Blar i utgivelsesdato Artikler, rapporter og annet (informatikk)
Viser treff 41-60 av 389
-
Environment mobility. Moving the desktop around.
(Research report; Forskningsrapport, 2004)In this position paper, we focus on issues related to middleware support for software mobility in ad hoc and pervasive systems. In particular, we are interested in moving the computational environment of a mobile user following his trajectory. We present details of WAIFARER, a prototype implementation that automatically saves and restores application level state to support this mobility. Security, ... -
Arctic beans containers composition of non-functional services using composition filters
(Research report; Forskningsrapport, 2005)It is becoming clear that modern middleware platforms must provide both deploy-time configuration and run-time reconfiguration to accommodate rapid changing requirements and also to be able to operate in dynamic environments. J2EE is a key example of a middleware architecture that supports enterprise applications via its Enterprise JavaBeans (EJB) component model. EJB provides limited configurability ... -
Engineering push-based web services
(Research report; Forskningsrapport, 2005)Much of the content of popular Internet information sources is highly dynamic: urgent in nature and sometimes relevant only for a short time. The typical approach to querying such dynamic sources is polling for updates often.1 This strains the traditional pull-based Internet and wastes network resources on transmitting redundant information. This paper focuses on how to structure the Internet to ... -
Minimizing unwanted traffic in a global messaging system. Spam, denial-of-service-attacks, and edacious subscribers
(Research report; Forskningsrapport, 2005)The main purpose of this paper is to illuminate two types of unwanted traffic in a publish/subscribe system -- malicious (spam, DoS attacks) and vain (unused events) -- and suggest a general mechanism for minimizing their effects. We do this by augmenting the classic publish/subscribe interface with volume-limiting parameters -- a combination of attributes assigned to events by publishers and ... -
A graphical deployment and management tool for distributed applications
(Research report; Forskningsrapport, 2005)OOPP is a component based middleware platform with support for complex distributed applications. The main goal of OOPP is to create an expressive programming model for distributed applications where by default details are hidden for the programmer. When necessary, reflection is used to expose and sometimes modify these details. All interaction with an OOPP component are specified by its component ... -
The Longcut Wide Area Network Emulator. Design and Evaluation
(Research report; Forskningsrapport, 2005)Experiments run on a Grid, consisting of clusters administered by multiple organizations connected by shared wide area networks (WANs), may not be reproducible. First, traffic on the WAN cannot be controlled. Second, allocating the same resources for subsequent experiments can be difficult. Longcut solves both problems by splitting a single cluster into several parts, and for each part having one ... -
Practical and low-overhead masking of failures of TCP-based servers
(Research report; Forskningsrapport, 2005-08-25)This article describes an architecture that allows a replicated service to survive crashes without breaking its TCP connections. Our approach does not require modifications to the TCP protocol, to the operating system on the server, or to any of the software running on the clients. Furthermore, it runs on commodity hardware. We compare two implementations of this architecture – one based on ... -
Towards Declarative Characterisation and Negotiation of Bindings
(Chapter; Bokkapittel, 2005-12) -
A Declarative Profile Model for Qos negotiation
(Research report; Forskningsrapport, 2005-12)In this report we define the semantics of a language for dynamic QoS expressions which can be evaluated at run-time for conformance. We define how expressions can be constructed from atomic expressions termed ’basic profiles’ using composition operators. Two such operators are defined: The sum ( ’+’ ) which corresponds to simple conjunction and component-sum (’Å’) which assume that the operands ... -
The xTrans Transaction Model and FlexCP Commit Protocol
(Research report; Forskningsrapport, 2006)Traditionally, transactions are flat and atomic possessing the ACID properties. The traditional ACID transaction model has clear limitations in new application domains where transactions often are long-running and require properties that go beyond ACID. Structuring a long-running transaction as an ACID transaction will impede both performance and concurrency. To meet extended and varying transactional ... -
Continuation-passing enactment of distributed recoverable workflows
(Research report; Forskningsrapport, 2006)Scalability, reliability and adaptability are among the key requirements for the enactment of distributed workflows. In addition, system resources should be efficiently utilized. Central workflow engines and static analysis of workflow specifications are some of the important obstacles to meeting these requirements. We propose a fully decentralized approach to workflow enactment that is not subject ... -
FirePatch. Secure and time-critical dissemination of patches
(Research report; Forskningsrapport, 2006)Because software security patches relay information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is a race between hackers and end-users to first obtain patches. In this paper we present and evaluate FirePatch, an intrusion-tolerant dissemination mechanism that combines encryption, replication, and sandboxing such that ... -
Policies and metrics for fair resource sharing
(Research report; Forskningsrapport, 2006)Performance isolation is essential to operating systems shared by dependable services. Unfortunately, most such systems, including real-time operating systems and VMMs, only fairly divide and account for CPU cycles. We submit that dependable services require specifying and enforcing policies for all resources, and that current metrics for evaluating fair sharing are insufficient. This paper proposes ... -
Gesture-Based, Touch-Free Multi-User Gaming on Wall-Sized, High-Resolution Tiled Displays
(Journal article; Tidsskriftartikkel; Peer reviewed, 2008) -
Secure Distributed Storage in Peer to Peer Networks
(Lecture; Forelesning; Peer reviewed, 2008-02-07) -
NB-FEB : an easy-to-use and scalable universal synchronization primitive for parallel programming
(Research report; Forskningsrapport, 2008-10)This paper addresses the problem of universal synchronization primitives that can support scalable thread synchronization for large-scale many-core architectures. The universal synchronization primitives that have been deployed widely in conventional architectures, are the compare-and-swap (CAS) and load-linked/store-conditional (LL/SC) primitives. However, such synchronization primitives are ... -
Measuring Physical Activity with Sensors : A Qualitative Study
(Journal article; Tidsskriftartikkel; Peer reviewed, 2009) -
Modeling Prognostic Factors in Resectable Pancreatic Adenocarcinomas
(Journal article; Tidsskriftartikkel; Peer reviewed, 2009) -
Sixteen years of ICPC use in Norwegian primary care : looking through the facts
(Journal article; Tidsskriftartikkel; Peer reviewed, 2010) -
Telemedisin - teknologi og helse
(Conference object; Konferansebidrag, 2010-09-02)