Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- OS and Networks (6)
- Databases and Information Systems (4)
- Business (2)
- Computer Engineering (2)
- Computer and Systems Architecture (2)
-
- Education (2)
- Educational Administration and Supervision (2)
- Electrical and Computer Engineering (2)
- Engineering (2)
- Hardware Systems (2)
- Higher Education Administration (2)
- Library and Information Science (2)
- Social and Behavioral Sciences (2)
- Software Engineering (2)
- Accounting (1)
- Architecture (1)
- Art and Design (1)
- Arts and Humanities (1)
- Business Administration, Management, and Operations (1)
- Chemistry (1)
- Communication (1)
- Communication Technology and New Media (1)
- Controls and Control Theory (1)
- Corporate Finance (1)
- Digital Circuits (1)
- Digital Communications and Networking (1)
- Economics (1)
- Keyword
-
- FC SAN (2)
- Marshall University (2)
- Storage (2)
- Storage arrays (2)
- A vision and method in studying Abdul-Wahab el-Bayyati Poetry (1)
-
- Architectural strategy (1)
- Articles (1)
- Behavioral models (1)
- Competitive aspects of IS (1)
- Computational simulation (1)
- Control systems (1)
- Data curation (1)
- Data management (1)
- Design evolution (1)
- Empirical validation (1)
- External effects (1)
- FSA inference (1)
- Fault-tolerant systems (1)
- Higher education (1)
- IT impacts on industry and market structure (1)
- Institutional repository (1)
- Invited Talks (1)
- Libraries (1)
- Linux (1)
- Movement detection (1)
- Open source (1)
- Operating system (1)
- Power-efficient (1)
- Product architecture (1)
- Real-time systems (1)
- Publication
- File Type
Articles 1 - 11 of 11
Full-Text Articles in Systems Architecture
Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro
Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro
David LO
A number of techniques that infer finite state automata from execution traces have been used to support test and analysis activities. Some of these techniques can produce automata that integrate information about the data-flow, that is, they also represent how data values affect the operations executed by programs. The integration of information about operation sequences and data values into a unique model is indeed conceptually useful to accurately represent the behavior of a program. However, it is still unclear whether handling heterogeneous types of information, such as operation sequences and data values, necessarily produces higher quality models or not. In …
Data Curation Is For Everyone! The Case For Master's And Baccalaureate Institutional Engagement With Data Curation, Yasmeen Shorish
Data Curation Is For Everyone! The Case For Master's And Baccalaureate Institutional Engagement With Data Curation, Yasmeen Shorish
Yasmeen Shorish
This article describes the fundamental challenges to data curation, how these challenges may be compounded for smaller institutions, and how data management is an essential and manageable component of data curation. Data curation is often discussed within the confines of large, research universities. As a result, master’s and baccalaureate institutions may be left with the impression that they cannot engage with data curation. However, by proactively engaging with faculty, libraries of all sizes can build closer relationships and help educate faculty on data documentation and organization best practices. Experiences from one master’s comprehensive institution as it engages with data management …
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
At The Tone, The Time Will Be... Unknown – A Perspective On The Evolution Of Time In Telecommunications, Robert Iannucci
Robert A Iannucci
No abstract provided.
Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam
Embedded Virtual Machines For Robust Wireless Control And Actuation, Miroslav Pajic, Rahul Mangharam
Rahul Mangharam
Embedded wireless networks have largely focused on open-loop sensing and monitoring. To address actuation in closed-loop wireless control systems there is a strong need to re-think the communication architectures and protocols for reliability, coordination and control. As the links, nodes and topology of wireless systems are inherently unreliable, such time-critical and safety-critical applications require programming abstractions and runtime systems where the tasks are assigned to the sensors, actuators and controllers as a single component rather than statically mapping a set of tasks to a specific physical node at design time. To this end, we introduce the Embedded Virtual Machine (EVM), …
Linux 101: Ci-Trainseminar, Edward Aractingi
Linux 101: Ci-Trainseminar, Edward Aractingi
Edward Aractingi
An overview of how the Linux operating system.
Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs
Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs
Edward Aractingi
The presentation will provide insight into the decision to move from a fibre channel SAN solution, the resulting performance metrics and financial savings seen by Marshall University. Presented at The Ohio Higher Education Computing Council (OHECC) March 23, 2011.
Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs
Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs
Allen Taylor
The presentation will provide insight into the decision to move from a fibre channel SAN solution, the resulting performance metrics and financial savings seen by Marshall University. Presented at The Ohio Higher Education Computing Council (OHECC) March 23, 2011.
Movement Detection For Power-Efficient Smartphone Wlan Localization, Mark Chang, Ilari Shafer
Movement Detection For Power-Efficient Smartphone Wlan Localization, Mark Chang, Ilari Shafer
Mark L. Chang
Mobile phone services based on the location of a user have increased in popularity and importance, particularly with the proliferation of feature-rich smartphones. One major obstacle to the widespread use of location-based services is the limited battery life of these mobile devices and the high power costs of many existing approaches. We demonstrate the effectiveness of a localization strategy that performs full localization only when it detects a user has finished moving. We characterize the power use of a smartphone, then verify our strategy using models of long-term walk behavior, recorded data, and device implementation. For the same sample period, …
Platform Competition In Digital Systems: Architectural Control And Value Migration, C. Jason Woodard
Platform Competition In Digital Systems: Architectural Control And Value Migration, C. Jason Woodard
C. Jason Woodard
Digital systems give rise to complex layered architectures in which products at one layer serve as platforms for applications and services in adjacent layers. Platform owners face a difficult balancing act. On one hand, they need to make their platforms attractive to potential complementors by mitigating the threat of architectural lock-in. On the other hand, platform owners must be careful not to give away too much too soon, or risk being unable to recoup their own investments. This paper presents an agent-based model that explores this tension at both the firm and industry levels. Computational experiments show that boundedly rational …
From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons
From Primordial Soup To Platform-Based Competition: Exploring The Emergence Of Products, Systems, And Platforms, C. Jason Woodard, Eric K. Clemons
C. Jason Woodard
We use an agent-based NK model to explore the conditions under which standard platforms emerge among competing products. Our findings were inconclusive. We find that the usual Darwinian conditions needed for the emergence of complexity are sufficient to yield a limited reliance upon platforms with a core of common components, simply because evolution causes the population to converge on a set of products that contain combinations that “work well,” yielding what we call “coincidental platform emergence.” Economies of scale yield more use of common components, or “production platform mergence.” Positive participation externalities initially induce the highest degree of platform emergence …
A Vision And Method In Studying Abdul-Wahab El-Bayyati Poetry, Philadelphia University
A Vision And Method In Studying Abdul-Wahab El-Bayyati Poetry, Philadelphia University
Philadelphia University, Jordan
No abstract provided.