A Scalable and Reliable Mobile Agent Computation Model

Size: px
Start display at page:

Download "A Scalable and Reliable Mobile Agent Computation Model"

Transcription

1 A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou , Chin Abstrct. This pper presents high performnce service bsed mobile gent computtion model. The sclbility nd relibility of this model is secured through the service clone policy nd ccess privilege policy. With the introduction of service density of group, we cn further decrese resource witing nd blnce the service occupncy for the whole network. 1 Introduction Mobile Agents re progrms tht cn be migrted nd executed between different network hosts. There re tow types of mobile gents clssified by the migrtion bility of the gents. They re strong migrtion mobile gents nd wek migrtion mobile gents. When using the strong migrtion policy, the mobile gent system needs to record ll the sttes nd relted dt in ech position of the gent, which will spend huge mount of time nd spce for the trnsport, nd will led to low efficiency. When using wek migrtion policy, the trnsporttion of dt will decrese gretly, however, the bilities of dpting the complicted network topology will decrese too. Therefore, how to design relible nd high-efficiency work pttern for the mobile gent is one of the most importnt problems. In fct, the Grid[3] technology hs provided powerful pltform for the mobile gent. The WSDL[4] provides web service description lnguge for service disposing. How dose the service be composed together cn be described by the WSFL[6]. And the UDDI (Universl Description, Discovery nd Integrtion)[5] is used to enble online registry nd the publishing nd dynmic discovery of Web services offered by businesses. The RDF[7], which is recommended by W3C nd cn support domin-independent metdt description, is used to describe the resources. The mobile gent computtion model tht is built upon these bove techniques is convergence nd hrd to sclbility. In order to solve this problem, sclble nd relible service bsed mobile gent computtion model is proposed bsed on decentrlized virtul orgniztion rchitecture. J. Zhng, J.-H. He, nd Y. Fu (Eds.): CIS 2004, LNCS 3314, pp , c Springer-Verlg Berlin Heidelberg 2004

2 A Sclble nd Relible Mobile Agent Computtion Model Overview of MACM nd Fbric Architecture Our computtion model is estblished upon the virtul orgniztion rchitecture, nmely virtul orgniztion (VO or group), which cn gretly reduce the mobile gent size during migrtion, nd this rchitecture cn provide more intelligent support for mobile gent. The bsic elements of virtul orgniztion re nodes, which cn be PC, PDA, lptop, nd other devices connected by network. The nodes re grouped in virtul, nd they cn join nd leve the group dynmiclly. The groups re virtully hierrchicl, which mens tht the groups cn be clssified into root-lyer, middle-lyers nd lef virtul lyers. The virtul group bsed fbric rchitecture is the pltform of the mobile gent migrtion. By this wy, the mobile gent cn discovery nd move more effective nd it cn lso gretly decrese the mobile gent size during migrtion. 2.1 Forml Definition of Infrstructure The VO bsed rchitecture mentioned in this pper is structure similr to the fbric lyer in [1]. Some definitions re given s the following: Definition 1. Node, the minimized devices tht cn lod nd execute the mobile gents in network re denoted s R i. Ech node in VO cn be service provider or service consumer. Definition 2. Key Node is kind of nodes tht dels with the remote communictions, denoted s Ri 0. Ech group must contin key node. And the key nodes re lwys positioned in two or more thn tow groups. Normlly the contiguity key nodes form kernel group. Definition 3. Group, the set includes one node or severl nodes, denoted s G i = {R,R 0,R 1, 2..., R}, n where is the nme of the group. Ech group hs lyer identifier i, which mens tht the group is the ith lyer in VO. The node cn join in more thn one group in VO, which mens tht ech node including key node cn belong to two or more thn two groups. Rj i mens tht node belongs to group G j. Group is comprtively stble orgniztion; the nodes belonging to certin group cn leve this group nd join in nother group dynmiclly. The login nd logout of nodes dopt the GGMP (Grid Group Mngement Protocol)[1], which is similr to the IGMP. Definition 4. Service, in VO rchitecture, service is kind of deling process tht provided by certin nodes in VO. It cn be formlly defined s four-tuple: S(GUIDS, P rivilege, Content, Opertion), where GUIDS is the globl unique ID of the service. And privilege is the privilege defined by the service provider, which include public nd privte privileges. Content is the process of service. Opertion is kind of specil opertions ssocited with service, which includes clone, serve, migrtion etc.

3 348 Y. Liu et l. Definition 5. Service Mngement Node, is kind of nodes tht contins the services informtion of current group, denoted s R s. Normlly, ll these contiguity service mngement nodes form service mngement group utomticlly. Definition 6. Virtul Orgniztion, VO is fbric structure tht composed of nodes nd is estblished by seril of protocols. It is hierrchicl tree structure constituted by virtul groups. There exist root group (denoted s RG, nd it is the first lyer) nd other middle lyer groups, denoted s G i j, i mens tht the group is the ith lyer in the virtul orgniztion. L is the lef group, which is positioned t the bottom of the virtul tree, shown s figure 1. Normlly, the group contins resembling nd djcent nodes. There is key node Ri 0 in ech group G i. The functions of the key node in group re similr to the gtewy in LAN, which communictes with other nodes outside the group. A protocol clled GGMP (Grid Group Mngement Protocol)[2] hs been used to determine the key node. Among ll the nodes nd groups, the key nodes constitute virtul group clled kernel group, G k. It is the most importnt portion tht serves for other nodes. It dels with communiction nd seeking etc. Among ll of the nodes in virtul orgniztion topology, the root (first lyer) group in the tree structure of virtul orgniztion is lwys chosen from one of the kernel groups. 2.2 Sfe Service Mngement Protocol Service is disposed upon the virtul orgniztion. Compred with the UDDI[5], the virtul orgniztion bsed service is more dispersed. It is not necessry to Root lyer (First) RG G 1 2 G 2 2 Middle lyer G 1 i G 2 i G n i Lef lyer L 1 L i L j L k L p L q Fig. 1. Tree-Structure of the Virtul Orgniztion

4 A Sclble nd Relible Mobile Agent Computtion Model 349 estblish universl service informtion server in virtul orgnize, on the contrry, the service informtion is distributed in norml group, there is service mngement node in ech group. The vilble service informtion is stored in these service mngement nodes. For sfe service mngement protocol, once the service hs been relesed by the originl node, it cn be replicted to the sme group nodes nd others, nd this opertion is clled clone. However, there my exist some services tht would not shre them with ll the other nodes in VO. So the service disposed in the virtul orgniztion hs privilege ttribute. For the virtul tree is orgnized in hierrchy, the privilege of ech lyer is different, nd in generl the higher privilege is ssigned to the higher lyer group in VO. Tble 1. Privileges defined by the SSMP Privilege Types Privte privileges Public privileges Privilege Sub-types Self privte Notes The node, which releses the service, engrosses the service. Group privte The service is privtely belonged to the relesed node nd its group. Below ccess Sme level ccess Full tree ccess Specil ccess level The service is public to the groups, which re the children of the originl service relesed group. The service is public to the sme lyer group nodes in VO, which mens the service relesed by the ith lyer group node, nd it cn be cloned to the sme ith lyer group nodes. The service is public to ll the tree nodes. The service cn specify the public lyer from ith lyer to jth lyer, i<j. Tble 1 lists the privileges tht re defined by the SSMP. The privilege cn be clssified into two ctegories: privte service nd public service. This ctegory division is bsed on the concept of the group, tht is to sy, whether the service is privte or public to other groups. A frther ctegory in privte privilege cn be clssified into self-privte nd group-privte, the difference between these two ctegories is whether the service cn be cloned mong the originl group. There re four kinds of frther public privilege ctegories, they re below ccess, sme level ccess, full tree ccess, nd specil level ccess respectively. This kind of public privilege ctegory mens tht the services cn be cloned out of their relesed groups, nd the ccess degree out of the originl groups is controlled by this privilege ctegory.

5 350 Y. Liu et l. 2.3 Service Density Before the service dispose protocol is presented, tolernce nmed Service Density should be introduced firstly. It is one of the most importnt fctors in our mobile gent computtion model. Definition 7. Service Density of Group, is function,f s (A G i,n G i ), which symbolizes certin vilble service in groups. Where s is the service nme. A G i is the number of nodes in group G i, which contins vilble service of s. N G i is the node number in group G i. In our mobile gent computtion model, the service density of group (SDG) is defined s formultion (1). In SSMP, the service density of current group is stored in this service mngement node. Other groups cn request for service density by sending messge to this mngement node. η S G i = A G i N G i 100% (1) 3 Service Bsed Mobile Agent Computtion Model Definition 8. Service bsed mobile gent computtion model, is sixtuple MACM =(R, S, M, φ, v, E), Where, R is the node set, S is the finite stte set of the mobile gent. S does not include the stte of the gent migrtion Λ nd the null stte ε. Here, migrtion stte Λ mens tht the mobile gent strts to move to nother node to execute new stte; null stte mens tht the mobile gent does not perform ny ction (execution nd migrtion). M S is the set of ll the messge opertion sttes for mobile gent. M = {M s,m }, M s is the stte of sending messge, nd M is the stte of receiving messge. v R is the initil node tht the mobile gent hs been produced, mobile gent s service firstly comes from the node v, nd then cycles re driven by the finite sttes. E R is the set of finl node for the mobile gent, only in the finl node the mobile gent cn be destroyed nd the service ends. φ, the trnsition reltion, is finite subset of (R (S {Λ, ε})) R: φ :(R (S {Λ, ε})) R, Where (1)To ll the R i,r j R, ifφ(r i,ε)=r j, then R i = R j, (2)To ll the R i,r j R, ifφ(r i,λ)=r j, then R i R j, (3)To ll the R i,r j R, S k S, ifφ(r i,s k )=R j, then R i = R j, (4)To ll the R i R, ifφ(r i,m ) = R i, then the next trnsition stte reltion is φ(r i,m s )=R i, (5)To VO = {G n m,n =1, 2, 3,..., m =1, 2, 3,...}, η Sr G is the service S n r s m density of group G n m. When mobile gent begins to switch to S r service, there will be: φ Sr (R i,λ)=r j

6 A Sclble nd Relible Mobile Agent Computtion Model 351 Here R i is the current position node of the mobile gent. To the trget node R j,wehve: (R j SN Sr ) (SN G q Sr G q k G q k ) (G q k G n m ) (η Sr =mx(η k G q Sr G,n,m=1, 2, 3,...)) n k m where SN Sr is the vilble service node in G q G q k of service S r. k (6)After the migrtion in (5) hs finished, the service S r s density of G q k chnge to: will A Sr 1 η Sr G q = k 100% (2) G q k N Sr G q k In this computtion model, the migrtion stte Λ is estblished by the communiction of the nodes in VO. By dopting the service fbric communiction protocol, mobile gent cn move from the originl node to the destintion node efficiently. The stte trnsition nd messge communiction re ll implemented by this protocol. The service density hs been treted s n importnt tolernce to disptch the mobile gent s migrtion. 4 Conclusions In this pper, sfe service bsed mobile gent computtion model is introduced. With the policy of service clone in tree structure hierrchy group nd the policy of flexible service ccess, the model is more effective nd relible compred with trditionl methods. Furthermore, gent cn use group service density to monitor the whole network service occupncy in groups. It cn blnce the service s serving time nd decrese the witing list of service. Acknowledgements. This pper ws sponsored by Chin Defense Ministry, nd ws prtilly supported by the Aerospce Reserch Foundtion (No HT- ZJDX-13). Thnks for Dr. Zhng Qiong s dvice to this pper. References 1. Hung, L.C., Wu, Z.H., nd Pn, Y.H.: Virtul nd Dynmic Hierrchicl Architecture for E-Science Grid. Interntionl Journl of High Performnce Computing Applictions, 17 (2003) Hung, L.C., Wu, Z.H., nd Pn, Y.H.: A Sclble nd Effective Architecture for Grid services Discovery. First Workshop on Semntics in Peer-to-Peer nd Grid Computing. Budpest, Hungry, 20 My 2003: Foster, I., Kesselmn, C., nd Tuecke, S.: The Antomy of the Grid: Enbling Sclble Virtul Orgniztions. Interntionl J. Supercomputer Applictions, 15(3), 2001

7 352 Y. Liu et l. 4. Christensen, E., Curber, F., Meredith, G. nd Weerwrn., S.: Web Services Description Lnguge (WSDL) 1.1. W3C, Note 15, 2001, w3. org /TR/wsdl 5. UDDI 6. Web Services Flow Lnguge (WSFL) Version 1.0, softwre/ solutions/ Webservices/pdf/WSFL.pdf 7. Brickley, D., nd Guh,R. V.: Resource Description Frmework (RDF) Schem Specifiction 1.0, W3C Cndidte Recommendtion 27 Mrch 2000.

A Finite State Mobile Agent Computation Model

A Finite State Mobile Agent Computation Model A Finite State Mobile Agent Computation Model Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, and Yunhe Pan College of Computer Science, Zhejiang University Hangzhou 310027, PR China Abstract In this paper,

More information

COMPUTER EDUCATION TECHNIQUES, INC. (MS_W2K3_SERVER ) SA:

COMPUTER EDUCATION TECHNIQUES, INC. (MS_W2K3_SERVER ) SA: In order to lern which questions hve een nswered correctly: 1. Print these pges. 2. Answer the questions. 3. Send this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following

More information

Simulating a Finite State Mobile Agent System

Simulating a Finite State Mobile Agent System Simulating a Finite State Mobile Agent System Liu Yong, Xu Congfu, Chen Yanyu, and Pan Yunhe College of Computer Science, Zhejiang University, Hangzhou 310027, P.R. China Abstract. This paper analyzes

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Preserving Constraints for Aggregation Relationship Type Update in XML Document

Preserving Constraints for Aggregation Relationship Type Update in XML Document Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor

More information

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1

vcloud Director Service Provider Admin Portal Guide vcloud Director 9.1 vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/

More information

vcloud Director Service Provider Admin Portal Guide 04 OCT 2018 vcloud Director 9.5

vcloud Director Service Provider Admin Portal Guide 04 OCT 2018 vcloud Director 9.5 vcloud Director Service Provider Admin Portl Guide 04 OCT 208 vcloud Director 9.5 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments

More information

Epson Projector Content Manager Operation Guide

Epson Projector Content Manager Operation Guide Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte

More information

Epson iprojection Operation Guide (Windows/Mac)

Epson iprojection Operation Guide (Windows/Mac) Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Migrating vrealize Automation to 7.3 or March 2018 vrealize Automation 7.3

Migrating vrealize Automation to 7.3 or March 2018 vrealize Automation 7.3 Migrting vrelize Automtion to 7.3 or 7.3.1 15 Mrch 2018 vrelize Automtion 7.3 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments bout

More information

McAfee Network Security Platform

McAfee Network Security Platform Mnger Applince Quick Strt Guide Revision B McAfee Network Security Pltform This guide is high-level description of how to instll nd configure the Mnger Applince. For more detiled instlltion informtion,

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

A Transportation Problem Analysed by a New Ranking Method

A Transportation Problem Analysed by a New Ranking Method (IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Engineer To Engineer Note

Engineer To Engineer Note Engineer To Engineer Note EE-188 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

ECE 468/573 Midterm 1 September 28, 2012

ECE 468/573 Midterm 1 September 28, 2012 ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 Introduction to EsyMP Network Projection EsyMP Network Projection Fetures... 5 Disply Options... 6 Multi-Screen Disply Function... 6 Movie Sending Mode...

More information

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization

An Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction

More information

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu

Vulnerability Analysis of Electric Power Communication Network. Yucong Wu 2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,

More information

A Formalism for Functionality Preserving System Level Transformations

A Formalism for Functionality Preserving System Level Transformations A Formlism for Functionlity Preserving System Level Trnsformtions Smr Abdi Dniel Gjski Center for Embedded Computer Systems UC Irvine Center for Embedded Computer Systems UC Irvine Irvine, CA 92697 Irvine,

More information

UNIT 11. Query Optimization

UNIT 11. Query Optimization UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,

More information

COMMON HALF YEARLY EXAMINATION DECEMBER 2018

COMMON HALF YEARLY EXAMINATION DECEMBER 2018 li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net.pds.pds COMMON HALF YEARLY EXAMINATION DECEMBER 2018 STD : XI SUBJECT: COMPUTER SCIENCE

More information

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment

File Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes

More information

Accelerating 3D convolution using streaming architectures on FPGAs

Accelerating 3D convolution using streaming architectures on FPGAs Accelerting 3D convolution using streming rchitectures on FPGAs Hohun Fu, Robert G. Clpp, Oskr Mencer, nd Oliver Pell ABSTRACT We investigte FPGA rchitectures for ccelerting pplictions whose dominnt cost

More information

Looking up objects in Pastry

Looking up objects in Pastry Review: Pstry routing tbles 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 2 3 4 7 8 9 b c d e f Row0 Row 1 Row 2 Row 3 Routing tble of node with ID i =1fc s - For ech

More information

TO REGULAR EXPRESSIONS

TO REGULAR EXPRESSIONS Suject :- Computer Science Course Nme :- Theory Of Computtion DA TO REGULAR EXPRESSIONS Report Sumitted y:- Ajy Singh Meen 07000505 jysmeen@cse.iit.c.in BASIC DEINITIONS DA:- A finite stte mchine where

More information

pdfapilot Server 2 Manual

pdfapilot Server 2 Manual pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:

More information

License Manager Installation and Setup

License Manager Installation and Setup The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.

More information

Readings : Computer Networking. Outline. The Next Internet: More of the Same? Required: Relevant earlier meeting:

Readings : Computer Networking. Outline. The Next Internet: More of the Same? Required: Relevant earlier meeting: Redings 15-744: Computer Networking L-14 Future Internet Architecture Required: Servl pper Extr reding on Mobility First Relevnt erlier meeting: CCN -> Nmed Dt Network 2 Outline The Next Internet: More

More information

Visual IoT/Robotics Programming Language in -Calculus

Visual IoT/Robotics Programming Language in -Calculus 2017 IEEE 13th Interntionl Symposium on Autonomous Decentrlized Systems Visul IoT/Robotics Progrmming Lnguge in -Clculus Gennro De Luc nd Yinong Chen School of Computing, Informtics nd Decision Systems

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

Data sharing in OpenMP

Data sharing in OpenMP Dt shring in OpenMP Polo Burgio polo.burgio@unimore.it Outline Expressing prllelism Understnding prllel threds Memory Dt mngement Dt cluses Synchroniztion Brriers, locks, criticl sections Work prtitioning

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 About EsyMP Multi PC Projection Meeting Styles Proposed by EsyMP Multi PC Projection... 5 Holding Meetings Using Multiple Imges... 5 Holding Remote Meetings

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. TechAdvisory.org SME Reports sponsored by Voice over Internet Protocol (VoIP)

More information

How to Design REST API? Written Date : March 23, 2015

How to Design REST API? Written Date : March 23, 2015 Visul Prdigm How Design REST API? Turil How Design REST API? Written Dte : Mrch 23, 2015 REpresenttionl Stte Trnsfer, n rchitecturl style tht cn be used in building networked pplictions, is becoming incresingly

More information

PYTHON PROGRAMMING. The History of Python. Features of Python. This Course

PYTHON PROGRAMMING. The History of Python. Features of Python. This Course The History of Python PYTHON PROGRAMMING Dr Christin Hill 7 9 November 2016 Invented by Guido vn Rossum* t the Centrum Wiskunde & Informtic in Amsterdm in the erly 1990s Nmed fter Monty Python s Flying

More information

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution

Tree Structured Symmetrical Systems of Linear Equations and their Graphical Solution Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime

More information

Reducing Costs with Duck Typing. Structural

Reducing Costs with Duck Typing. Structural Reducing Costs with Duck Typing Structurl 1 Duck Typing In computer progrmming with object-oriented progrmming lnguges, duck typing is lyer of progrmming lnguge nd design rules on top of typing. Typing

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

Address/Data Control. Port latch. Multiplexer

Address/Data Control. Port latch. Multiplexer 4.1 I/O PORT OPERATION As discussed in chpter 1, ll four ports of the 8051 re bi-directionl. Ech port consists of ltch (Specil Function Registers P0, P1, P2, nd P3), n output driver, nd n input buffer.

More information

Assignment 4. Due 09/18/17

Assignment 4. Due 09/18/17 Assignment 4. ue 09/18/17 1. ). Write regulr expressions tht define the strings recognized by the following finite utomt: b d b b b c c b) Write FA tht recognizes the tokens defined by the following regulr

More information

vcloud Director Tenant Portal Guide vcloud Director 9.1

vcloud Director Tenant Portal Guide vcloud Director 9.1 vcloud Director Tennt Portl Guide vcloud Director 9.1 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments bout this documenttion, submit

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EsyMP Multi PC Projection Opertion Guide Contents 2 About EsyMP Multi PC Projection Meeting Styles Proposed by EsyMP Multi PC Projection... 5 Holding Meetings Using Multiple Imges... 5 Holding Remote Meetings

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

Transitioning to NEMSIS 3

Transitioning to NEMSIS 3 TRANSITIONING TO NEMSIS 3 LOCAL EMS SERVICES 1 Trnsitioning to NEMSIS 3 Resources for Locl EMS Services TRANSITIONING TO NEMSIS 3 LOCAL EMS SERVICES 2 Index Getting Strted FAQs for Leders Trnsition Checklist

More information

Geometric transformations

Geometric transformations Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Research on Digital Library Personalized Information Service Model Based on Agent Model

Research on Digital Library Personalized Information Service Model Based on Agent Model Reserch on Digitl Librry Personlized Informtion Service Model Bsed on Model Xu Yn Xi n Physicl Eduction University Xi n, Shnxi, Chin, 710068 guilinxuyn@yhoo.com.cn Journl of Digitl Informtion Mngement

More information

Topic 2: Lexing and Flexing

Topic 2: Lexing and Flexing Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of

More information

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl

More information

On components with explicit protocols satisfying a notion of correctness by construction

On components with explicit protocols satisfying a notion of correctness by construction On components with explicit protocols stisfying notion of correctness by construction Andrés Frís nd Mrio Südholt Déprtement Informtique École des Mines de Nntes 4, rue Alfred Kstler BP 20722 F-44307 Nntes

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012

Dynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012 Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.

More information

Colored Petri Net (CPN) based Model for Hybrid Security Architecture based on Reputation for Secure Execution of Mobile Agents

Colored Petri Net (CPN) based Model for Hybrid Security Architecture based on Reputation for Secure Execution of Mobile Agents Interntionl Journl of Appliction or Innovtion in Engineering & Mngement (IJAIEM) Web Site: www.ijiem.org Emil: editor@ijiem.org Volume 5, Issue 1, Jnury 2016 ISSN 2319-4847 Colored Petri Net (CPN) bsed

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS

A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Scalable Distributed Data Structures: A Survey Λ

Scalable Distributed Data Structures: A Survey Λ Sclble Distributed Dt Structures: A Survey Λ ADRIANO DI PASQUALE University of L Aquil, Itly ENRICO NARDELLI University of L Aquil nd Istituto di Anlisi dei Sistemi ed Informtic, Itly Abstrct This pper

More information

Coprocessor memory definition. Loic Pallardy / Arnaud Pouliquen

Coprocessor memory definition. Loic Pallardy / Arnaud Pouliquen Coprocessor memory definition Loic Pllrdy / Arnud Pouliquen Objective 2 The gol of following slides is to sum up on-going discussion in OpenAP weekly bout Remoteproc/Rpmsg memory lloction. Following proposl

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X

a(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X 4. Mon, Sept. 30 Lst time, we defined the quotient topology coming from continuous surjection q : X! Y. Recll tht q is quotient mp (nd Y hs the quotient topology) if V Y is open precisely when q (V ) X

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Midterm I Solutions CS164, Spring 2006

Midterm I Solutions CS164, Spring 2006 Midterm I Solutions CS164, Spring 2006 Februry 23, 2006 Plese red ll instructions (including these) crefully. Write your nme, login, SID, nd circle the section time. There re 8 pges in this exm nd 4 questions,

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Infrastructures for Cloud Computing and Big Data

Infrastructures for Cloud Computing and Big Data University of Bologn Diprtimento di Informtic Scienz e Ingegneri (DISI) Engineering Bologn Cmpus Clss of Computer Networks M or Infrstructures for Cloud Computing nd Big Dt ONs nd Advnced Filesystems Antonio

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Data Integrity Proofs in Cloud Computing

Data Integrity Proofs in Cloud Computing Technovision-2014: 1st Interntionl Conference t SITS, Nrhe, Pune on April 5-6, 2014 Dt Integrity Proofs in Cloud Computing Deshmukh Ashwini B. Deptt. of Computer Science nd Engg. Ambjogi, Dist. Beed, Mhrshtr

More information

Scalable extensible middleware framework for context-aware mobile applications (SCAMMP)

Scalable extensible middleware framework for context-aware mobile applications (SCAMMP) Sclble extensible middlewre frmework for context-wre mobile pplictions (SCAMMP) Hssn Sbeyti 1, Mohmd Mlli 1, Khlid Al-Tht 2, Ahmd Fdlllh 1, nd Mohmd Youssef 3 1 Fculty of Computer Studies, Arb Open University,

More information

Toward Self-Referential Autonomous Learning of Object and Situation Models

Toward Self-Referential Autonomous Learning of Object and Situation Models Cogn Comput (2016) 8:703 719 DOI 10.1007/2559-016-9407-7 Towrd Self-eferentil Autonomous Lerning of Object nd Sitution Models Florin Dmerow 1 Andres Knobluch 2,3 Ursul Körner 3 Julin Eggert 3 Edgr Körner

More information

Tixeo compared to other videoconferencing solutions

Tixeo compared to other videoconferencing solutions compred to other videoconferencing solutions for V171026EN , unique solution on the video conferencing field Adobe Connect Web RTC Vydio for High security level, privcy Zero impct on network security policies

More information

Enginner To Engineer Note

Enginner To Engineer Note Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181

More information

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls

CPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd

More information

OMG, Real Time Embedded Distributed Object Systems Workshop. Arlington, USA, July 15-18, 2002

OMG, Real Time Embedded Distributed Object Systems Workshop. Arlington, USA, July 15-18, 2002 OMG, Rel Time Embedded Distributed Object Systems Workshop. Arlington, USA, July 15-18, 2002 The DSSV Methodology: High Level Vlidtion of CORBA Architecture using Discrete Event Simultion Approch. Emmnuelle

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information