hybrid Architecture Combining Reactive Plan Execution And Reactive Learning, Samin Karim, Liz Sonenberg, Ah-Hwee Tan Aug 2006

A Hybrid Architecture Combining Reactive Plan Execution And Reactive Learning, Samin Karim, Liz Sonenberg, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Developing software agents has been complicated by the problem of how knowledge should be represented and used. Many researchers have identified that agents need not require the use of complex representations, but in many cases suffice to use “the world” as their representation. However, the problem of introspection, both by the agents themselves and by (human) domain experts, requires a knowledge representation with a higher level of abstraction that is more ‘understandable’. Learning and adaptation in agents has traditionally required knowledge to be represented at an arbitrary, low-level of abstraction. We seek to create an agent that has the capability …


Interacting With Web Hierarchies, Saverio Perugini, Naren Ramakrishnan Jun 2006

Interacting With Web Hierarchies, Saverio Perugini, Naren Ramakrishnan

Computer Science Faculty Publications

Web site interfaces are a particularly good fit for hierarchies in the broadest sense of that idea, i.e. a classification with multiple attributes, not necessarily a tree structure. Several adaptive interface designs are emerging that support flexible navigation orders, exposing and exploring dependencies, and procedural information-seeking tasks. This paper provides a context and vocabulary for thinking about hierarchical Web sites and their design. The paper identifies three features that interface to information hierarchies. These are flexible navigation orders, the ability to expose and explore dependencies, and support for procedural tasks. A few examples of these features are also provided


A Study Of The Compliance Of Alarm Installations In Perth, Western Australia: Are Security Alarm Systems Being Installed To Australian Standard As2201.1 – “Systems Installed In A Client's Premises.”, Robert E. Mclaughlin, David J. Brooks Apr 2006

A Study Of The Compliance Of Alarm Installations In Perth, Western Australia: Are Security Alarm Systems Being Installed To Australian Standard As2201.1 – “Systems Installed In A Client's Premises.”, Robert E. Mclaughlin, David J. Brooks

Australian Information Warfare and Security Conference

This study presented an overview of the training available to intruder alarm installers. A survey of domestic and commercial intruder alarm systems (n=20) were completed across Perth, Western Australia, metropolitan area. The gathered data were evaluated against Australian Standard AS2201.1 for intruder alarm systems, to determine whether alarm installations comply with two parts of the standard, being that of control panel location and zone supervision. AS2201.1 requires that intruder alarm control equipment shall be located within the alarmed area, located outside the entry/exit point and operate as dual endofline supervision. The study presents significant findings into the compliance of installed …


Place-Valued Logics Around Cybernetic Ontology, The Bcl And Afosr, Rudolf Kaehr Jan 2006

Place-Valued Logics Around Cybernetic Ontology, The Bcl And Afosr, Rudolf Kaehr

Rudolf Kaehr

No abstract provided.


From Ruby To Rudy, Rudolf Kaehr Jan 2006

From Ruby To Rudy, Rudolf Kaehr

Rudolf Kaehr

No abstract provided.


The Chinese Challenge. Hallucinations For Other Futures, Rudolf Kaehr Jan 2006

The Chinese Challenge. Hallucinations For Other Futures, Rudolf Kaehr

Rudolf Kaehr

The main question is: What can we learn from China that China is not teaching us? It is proposed that a study of polycontextural logic and morphogrammatics could be helpful to discover this new kind of rationality.


The Role Of Connective Tissue Growth Factor In Skeletal Growth And Development, Philadelphia University Jan 2006

The Role Of Connective Tissue Growth Factor In Skeletal Growth And Development, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Efficient Scheduling For Sdmg Cioq Switches, Mei Yang, S. Q. Zheng Jan 2006

Efficient Scheduling For Sdmg Cioq Switches, Mei Yang, S. Q. Zheng

Electrical & Computer Engineering Faculty Research

Combined input and output queuing (CIOQ) switches are being considered as high-performance switch architectures due to their ability to achieve 100% throughput and perfectly emulate output queuing (OQ) switch performance with a small speedup factor S. To realize a speedup factor S, a conventional CIOQ switch requires the switching fabric and memories to operate S times faster than the line rate. In this paper, we propose to use a CIOQ switch with space-division multiplexing expansion and grouped input/output ports (SDMG CIOQ switch for short) to realize speedup while only requiring the switching fabric and memories to operate at the line …