Now showing items 421-440 of 468

    • StormVideo - digital video in the field of meteorology 

      Nybø, Olav; Hartvigsen, Gunnar; Johansen, Dag (Research report; Forskningsrapport, 1994-09)
      Visual observations constitute important input to different meteorological tasks. Previously, these observations were made by human observers and manually reported to the meteorologists. With the employment of video technology, this kind of observations can be automated. This paper presents one approach to visual weather observations. This involves software compression and transmission of digital ...
    • An extensible software architecture for mobile components 

      Marzullo, Keith; Johansen, Dag; Lauvset, Kåre J. (Research report; Forskningsrapport, 2000-10-06)
      This paper presents a generic software architecture for large-scale distributed applications where mobile agents are an integral part. We have devised this architecture through completion of a series of mobile agent systems and associated applications over the last 8 years.
    • Building agent applications using wrappers 

      Sudmann, Nils P.; Johansen, Dag (Research report; Forskningsrapport, 2001-01-11)
      For the past seven years, the TACOMA project has investigated software support for mobile agents. Several prototypes have been developed, with experiences in distributed applications directing the effort. This paper presents a new mechanism that supports implementing agent applications by creating troops of agents using wrappers. This solution requires little extra support from the agent system, and ...
    • 3D visualization of weather forecasts and topography 

      Skotnes, Harald; Hartvigsen, Gunnar; Johansen, Dag (Research report; Forskningsrapport, 1994-09)
      Advances in computing power and graphics have increased the use of graphics in weather forecasting. This includes 3D animation sequences and geographical information systems. The paper addresses the main problems and presents preliminary results of the visualization of atmospheric models in conjunction with the underlying topography. The goal is among others to make a sort of 3D satellite pictures ...
    • Separating mobility from mobile agents 

      Marzullo, Keith; Lauvset, Kåre J.; Johansen, Dag (Research report; Forskningsrapport, 2001-01-16)
      In this paper we argue that the traditional model of a mobile agent provides a poor programming structure. We base our argument on our experience since 1993 in building distributed applications and mobile agent platforms. We have observed that every distributed applications contain three distinct aspects, which we call function, mobility and management. Separating an application into these three ...
    • Performance isolation and adaption in the Vortex Kernel 

      Kvalnes, Aage; Renesse, Robbert van; Johansen, Dag (Research report; Forskningsrapport, 2003-01-10)
      Vortex is a new multiprocessor operating system kernel intended for emerging Internet service applications. The architecture is based on SEDA's staged computational model. Vortex provides mechanisms for performance isolation and dynamic adaptation. Performance results validate that the resource control mechanisms of Vortex are effective, and that Vortex significantly outperforms Linux on single-threaded ...
    • Continuation-passing enactment of distributed recoverable workflows 

      Weihei, Yu; Yang, Jie (Research report; Forskningsrapport, 2006)
      Scalability, reliability and adaptability are among the key requirements for the enactment of distributed workflows. In addition, system resources should be efficiently utilized. Central workflow engines and static analysis of workflow specifications are some of the important obstacles to meeting these requirements. We propose a fully decentralized approach to workflow enactment that is not subject ...
    • Increased scalability of the StormCast distributed application 

      Farsi, V. (Research report; Forskningsrapport, 1994-09)
      Scaling is recognized as a primary concern in developing distributed applications. Scaling problems occur when an application reach its upper boundary in some way or another. This paper describes the considerations made in the redesign of the StormCast distributed application to achieve more scalability. Naturally, there can be many factors that restrict a system's scalability. The challenge meeting ...
    • Arctic beans containers composition of non-functional services using composition filters 

      Yang, Jie; Blair, Gordon S.; Andersen, Anders (Research report; Forskningsrapport, 2005)
      It is becoming clear that modern middleware platforms must provide both deploy-time configuration and run-time reconfiguration to accommodate rapid changing requirements and also to be able to operate in dynamic environments. J2EE is a key example of a middleware architecture that supports enterprise applications via its Enterprise JavaBeans (EJB) component model. EJB provides limited configurability ...
    • FirePatch. Secure and time-critical dissemination of patches 

      Johansen, Håvard; Rennesse, Robbert van; Johansen, Dag (Research report; Forskningsrapport, 2006)
      Because software security patches relay information about vulnerabilities, they can be reverse engineered into exploits. Tools for doing this already exist. As a result, there is a race between hackers and end-users to first obtain patches. In this paper we present and evaluate FirePatch, an intrusion-tolerant dissemination mechanism that combines encryption, replication, and sandboxing such that ...
    • Satellite communication applied in a distributed application 

      Farstad, Werner; Johansen, Dag; Hartvigsen, Gunnar (Research report; Forskningsrapport, 1994-12)
      The paper describes the development of a prototype application for access to vital weather information from the Northern Atlantic sea region. The application gives meteorologists access to weather observations measured on sea vessels. Today the available information is very limited. On a daily basis, only 4-5 weather observations in the whole arctic sea-region are conducted. It is therefore suggested ...
    • The xTrans Transaction Model and FlexCP Commit Protocol 

      Arntsen, Anna-Brith (Research report; Forskningsrapport, 2006)
      Traditionally, transactions are flat and atomic possessing the ACID properties. The traditional ACID transaction model has clear limitations in new application domains where transactions often are long-running and require properties that go beyond ACID. Structuring a long-running transaction as an ACID transaction will impede both performance and concurrency. To meet extended and varying transactional ...
    • The StormCast API. Specification of software interfaces in StormCast 2.1 

      Hartvigsen, Gunnar; Johansen, Dag; Farsi, Vahid; Farstad, Werner; Høgtun, Bente; Knudsen, Pål (Research report; Forskningsrapport, 1994-12)
      This report presents the software architecture in the StormCast meteorological workbench. The focus is on the software interfaces in StormCast version 2.1. For each layer in the architecture the functionality, the call structure, the interfaces, the event diagrams and test data are described. In addition, further works are discussed. The identication of software interfaces are based on the StormCast ...
    • Policies and metrics for fair resource sharing 

      Renesse, Robbert van; Kvalnes, Aage; Zagorodnov, Dmitrii; Johansen, Dag (Research report; Forskningsrapport, 2006)
      Performance isolation is essential to operating systems shared by dependable services. Unfortunately, most such systems, including real-time operating systems and VMMs, only fairly divide and account for CPU cycles. We submit that dependable services require specifying and enforcing policies for all resources, and that current metrics for evaluating fair sharing are insufficient. This paper proposes ...
    • A graphical deployment and management tool for distributed applications 

      Andersen, Anders; Aanensen, Thomas (Research report; Forskningsrapport, 2005)
      OOPP is a component based middleware platform with support for complex distributed applications. The main goal of OOPP is to create an expressive programming model for distributed applications where by default details are hidden for the programmer. When necessary, reflection is used to expose and sometimes modify these details. All interaction with an OOPP component are specified by its component ...
    • Secure communication in FRTP 

      Stabell-Kulø, Tage (Research report; Forskningsrapport, 1995-02)
      To ensure privacy, users of the File Repository Transfer Protocol (Frtp) may require that communication partners are properly authenticated. If one partner wants the communication to be crypted, the other must honor the request. This report describes how authentication and privacy are realized. It is shown, by means of an authentication logic, that the protocol achives its goal in this respect.
    • Practical and low-overhead masking of failures of TCP-based servers 

      Marzullo, Keith; Zagorodnov, Dmitrii; Alvisi, Lorenzo; Bressoud, Thomas C. (Research report; Forskningsrapport, 2005-08-25)
      This article describes an architecture that allows a replicated service to survive crashes without breaking its TCP connections. Our approach does not require modifications to the TCP protocol, to the operating system on the server, or to any of the software running on the clients. Furthermore, it runs on commodity hardware. We compare two implementations of this architecture – one based on ...
    • File repository transfer protocol. Version 1 

      Stabell-Kulø, Tage (Research report; Forskningsrapport, 1995-02)
      This document presents and specifies the protocol that interfaces clients and servers in the File Repository (FR). The FR is a software system that supports sharing of files. The protocol is modelled after Smtp and Nntp and is encoded in Ascii. No details of server implementation is visible in the protocol description, but we state our intentions at several occasions.
    • Minimizing unwanted traffic in a global messaging system. Spam, denial-of-service-attacks, and edacious subscribers 

      Zagorodnov, Dmitrii (Research report; Forskningsrapport, 2005)
      The main purpose of this paper is to illuminate two types of unwanted traffic in a publish/subscribe system -- malicious (spam, DoS attacks) and vain (unused events) -- and suggest a general mechanism for minimizing their effects. We do this by augmenting the classic publish/subscribe interface with volume-limiting parameters -- a combination of attributes assigned to events by publishers and ...
    • Engineering push-based web services 

      Brenna, Lars; Johansen, Dag (Research report; Forskningsrapport, 2005)
      Much of the content of popular Internet information sources is highly dynamic: urgent in nature and sometimes relevant only for a short time. The typical approach to querying such dynamic sources is polling for updates often.1 This strains the traditional pull-based Internet and wastes network resources on transmitting redundant information. This paper focuses on how to structure the Internet to ...