Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 39

Full-Text Articles in Systems Architecture

Random Automata Networks: Why Playing Dice Is Not A Vice, Christof Teuscher Dec 2010

Random Automata Networks: Why Playing Dice Is Not A Vice, Christof Teuscher

Systems Science Friday Noon Seminar Series

Random automata networks consist of a set of simple compute nodes interacting with each other. In this generic model, one or multiple model parameters, such as the the node interactions and/or the compute functions, are chosen at random. Random Boolean Networks (RBNs) are a particular case of discrete dynamical automata networks where both time and states are discrete. While traditional RBNs are generally credited to Stuart Kauffman (1969), who introduced them as simplified models of gene regulation, Alan Turing proposed unorganized machines as early as 1948. In this talk I will start with Alan Turing's early work on unorganized machines, …


Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung Dec 2010

Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung

Master's Projects

False sharing (FS) is a well-known problem occurring in multiprocessor systems. It results in performance degradation on multi-threaded programs running on multiprocessor environments.

With the evolution of processor architecture over time, the multicore processor is a recent direction used by hardware designers to increase performance while avoiding heat and power walls. To fully exploit the processing power from these multicore hardware architectures, the software programmer needs to build applications using parallel programming concepts, which are based upon multi-threaded programming principles.

Since the architecture of a multicore processor is very similar to a multiprocessor system, the presence of the false sharing …


Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks Nov 2010

Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks

Australian Security and Intelligence Conference

Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat vulnerabilities. This study expands on a past article (Brooks, 2009) that presented a defeat evaluation methodology applied to high-security biometric readers. The defeat methodology is represented, but applied to both fingerprint and back-of-hand biometric readers. Defeat evaluation included both physical and technical integrity …


Morphogrammatics Of Reflection, Rudolf Kaehr Nov 2010

Morphogrammatics Of Reflection, Rudolf Kaehr

Rudolf Kaehr

Turning back from the studies of morphogrammatics to some open questions of reflectional programming, the recountered problematics might be put into a different light and new methods of handling formal aspects of reflection and reflectionality shall be introduced. Albeit the use of light-metaphors, morphogrammatic reflection is not sketched along the paradigm of optical metaphors. Morphograms are presenting neither propositions nor perceptions able for mirroring (representation). Exercises in defining morphogrammatic retro-grade recursion and reflection schemata are continued from the paper “Sketches to Morphogrammatic Programming”.


Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan Oct 2010

Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan

Computer Science Faculty Publications

Personalization constitutes the mechanisms necessary to automatically customize information content, structure, and presentation to the end user to reduce information overload. Unlike traditional approaches to personalization, the central theme of our approach is to model a website as a program and conduct website transformation for personalization by program transformation (e.g., partial evaluation, program slicing). The goal of this paper is study personalization through a program transformation lens and develop a formal model, based on program transformations, for personalized interaction with hierarchical hypermedia. The specific research issues addressed involve identifying and developing program representations and transformations suitable for classes of hierarchical …


Enhancing Stockmarket Trading Performance With Anns, Bruce Vanstone, Gavin Finnie Sep 2010

Enhancing Stockmarket Trading Performance With Anns, Bruce Vanstone, Gavin Finnie

Gavin Finnie

Artificial Neural Networks (ANNs) have been repeatedly and consistently applied to the domain of trading financial time series, with mixed results. Many researchers have developed their own techniques for both building and testing such ANNs, and this presents a difficulty when trying to learn lessons and compare results. In a previous paper, Vanstone and Finnie have outlined an empirical methodology for creating and testing ANNs for use within stockmarket trading systems. This paper demonstrates the use of their methodology, and creates and benchmarks a financially viable ANN-based trading system. Many researchers appear to fail at the final hurdles in their …


Enhancing Stockmarket Trading Performance With Anns, Bruce Vanstone, Gavin Finnie Aug 2010

Enhancing Stockmarket Trading Performance With Anns, Bruce Vanstone, Gavin Finnie

Bruce Vanstone

Artificial Neural Networks (ANNs) have been repeatedly and consistently applied to the domain of trading financial time series, with mixed results. Many researchers have developed their own techniques for both building and testing such ANNs, and this presents a difficulty when trying to learn lessons and compare results. In a previous paper, Vanstone and Finnie have outlined an empirical methodology for creating and testing ANNs for use within stockmarket trading systems. This paper demonstrates the use of their methodology, and creates and benchmarks a financially viable ANN-based trading system. Many researchers appear to fail at the final hurdles in their …


Increasing Effectiveness Of The Zachman Framework Using The Balanced Scorecard, Anagha Gokhale Aug 2010

Increasing Effectiveness Of The Zachman Framework Using The Balanced Scorecard, Anagha Gokhale

Purdue Polytechnic Masters Theses

The purpose of this study is to explore the impact of integrating the use of Zachman Framework of Enterprise Architecture and the Balanced Scorecard (BSC) Framework for an effective business-IT alignment. The study tries to identify certain gaps in the Zachman Framework focusing on the motivational aspects of the framework, which have been discussed in the literature review. The aim is to achieve the integration by mitigating these motivational aspect’s weaknesses in the Zachman Framework using the deliverables obtained from the BSC. Thus the author proposes to achieve business-IT alignment through this integration. No research studies in the past have …


A Study Of Improving The Parallel Performance Of Vasp., Matthew Brandon Baker Aug 2010

A Study Of Improving The Parallel Performance Of Vasp., Matthew Brandon Baker

Electronic Theses and Dissertations

This thesis involves a case study in the use of parallelism to improve the performance of an application for computational research on molecules. The application, VASP, was migrated from a machine with 4 nodes and 16 single-threaded processors to a machine with 60 nodes and 120 dual-threaded processors. When initially migrated, VASP's performance deteriorated after about 17 processing elements (PEs), due to network contention. Subsequent modifications that restrict communication amongst VASP processes, together with additional support for threading, allowed VASP to scale up to 112 PEs, the maximum number that was tested. Other performance-enhancing optimizations that were attempted included replacing …


Integrating Recommender Information In Social Ecosystems Decisions, Renato A C Capuruco, Luiz Fernando Capretz Aug 2010

Integrating Recommender Information In Social Ecosystems Decisions, Renato A C Capuruco, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

The exploration of online social networks whose members share mutual recommendations and interactions is a time-dependent and contextual-based process which aims to predict the social status among members, ultimately improving the network's discoverability to achieve societal gain. To address the difficulties associated with the process, this article presents an integrated recommender model whose statements are time-dependent, interaction-aware, and social context-sensitive. The originality of the proposed model stems from the integration of the predictive recommender, social networks, and interaction components. Each model is developed based on: (1) a time history and decay algorithm to consider the decreasing intensity of recommendations among …


St. Jude Medical: An Object-Oriented Software Architecture For Embedded And Real-Time Medical Devices, Atila Amiri Aug 2010

St. Jude Medical: An Object-Oriented Software Architecture For Embedded And Real-Time Medical Devices, Atila Amiri

Master's Theses

Medical devices used for surgical or therapeutic purposes require a high degree of safety and effectiveness. Software is critical component of many such medical devices. The software architecture of a system defines organizational structure and the runtime characteristic of the application used to control the operation of the system and provides a set of frameworks that are used to develop that. As such, the design of software architecture is a critical element in achieving the intended functionality, performance, and safety requirements of a medical device. This architecture uses object-oriented design techniques, which model the underlying system as a set of …


Reducing Cluster Power Consumption By Dynamically Suspending Idle Nodes, Brian Michael Oppenheim Jun 2010

Reducing Cluster Power Consumption By Dynamically Suspending Idle Nodes, Brian Michael Oppenheim

Master's Theses

Close to 1% of the world's electricity is consumed by computer servers. Given that the increased use of electricity raises costs and damages the environment, optimizing the world's computing infrastructure for power consumption is worthwhile. This thesis is one attempt at such an optimization. In particular, I began by building a cluster of 6 Intel Atom based low-power nodes to perform work analogous to data center clusters. Then, I installed a version of Hadoop modified with a novel power management system on the cluster. The power management system uses different algorithms to determine when to turn off idle nodes in …


Fast Energy Loss Computation And Fuzzy-Based Shunt Capacitor Insertion, Philadelphia University May 2010

Fast Energy Loss Computation And Fuzzy-Based Shunt Capacitor Insertion, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Focused Multi-Document Summarization: Human Summarization Activity Vs. Automated Systems Techniques, Quinsulon L. Israel, Hyoil Han, Il-Yeol Song May 2010

Focused Multi-Document Summarization: Human Summarization Activity Vs. Automated Systems Techniques, Quinsulon L. Israel, Hyoil Han, Il-Yeol Song

Computer Sciences and Electrical Engineering Faculty Research

Focused Multi-Document Summarization (MDS) is concerned with summarizing documents in a collection with a concentration toward a particular external request (i.e. query, question, topic, etc.), or focus. Although the current state-of-the-art provides somewhat decent performance for DUC/TAC-like evaluations (i.e. government and news concerns), other considerations need to be explored. This paper not only briefly explores the state-of-the-art in automatic systems techniques, but also a comparison with human summarization activity.


Personalization By Website Transformation: Theory And Practice, Saverio Perugini May 2010

Personalization By Website Transformation: Theory And Practice, Saverio Perugini

Computer Science Faculty Publications

We present an analysis of a progressive series of out-of-turn transformations on a hierarchical website to personalize a user’s interaction with the site. We formalize the transformation in graph-theoretic terms and describe a toolkit we built that enumerates all of the traversals enabled by every possible complete series of these transformations in any site and computes a variety of metrics while simulating each traversal therein to qualify the relationship between a site’s structure and the cumulative effect of support for the transformation in a site. We employed this toolkit in two websites. The results indicate that the transformation enables users …


Memristics: Memristors, Again? – Part Ii, How To Transform Wired ‘Translations’ Between Crossbars Into Interactions?, Rudolf Kaehr Apr 2010

Memristics: Memristors, Again? – Part Ii, How To Transform Wired ‘Translations’ Between Crossbars Into Interactions?, Rudolf Kaehr

Rudolf Kaehr

The idea behind this patchwork of conceptual interventions is to show the possibility of a “buffer-free” modeling of the crossbar architecture for memristive systems on the base of a purely difference-theoretical approach. It is considered that on a nano-electronic level principles of interpretation appears as mechanisms of complementarity. The most basic conceptual approach to such a complementarity is introduced as an interchangeability of operators and operands of an operation. Therefore, the architecture of crossbars gets an interpretation as complementarity between crossbar functionality and “buffering” translation functionality. That is, the same matter functions as operator and at once, as operand – …


Memristics: Memristors, Again?, Rudolf Kaehr Apr 2010

Memristics: Memristors, Again?, Rudolf Kaehr

Rudolf Kaehr

This collection gives first and short critical reflections on the concepts of memristics, memristors and memristive systems and the history of similar movements with an own focus on a possible interplay between memory and computing functions, at once, at the same place and time, to achieve a new kind of complementarity between computation and memory on a single chip without retarding buffering conditions.


Dsfs: Decentralized Security For Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, Anli Chen Mar 2010

Dsfs: Decentralized Security For Large Parallel File Systems, Zhongying Niu, Hong Jiang, Ke Zhou, Dan Feng, Tianming Yang, Dongliang Lei, Anli Chen

CSE Technical Reports

This paper describes DSFS, a decentralized security system for large parallel file system. DSFS stores global access control lists (ACLs) in a centralized decisionmaking server and pushes pre-authorization lists (PALs) into storage devices. Thus DSFS allows users to flexibly set any access control policy for the global ACL or even change the global ACL system without having to upgrade the security code in their storage devices. With pre-authorization lists, DSFS enables a networkattached storage device to immediately authorize I/O, instead of demanding a client to acquire an authorization from a centralized authorization server at a crucial time. The client needs …


Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn Mar 2010

Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn

Tobias Hahn

Everybody knows there is potential to make big money in the stock market. But what most people don't know is how to go about it. This book will guide you step-by-step through the authors' tried and tested method for building rule-based stockmarket trading systems. It shows you how to design, test and trade a rule-based system.

It differs from other books in that it takes a scientific approach to developing trading systems, based on what others have done before. This book reviews previous work, and shows that some of it is gold dust because it provides information about what works …


Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn Mar 2010

Designing Stockmarket Trading Systems: With And Without Soft Computing, Bruce Vanstone, Tobias Hahn

Bruce Vanstone

Everybody knows there is potential to make big money in the stock market. But what most people don't know is how to go about it. This book will guide you step-by-step through the authors' tried and tested method for building rule-based stockmarket trading systems. It shows you how to design, test and trade a rule-based system.

It differs from other books in that it takes a scientific approach to developing trading systems, based on what others have done before. This book reviews previous work, and shows that some of it is gold dust because it provides information about what works …


Architecture And Usability Aspects Of Environmental Data Portals, Michael Mcmahon, Jr. Feb 2010

Architecture And Usability Aspects Of Environmental Data Portals, Michael Mcmahon, Jr.

2010 Annual Nevada NSF EPSCoR Climate Change Conference

12 PowerPoint slides Session 2: Infrastructure Convener: Sergiu Dascalu, UNR Abstract: -Web Portal: A web site that acts as a starting point or gateway to Internet content, services, and information. Portals expose this information via a consistent set of visual elements and organizational constructs that improve the user experience and may relate, unify, or otherwise enhance the content. -Data Portal: A web site that acts as a starting point or gateway to Internet content, web/data services, and related information. Portals expose this information via a consistent set of visual elements and organizational constructs that improve the user experience and relate, …


Goals, Plans, And Strategies Of The Cyberinfrastructure Project Component, Sergiu Dascalu Feb 2010

Goals, Plans, And Strategies Of The Cyberinfrastructure Project Component, Sergiu Dascalu

2010 Annual Nevada NSF EPSCoR Climate Change Conference

15 PowerPoint slides Session 2: Infrastructure Convener: Sergiu Dascalu, UNR Abstract: -Team -Goal and Targets -Strategies and Activities -Progress: Activities & Milestones -Plans


Sketch Of A Typology Of Abstract Memristic Machines, Rudolf Kaehr Jan 2010

Sketch Of A Typology Of Abstract Memristic Machines, Rudolf Kaehr

Rudolf Kaehr

A typology of memristic machines is sketched. This sketch gives an overview and orientation to the paper “Towards Abstract Memristic Machines”. It also intents to propose a concise systematization of the newly introduced terms and strategies to memristics and morphogrammatics. This sketch is introducing four types of sign-use for four types of machines of fundamentally different paradigms: 1. semiotic, 2. monomorphic, 3. polymorphic and 4. bisimilar abstract machines. Further definitions of abstract machines have to be based on those graphematic notational systems. A realization of such constructions of abstract machines, in contrast to existing abstract machines of the theory of …


Towards Abstract Memristic Machines, Rudolf Kaehr Jan 2010

Towards Abstract Memristic Machines, Rudolf Kaehr

Rudolf Kaehr

No abstract provided.


From Universe To Polyverses, Rudolf Kaehr Jan 2010

From Universe To Polyverses, Rudolf Kaehr

Rudolf Kaehr

Some thoughts about the power of speculation behind important discoveries in mathematics, physics and computer science. The exercise shows that there is no need for a compulsory ultimate unifying universe. It is speculated that just this paradigm of a single ultimate universe is unmasking itself today as the main obstacle for further development in Western science and technology.


Morphogrammatics For Dummies: The Domino Approach, Rudolf Kaehr Jan 2010

Morphogrammatics For Dummies: The Domino Approach, Rudolf Kaehr

Rudolf Kaehr

Dominoes, morphograms, cellular automata, memristics. Topics: possible continuation, coalitions, cooperations, substitution, morphic bisimilarity.


Computing An Incompressible Viscous Fluid Flow Using Neural Network Based On Modified Adaptive Smoothing Errors, Philadelphia University Jan 2010

Computing An Incompressible Viscous Fluid Flow Using Neural Network Based On Modified Adaptive Smoothing Errors, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


An Investigation Of Speech Enhancement Using Wavelet Filtering Method, International Journal Of Speech Technology, Philadelphia University Jan 2010

An Investigation Of Speech Enhancement Using Wavelet Filtering Method, International Journal Of Speech Technology, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Jordanian Commercial Bank Strategies In High- Rate Of Return Realization And Its Relation With Liquidity Gap Management Performance, Philadelphia University Jan 2010

Jordanian Commercial Bank Strategies In High- Rate Of Return Realization And Its Relation With Liquidity Gap Management Performance, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Testing Lyoequivalency For Three Commercially Sustainedrelease Tablets Containing Diltiazem Hydrochloride, Philadelphia University Jan 2010

Testing Lyoequivalency For Three Commercially Sustainedrelease Tablets Containing Diltiazem Hydrochloride, Philadelphia University

Philadelphia University, Jordan

No abstract provided.