Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

872 Full-Text Articles 1,171 Authors 952,718 Downloads 111 Institutions

All Articles in Systems Architecture

Faceted Search

872 full-text articles. Page 24 of 33.

Advances In Dynamic Virtualized Cloud Management, Michael Tighe 2014 The University of Western Ontario

Advances In Dynamic Virtualized Cloud Management, Michael Tighe

Electronic Thesis and Dissertation Repository

Cloud computing continues to gain in popularity, with more and more applications being deployed into public and private clouds. Deploying an application in the cloud allows application owners to provision computing resources on-demand, and scale quickly to meet demand. An Infrastructure as a Service (IaaS) cloud provides low-level resources, in the form of virtual machines (VMs), to clients on a pay-per-use basis. The cloud provider (owner) can reduce costs by lowering power consumption. As a typical server can consume 50% or more of its peak power consumption when idle, this can be accomplished by consolidating client VMs onto as few …


A Study Of The Compliance Of Alarm Installations In Perth, Western Australia: Are Security Alarm Systemsbeing Installed To Australian Standard As2201.1 - "Systems Installed In A Client's Premises.", Robert E. McLaughlin, David J. Brooks 2014 Edith Cowan University

A Study Of The Compliance Of Alarm Installations In Perth, Western Australia: Are Security Alarm Systemsbeing Installed To Australian Standard As2201.1 - "Systems Installed In A Client's Premises.", Robert E. Mclaughlin, David J. Brooks

David J Brooks Dr.

This study presented an overview of the training available to intruder alarm installers. A survey of domestic and commercial intruder alarm systems (n=20) were completed across Perth, Western Australia, metropolitan area. The gathered data were evaluated against Australian Standard AS2201.1 for intruder alarm systems, to determine whether alarm installations comply with two parts of the standard, being that of control panel location and zone supervision. AS2201.1 requires that intruder alarm control equipment shall be located within the alarmed area, located outside the entry/exit point and operate as dual endofline supervision. The study presents significant findings into the compliance of installed …


Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks 2014 Edith Cowan University

Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks

David J Brooks Dr.

Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat vulnerabilities. This study expands on a past article (Brooks, 2009) that presented a defeat evaluation methodology applied to high-security biometric readers. The defeat methodology is represented, but applied to both fingerprint and back-of-hand biometric readers. Defeat evaluation included both physical and technical integrity …


Reliable And Efficient Multithreading, Tongping Liu 2014 University of Massachusetts Amherst

Reliable And Efficient Multithreading, Tongping Liu

Doctoral Dissertations

The advent of multicore architecture has increased the demand for multithreaded programs. It is notoriously far more challenging to write parallel programs correctly and efficiently than sequential ones because of the wide range of concurrency errors and performance problems. In this thesis, I developed a series of runtime systems and tools to combat concurrency errors and performance problems of multithreaded programs. The first system, Dthreads, automatically ensures determinism for unmodified C/C++ applications using the pthreads library without requiring programmer intervention and hardware support. Dthreads greatly simplifies the understanding and debugging of multithreaded programs. Dthreads often matches or even exceeds the …


Wireless Location Determination: Using Existing 802.11 Wireless Networks To Determine A Users Location, Travis Calvert 2014 Minnesota State University, Mankato

Wireless Location Determination: Using Existing 802.11 Wireless Networks To Determine A Users Location, Travis Calvert

Journal of Undergraduate Research at Minnesota State University, Mankato

The ability to determine a user’s location through an existing 802.11 wireless network has vast implications in the area of context-aware and pervasive computing. Such abilities have been developed mainly in the Linux environment to date. To maximize its usefulness, a location determination system was developed for the more dominant Windows operation system. While being able to operate outdoors as well as indoors, this system succeeds where traditional GPS (Global Positioning Systems) fail, namely indoor environments. This system could benefit the large number of existing wireless networks and requires no additional hardware; only a few simple software downloads. The ability …


Data Analytics Of University Student Records, Mark Blaise DeCotes 2014 University of Tennessee - Knoxville

Data Analytics Of University Student Records, Mark Blaise Decotes

Masters Theses

Understanding the proper navigation of a college curriculum is a daunting task for students, faculty, and staff. Collegiate courses offer enough intellectual challenge without the unnecessary confusion caused by course scheduling issues. Administrative faculty who execute curriculum changes need both quantitative data and empirical evidence to support their notions about which courses are cornerstone. Students require clear understanding of paths through their courses and majors that give them the optimal chance of success. In this work, we re-envision the analysis of student records from several decades by opening up these datasets to new ways of interactivity. We represent curricula through …


Structure Preserving Large Imagery Reconstruction, Ju Shen, Jianjun Yang, Sami Taha Abu Sneineh, Bryson Payne, Markus Hitz 2014 University of Dayton

Structure Preserving Large Imagery Reconstruction, Ju Shen, Jianjun Yang, Sami Taha Abu Sneineh, Bryson Payne, Markus Hitz

Computer Science Faculty Publications

With the explosive growth of web-based cameras and mobile devices, billions of photographs are uploaded to the internet. We can trivially collect a huge number of photo streams for various goals, such as image clustering, 3D scene reconstruction, and other big data applications. However, such tasks are not easy due to the fact the retrieved photos can have large variations in their view perspectives, resolutions, lighting, noises, and distortions. Furthermore, with the occlusion of unexpected objects like people, vehicles, it is even more challenging to find feature correspondences and reconstruct realistic scenes. In this paper, we propose a structure-based image …


Grounded Ontology – A Proposed Methodology For Emergent Ontology Engineering, Syed Irfan Nabi, Zaheeruddin Asif 2014 Institute of Business Administration, Karachi, Pakistan

Grounded Ontology – A Proposed Methodology For Emergent Ontology Engineering, Syed Irfan Nabi, Zaheeruddin Asif

Business Review

This research posits that a domain ontology developed using text-coding technique contributes in conceptualizing and representing state-of-the-art as given by published research in a particular domain. The motivation behind this research is to provide means for creating a better understanding among the researchers through ontology that would present a clearer picture of any domain of interest. However, a general observation on ontology engineering methods is the domination of personal perspective of ontology developer and/or expert in the resultant ontology. Current ontology engineering methods bestow a primary role to ontology developer. Ontology thus developed is heavily biased towards the domain expert’s …


Synchronicity: Pushing The Envelope Of Fine-Grained Localization With Distributed Mimo, Jie XIONG, Kyle JAMIESON, Karthikeyan SUNDARESAN 2014 Singapore Management University

Synchronicity: Pushing The Envelope Of Fine-Grained Localization With Distributed Mimo, Jie Xiong, Kyle Jamieson, Karthikeyan Sundaresan

Research Collection School Of Computing and Information Systems

Indoor localization of mobile devices and tags has received much attention recently, with encouraging fine-grained localization results available with enough line-of-sight coverage and enough hardware infrastructure. Synchronicity is a location system that aims to push the envelope of highly-accurate localization systems further in both dimensions, requiring less line-of-sight and less infrastructure. With Distributed MIMO network of wireless LAN access points (APs) as a starting point, we leverage the time synchronization that such a network affords to localize with time-difference-of-arrival information at the APs. We contribute novel super-resolution signal processing algorithms and reflection path elimination schemes, yielding superior results even in …


Process-Algebraic Interpretation Of Aadl Models, Oleg Sokolsky, Insup Lee, Duncan Clarke 2014 University of Pennsylvania

Process-Algebraic Interpretation Of Aadl Models, Oleg Sokolsky, Insup Lee, Duncan Clarke

Oleg Sokolsky

We present a toolset for the behavioral verification and validation of architectural models of embedded systems expressed in the language AADL. The toolset provides simulation and timing analysis of AADL models. Underlying both tools is a process-algebraic implementation of AADL semantics. The common implementation of the semantics ensures consistency in the analysis results between the tools.


Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard TEE, C. Jason Woodard 2014 École Polytechnique Fédérale de Lausanne

Architectural Control And Value Migration In Layered Ecosystems: The Case Of Open-Source Cloud Management Platforms, Richard Tee, C. Jason Woodard

C. Jason Woodard

Our paper focuses on strategic decision making in layered business ecosystems, highlighting the role of cross-layer interactions in shaping choices about product design and platform governance. Based on evidence from the cloud computing ecosystem, we analyze how concerns about architectural control and expectations regarding future value migration influence the design of product interfaces and the degree of openness to external contributions. We draw on qualitative longitudinal data to trace the development of two open-source platforms for managing cloud-based computing resources. We focus in particular on the emergence of a layered "stack" in which these platforms must compete with both vertically …


Power Management In The Cluster System, Leping Wang 2014 University of Nebraska-Lincoln

Power Management In The Cluster System, Leping Wang

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

With growing cost of electricity, the power management of server clusters has become an important problem. However, most previous researchers have only addressed the challenge in traditional homogeneous environments. Considering the increasing popularity of heterogeneous and virtualized systems, this thesis develops a series of efficient algorithms respectively for power management of heterogeneous soft real-time clusters and a virtualized cluster system. It is built on simple but effective mathematical models. When deployed to a new platform, the software incurs low configuration cost because no extensive performance measurements and profiling are required. Built upon optimization, queuing theory and control theory techniques, our …


Query Analyzer And Manager For Complex Event Processing As A Service, Wilson Higashino, Cedric Eichler, Miriam A M Capretz, Thierry Monteil, M. Beatriz F. Toledo, Patricia Stolf 2014 Western University

Query Analyzer And Manager For Complex Event Processing As A Service, Wilson Higashino, Cedric Eichler, Miriam A M Capretz, Thierry Monteil, M. Beatriz F. Toledo, Patricia Stolf

Electrical and Computer Engineering Publications

Complex Event Processing (CEP) is a set of tools and techniques that can be used to obtain insights from high-volume, high-velocity continuous streams of events. CEP-based systems have been adopted in many situations that require prompt establishment of system diagnostics and execution of reaction plans, such as in monitoring of complex systems. This article describes the Query Analyzer and Manager (QAM) module, a first effort toward the development of a CEP as a Service (CEPaaS) system. This module is responsible for analyzing user-defined CEP queries and for managing their execution in distributed cloud-based environments. Using a language-agnostic internal query representation, …


Design Of Cpu Simulation Software For Armv7 Instruction Set Architecture, Dillon Tellier 2014 California Polytechnic State University - San Luis Obispo

Design Of Cpu Simulation Software For Armv7 Instruction Set Architecture, Dillon Tellier

Computer Engineering

Simulations have long been a part of the engineering process in both the professional and academic domain. From a pedagogic standpoint, simulations allow students to explore the dynamics of engineering scenarios by controlling variables, taking measurements, and observing behavior which would be difficult or impossible without simulation. One such tool is a CPU simulator used in Cal Poly’s Computer Architecture classes; this software simulates an instruction accurate operation of a computer processor and reports statistics regarding the execution of the supplied compiled machine code. For the last several years Cal Poly’s computer architecture classes have used a previous version of …


Transport Architectures For An Evolving Internet, Keith Winstein '99 2014 Illinois Mathematics and Science Academy

Transport Architectures For An Evolving Internet, Keith Winstein '99

Doctoral Dissertations

In the Internet architecture, transport protocols are the glue between an application’s needs and the network’s abilities. But as the Internet has evolved over the last 30 years, the implicit assumptions of these protocols have held less and less well. This can cause poor performance on newer networks—cellular networks, datacenters—and makes it challenging to roll out networking technologies that break markedly with the past.

Working with collaborators at MIT, I have built two systems that explore an objective-driven, computer-generated approach to protocol design. My thesis is that making protocols a function of stated assumptions and objectives can improve application performance …


Service Evolution Patterns, Shuying Wang, Wilson Higashino, Michael Hayes, Miriam A M Capretz 2014 Western University

Service Evolution Patterns, Shuying Wang, Wilson Higashino, Michael Hayes, Miriam A M Capretz

Electrical and Computer Engineering Publications

Service evolution is the process of maintaining and evolving existing Web services to cater for new requirements and technological changes. In this paper, a service evolution model is proposed to analyze service dependencies, identify changes on services and estimate impact on consumers that will use new versions of these services. Based on the proposed service evolution model, four service evolution patterns are described: compatibility, transition, split-map, and merge-map. These proposed patterns provide reusable templates to encourage well-defined service evolution while minimizing issues that arise otherwise. They can be applied in the service evolution scenario where a single service is used …


Contextual Anomaly Detection In Big Sensor Data, Michael Hayes, Miriam A M Capretz 2014 Western University

Contextual Anomaly Detection In Big Sensor Data, Michael Hayes, Miriam A M Capretz

Electrical and Computer Engineering Publications

Performing predictive modelling, such as anomaly detection, in Big Data is a difficult task. This problem is compounded as more and more sources of Big Data are generated from environmental sensors, logging applications, and the Internet of Things. Further, most current techniques for anomaly detection only consider the content of the data source, i.e. the data itself, without concern for the context of the data. As data becomes more complex it is increasingly important to bias anomaly detection techniques for the context, whether it is spatial, temporal, or semantic. The work proposed in this paper outlines a contextual anomaly detection …


A Constrained, Possibilistic Logical Approach For Software System Survivability Evaluation, Yanjun Zuo 2014 University of North Dakota

A Constrained, Possibilistic Logical Approach For Software System Survivability Evaluation, Yanjun Zuo

Accountancy Faculty Publications

In this paper, we present a logical framework to facilitate users in assessing a software system in terms of the required survivability features. Survivability evaluation is essential in linking foreign software components to an existing system or obtaining software systems from external sources. It is important to make sure that any foreign components/systems will not compromise the current system’s survivability properties. Given the increasing large scope and complexity of modern software systems, there is a need for an evaluation framework to accommodate uncertain, vague, or even ill-known knowledge for a robust evaluation based on multi-dimensional criteria. Our framework incorporates user-defined …


Evaluation Of Particle Swarm Optimization Applied To Grid Scheduling, Wilson Higashino, Miriam A M Capretz, M. Beatriz F. Toledo 2014 Western University

Evaluation Of Particle Swarm Optimization Applied To Grid Scheduling, Wilson Higashino, Miriam A M Capretz, M. Beatriz F. Toledo

Electrical and Computer Engineering Publications

The problem of scheduling independent users’ jobs to resources in Grid Computing systems is of paramount importance. This problem is known to be NP-hard, and many techniques have been proposed to solve it, such as heuristics, genetic algorithms (GA), and, more recently, particle swarm optimization (PSO). This article aims to use PSO to solve grid scheduling problems, and compare it with other techniques. It is shown that many often-overlooked implementation details can have a huge impact on the performance of the method. In addition, experiments also show that the PSO has a tendency to stagnate around local minima in high-dimensional …


Coffee: Context Observer For Fast Enthralling Entertainment, Anthony M. Lenz 2014 California Polytechnic State University, San Luis Obispo

Coffee: Context Observer For Fast Enthralling Entertainment, Anthony M. Lenz

Master's Theses

Desktops, laptops, smartphones, tablets, and the Kinect, oh my! With so many devices available to the average consumer, the limitations and pitfalls of each interface are becoming more apparent. Swimming in devices, users often have to stop and think about how to interact with each device to accomplish the current tasks at hand. The goal of this thesis is to minimize user cognitive effort in handling multiple devices by creating a context aware hybrid interface. The context aware system will be explored through the hybridization of gesture and touch interfaces using a multi-touch coffee table and the next-generation Microsoft Kinect. …


Digital Commons powered by bepress