Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Theory and Algorithms (6)
- Arts and Humanities (4)
- Databases and Information Systems (4)
- Programming Languages and Compilers (4)
- Social and Behavioral Sciences (4)
-
- Artificial Intelligence and Robotics (3)
- Continental Philosophy (3)
- Environmental Sciences (3)
- Epistemology (3)
- Graphics and Human Computer Interfaces (3)
- Logic and Foundations (3)
- Logic and Foundations of Mathematics (3)
- Mathematics (3)
- Other Languages, Societies, and Cultures (3)
- Other Mathematics (3)
- Other Social and Behavioral Sciences (3)
- Philosophy (3)
- Philosophy of Mind (3)
- Philosophy of Science (3)
- Set Theory (3)
- Software Engineering (3)
- Information Security (2)
- Numerical Analysis and Scientific Computing (2)
- OS and Networks (2)
- Other Computer Sciences (2)
- Accounting (1)
- Architecture (1)
- Institution
- Keyword
-
- AOP; aspect-oriented programming; paradigm; polycontexturality; polysemy; chiasm; object; abject; time modi (1)
- Algorithm design and analysis (1)
- Algorithms--Data processing (1)
- Analytical models (1)
- Architecture Arts and Humanities Business Education Engineering Law Life Sciences Medicine and Health Sciences Physical Sciences and Mathematics Social and Behavioral Sciences (1)
-
- Awareness (1)
- China (1)
- Compliance (1)
- Computer networks (1)
- Computer science (1)
- Computer software -- Development (1)
- Contextural Programming Paradigm (1)
- Data dissemination (1)
- Data integrity (1)
- Delay (1)
- Domain Expert (1)
- Edge computing (1)
- Failure analysis (1)
- Gotthard Gunther Studies (1)
- Hybrid Architecture (1)
- Intruder alarms (1)
- Large-scale systems (1)
- Legislation (1)
- Multiagent System (1)
- Navigation Task (1)
- New rationality (1)
- Object-oriented programming (Computer science) (1)
- Parallel Computer Architecture (1)
- Peer to peer computing (1)
- Programming languages (Electronic computers) (1)
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Systems Architecture
Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang
Modeling Heterogeneous User Churn And Local Resilience Of Unstructured P2p Networks, Zhongmei Yao, Derek Leonard, Dmitri Loguinov, Xiaoming Wang
Computer Science Faculty Publications
Previous analytical results on the resilience of unstructured P2P systems have not explicitly modeled heterogeneity of user churn (i.e., difference in online behavior) or the impact of in-degree on system resilience. To overcome these limitations, we introduce a generic model of heterogeneous user churn, derive the distribution of the various metrics observed in prior experimental studies (e.g., lifetime distribution of joining users, joint distribution of session time of alive peers, and residual lifetime of a randomly selected user), derive several closed-form results on the transient behavior of in-degree, and eventually obtain the joint in/out degree isolation probability as a simple …
A Pattern Language For Extensible Program Representation, Andrew P. Black, Daniel Vainsencher
A Pattern Language For Extensible Program Representation, Andrew P. Black, Daniel Vainsencher
Computer Science Faculty Publications and Presentations
For the last 15 years, implementors of multiple view programming environments have sought a single code model that would form a suitable basis for all of the program analyses and tools that might be applied to the code. They have been unsuccessful. The consequences are a tendency to build monolithic, single-purpose tools, each of which implements its own specialized analyses and optimized representation. This restricts the availability of the analyses, and also limits the reusability of the representation by other tools. Unintegrated tools also produce inconsistent views, which reduce the value of multiple views. This article describes a set of …
Three Architectures For Trusted Data Dissemination In Edge Computing, Shen-Tat Goh, Hwee Hwa Pang, Robert H. Deng, Feng Bao
Three Architectures For Trusted Data Dissemination In Edge Computing, Shen-Tat Goh, Hwee Hwa Pang, Robert H. Deng, Feng Bao
Research Collection School Of Computing and Information Systems
Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for users to validate the results—that values in the result tuples are not tampered with, that no qualifying data are left out, that no spurious tuples are introduced, and that a query result is not actually the output from a different query. This paper aims to address the challenges of ensuring data integrity in edge computing. We study three schemes that enable users to check …
A Hybrid Architecture Combining Reactive Plan Execution And Reactive Learning, Samin Karim, Liz Sonenberg, Ah-Hwee Tan
A Hybrid Architecture Combining Reactive Plan Execution And Reactive Learning, Samin Karim, Liz Sonenberg, Ah-Hwee Tan
Research Collection School Of Computing and Information Systems
Developing software agents has been complicated by the problem of how knowledge should be represented and used. Many researchers have identified that agents need not require the use of complex representations, but in many cases suffice to use “the world” as their representation. However, the problem of introspection, both by the agents themselves and by (human) domain experts, requires a knowledge representation with a higher level of abstraction that is more ‘understandable’. Learning and adaptation in agents has traditionally required knowledge to be represented at an arbitrary, low-level of abstraction. We seek to create an agent that has the capability …
Interacting With Web Hierarchies, Saverio Perugini, Naren Ramakrishnan
Interacting With Web Hierarchies, Saverio Perugini, Naren Ramakrishnan
Computer Science Faculty Publications
Web site interfaces are a particularly good fit for hierarchies in the broadest sense of that idea, i.e. a classification with multiple attributes, not necessarily a tree structure. Several adaptive interface designs are emerging that support flexible navigation orders, exposing and exploring dependencies, and procedural information-seeking tasks. This paper provides a context and vocabulary for thinking about hierarchical Web sites and their design. The paper identifies three features that interface to information hierarchies. These are flexible navigation orders, the ability to expose and explore dependencies, and support for procedural tasks. A few examples of these features are also provided
A Study Of The Compliance Of Alarm Installations In Perth, Western Australia: Are Security Alarm Systems Being Installed To Australian Standard As2201.1 – “Systems Installed In A Client's Premises.”, Robert E. Mclaughlin, David J. Brooks
A Study Of The Compliance Of Alarm Installations In Perth, Western Australia: Are Security Alarm Systems Being Installed To Australian Standard As2201.1 – “Systems Installed In A Client's Premises.”, Robert E. Mclaughlin, David J. Brooks
Australian Information Warfare and Security Conference
This study presented an overview of the training available to intruder alarm installers. A survey of domestic and commercial intruder alarm systems (n=20) were completed across Perth, Western Australia, metropolitan area. The gathered data were evaluated against Australian Standard AS2201.1 for intruder alarm systems, to determine whether alarm installations comply with two parts of the standard, being that of control panel location and zone supervision. AS2201.1 requires that intruder alarm control equipment shall be located within the alarmed area, located outside the entry/exit point and operate as dual endofline supervision. The study presents significant findings into the compliance of installed …
Place-Valued Logics Around Cybernetic Ontology, The Bcl And Afosr, Rudolf Kaehr
Place-Valued Logics Around Cybernetic Ontology, The Bcl And Afosr, Rudolf Kaehr
Rudolf Kaehr
No abstract provided.
From Ruby To Rudy, Rudolf Kaehr
The Chinese Challenge. Hallucinations For Other Futures, Rudolf Kaehr
The Chinese Challenge. Hallucinations For Other Futures, Rudolf Kaehr
Rudolf Kaehr
The main question is: What can we learn from China that China is not teaching us? It is proposed that a study of polycontextural logic and morphogrammatics could be helpful to discover this new kind of rationality.
The Role Of Connective Tissue Growth Factor In Skeletal Growth And Development, Philadelphia University
The Role Of Connective Tissue Growth Factor In Skeletal Growth And Development, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Efficient Scheduling For Sdmg Cioq Switches, Mei Yang, S. Q. Zheng
Efficient Scheduling For Sdmg Cioq Switches, Mei Yang, S. Q. Zheng
Electrical & Computer Engineering Faculty Research
Combined input and output queuing (CIOQ) switches are being considered as high-performance switch architectures due to their ability to achieve 100% throughput and perfectly emulate output queuing (OQ) switch performance with a small speedup factor S. To realize a speedup factor S, a conventional CIOQ switch requires the switching fabric and memories to operate S times faster than the line rate. In this paper, we propose to use a CIOQ switch with space-division multiplexing expansion and grouped input/output ports (SDMG CIOQ switch for short) to realize speedup while only requiring the switching fabric and memories to operate at the line …