Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

2012

Discipline
Keyword
Publication
File Type

Articles 1 - 11 of 11

Full-Text Articles in Systems Architecture

Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro Dec 2012

Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro

David LO

A number of techniques that infer finite state automata from execution traces have been used to support test and analysis activities. Some of these techniques can produce automata that integrate information about the data-flow, that is, they also represent how data values affect the operations executed by programs. The integration of information about operation sequences and data values into a unique model is indeed conceptually useful to accurately represent the behavior of a program. However, it is still unclear whether handling heterogeneous types of information, such as operation sequences and data values, necessarily produces higher quality models or not. In …


Data Curation Is For Everyone! The Case For Master's And Baccalaureate Institutional Engagement With Data Curation, Yasmeen Shorish Dec 2012

Data Curation Is For Everyone! The Case For Master's And Baccalaureate Institutional Engagement With Data Curation, Yasmeen Shorish

Yasmeen Shorish

This article describes the fundamental challenges to data curation, how these challenges may be compounded for smaller institutions, and how data management is an essential and manageable component of data curation. Data curation is often discussed within the confines of large, research universities. As a result, master’s and baccalaureate institutions may be left with the impression that they cannot engage with data curation. However, by proactively engaging with faculty, libraries of all sizes can build closer relationships and help educate faculty on data documentation and organization best practices. Experiences from one master’s comprehensive institution as it engages with data management …


At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci Oct 2012

At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci

Robert A Iannucci

No abstract provided.


Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam Oct 2012

Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam

Rahul Mangharam

Embedded wireless networks have largely focused on open-loop sensing and monitoring. To address actuation in closed-loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions and runtime systems where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), …


Linux 101: Ci-Trainseminar, Edward Aractingi Sep 2012

Linux 101: Ci-Trainseminar, Edward Aractingi

Edward Aractingi

An overview of how the Linux operating system.


Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs Sep 2012

Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs

Edward Aractingi

The presentation will provide insight into the decision to move from a fibre channel SAN solution, the resulting performance metrics and financial savings seen by Marshall University. Presented at The Ohio Higher Education Computing Council (OHECC) March 23, 2011.


Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs Sep 2012

Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs

Allen Taylor

The presentation will provide insight into the decision to move from a fibre channel SAN solution, the resulting performance metrics and financial savings seen by Marshall University. Presented at The Ohio Higher Education Computing Council (OHECC) March 23, 2011.


Movement Detection For Power-Efficient Smartphone Wlan Localization, Mark Chang, Ilari Shafer Jul 2012

Movement Detection For Power-Efficient Smartphone Wlan Localization, Mark Chang, Ilari Shafer

Mark L. Chang

Mobile phone services based on the location of a user have increased in popularity and importance, particularly with the proliferation of feature-rich smartphones. One major obstacle to the widespread use of location-based services is the limited battery life of these mobile devices and the high power costs of many existing approaches. We demonstrate the effectiveness of a localization strategy that performs full localization only when it detects a user has finished moving. We characterize the power use of a smartphone, then verify our strategy using models of long-term walk behavior, recorded data, and device implementation. For the same sample period, …


Platform Competition In Digital Systems: Architectural Control And Value Migration, C. Jason Woodard Apr 2012

Platform Competition In Digital Systems: Architectural Control And Value Migration, C. Jason Woodard

C. Jason Woodard

Digital systems give rise to complex layered architectures in which products at one layer serve as platforms for applications and services in adjacent layers. Platform owners face a difficult balancing act. On one hand, they need to make their platforms attractive to potential complementors by mitigating the threat of architectural lock-in. On the other hand, platform owners must be careful not to give away too much too soon, or risk being unable to recoup their own investments. This paper presents an agent-based model that explores this tension at both the firm and industry levels. Computational experiments show that boundedly rational …


From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons Apr 2012

From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons

C. Jason Woodard

We use an agent-based NK model to explore the conditions under which standard platforms emerge among competing products. Our findings were inconclusive. We find that the usual Darwinian conditions needed for the emergence of complexity are sufficient to yield a limited reliance upon platforms with a core of common components, simply because evolution causes the population to converge on a set of products that contain combinations that “work well,” yielding what we call “coincidental platform emergence.” Economies of scale yield more use of common components, or “production platform mergence.” Positive participation externalities initially induce the highest degree of platform emergence …


A Vision And Method In Studying Abdul-Wahab El-Bayyati Poetry, Philadelphia University Feb 2012

A Vision And Method In Studying Abdul-Wahab El-Bayyati Poetry, Philadelphia University

Philadelphia University, Jordan

No abstract provided.