Now showing items 41-60 of 627

    • Evaluating the performance of the allreduce collective operation on clusters. Approach and results 

      Bongo, Lars Ailo; Anshus, Otto J.; Bjørndalen, John Markus (Research report; Forskningsrapport, 2004)
      The performance of the collective operations provided by a communication library is important for many applications run on clusters. The communication structure of collective operations can be organized as a tree. Performance can be improved by configuring and mapping the tree to the clusters in use. We describe and demonstrate an approach for evaluating the performance of different configurations ...
    • A programmable structure for pervasive computing 

      Arntzen, Ingar Mæhlum; Johansen, Dag (Research report; Forskningsrapport, 2004)
      This exstended abstract presents an asymmetric and programmable (extensible) approach to pervasive computing. The idea is to off-load computations from light portable clients into a back-bone of seamlessly integrated servers. This way, a user can extend and personalize his pervasive computational environment by installing computations following his trajectory throughout the day. Focus on this extended ...
    • ReflecTS: A reflective transaction service framework for open applications 

      Jakobsen, Anna-Brith A.; Karlsen, Randi (Research report; Forskningsrapport, 2004)
      Transactional middleware platforms must accommodate an increasingly diverse range of requirements from both applications and the underlying systems. It is clear that applications have characteristics and requirements that vary a lot, and that transactional middleware must be able to support the potential variety in transaction execution requirements. In this paper we describe ReflecTS, a reflective ...
    • The last hop of global notification delivery to mobile users. Matching preferences, context, and device constraints. 

      Zagorodnov, Dmitrii; Johansen, Dag (Research report; Forskningsrapport, 2004)
      Events injected by publishers into a publish/subscribe system may reach users through a variety of devices: a stationary desktop, a laptop, a mobile phone, etc. We argue that the "last hop" -- from the network to the output device -- has unique properties, owing to the mobile nature of these devices, and as such demands special consideration. In particular, user's preferences and location may limit ...
    • Environment mobility. Moving the desktop around. 

      Renesse, Robbert van; Johansen, Dag; Johansen, Håvard (Research report; Forskningsrapport, 2004)
      In this position paper, we focus on issues related to middleware support for software mobility in ad hoc and pervasive systems. In particular, we are interested in moving the computational environment of a mobile user following his trajectory. We present details of WAIFARER, a prototype implementation that automatically saves and restores application level state to support this mobility. Security, ...
    • Arctic beans containers composition of non-functional services using composition filters 

      Yang, Jie; Blair, Gordon S.; Andersen, Anders (Research report; Forskningsrapport, 2005)
      It is becoming clear that modern middleware platforms must provide both deploy-time configuration and run-time reconfiguration to accommodate rapid changing requirements and also to be able to operate in dynamic environments. J2EE is a key example of a middleware architecture that supports enterprise applications via its Enterprise JavaBeans (EJB) component model. EJB provides limited configurability ...
    • Engineering push-based web services 

      Brenna, Lars; Johansen, Dag (Research report; Forskningsrapport, 2005)
      Much of the content of popular Internet information sources is highly dynamic: urgent in nature and sometimes relevant only for a short time. The typical approach to querying such dynamic sources is polling for updates often.1 This strains the traditional pull-based Internet and wastes network resources on transmitting redundant information. This paper focuses on how to structure the Internet to ...
    • Minimizing unwanted traffic in a global messaging system. Spam, denial-of-service-attacks, and edacious subscribers 

      Zagorodnov, Dmitrii (Research report; Forskningsrapport, 2005)
      The main purpose of this paper is to illuminate two types of unwanted traffic in a publish/subscribe system -- malicious (spam, DoS attacks) and vain (unused events) -- and suggest a general mechanism for minimizing their effects. We do this by augmenting the classic publish/subscribe interface with volume-limiting parameters -- a combination of attributes assigned to events by publishers and ...
    • A graphical deployment and management tool for distributed applications 

      Andersen, Anders; Aanensen, Thomas (Research report; Forskningsrapport, 2005)
      OOPP is a component based middleware platform with support for complex distributed applications. The main goal of OOPP is to create an expressive programming model for distributed applications where by default details are hidden for the programmer. When necessary, reflection is used to expose and sometimes modify these details. All interaction with an OOPP component are specified by its component ...
    • The Longcut Wide Area Network Emulator. Design and Evaluation 

      Bongo, Lars Ailo (Research report; Forskningsrapport, 2005)
      Experiments run on a Grid, consisting of clusters administered by multiple organizations connected by shared wide area networks (WANs), may not be reproducible. First, traffic on the WAN cannot be controlled. Second, allocating the same resources for subsequent experiments can be difficult. Longcut solves both problems by splitting a single cluster into several parts, and for each part having one ...
    • Practical and low-overhead masking of failures of TCP-based servers 

      Marzullo, Keith; Zagorodnov, Dmitrii; Alvisi, Lorenzo; Bressoud, Thomas C. (Research report; Forskningsrapport, 2005-08-25)
      This article describes an architecture that allows a replicated service to survive crashes without breaking its TCP connections. Our approach does not require modifications to the TCP protocol, to the operating system on the server, or to any of the software running on the clients. Furthermore, it runs on commodity hardware. We compare two implementations of this architecture – one based on ...
    • Towards Declarative Characterisation and Negotiation of Bindings 

      Hanssen, Øyvind (Chapter; Bokkapittel, 2005-12)
    • A Declarative Profile Model for Qos negotiation 

      Hanssen, Øyvind (Research report; Forskningsrapport, 2005-12)
      In this report we define the semantics of a language for dynamic QoS expressions which can be evaluated at run-time for conformance. We define how expressions can be constructed from atomic expressions termed ’basic profiles’ using composition operators. Two such operators are defined: The sum ( ’+’ ) which corresponds to simple conjunction and component-sum (’Å’) which assume that the operands ...
    • The xTrans Transaction Model and FlexCP Commit Protocol 

      Arntsen, Anna-Brith (Research report; Forskningsrapport, 2006)
      Traditionally, transactions are flat and atomic possessing the ACID properties. The traditional ACID transaction model has clear limitations in new application domains where transactions often are long-running and require properties that go beyond ACID. Structuring a long-running transaction as an ACID transaction will impede both performance and concurrency. To meet extended and varying transactional ...
    • Continuation-passing enactment of distributed recoverable workflows 

      Weihei, Yu; Yang, Jie (Research report; Forskningsrapport, 2006)
      Scalability, reliability and adaptability are among the key requirements for the enactment of distributed workflows. In addition, system resources should be efficiently utilized. Central workflow engines and static analysis of workflow specifications are some of the important obstacles to meeting these requirements. We propose a fully decentralized approach to workflow enactment that is not subject ...
    • FirePatch. Secure and time-critical dissemination of patches 

      Johansen, Håvard; Rennesse, Robbert van; Johansen, Dag (Research report; Forskningsrapport, 2006)
      Because software security patches relay information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is a race between hackers and end-users to first obtain patches. In this paper we present and evaluate FirePatch, an intrusion-tolerant dissemination mechanism that combines encryption, replication, and sandboxing such that ...
    • Policies and metrics for fair resource sharing 

      Renesse, Robbert van; Kvalnes, Aage; Zagorodnov, Dmitrii; Johansen, Dag (Research report; Forskningsrapport, 2006)
      Performance isolation is essential to operating systems shared by dependable services. Unfortunately, most such systems, including real-time operating systems and VMMs, only fairly divide and account for CPU cycles. We submit that dependable services require specifying and enforcing policies for all resources, and that current metrics for evaluating fair sharing are insufficient. This paper proposes ...
    • Frag: A distributed approach to display wall gaming 

      Grammeltvedt, Åsmund (Master thesis; Mastergradsoppgave, 2006-06-01)
      Computer games with distributed functionality, such as most modern multiplayer games, provide a rich environment in which one can experiment with high performance distribution of computational and graphical resources. Their extremely high requirements for processing power and consistent visual output create a platform with unique demands. Current tiled display walls provide, as a consequence of ...
    • A distributed and parallell robot environment for competitive search and rescue using a display wall for visualization 

      Skadsem, Marte Karidatter (Master thesis; Mastergradsoppgave, 2006-06-08)
      In this thesis we present the development of a distributed and parallel environment which offers functionality to robots to support them in their task performance. We want the environment to be a framework where students can experiment with robots, and in which we can arrange robot competitions. Our motivation for this thesis is an earlier developed robot system at our department. It was ...
    • Bilder og stedsinformasjon 

      Bjørnenak, Kai Arne (Master thesis; Mastergradsoppgave, 2006-12-15)
      Enorme mengder informasjon er tilgjengelig på internett for browsing og søk for folk på jakt etter informasjon. En økende del av denne informasjonsmengden er bilder, video og audio. Disse media-typene er ikke så lette å kategorisere og beskrive som en tekstlig ressurs. Vi trenger derfor nye metoder for å takle utfordringene denne fremveksten av nye media gir oss. Digitalt fotografi har hatt ...