Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

621 Full-Text Articles 653 Authors 199,348 Downloads 70 Institutions

All Articles in Systems Architecture

Faceted Search

621 full-text articles. Page 1 of 19.

Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska 2018 University of Oslo, Department of Informatics; University of Malawi, Department of Computer Science

Cultivating Third Party Development In Platform-Centric Software Ecosystems: Extended Boundary Resources Model, Brown C. Msiska

The African Journal of Information Systems

Software ecosystems provide an effective way through which software solutions can be constructed by composing software components, typically applications, developed by internal and external developers on top of a software platform. Third party development increases the potential of a software ecosystem to effectively and quickly respond to context-specific software requirements. The boundary resources model gives a theoretical account for cultivation of third party development premised on the role of platform boundary resources such as application programming interfaces (API). However, from a longitudinal case study of the DHIS2 software ecosystem, this paper observes that no matter how good the boundary resources ...


Colenda @ The University Of Pennsylvania: Using A Decoupled, Pluggable Architecture For Object Processing, Kate Lynch 2018 University of Pennsylvania

Colenda @ The University Of Pennsylvania: Using A Decoupled, Pluggable Architecture For Object Processing, Kate Lynch

Scholarship at Penn Libraries

This poster details the architecture of the repository and the deliverables of the first major release of Colenda, the open-source repository software developed at Penn Libraries. Staff in Digital Library Development & Systems created Colenda, a long-term preservation ecosystem including Samvera, an open-source software framework for repository development, at its core. Colenda is a Samvera instance that provides materials-agnostic fuThis poster details the architecture of the repository and the deliverables of the first major release of Colenda, the open-source repository software developed at Penn Libraries. Staff in Digital Library Development & Systems created Colenda, a long-term preservation ecosystem including Samvera, an open-source ...


Fusing Multi-Abstraction Vector Space Models For Concern Localization, Yun ZHANG, David LO, Xin XIA, Giuseppe SCANNIELLO, Tien-Duy B. LE, Jianling SUN 2018 Singapore Management University

Fusing Multi-Abstraction Vector Space Models For Concern Localization, Yun Zhang, David Lo, Xin Xia, Giuseppe Scanniello, Tien-Duy B. Le, Jianling Sun

Research Collection School Of Information Systems

Concern localization refers to the process of locating code units that match a particular textual description. It takes as input textual documents such as bug reports and feature requests and outputs a list of candidate code units that are relevant to the bug reports or feature requests. Many information retrieval (IR) based concern localization techniques have been proposed in the literature. These techniques typically represent code units and textual descriptions as a bag of tokens at one level of abstraction, e.g., each token is a word, or each token is a topic. In this work, we propose a multi-abstraction ...


Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar 2018 California Polytechnic State University, San Luis Obispo

Extension Of Cpe 454 Operating System, Joseph Nathaniel Arhar

Computer Science

This project extended on the operating system I wrote in CPE 454 by adding additional features on top of the existing implementation. In order to implement them, I researched operating system design patterns and hardware details. I used wiki.osdev.org for most research, just like I did in CPE 454. The source code for the project is at https://github.com/josepharhar/jos.


Compiler Optimization Effects On Register Collisions, Jonathan S. Tan 2018 California Polytechnic State University, San Luis Obispo

Compiler Optimization Effects On Register Collisions, Jonathan S. Tan

Master's Theses and Project Reports

We often want a compiler to generate executable code that runs as fast as possible. One consideration toward this goal is to keep values in fast registers to limit the number of slower memory accesses that occur. When there are not enough physical registers available for use, values are ``spilled'' to the runtime stack. The need for spills is discovered during register allocation wherein values in use are mapped to physical registers. One factor in the efficacy of register allocation is the number of values in use at one time (register collisions). Register collision is affected by compiler optimizations that ...


Towards Mitigating Co-Incident Peak Power Consumption And Managing Energy Utilization In Heterogeneous Clusters, Renan DelValle Rueda 2018 State University of New York at Binghamton

Towards Mitigating Co-Incident Peak Power Consumption And Managing Energy Utilization In Heterogeneous Clusters, Renan Delvalle Rueda

Graduate Dissertations and Theses

As data centers continue to grow in scale, the resource management software needs to work closely with the hardware infrastructure to provide high utilization, performance, fault tolerance, and high availability. Apache Mesos has emerged as a leader in this space, providing an abstraction over the entire cluster, data center, or cloud to present a uniform view of all the resources. In addition, frameworks built on Mesos such as Apache Aurora, developed within Twitter and later contributed to the Apache Software Foundation, allow massive job submissions with heterogeneous resource requirements. The availability of such tools in the Open Source space, with ...


Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson 2018 University of Arkansas, Fayetteville

Usability Of Sound-Driven User Interfaces, Zachary T. Roth, Dale R. Thompson

Computer Science and Computer Engineering Undergraduate Honors Theses

The model for interacting with computing devices remains primarily focused on visual design. However, sound has a unique set of advantages. In this work, an experiment was devised where participants were tasked with identifying elements in an audio-only computing environment. The interaction relied on mouse movement and button presses for navigation. Experiment trials consisted of variations in sound duration, volume, and distinctness according to both experiment progress and user behavior. Participant interactions with the system were tracked to examine the usability of the interface. Preliminary results indicated the majority of participants mastered every provided test, but the total time spent ...


Wisdom In Sum Of Parts: Multi-Platform Activity Prediction In Social Collaborative Sites, Roy Ka-Wei LEE, David LO 2018 Singapore Management University

Wisdom In Sum Of Parts: Multi-Platform Activity Prediction In Social Collaborative Sites, Roy Ka-Wei Lee, David Lo

Research Collection School Of Information Systems

In this paper, we proposed a novel framework which uses user interests inferred from activities (a.k.a., activity interests) in multiple social collaborative platforms to predict users’ platform activities. Included in the framework are two prediction approaches: (i) direct platform activity prediction, which predicts a user’s activities in a platform using his or her activity interests from the same platform (e.g., predict if a user answers a given Stack Overflow question using the user’s interests inferred from his or her prior answer and favorite activities in Stack Overflow), and (ii) cross-platform activity prediction, which predicts a ...


Blockchain In Payment Card Systems, Darlene Godfrey-Welch, Remy Lagrois, Jared Law, Russell Scott Anderwald 2018 Southern Methodist University

Blockchain In Payment Card Systems, Darlene Godfrey-Welch, Remy Lagrois, Jared Law, Russell Scott Anderwald

SMU Data Science Review

Payment cards (e.g., credit and debit cards) are the most frequent form of payment in use today. A payment card transaction entails many verification information exchanges between the cardholder, merchant, issuing bank, a merchant bank, and third-party payment card processors. Today, a record of the payment transaction often records to multiple ledgers. Merchant’s incur fees for both accepting and processing payment cards. The payment card industry is in dire need of technology which removes the need for third-party verification and records transaction details to a single tamper-resistant digital ledger. The private blockchain is that technology. Private blockchain provides ...


Making Scientific Applications Portable: Software Containers And Package Managers, Curtis Noecker 2018 College of Saint Benedict and Saint John's University

Making Scientific Applications Portable: Software Containers And Package Managers, Curtis Noecker

All College Thesis Program, 2016-present

Scientific workflows for high-performance computing (HPC) are becoming increasingly complex. Developing a way to simplify these workflows could save many hours for both HPC users and developers, potentially eliminating any time spent managing software dependencies and experiment set-up. To accomplish this, we propose using two programs together: Docker and Spack. Docker is a container platform and Spack is a package manager designed specifically for HPC. In this paper, we show how Docker and Spack can be used to containerize the extreme-scale Scientific Software Development Kit (xSDK). Doing this makes the xSDK far more accessible to non-computer scientists and lowers time ...


A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri 2018 Western Michigan University

A Survey Of Security And Privacy In Mobile Cloud Computing, Bhuvaneswari Rayapuri

Master's Theses

Cloud Computing is an emerging technology that provides shared processing resources and data to computers and other devices on demand. On the other hand, Mobile Computing allows transmission of data, voice and video. From these two there emerges a new concept Mobile Cloud Computing which not only overcomes the problems of Mobile Computing but also integrates Cloud Computing into Mobile Environments to overcome obstacles related to Performance, Security and Environment. This paper also provides a decent description on Security and Privacy, its related problems, threats and challenges. This paper first provides details on survey of Mobile Cloud Computing, then it ...


Combined Classifier For Cross-Project Defect Prediction: An Extended Empirical Study, Yun ZHANG, David LO, Xin XIA, Jianling SUN 2018 Singapore Management University

Combined Classifier For Cross-Project Defect Prediction: An Extended Empirical Study, Yun Zhang, David Lo, Xin Xia, Jianling Sun

Research Collection School Of Information Systems

To facilitate developers in effective allocation of their testing and debugging efforts, many software defect prediction techniques have been proposed in the literature. These techniques can be used to predict classes that are more likely to be buggy based on the past history of classes, methods, or certain other code elements. These techniques are effective provided that a sufficient amount of data is available to train a prediction model. However, sufficient training data are rarely available for new software projects. To resolve this problem, cross-project defect prediction, which transfers a prediction model trained using data from one project to another ...


Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, Shawn Ware, David Phillips 2018 University of Nebraska at Omaha

Keep It Simple, Keep It Safe - Research On The Impacts Of Increasing Complexity Of Modern Enterprise Applications, Shawn Ware, David Phillips

Student Research and Creative Activity Fair

As the Cybersecurity program within UNO continues to adapt to the ever-changing world of information systems and information security, the Cybersecurity Capstone has recently become an active, community-involvement project, where real-world organizations can receive valuable, useful research and information from students on their way towards a degree. This presentation encompasses two such projects from the Cybersecurity Capstone, looking at how modern, more complex systems can often increase system vulnerability.


Randomized Routing On Fat-Trees, Ronald I. Greenberg 2018 Selected Works

Randomized Routing On Fat-Trees, Ronald I. Greenberg

Ronald Greenberg

Fat-trees are a class of routing networks for hardware-efficient parallel computation. This paper presents a randomized algorithm for routing messages on a fat-tree. The quality of the algorithm is measured in terms of the load factor of a set of messages to be routed, which is a lower bound on the time required to deliver the messages. We show that if a set of messages has load factor lambda on a fat-tree with n processors, the number of delivery cycles (routing attempts) that the algorithm requires is O(lambda+lgnlglgn) with probability 1-O(1/n). The ...


The Legacy Of Multics And Secure Operating Systems Today, John Schriner 2018 CUNY Queensborough Community College

The Legacy Of Multics And Secure Operating Systems Today, John Schriner

Publications and Research

This paper looks to the legacy of Multics from 1963 and its influence on computer security. It discusses kernel-based and virtualization-based containment in projects like SELinux and Qubes, respectively. The paper notes the importance of collaborative and research-driven projects like Qubes and Tor Project.


How Do Topological Properties Of Ripple-Carry Adders Affect Time Delay?, Alexander Boukal 2018 Augsburg University

How Do Topological Properties Of Ripple-Carry Adders Affect Time Delay?, Alexander Boukal

Zyzzogeton Posters

This poster presents topological properties of N-bit ripple-carry adders and the effects of their topology, specifically their genus, on the speed of current flow. An adder is a very simple computer that takes input numbers (0 and 1) from logic gates and then adds them together. To create a ripple-carry adder, we take N number of adder circuits and arrange them in parallel. We differentiate between two kinds of adder circuits: half adders and full adders. Half adders are non-planar (has loops) circuits with genus = 1 that let us perform elementary addition operations using logic gates. Full adder circuits are ...


Modeling Data Center Co-Tenancy Performance Interference, Wei Kuang 2018 Michigan Technological University

Modeling Data Center Co-Tenancy Performance Interference, Wei Kuang

Dissertations, Master's Theses and Master's Reports

A multi-core machine allows executing several applications simultaneously. Those jobs are scheduled on different cores and compete for shared resources such as the last level cache and memory bandwidth. Such competitions might cause performance degradation. Data centers often utilize virtualization to provide a certain level of performance isolation. However, some of the shared resources cannot be divided, even in a virtualized system, to ensure complete isolation. If the performance degradation of co-tenancy is not known to the cloud administrator, a data center often has to dedicate a whole machine for a latency-sensitive application to guarantee its quality of service. Co-run ...


Why Are Fairness Concerns So Important? Lessons From Pricing A Shared Last-Mile Transportation System, Yiwei CHEN, Hai WANG 2018 Singapore Management University

Why Are Fairness Concerns So Important? Lessons From Pricing A Shared Last-Mile Transportation System, Yiwei Chen, Hai Wang

Research Collection School Of Information Systems

The Last-Mile Problem refers to the provision of travel service from the nearest public transportation node to the final destination. The Last-Mile Transportation System (LMTS), which has recently emerged, provides on-demand shared last-mile transportation service. While it is natural that in the last-mile supply chain, a high-value parcel should be charged a higher price and deserves service priority compared to a low-value parcel, it is not straightforward to identify an obvious pricing and service priority for an LMTS that serves passengers. In an LMTS, a special-type passenger who has a higher valuation of service usually has a lower waiting time ...


Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred 2018 The University of Akron

Smart-Teleprompter: An Online Teleprompter With Text Editing, Mikyla Wilfred

Honors Research Projects

Mikyla Wilfred

Major: Computer Science

Project Sponsor: Dr. Collard

Number of Project Credits: 3

Smart-Teleprompter

The smart-teleprompter is a website that allows a logged in user to edit text files as well as teleprompt them straight to the screen. A teleprompter is used by newscasters and other media professionals to read scripts while still looking at or near the camera. My project uses this concept creating a page that defaults to white font on a black background that can scroll through the script. The website allows the logged in user to save defaults of font color, background color, font style ...


Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad 2017 University of Nebraska-Lincoln

Design And Implementation Of A Stand-Alone Tool For Metabolic Simulations, Milad Ghiasi Rad

Computer Science and Engineering: Theses, Dissertations, and Student Research

In this thesis, we present the design and implementation of a stand-alone tool for metabolic simulations. This system is able to integrate custom-built SBML models along with external user’s input information and produces the estimation of any reactants participating in the chain of the reactions in the provided model, e.g., ATP, Glucose, Insulin, for the given duration using numerical analysis and simulations. This tool offers the food intake arguments in the calculations to consider the personalized metabolic characteristics in the simulations. The tool has also been generalized to take into consideration of temporal genomic information and be flexible ...


Digital Commons powered by bepress