A Scalable and Reliable Mobile Agent Computation Model
|
|
- Evan Rich
- 5 years ago
- Views:
Transcription
1 A Sclble nd Relible Mobile Agent Computtion Model Yong Liu, Congfu Xu, Zhohui Wu, nd Yunhe Pn College of Computer Science, Zhejing University Hngzhou , Chin Abstrct. This pper presents high performnce service bsed mobile gent computtion model. The sclbility nd relibility of this model is secured through the service clone policy nd ccess privilege policy. With the introduction of service density of group, we cn further decrese resource witing nd blnce the service occupncy for the whole network. 1 Introduction Mobile Agents re progrms tht cn be migrted nd executed between different network hosts. There re tow types of mobile gents clssified by the migrtion bility of the gents. They re strong migrtion mobile gents nd wek migrtion mobile gents. When using the strong migrtion policy, the mobile gent system needs to record ll the sttes nd relted dt in ech position of the gent, which will spend huge mount of time nd spce for the trnsport, nd will led to low efficiency. When using wek migrtion policy, the trnsporttion of dt will decrese gretly, however, the bilities of dpting the complicted network topology will decrese too. Therefore, how to design relible nd high-efficiency work pttern for the mobile gent is one of the most importnt problems. In fct, the Grid[3] technology hs provided powerful pltform for the mobile gent. The WSDL[4] provides web service description lnguge for service disposing. How dose the service be composed together cn be described by the WSFL[6]. And the UDDI (Universl Description, Discovery nd Integrtion)[5] is used to enble online registry nd the publishing nd dynmic discovery of Web services offered by businesses. The RDF[7], which is recommended by W3C nd cn support domin-independent metdt description, is used to describe the resources. The mobile gent computtion model tht is built upon these bove techniques is convergence nd hrd to sclbility. In order to solve this problem, sclble nd relible service bsed mobile gent computtion model is proposed bsed on decentrlized virtul orgniztion rchitecture. J. Zhng, J.-H. He, nd Y. Fu (Eds.): CIS 2004, LNCS 3314, pp , c Springer-Verlg Berlin Heidelberg 2004
2 A Sclble nd Relible Mobile Agent Computtion Model Overview of MACM nd Fbric Architecture Our computtion model is estblished upon the virtul orgniztion rchitecture, nmely virtul orgniztion (VO or group), which cn gretly reduce the mobile gent size during migrtion, nd this rchitecture cn provide more intelligent support for mobile gent. The bsic elements of virtul orgniztion re nodes, which cn be PC, PDA, lptop, nd other devices connected by network. The nodes re grouped in virtul, nd they cn join nd leve the group dynmiclly. The groups re virtully hierrchicl, which mens tht the groups cn be clssified into root-lyer, middle-lyers nd lef virtul lyers. The virtul group bsed fbric rchitecture is the pltform of the mobile gent migrtion. By this wy, the mobile gent cn discovery nd move more effective nd it cn lso gretly decrese the mobile gent size during migrtion. 2.1 Forml Definition of Infrstructure The VO bsed rchitecture mentioned in this pper is structure similr to the fbric lyer in [1]. Some definitions re given s the following: Definition 1. Node, the minimized devices tht cn lod nd execute the mobile gents in network re denoted s R i. Ech node in VO cn be service provider or service consumer. Definition 2. Key Node is kind of nodes tht dels with the remote communictions, denoted s Ri 0. Ech group must contin key node. And the key nodes re lwys positioned in two or more thn tow groups. Normlly the contiguity key nodes form kernel group. Definition 3. Group, the set includes one node or severl nodes, denoted s G i = {R,R 0,R 1, 2..., R}, n where is the nme of the group. Ech group hs lyer identifier i, which mens tht the group is the ith lyer in VO. The node cn join in more thn one group in VO, which mens tht ech node including key node cn belong to two or more thn two groups. Rj i mens tht node belongs to group G j. Group is comprtively stble orgniztion; the nodes belonging to certin group cn leve this group nd join in nother group dynmiclly. The login nd logout of nodes dopt the GGMP (Grid Group Mngement Protocol)[1], which is similr to the IGMP. Definition 4. Service, in VO rchitecture, service is kind of deling process tht provided by certin nodes in VO. It cn be formlly defined s four-tuple: S(GUIDS, P rivilege, Content, Opertion), where GUIDS is the globl unique ID of the service. And privilege is the privilege defined by the service provider, which include public nd privte privileges. Content is the process of service. Opertion is kind of specil opertions ssocited with service, which includes clone, serve, migrtion etc.
3 348 Y. Liu et l. Definition 5. Service Mngement Node, is kind of nodes tht contins the services informtion of current group, denoted s R s. Normlly, ll these contiguity service mngement nodes form service mngement group utomticlly. Definition 6. Virtul Orgniztion, VO is fbric structure tht composed of nodes nd is estblished by seril of protocols. It is hierrchicl tree structure constituted by virtul groups. There exist root group (denoted s RG, nd it is the first lyer) nd other middle lyer groups, denoted s G i j, i mens tht the group is the ith lyer in the virtul orgniztion. L is the lef group, which is positioned t the bottom of the virtul tree, shown s figure 1. Normlly, the group contins resembling nd djcent nodes. There is key node Ri 0 in ech group G i. The functions of the key node in group re similr to the gtewy in LAN, which communictes with other nodes outside the group. A protocol clled GGMP (Grid Group Mngement Protocol)[2] hs been used to determine the key node. Among ll the nodes nd groups, the key nodes constitute virtul group clled kernel group, G k. It is the most importnt portion tht serves for other nodes. It dels with communiction nd seeking etc. Among ll of the nodes in virtul orgniztion topology, the root (first lyer) group in the tree structure of virtul orgniztion is lwys chosen from one of the kernel groups. 2.2 Sfe Service Mngement Protocol Service is disposed upon the virtul orgniztion. Compred with the UDDI[5], the virtul orgniztion bsed service is more dispersed. It is not necessry to Root lyer (First) RG G 1 2 G 2 2 Middle lyer G 1 i G 2 i G n i Lef lyer L 1 L i L j L k L p L q Fig. 1. Tree-Structure of the Virtul Orgniztion
4 A Sclble nd Relible Mobile Agent Computtion Model 349 estblish universl service informtion server in virtul orgnize, on the contrry, the service informtion is distributed in norml group, there is service mngement node in ech group. The vilble service informtion is stored in these service mngement nodes. For sfe service mngement protocol, once the service hs been relesed by the originl node, it cn be replicted to the sme group nodes nd others, nd this opertion is clled clone. However, there my exist some services tht would not shre them with ll the other nodes in VO. So the service disposed in the virtul orgniztion hs privilege ttribute. For the virtul tree is orgnized in hierrchy, the privilege of ech lyer is different, nd in generl the higher privilege is ssigned to the higher lyer group in VO. Tble 1. Privileges defined by the SSMP Privilege Types Privte privileges Public privileges Privilege Sub-types Self privte Notes The node, which releses the service, engrosses the service. Group privte The service is privtely belonged to the relesed node nd its group. Below ccess Sme level ccess Full tree ccess Specil ccess level The service is public to the groups, which re the children of the originl service relesed group. The service is public to the sme lyer group nodes in VO, which mens the service relesed by the ith lyer group node, nd it cn be cloned to the sme ith lyer group nodes. The service is public to ll the tree nodes. The service cn specify the public lyer from ith lyer to jth lyer, i<j. Tble 1 lists the privileges tht re defined by the SSMP. The privilege cn be clssified into two ctegories: privte service nd public service. This ctegory division is bsed on the concept of the group, tht is to sy, whether the service is privte or public to other groups. A frther ctegory in privte privilege cn be clssified into self-privte nd group-privte, the difference between these two ctegories is whether the service cn be cloned mong the originl group. There re four kinds of frther public privilege ctegories, they re below ccess, sme level ccess, full tree ccess, nd specil level ccess respectively. This kind of public privilege ctegory mens tht the services cn be cloned out of their relesed groups, nd the ccess degree out of the originl groups is controlled by this privilege ctegory.
5 350 Y. Liu et l. 2.3 Service Density Before the service dispose protocol is presented, tolernce nmed Service Density should be introduced firstly. It is one of the most importnt fctors in our mobile gent computtion model. Definition 7. Service Density of Group, is function,f s (A G i,n G i ), which symbolizes certin vilble service in groups. Where s is the service nme. A G i is the number of nodes in group G i, which contins vilble service of s. N G i is the node number in group G i. In our mobile gent computtion model, the service density of group (SDG) is defined s formultion (1). In SSMP, the service density of current group is stored in this service mngement node. Other groups cn request for service density by sending messge to this mngement node. η S G i = A G i N G i 100% (1) 3 Service Bsed Mobile Agent Computtion Model Definition 8. Service bsed mobile gent computtion model, is sixtuple MACM =(R, S, M, φ, v, E), Where, R is the node set, S is the finite stte set of the mobile gent. S does not include the stte of the gent migrtion Λ nd the null stte ε. Here, migrtion stte Λ mens tht the mobile gent strts to move to nother node to execute new stte; null stte mens tht the mobile gent does not perform ny ction (execution nd migrtion). M S is the set of ll the messge opertion sttes for mobile gent. M = {M s,m }, M s is the stte of sending messge, nd M is the stte of receiving messge. v R is the initil node tht the mobile gent hs been produced, mobile gent s service firstly comes from the node v, nd then cycles re driven by the finite sttes. E R is the set of finl node for the mobile gent, only in the finl node the mobile gent cn be destroyed nd the service ends. φ, the trnsition reltion, is finite subset of (R (S {Λ, ε})) R: φ :(R (S {Λ, ε})) R, Where (1)To ll the R i,r j R, ifφ(r i,ε)=r j, then R i = R j, (2)To ll the R i,r j R, ifφ(r i,λ)=r j, then R i R j, (3)To ll the R i,r j R, S k S, ifφ(r i,s k )=R j, then R i = R j, (4)To ll the R i R, ifφ(r i,m ) = R i, then the next trnsition stte reltion is φ(r i,m s )=R i, (5)To VO = {G n m,n =1, 2, 3,..., m =1, 2, 3,...}, η Sr G is the service S n r s m density of group G n m. When mobile gent begins to switch to S r service, there will be: φ Sr (R i,λ)=r j
6 A Sclble nd Relible Mobile Agent Computtion Model 351 Here R i is the current position node of the mobile gent. To the trget node R j,wehve: (R j SN Sr ) (SN G q Sr G q k G q k ) (G q k G n m ) (η Sr =mx(η k G q Sr G,n,m=1, 2, 3,...)) n k m where SN Sr is the vilble service node in G q G q k of service S r. k (6)After the migrtion in (5) hs finished, the service S r s density of G q k chnge to: will A Sr 1 η Sr G q = k 100% (2) G q k N Sr G q k In this computtion model, the migrtion stte Λ is estblished by the communiction of the nodes in VO. By dopting the service fbric communiction protocol, mobile gent cn move from the originl node to the destintion node efficiently. The stte trnsition nd messge communiction re ll implemented by this protocol. The service density hs been treted s n importnt tolernce to disptch the mobile gent s migrtion. 4 Conclusions In this pper, sfe service bsed mobile gent computtion model is introduced. With the policy of service clone in tree structure hierrchy group nd the policy of flexible service ccess, the model is more effective nd relible compred with trditionl methods. Furthermore, gent cn use group service density to monitor the whole network service occupncy in groups. It cn blnce the service s serving time nd decrese the witing list of service. Acknowledgements. This pper ws sponsored by Chin Defense Ministry, nd ws prtilly supported by the Aerospce Reserch Foundtion (No HT- ZJDX-13). Thnks for Dr. Zhng Qiong s dvice to this pper. References 1. Hung, L.C., Wu, Z.H., nd Pn, Y.H.: Virtul nd Dynmic Hierrchicl Architecture for E-Science Grid. Interntionl Journl of High Performnce Computing Applictions, 17 (2003) Hung, L.C., Wu, Z.H., nd Pn, Y.H.: A Sclble nd Effective Architecture for Grid services Discovery. First Workshop on Semntics in Peer-to-Peer nd Grid Computing. Budpest, Hungry, 20 My 2003: Foster, I., Kesselmn, C., nd Tuecke, S.: The Antomy of the Grid: Enbling Sclble Virtul Orgniztions. Interntionl J. Supercomputer Applictions, 15(3), 2001
7 352 Y. Liu et l. 4. Christensen, E., Curber, F., Meredith, G. nd Weerwrn., S.: Web Services Description Lnguge (WSDL) 1.1. W3C, Note 15, 2001, w3. org /TR/wsdl 5. UDDI 6. Web Services Flow Lnguge (WSFL) Version 1.0, softwre/ solutions/ Webservices/pdf/WSFL.pdf 7. Brickley, D., nd Guh,R. V.: Resource Description Frmework (RDF) Schem Specifiction 1.0, W3C Cndidte Recommendtion 27 Mrch 2000.
A Finite State Mobile Agent Computation Model
A Finite State Mobile Agent Computation Model Yong Liu, Congfu Xu, Zhaohui Wu, Weidong Chen, and Yunhe Pan College of Computer Science, Zhejiang University Hangzhou 310027, PR China Abstract In this paper,
More informationCOMPUTER EDUCATION TECHNIQUES, INC. (MS_W2K3_SERVER ) SA:
In order to lern which questions hve een nswered correctly: 1. Print these pges. 2. Answer the questions. 3. Send this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following
More informationSimulating a Finite State Mobile Agent System
Simulating a Finite State Mobile Agent System Liu Yong, Xu Congfu, Chen Yanyu, and Pan Yunhe College of Computer Science, Zhejiang University, Hangzhou 310027, P.R. China Abstract. This paper analyzes
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationComplete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li
2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationPreserving Constraints for Aggregation Relationship Type Update in XML Document
Preserving Constrints for Aggregtion Reltionship Type Updte in XML Document Eric Prdede 1, J. Wenny Rhyu 1, nd Dvid Tnir 2 1 Deprtment of Computer Science nd Computer Engineering, L Trobe University, Bundoor
More informationvcloud Director Service Provider Admin Portal Guide vcloud Director 9.1
vcloud Director Service Provider Admin Portl Guide vcloud Director 9. vcloud Director Service Provider Admin Portl Guide You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/
More informationvcloud Director Service Provider Admin Portal Guide 04 OCT 2018 vcloud Director 9.5
vcloud Director Service Provider Admin Portl Guide 04 OCT 208 vcloud Director 9.5 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments
More informationEpson Projector Content Manager Operation Guide
Epson Projector Content Mnger Opertion Guide Contents 2 Introduction to the Epson Projector Content Mnger Softwre 3 Epson Projector Content Mnger Fetures... 4 Setting Up the Softwre for the First Time
More informationUnit #9 : Definite Integral Properties, Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationCS 268: IP Multicast Routing
Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte
More informationEpson iprojection Operation Guide (Windows/Mac)
Epson iprojection Opertion Guide (Windows/Mc) Contents 2 Introduction to Epson iprojection 5 Epson iprojection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters nd Projection
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-186 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationEasyMP Multi PC Projection Operation Guide
EsyMP Multi PC Projection Opertion Guide Contents 2 Introduction to EsyMP Multi PC Projection 5 EsyMP Multi PC Projection Fetures... 6 Connection to Vrious Devices... 6 Four-Pnel Disply... 6 Chnge Presenters
More informationLECT-10, S-1 FP2P08, Javed I.
A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationMigrating vrealize Automation to 7.3 or March 2018 vrealize Automation 7.3
Migrting vrelize Automtion to 7.3 or 7.3.1 15 Mrch 2018 vrelize Automtion 7.3 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments bout
More informationMcAfee Network Security Platform
Mnger Applince Quick Strt Guide Revision B McAfee Network Security Pltform This guide is high-level description of how to instll nd configure the Mnger Applince. For more detiled instlltion informtion,
More informationFig.25: the Role of LEX
The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing
More informationA New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method
A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,
More informationDefinition of Regular Expression
Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll
More informationA Transportation Problem Analysed by a New Ranking Method
(IJIRSE) Interntionl Journl of Innovtive Reserch in Science & Engineering ISSN (Online) 7-07 A Trnsporttion Problem Anlysed by New Rnking Method Dr. A. Shy Sudh P. Chinthiy Associte Professor PG Scholr
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationEngineer To Engineer Note
Engineer To Engineer Note EE-188 Technicl Notes on using Anlog Devices' DSP components nd development tools Contct our technicl support by phone: (800) ANALOG-D or e-mil: dsp.support@nlog.com Or visit
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationSmall Business Networking
Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology
More informationECE 468/573 Midterm 1 September 28, 2012
ECE 468/573 Midterm 1 September 28, 2012 Nme:! Purdue emil:! Plese sign the following: I ffirm tht the nswers given on this test re mine nd mine lone. I did not receive help from ny person or mteril (other
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 Introduction to EsyMP Network Projection EsyMP Network Projection Fetures... 5 Disply Options... 6 Multi-Screen Disply Function... 6 Movie Sending Mode...
More informationAn Efficient Divide and Conquer Algorithm for Exact Hazard Free Logic Minimization
An Efficient Divide nd Conquer Algorithm for Exct Hzrd Free Logic Minimiztion J.W.J.M. Rutten, M.R.C.M. Berkelr, C.A.J. vn Eijk, M.A.J. Kolsteren Eindhoven University of Technology Informtion nd Communiction
More informationVulnerability Analysis of Electric Power Communication Network. Yucong Wu
2nd Interntionl Conference on Advnces in Mechnicl Engineering nd Industril Informtics (AMEII 2016 Vulnerbility Anlysis of Electric Power Communiction Network Yucong Wu Deprtment of Telecommunictions Engineering,
More informationA Formalism for Functionality Preserving System Level Transformations
A Formlism for Functionlity Preserving System Level Trnsformtions Smr Abdi Dniel Gjski Center for Embedded Computer Systems UC Irvine Center for Embedded Computer Systems UC Irvine Irvine, CA 92697 Irvine,
More informationUNIT 11. Query Optimization
UNIT Query Optimiztion Contents Introduction to Query Optimiztion 2 The Optimiztion Process: An Overview 3 Optimiztion in System R 4 Optimiztion in INGRES 5 Implementing the Join Opertors Wei-Png Yng,
More informationCOMMON HALF YEARLY EXAMINATION DECEMBER 2018
li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net li.net i.net.pds.pds COMMON HALF YEARLY EXAMINATION DECEMBER 2018 STD : XI SUBJECT: COMPUTER SCIENCE
More informationFile Manager Quick Reference Guide. June Prepared for the Mayo Clinic Enterprise Kahua Deployment
File Mnger Quick Reference Guide June 2018 Prepred for the Myo Clinic Enterprise Khu Deployment NVIGTION IN FILE MNGER To nvigte in File Mnger, users will mke use of the left pne to nvigte nd further pnes
More informationAccelerating 3D convolution using streaming architectures on FPGAs
Accelerting 3D convolution using streming rchitectures on FPGAs Hohun Fu, Robert G. Clpp, Oskr Mencer, nd Oliver Pell ABSTRACT We investigte FPGA rchitectures for ccelerting pplictions whose dominnt cost
More informationLooking up objects in Pastry
Review: Pstry routing tbles 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 1 2 3 4 7 8 9 b c d e f 0 2 3 4 7 8 9 b c d e f Row0 Row 1 Row 2 Row 3 Routing tble of node with ID i =1fc s - For ech
More informationTO REGULAR EXPRESSIONS
Suject :- Computer Science Course Nme :- Theory Of Computtion DA TO REGULAR EXPRESSIONS Report Sumitted y:- Ajy Singh Meen 07000505 jysmeen@cse.iit.c.in BASIC DEINITIONS DA:- A finite stte mchine where
More informationpdfapilot Server 2 Manual
pdfpilot Server 2 Mnul 2011 by clls softwre gmbh Schönhuser Allee 6/7 D 10119 Berlin Germny info@cllssoftwre.com www.cllssoftwre.com Mnul clls pdfpilot Server 2 Pge 2 clls pdfpilot Server 2 Mnul Lst modified:
More informationLicense Manager Installation and Setup
The Network License (concurrent-user) version of e-dpp hs hrdwre key plugged to the computer running the License Mnger softwre. In the e-dpp terminology, this computer is clled the License Mnger Server.
More informationReadings : Computer Networking. Outline. The Next Internet: More of the Same? Required: Relevant earlier meeting:
Redings 15-744: Computer Networking L-14 Future Internet Architecture Required: Servl pper Extr reding on Mobility First Relevnt erlier meeting: CCN -> Nmed Dt Network 2 Outline The Next Internet: More
More informationVisual IoT/Robotics Programming Language in -Calculus
2017 IEEE 13th Interntionl Symposium on Autonomous Decentrlized Systems Visul IoT/Robotics Progrmming Lnguge in -Clculus Gennro De Luc nd Yinong Chen School of Computing, Informtics nd Decision Systems
More informationDistributed Systems Principles and Paradigms
Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784
More informationData sharing in OpenMP
Dt shring in OpenMP Polo Burgio polo.burgio@unimore.it Outline Expressing prllelism Understnding prllel threds Memory Dt mngement Dt cluses Synchroniztion Brriers, locks, criticl sections Work prtitioning
More informationOverview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases
Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture
More informationEasyMP Multi PC Projection Operation Guide
EsyMP Multi PC Projection Opertion Guide Contents 2 About EsyMP Multi PC Projection Meeting Styles Proposed by EsyMP Multi PC Projection... 5 Holding Meetings Using Multiple Imges... 5 Holding Remote Meetings
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationUnit 5 Vocabulary. A function is a special relationship where each input has a single output.
MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. TechAdvisory.org SME Reports sponsored by Voice over Internet Protocol (VoIP)
More informationHow to Design REST API? Written Date : March 23, 2015
Visul Prdigm How Design REST API? Turil How Design REST API? Written Dte : Mrch 23, 2015 REpresenttionl Stte Trnsfer, n rchitecturl style tht cn be used in building networked pplictions, is becoming incresingly
More informationPYTHON PROGRAMMING. The History of Python. Features of Python. This Course
The History of Python PYTHON PROGRAMMING Dr Christin Hill 7 9 November 2016 Invented by Guido vn Rossum* t the Centrum Wiskunde & Informtic in Amsterdm in the erly 1990s Nmed fter Monty Python s Flying
More informationTree Structured Symmetrical Systems of Linear Equations and their Graphical Solution
Proceedings of the World Congress on Engineering nd Computer Science 4 Vol I WCECS 4, -4 October, 4, Sn Frncisco, USA Tree Structured Symmetricl Systems of Liner Equtions nd their Grphicl Solution Jime
More informationReducing Costs with Duck Typing. Structural
Reducing Costs with Duck Typing Structurl 1 Duck Typing In computer progrmming with object-oriented progrmming lnguges, duck typing is lyer of progrmming lnguge nd design rules on top of typing. Typing
More informationTool Vendor Perspectives SysML Thus Far
Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com
More informationAddress/Data Control. Port latch. Multiplexer
4.1 I/O PORT OPERATION As discussed in chpter 1, ll four ports of the 8051 re bi-directionl. Ech port consists of ltch (Specil Function Registers P0, P1, P2, nd P3), n output driver, nd n input buffer.
More informationAssignment 4. Due 09/18/17
Assignment 4. ue 09/18/17 1. ). Write regulr expressions tht define the strings recognized by the following finite utomt: b d b b b c c b) Write FA tht recognizes the tokens defined by the following regulr
More informationvcloud Director Tenant Portal Guide vcloud Director 9.1
vcloud Director Tennt Portl Guide vcloud Director 9.1 You cn find the most up-to-dte technicl documenttion on the VMwre website t: https://docs.vmwre.com/ If you hve comments bout this documenttion, submit
More informationEasyMP Multi PC Projection Operation Guide
EsyMP Multi PC Projection Opertion Guide Contents 2 About EsyMP Multi PC Projection Meeting Styles Proposed by EsyMP Multi PC Projection... 5 Holding Meetings Using Multiple Imges... 5 Holding Remote Meetings
More informationDr. D.M. Akbar Hussain
Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence
More informationCS321 Languages and Compiler Design I. Winter 2012 Lecture 5
CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,
More informationSimrad ES80. Software Release Note Introduction
Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the
More informationTransitioning to NEMSIS 3
TRANSITIONING TO NEMSIS 3 LOCAL EMS SERVICES 1 Trnsitioning to NEMSIS 3 Resources for Locl EMS Services TRANSITIONING TO NEMSIS 3 LOCAL EMS SERVICES 2 Index Getting Strted FAQs for Leders Trnsition Checklist
More informationGeometric transformations
Geometric trnsformtions Computer Grphics Some slides re bsed on Shy Shlom slides from TAU mn n n m m T A,,,,,, 2 1 2 22 12 1 21 11 Rows become columns nd columns become rows nm n n m m A,,,,,, 1 1 2 22
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationResearch on Digital Library Personalized Information Service Model Based on Agent Model
Reserch on Digitl Librry Personlized Informtion Service Model Bsed on Model Xu Yn Xi n Physicl Eduction University Xi n, Shnxi, Chin, 710068 guilinxuyn@yhoo.com.cn Journl of Digitl Informtion Mngement
More informationTopic 2: Lexing and Flexing
Topic 2: Lexing nd Flexing COS 320 Compiling Techniques Princeton University Spring 2016 Lennrt Beringer 1 2 The Compiler Lexicl Anlysis Gol: rek strem of ASCII chrcters (source/input) into sequence of
More informationSOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES
SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl
More informationOn components with explicit protocols satisfying a notion of correctness by construction
On components with explicit protocols stisfying notion of correctness by construction Andrés Frís nd Mrio Südholt Déprtement Informtique École des Mines de Nntes 4, rue Alfred Kstler BP 20722 F-44307 Nntes
More informationRevisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network
Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationEasyMP Network Projection Operation Guide
EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6
More informationDynamic Programming. Andreas Klappenecker. [partially based on slides by Prof. Welch] Monday, September 24, 2012
Dynmic Progrmming Andres Klppenecker [prtilly bsed on slides by Prof. Welch] 1 Dynmic Progrmming Optiml substructure An optiml solution to the problem contins within it optiml solutions to subproblems.
More informationColored Petri Net (CPN) based Model for Hybrid Security Architecture based on Reputation for Secure Execution of Mobile Agents
Interntionl Journl of Appliction or Innovtion in Engineering & Mngement (IJAIEM) Web Site: www.ijiem.org Emil: editor@ijiem.org Volume 5, Issue 1, Jnury 2016 ISSN 2319-4847 Colored Petri Net (CPN) bsed
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationA REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS
A REINFORCEMENT LEARNING APPROACH TO SCHEDULING DUAL-ARMED CLUSTER TOOLS WITH TIME VARIATIONS Ji-Eun Roh (), Te-Eog Lee (b) (),(b) Deprtment of Industril nd Systems Engineering, Kore Advnced Institute
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationIn the last lecture, we discussed how valid tokens may be specified by regular expressions.
LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.
More informationScalable Distributed Data Structures: A Survey Λ
Sclble Distributed Dt Structures: A Survey Λ ADRIANO DI PASQUALE University of L Aquil, Itly ENRICO NARDELLI University of L Aquil nd Istituto di Anlisi dei Sistemi ed Informtic, Itly Abstrct This pper
More informationCoprocessor memory definition. Loic Pallardy / Arnaud Pouliquen
Coprocessor memory definition Loic Pllrdy / Arnud Pouliquen Objective 2 The gol of following slides is to sum up on-going discussion in OpenAP weekly bout Remoteproc/Rpmsg memory lloction. Following proposl
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationa(e, x) = x. Diagrammatically, this is encoded as the following commutative diagrams / X
4. Mon, Sept. 30 Lst time, we defined the quotient topology coming from continuous surjection q : X! Y. Recll tht q is quotient mp (nd Y hs the quotient topology) if V Y is open precisely when q (V ) X
More informationthis grammar generates the following language: Because this symbol will also be used in a later step, it receives the
LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.
More informationMidterm I Solutions CS164, Spring 2006
Midterm I Solutions CS164, Spring 2006 Februry 23, 2006 Plese red ll instructions (including these) crefully. Write your nme, login, SID, nd circle the section time. There re 8 pges in this exm nd 4 questions,
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationInfrastructures for Cloud Computing and Big Data
University of Bologn Diprtimento di Informtic Scienz e Ingegneri (DISI) Engineering Bologn Cmpus Clss of Computer Networks M or Infrstructures for Cloud Computing nd Big Dt ONs nd Advnced Filesystems Antonio
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More informationData Integrity Proofs in Cloud Computing
Technovision-2014: 1st Interntionl Conference t SITS, Nrhe, Pune on April 5-6, 2014 Dt Integrity Proofs in Cloud Computing Deshmukh Ashwini B. Deptt. of Computer Science nd Engg. Ambjogi, Dist. Beed, Mhrshtr
More informationScalable extensible middleware framework for context-aware mobile applications (SCAMMP)
Sclble extensible middlewre frmework for context-wre mobile pplictions (SCAMMP) Hssn Sbeyti 1, Mohmd Mlli 1, Khlid Al-Tht 2, Ahmd Fdlllh 1, nd Mohmd Youssef 3 1 Fculty of Computer Studies, Arb Open University,
More informationToward Self-Referential Autonomous Learning of Object and Situation Models
Cogn Comput (2016) 8:703 719 DOI 10.1007/2559-016-9407-7 Towrd Self-eferentil Autonomous Lerning of Object nd Sitution Models Florin Dmerow 1 Andres Knobluch 2,3 Ursul Körner 3 Julin Eggert 3 Edgr Körner
More informationTixeo compared to other videoconferencing solutions
compred to other videoconferencing solutions for V171026EN , unique solution on the video conferencing field Adobe Connect Web RTC Vydio for High security level, privcy Zero impct on network security policies
More informationEnginner To Engineer Note
Technicl Notes on using Anlog Devices DSP components nd development tools from the DSP Division Phone: (800) ANALOG-D, FAX: (781) 461-3010, EMAIL: dsp_pplictions@nlog.com, FTP: ftp.nlog.com Using n ADSP-2181
More informationCPSC 213. Polymorphism. Introduction to Computer Systems. Readings for Next Two Lectures. Back to Procedure Calls
Redings for Next Two Lectures Text CPSC 213 Switch Sttements, Understnding Pointers - 2nd ed: 3.6.7, 3.10-1st ed: 3.6.6, 3.11 Introduction to Computer Systems Unit 1f Dynmic Control Flow Polymorphism nd
More informationOMG, Real Time Embedded Distributed Object Systems Workshop. Arlington, USA, July 15-18, 2002
OMG, Rel Time Embedded Distributed Object Systems Workshop. Arlington, USA, July 15-18, 2002 The DSSV Methodology: High Level Vlidtion of CORBA Architecture using Discrete Event Simultion Approch. Emmnuelle
More informationVoIP for the Small Business
VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become
More informationVoIP for the Small Business
Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the
More information