Open Access. Powered by Scholars. Published by Universities.®

Systems Architecture Commons

Open Access. Powered by Scholars. Published by Universities.®

873 Full-Text Articles 1,175 Authors 1,039,766 Downloads 111 Institutions

All Articles in Systems Architecture

Faceted Search

873 full-text articles. Page 31 of 33.

Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs 2011 Marshall University

Adopting Virtualized 10gbe Ethernet Iscsi San For Mission Critical Applications, Edward Aractingi, Allen Taylor, David Griggs

IT Research

The presentation will provide insight into the decision to move from a fibre channel SAN solution, the resulting performance metrics and financial savings seen by Marshall University. Presented at The Ohio Higher Education Computing Council (OHECC) March 23, 2011.


Linux 101: Ci-Trainseminar, Edward Aractingi 2011 Marshall University

Linux 101: Ci-Trainseminar, Edward Aractingi

IT Research

An overview of how the Linux operating system.


Performance Modeling Of Distributed Collaboration Services, Toqeer A. Israr, Gregor V. Bochmann 2011 Eastern Illinois University

Performance Modeling Of Distributed Collaboration Services, Toqeer A. Israr, Gregor V. Bochmann

Faculty Research & Creative Activity

This paper deals with performance modeling of distributed applications, service compositions and workflow systems. From the functional perspective, the distributed application is modeled as a collaboration involving several roles, and its behavior is defined in terms of a composition from several sub-collaborations using the standard sequencing operators found in UML Activity Diagrams and similar formalisms. For the performance perspective, each collaboration is characterized by a certain number of independent input events and dependent output events, and the performance of the collaboration is defined by the minimum delays that apply for a given output event in respect to each input event …


A Machine-Learning Approach For Workflow Identification From Low-Level Monitoring Information, Thorsten Stein 2011 Department of Computing, Cork Institute of Technology, Cork, Ireland.

A Machine-Learning Approach For Workflow Identification From Low-Level Monitoring Information, Thorsten Stein

Theses

Knowing which workflows are executed within Service Oriented Architectures (SOA) is essential for successful IT management. In many cases, SOAs grew out of previous existing IT architectures; existing components are used as single services and therefore as parts of newly created workflows. Since such workflows consist of newly developed and legacy services, traditional workflow management systems often cannot be applied. This thesis presents a method for gathering information about the executed workflows within such heterogeneous environments. An implementation of a framework is presented. This framework allows the training of machine-learning algorithms with workflow models and the mapping of low-level monitoring …


The Ordering Requirements Of Relativistic And Reader-Writer Locking Approaches To Shared Data Access, Philip William Howard, Josh Triplett, Jonathan Walpole, Paul E. McKenney 2011 Portland State University

The Ordering Requirements Of Relativistic And Reader-Writer Locking Approaches To Shared Data Access, Philip William Howard, Josh Triplett, Jonathan Walpole, Paul E. Mckenney

Computer Science Faculty Publications and Presentations

The semantics of reader-writer locks allow read-side concurrency. Unfortunately, the locking primitives serialize access to the lock variable to an extent that little or no concurrency is realized in practice for small critical sections. Relativistic programming is a methodology that also allows read- side concurrency. Relativistic programming uses dfferent ordering constraints than reader-writer locking. The different ordering constraints allow relativistic readers to proceed without synchronization so relativistic readers scale even for very short critical sections. In this paper we explore the diferences between the ordering constraints for reader-writer locking and relativistic programs. We show how and why the dfferent ordering …


Review Of The Health Information Technology Initiatives In Maryland And Georgia, Maurice Dawson, James Truesdale, Joshua Robinson 2010 Carnegie Mellon University

Review Of The Health Information Technology Initiatives In Maryland And Georgia, Maurice Dawson, James Truesdale, Joshua Robinson

Maurice Dawson

Health Information Technology (IT) is an important topic within the health community currently. Many states must update their status in relation to the Strategic and Operation Plan under the State Cooperative Agreement. In this literature review the findings have been summarized in reference to what is proposed in three states. Key items reviewed are the following; governance, policy/legal, technical infrastructure, business and technical operations,communications/marketing, and relationships to Medicaid/Medicare. With regards to the States of Maryland and Georgia, the State Health Information Exchange (HIE) Cooperative Agreement Program will allow both states to enhance its existing strategic plan and to build an …


Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens 2010 University of Missouri - St Louis

Understanding The Need And Importance Of The Cloud Computing Environment Within The National Institute Of Food And Agriculture, An Agency Of The United States Department Of Agriculture, Festus Onyegbula, Maurice Dawson, Jeffrey Stevens

Maurice Dawson

Aligning information systems to corporate goals has emerged as a leading concern over the last couple of decades. It is essential that we understand the need for cloud computing and how this technology can be implemented. Through this literature review we review theories of cloud computing and further elaborate on the theoretical framework for the implementation of cloud computing technology across organizations. We also detail cloud computing implementations across various governmental organizations and also across the industry. This review is expected to provide the current study with a more practical perspective on the issues and complexities of using cloud computing …


Clustering Algorithm Identification System Using Wavelet Transform, Philadelphia University 2010 Philadelphia University

Clustering Algorithm Identification System Using Wavelet Transform, Philadelphia University

Philadelphia University, Jordan

No abstract provided.


Random Automata Networks: Why Playing Dice Is Not A Vice, Christof Teuscher 2010 Portland State University

Random Automata Networks: Why Playing Dice Is Not A Vice, Christof Teuscher

Systems Science Friday Noon Seminar Series

Random automata networks consist of a set of simple compute nodes interacting with each other. In this generic model, one or multiple model parameters, such as the the node interactions and/or the compute functions, are chosen at random. Random Boolean Networks (RBNs) are a particular case of discrete dynamical automata networks where both time and states are discrete. While traditional RBNs are generally credited to Stuart Kauffman (1969), who introduced them as simplified models of gene regulation, Alan Turing proposed unorganized machines as early as 1948. In this talk I will start with Alan Turing's early work on unorganized machines, …


Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-eung 2010 San Jose State University

Analysis Of False Cache Line Sharing Effects On Multicore Cpus, Suntorn Sae-Eung

Master's Projects

False sharing (FS) is a well-known problem occurring in multiprocessor systems. It results in performance degradation on multi-threaded programs running on multiprocessor environments.

With the evolution of processor architecture over time, the multicore processor is a recent direction used by hardware designers to increase performance while avoiding heat and power walls. To fully exploit the processing power from these multicore hardware architectures, the software programmer needs to build applications using parallel programming concepts, which are based upon multi-threaded programming principles.

Since the architecture of a multicore processor is very similar to a multiprocessor system, the presence of the false sharing …


Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks 2010 Edith Cowan University

Assessing Vulnerabilities Of Biometric Readers Using An Applied Defeat Evaluation Methodology, David Brooks

Australian Security and Intelligence Conference

Access control systems using biometric identification readers are becoming common within critical infrastructure and other high security applications. There is a perception that biometric, due to their ability to identify and validate the user, are more secure. However, biometric systems are vulnerable to many categories of attack vectors and there has been restricted research into such defeat vulnerabilities. This study expands on a past article (Brooks, 2009) that presented a defeat evaluation methodology applied to high-security biometric readers. The defeat methodology is represented, but applied to both fingerprint and back-of-hand biometric readers. Defeat evaluation included both physical and technical integrity …


Morphogrammatics Of Reflection, Rudolf Kaehr 2010 ThinkArt Lab Glasgow

Morphogrammatics Of Reflection, Rudolf Kaehr

Rudolf Kaehr

Turning back from the studies of morphogrammatics to some open questions of reflectional programming, the recountered problematics might be put into a different light and new methods of handling formal aspects of reflection and reflectionality shall be introduced. Albeit the use of light-metaphors, morphogrammatic reflection is not sketched along the paradigm of optical metaphors. Morphograms are presenting neither propositions nor perceptions able for mirroring (representation). Exercises in defining morphogrammatic retro-grade recursion and reflection schemata are continued from the paper “Sketches to Morphogrammatic Programming”.


Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan 2010 University of Dayton

Program Transformations For Information Personalization, Saverio Perugini, Naren Ramakrishnan

Computer Science Faculty Publications

Personalization constitutes the mechanisms necessary to automatically customize information content, structure, and presentation to the end user to reduce information overload. Unlike traditional approaches to personalization, the central theme of our approach is to model a website as a program and conduct website transformation for personalization by program transformation (e.g., partial evaluation, program slicing). The goal of this paper is study personalization through a program transformation lens and develop a formal model, based on program transformations, for personalized interaction with hierarchical hypermedia. The specific research issues addressed involve identifying and developing program representations and transformations suitable for classes of hierarchical …


Enhancing Stockmarket Trading Performance With Anns, Bruce Vanstone, Gavin Finnie 2010 Bond University

Enhancing Stockmarket Trading Performance With Anns, Bruce Vanstone, Gavin Finnie

Gavin Finnie

Artificial Neural Networks (ANNs) have been repeatedly and consistently applied to the domain of trading financial time series, with mixed results. Many researchers have developed their own techniques for both building and testing such ANNs, and this presents a difficulty when trying to learn lessons and compare results. In a previous paper, Vanstone and Finnie have outlined an empirical methodology for creating and testing ANNs for use within stockmarket trading systems. This paper demonstrates the use of their methodology, and creates and benchmarks a financially viable ANN-based trading system. Many researchers appear to fail at the final hurdles in their …


Enhancing Stockmarket Trading Performance With Anns, Bruce Vanstone, Gavin Finnie 2010 Bond University

Enhancing Stockmarket Trading Performance With Anns, Bruce Vanstone, Gavin Finnie

Bruce Vanstone

Artificial Neural Networks (ANNs) have been repeatedly and consistently applied to the domain of trading financial time series, with mixed results. Many researchers have developed their own techniques for both building and testing such ANNs, and this presents a difficulty when trying to learn lessons and compare results. In a previous paper, Vanstone and Finnie have outlined an empirical methodology for creating and testing ANNs for use within stockmarket trading systems. This paper demonstrates the use of their methodology, and creates and benchmarks a financially viable ANN-based trading system. Many researchers appear to fail at the final hurdles in their …


Increasing Effectiveness Of The Zachman Framework Using The Balanced Scorecard, Anagha Gokhale 2010 Purdue University

Increasing Effectiveness Of The Zachman Framework Using The Balanced Scorecard, Anagha Gokhale

Purdue Polytechnic Masters Theses

The purpose of this study is to explore the impact of integrating the use of Zachman Framework of Enterprise Architecture and the Balanced Scorecard (BSC) Framework for an effective business-IT alignment. The study tries to identify certain gaps in the Zachman Framework focusing on the motivational aspects of the framework, which have been discussed in the literature review. The aim is to achieve the integration by mitigating these motivational aspect’s weaknesses in the Zachman Framework using the deliverables obtained from the BSC. Thus the author proposes to achieve business-IT alignment through this integration. No research studies in the past have …


A Study Of Improving The Parallel Performance Of Vasp., Matthew Brandon Baker 2010 East Tennessee State University

A Study Of Improving The Parallel Performance Of Vasp., Matthew Brandon Baker

Electronic Theses and Dissertations

This thesis involves a case study in the use of parallelism to improve the performance of an application for computational research on molecules. The application, VASP, was migrated from a machine with 4 nodes and 16 single-threaded processors to a machine with 60 nodes and 120 dual-threaded processors. When initially migrated, VASP's performance deteriorated after about 17 processing elements (PEs), due to network contention. Subsequent modifications that restrict communication amongst VASP processes, together with additional support for threading, allowed VASP to scale up to 112 PEs, the maximum number that was tested. Other performance-enhancing optimizations that were attempted included replacing …


Integrating Recommender Information In Social Ecosystems Decisions, Renato A C Capuruco, Luiz Fernando Capretz 2010 Western University

Integrating Recommender Information In Social Ecosystems Decisions, Renato A C Capuruco, Luiz Fernando Capretz

Electrical and Computer Engineering Publications

The exploration of online social networks whose members share mutual recommendations and interactions is a time-dependent and contextual-based process which aims to predict the social status among members, ultimately improving the network's discoverability to achieve societal gain. To address the difficulties associated with the process, this article presents an integrated recommender model whose statements are time-dependent, interaction-aware, and social context-sensitive. The originality of the proposed model stems from the integration of the predictive recommender, social networks, and interaction components. Each model is developed based on: (1) a time history and decay algorithm to consider the decreasing intensity of recommendations among …


St. Jude Medical: An Object-Oriented Software Architecture For Embedded And Real-Time Medical Devices, Atila Amiri 2010 California Polytechnic State University, San Luis Obispo

St. Jude Medical: An Object-Oriented Software Architecture For Embedded And Real-Time Medical Devices, Atila Amiri

Master's Theses

Medical devices used for surgical or therapeutic purposes require a high degree of safety and effectiveness. Software is critical component of many such medical devices. The software architecture of a system defines organizational structure and the runtime characteristic of the application used to control the operation of the system and provides a set of frameworks that are used to develop that. As such, the design of software architecture is a critical element in achieving the intended functionality, performance, and safety requirements of a medical device. This architecture uses object-oriented design techniques, which model the underlying system as a set of …


Reducing Cluster Power Consumption By Dynamically Suspending Idle Nodes, Brian Michael Oppenheim 2010 California Polytechnic State University, San Luis Obispo

Reducing Cluster Power Consumption By Dynamically Suspending Idle Nodes, Brian Michael Oppenheim

Master's Theses

Close to 1% of the world's electricity is consumed by computer servers. Given that the increased use of electricity raises costs and damages the environment, optimizing the world's computing infrastructure for power consumption is worthwhile. This thesis is one attempt at such an optimization. In particular, I began by building a cluster of 6 Intel Atom based low-power nodes to perform work analogous to data center clusters. Then, I installed a version of Hadoop modified with a novel power management system on the cluster. The power management system uses different algorithms to determine when to turn off idle nodes in …


Digital Commons powered by bepress