NET-COMPUTER: Internet Computer Architecture Based on Intelligent Agents

Size: px
Start display at page:

Download "NET-COMPUTER: Internet Computer Architecture Based on Intelligent Agents"

Transcription

1 NET-COMPUTER: Internet Computer Architecture Based on Intelligent s Odhiambo Marcel O Department of Electrical and Mining Engineering, University of South Africa (UNISA), P.O. Box 392, UNISA , South Africa. Abstract - Research in Intelligent s has been ongoing for sometimes now yielding interesting results, some of which have been translated into commercial ventures. Intelligent s are executable software components that represent the user, performs tasks on behalf of the user and when the task terminate, the s send the result to the user. s are best suited for the Internet: a collection of computers connected together in a world-wide computer network. A number of systems have been implemented, the simulation test results do show the feasibility of Intelligent s and systems. s technology gives rise to a new computer architecture: the NET-COMPUTER based on HYDRA computer architecture in which the computing power resides in the Internet. In the NETCOMPUTER, the Internet computers form the hardware and software resources, and the user is provided with a simple input/output interface through which he/she can access the Internet to run user tasks. The simulation test result do show the feasibility of the NET-COMPUTER based on HYDRA computer architecture and Intelligent s. Keywords: Intelligent s, Internet, HYDRA computer architecture, NET-COMPUTER 1. Introduction s technology developed from related works on distributed Artificial Intelligence (AI), where the researchers aimed at spreading intelligence behavior through distributed computer systems to tackle inherently distributed problems. They developed intelligent software programs (or s), where the most advanced can communicate, collaborate and even learn from each other as they use their knowledge for problem solving. The Internet has made it possible for computers at both ends of the world connected to one worldwide network: the Internet to talk to each other. From the comfort of their office or home, the user can log onto the Internet, and browse through documents on a remote machine several thousands of miles away. Combining information superhighway with the Internet opens the door for all sorts of communication and information processing possibilities. Automatic banking or Automatic Teller Machines (ATM), Imaging, Remote Teaching and Telemarketing are among the many services that can be provided [1]. A growing segment of the Internet is Electronic Commerce. Consumers are looking for suppliers selling products and services on the Internet. Meanwhile, the suppliers are looking for buyers to increase their market share. The vast amount of information on the Internet causes a great deal of problems for both the consumer and the seller. Searching the vast information on the Internet, a task executed online is not only time consuming but boring as well. Intelligent s are best suited for this type of task. Intelligent s will surf through the clutter on the Internet, resulting in the selection of specific information of interest to the user. The s speed up the process of locating items on the Internet and leave the users more free time to do more productive or enjoyable tasks. 2. Intelligent s The definitions of an fall everywhere along a continuum, from simple macros in which the user enters a few parameters to truly intelligent s which demonstrate learning abilities and artificial intelligence. An [2],[3] is a software entity with some degree of autonomy, carries out operations on behalf of the user or another program, and thus, represents or has knowledge of the user's goals or wishes. s are the user's personal representative or assistant on the Internet carrying the user's identity, access rights (permissions) and responsibilities. The s acts on behalf of the user at the user's request or using some agreed user protocol. s communicate with their peers by exchanging messages on behalf of the user [4]. While s can be as simple as subroutines, typically they are larger entities with some sort of persistent control (e.g. distinct control threads within a single address space, distinct processes on a single machine or separate processes on different machines). 2.1 s on the Internet (Distributed network) s on behalf of the user freely roam the Internet or information superhighway searching for relevant information or services which are of interest to the user. These s do not take actions on behalf of the user, they provide the user with the information, and the user is free to act otherwise. However, a higher level of

2 sophistication involves service performing s which execute the specific tasks on behalf of the user (e.g. find me the cheapest flight to Paris or arrange a meeting with the managing director someday next week). Finally there are predictive s that volunteer information or services to the user without explicitly being asked [3]. For example, the may monitor news groups on the Internet and return discussions that it believes to be of interest to the user. s execution on the Internet raises a host of issues which needs to be addressed if s processing is to be accepted by the computing community. For example, how ambitious should the representing a user be? And, how much should the user trust the especially when one considers that the s are delegated important decisions such as making financial commitments on behalf of their user. How about the security of such a transaction? In traversing the network searching for information, the s will need to have access permission at every site they visit in addition to the site authenticating the identity of the user that the purports to represent [4]. This is to prevent s masquerading as some other user's representative. The need to guard against wayward programs that install viruses, compromise host, or pilfer the database. The resources used by the at each site needs to be charged to the user. These and a host of many others are the issues which must be addressed. Finally, this model gives cleaner and simpler failure semantics. In a regular distributed system, the state between the client and the server is normally distributed. A failure half-way makes it tricky to ensure that both parties roll back their state to maintain consistency. Alternative architecture model such as server-server models shown in Figure 2 are also in existence. In the server model, the server co-ordinate activities of all local s arriving from other hosts. A number of -based systems have been in implemented, tested and the simulation results obtained point to the feasibility of s processing. The systems are implemented either as interpreted program code WAVE [7], [8], TACOMA [9], Telescript [10], [11], [12] and Tcl [13] or compiled program code [14], [15]. In the interpreted program code version, the execution engine runs on each host, receiving, interpreting user program (string) and executing the user command. In the compiled program code version, the compiled program code (compiled code) is loaded on to each host. The user commands (compiled program code) is loaded and executed by the execution engine. 2.2 s Motivation Four main motivations exist for the paradigm. The first, performance improvement is an important motivation. In Figure l (a), we have the common situation where a client and server are located on two different nodes. The sever will typically manage some data. To carry out computation, several messages will often have to be transferred back and forth between the two parties. There are performance advantages in moving the client to the server side of this connection. The amount of network interactions can be reduced as a result of co-locating service requesters and service providers heavily engaged in communication. This scenario is illustrated in Figure 1 (b). A second motivation for the model is that it is intuitive. s acting more or less independently on behalf of somebody are a well known concept. Figure l (c), represents a similar situation as in Figure l (b), but now the client itself does not move. It sends a representative to the server side to do the actual computation. The will typically reduce the amount of data that has to be transferred over the network. In this example, the result is finally sent back the client. A third motivation for the paradigm is that communication is reduced to a site local issue. All that is needed is to move, or co-locate, s that wish to communicate. Locality of s is not hidden, but communication channel are. 3. HYDRA Computer Architecture HYDRA: Parallel and Distributed Swarm computer architecture for execution [15] is based on the Swarm computer architecture [14]. The HYDRA computer depicted in Figure 3, consists of four modules: An Access Point (AP) through which the user can access the HYDRA computer to issue tasks and collects the results after task termination, Routing Module (RM) responsible for routing s to local destinations (PM), Processing Module (PM) is the execution engine and also the destination of an executing, and Network Router (NR) that connects hosts in the network, routes s between the hosts and ensures message delivery to correct destinations. s navigate a network of hosts using hosts addresses (PM and node), executing a task,

3 and when the task terminates, the s collects the result and send to the user. The HYDRA computer is a software implementation coded in the C programming language running in the UNIX/Linux environment using the TCP/IP transport protocol. PM2 host2.. PM n host n. The NR then starts the RM running at each host, creates a connection point for Access Point (user interface) at each host and then, enters a continuous loop monitoring network hosts, RM and AP connections for user connection. The HYDRA computing environment consists of several hosts connected together by an interconnection scheme to provide a distributed computer system in which s execution can be investigated. Traffic Monitor Server Server Traffic Monitor Dock Master Dock Master Navigation Navigation Figure 2: Server Server model Communication Router (CR) Access Point (AP) Network Router (NR) Network Router (NR) Access Point (AP) Routing Module (RM) Routing Module (RM) Transport Protocol Processing Module (PM 1) Processing Module (PM n) The Communication Router (CR) in the HYDRA computer connects hosts in the network and reliably delivers messages to the hosts. During the start up, the CR connects the hosts, starts the routing module at each host, establishes a listening end-point at each host and monitors message arrival at the end-points. The CR identifies both local and remote destinations to reliably deliver messages to these destinations. The CR uses an interconnection scheme [15] to connect hosts in the network, assign host numbers to host names and establish communication channels among the hosts. The hosts in the network are grouped into domains, and the domains interconnected together to form a distributed network. Hosts in a domain are directly connected to every other host in that domain and within each domain, a single host acts as gateway handling out-of domain s i.e. s crossing domain boundaries. After the hosts in the domain have been connected, the CR at each hosts opens the network file containing names of all hosts in the network, reads the hostnames and maps hostnames to PM i.e. PM1 host1, Figure 3: The HYDRA Computer Architecture 4. The NET-COMPUTER Computer System The NET-COMPUTER implementation is based on HYRDRA computer architecture developed specifically for executing Intelligent s. The motivation for developing the NET-COMPUTER is to shift the computing resources to the Internet and provide users with a simple input/output device through which users can access the Internet computing resources. Current estimates indicate that: Nearly 90% of the users run document processing applications. In an 8-hour office working day, effective computer usage is about 40% (the time when the computer is actively in use). In the home environment, this is less than 20%. The ordinary user uses less than 10% of the computing

4 resources e.g. processor speed etc (except for scientific applications and data processing applications e.g. payroll processing). From the above statistics, one can rightly argue that there is no point in providing the user with a powerful machine which spends most of its time idle and thus, forms part of office/home decoration. Thus, why not concentrate the computing resources on the Internet and provide the user with a simple input/output terminal through which to access the computing resources. The user input/output terminal can be as simple as a pager, ipad, tablet, personal organizer, etc. Network access node Internet Servers HYDRA computer architecture User interface execution, a node file containing node distribution (node reference number and links to other nodes in the network) is prepared for each PM. At each node, is stored a unique number which is accessed by s visiting the node. The aim here is demonstrate the ability of the s to access a stored data item. The unique number is stored in the persistent workspace 3 (PW3) which is accessible and can be modified by s belonging to the same task. The unique number stored at each visited destination is retrieved by the s and used in a simple addition routine. The node file is then uploaded to the respective PMs. Internet computing resources (a) (b) host 2: ainur Figure 3: Configuration of the NET-COMPUTER host 1: yavanna The NET-COMPUTER is a collection of Internet computers (servers) running user programs on demand. Both the hardware and software resources reside on the Internet. The user need not be aware of the exact location of the resources. The HYDRA computer architecture attached to the Internet servers shown in Figure 3 (a) receives and executes the s. The Internet servers are connected together to form the Internet computing resources shown in Figure 3 (b). The Internet or cloud provides the computing resources. The user interface to the NET-COMPUTER is a simple device with less complexity in hardware and software since the computing resources reside on the Internet. 5. Simulation Test The NET-COMPUTER was simulated in a network of three hosts: ainur, kira and yavanna connected as shown in Figure 4. The hosts: are connected to networks A, B and C shown in Figure 5 and, run UNIX operating system. The objective of the simulation test to test the following s characteristics: 1. Mobility: the ability of s to navigate the network and reach destination address (host). 2. Demonstrate the ability of the s to carry out useful work. 3. Test the ability of the gateway hosts to route s to host in the other domains. In addition, the user is at liberty to configure and select the hosts on which to run HYDRA computer system as explained in section 3.0. This is done through selection of hosts in each domain. At the beginning of Access Point Figure 4: Simulation test network In the test routine, the s load a value of Ahex to the s workspace 2 (AW2), the s then navigate the network to node 1 in all PMs. On reaching its destination, the s retrieve the number stored at PW3 and add it five times to the number carried by the s and store the result in PW3 as shown in table 1. The s then navigate the network to node 1 in PM3 where each add contents of its AW2 to the contents of PW3 in PM3 and store the result in AW3. The final result is stored in PW4 in PM3 shown in table 2. The test program is described as follows: host 3: kira AW2, AW3, AW4 - variables in the workspace. PW3, PW4 - persistent workspace (nodal variables) 01 Assign a value to AW2. 02 Insert destinations PM (PM1-3) address in the destination list (DL). 03 Insert destination node address (node 1) in the destination list (DL). 04 Spawn to destination address in the destination list. 05 Load a value from persistent workspace PW3 to AW3. 06 Add contents of AW3 to contents AW2 and store the result. 07 Add one (1) to contents of AW4. 08 Test if contents of AW4 equal If contents of AW4 are less than 5, go back to 06.

5 Figure 5: The NET-COMPUTER execution network 10 Store the contents of AW2 in persistent workspace PW3. 11 Store the value 0 in persistent workspace PW4. 12 Insert destination PM (PM3) address in the destination list. 13 Insert destination node (node 1) address in the destination list. 14 Spawn to the address in the destination list. 15 Load a value from persistent workspace PW3 to AW3. 16 Add contents of AW3 to contents AW2 and store the result in AW3. 17 Load a value from persistent workspace PW4 to AW4. 18 Add contents of AW3 to contents AW4 and store the result in AW3. 19 Store the contents of AW3 to persistent workspace PW4 20 Terminate. 6. Simulation Test Results During the simulation test, s traversed the network using destination addresses carrying a data item. At each visited PM, the s retrieved data item stored at the site and added the data to the data item carried by the, executing the addition loop five times and stored the final result at the visited site. At the end of the addition, the retrieved final result stored and stored it in s workspace. The then, traversed the network to PM3. At the destination PM3, the retrieved the stored data, added it to the data carried in the s workspace and stored the result at PM3. The results are presented below in tables 1 and Conclusion The simulation tests were carried out to test s ability to traverse the network using destination (PM) addresses, access a data item stored at a site, manipulate the data item and store the final result at the site or communicate the data item (result) to a different location. In the NET-COMPUTER, the computing resources are distributed over a wide geographical area. Thus, s navigate the network to reach their execution environment and the user at the end of the task execution to deliver the results. The hosts used in the simulation test are connected to physically separate networks. We can therefore conclude that the s traversed the network to reach their destinations. Thus, confirming s navigation ability in the HYDRA computer architecture. The simple addition exercise demonstrated that s can be used to carry out some useful work such as manipulating user program. The ability of the s to access stored information (data), manipulate the data and carry the data to different locations within the network, demonstrates the s ability to collect/access, modify data and communicate the same. The simulation test results have demonstrated the feasibility of the NET- COMPUTER based on HYDRA computer architecture and Intelligent s. However, more research work is needed to adapt the HYDRA architecture for deployment on the Internet. Table 1: s add contents of AW2 to the contents of PW3 PM PM1 PM2 PM3 Number Value in Loop count PW3 Value in A A A AW2 Sub total C D E 1 Sub total E Sub total Sub total A A AA 4 Sub total C C CE 5 Total in PW C C CE Moreover, the delays experienced when sending s and during execution of user program and, the fact that the participating hosts run other programs in addition to HYDRA computer architecture has not been taken into account. These are matters and others will be the subject of further investigation in the next phase of the research. Table 2: s add contents of AW2 to the contents of PW3 and store the results in PW4 in PM3 Loop PM1 PM2 PM3 Sub Total in count Total PM C 4 (AW2) CE (PW3) C 9 (AW2) CE (PW CE (PW3) CE (AW2) 2 (AW3) 7 (AW3 C(AW3) 2 (PW4) (PW4) C 5 (PW4) The NET-COMPUTER aims to provide the user with the ability to log to the system, issue tasks to be executed,

6 log off and at a later time log to the system to collect the task results. Thus, providing an execution environment similar to the mail server described in section 4.0. The simulation was run with the user was connected online, the next phase of the research will investigate the feasibility of the user to log to the NET-COMPUTER, issue a task and log off. At a later time, the user can log to the NET-COMPUTER to collect the results of the task execution. The combination of Intelligent s and the NET- COMPUTER might just provide the mechanism for furthering Electronic Commerce on the Internet. However, a lot of work still needs to be done to make s processing on the Internet feasible. Issues such as security, accessibility, fault-tolerance, authentication, charges for consumed resources, etc still need to be adequately addressed. 8. References white paper. General Magic Inc Latham Street, Mountain View, California [12] White James E. Telescript Technology: Mobile s. General Magic white paper. General Magic Inc Latham Street, Mountain View, California [13] Gray Robert S. Tel: A Transportable Systems. Department of Computer Science, Dartmouth College, Hanover, New Hampshire November 17, [14] Luciano De Errico. Based Distributed Parallel Processing. A Dissertation for the degree of Doctorate of Philosophy, Department of Electrical and Electronic Engineering, University of Surrey. January 17, [15] Marcel O Odhiambo. HYDRA: Parallel and Distributed Swarm Computer Architecture. ROVPIA 99 International Conference on Robotics, Vision and Parallel Processing for Automation July 16 th 18 th, Ipoh, Malaysia. [1] Indermaur Kurt. Baby Steps. BYTE, March 1995, pp [2] Russell Stuart J, Norvig Peter (2003). Artificial Intelligence: A Modern Approach ( (2 nd ed.), Upper Saddle River, New Jersey: Prentice Hall, ISBN , ( chpt. 2 [3] Intelligent s. MIT Encyclopedia ( [4] Genesereth Michael R, Ketchpe Steve P. Software s. Comms. of the ACM, July 1994, Vol. 37, No.7, pp [5] Jennings Nick, Wooldridge Michael. Soft-ware s. IEE Review, January 1996, pp [6] Wayner Peter. Free s. BYTE, March 1995, pp [7] Sapaty PS, Borst PM. An Overview of WAVE Language and Systems for Distributed Processing in Open Networks. University of Surrey, Department of Electronic and Electrical Engineering, Technical report, June [8] Sapaty PS, Borst PM.. The WAVE Model and Architecture for Network Processing in Open Networks. University of Surrey, Department of Electronic and Electrical Engineering, Technical report, Undated. [9] Johansen Dag Joha SE, Robert Renesse, Scheneider Fred B. An Introduction to the TACOMA Distributed System Version 1.0. Technical report: University of Tromso (Norway) and Cornell University (USA), June 24, [10] White James E. Telescript Technology: The Foundation for the Electronic Marketplace. General Magic white paper. General Magic Inc Latham Street, Mountain View, California [11] White James E. Telescript Technology: Scene from the Electronic Marketplace. General Magic

Bridges To Computing

Bridges To Computing Bridges To Computing General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use this presentation to promote

More information

Mobile Agent Paradigm in Computer Networks

Mobile Agent Paradigm in Computer Networks Mobile Agent Paradigm in Computer Networks Nguyen Hong Van DSV, Stockholm University, Forum 100, SE-164 40 Kista, Sweden Email: si-hvan@dsv.su.se ABSTRACT : Mobile agent technology has recently emerged

More information

COMP310 MultiAgent Systems. Chapter 10 - Applications

COMP310 MultiAgent Systems. Chapter 10 - Applications COMP310 MultiAgent Systems Chapter 10 - Applications Application Areas Agents are indicated for domains where autonomous action is required. Multiagent systems are indicated for domains where: control,

More information

Client (meet lib) tac_firewall ch_firewall ag_vm. (3) Create ch_firewall. (5) Receive and examine (6) Locate agent (7) Create pipes (8) Activate agent

Client (meet lib) tac_firewall ch_firewall ag_vm. (3) Create ch_firewall. (5) Receive and examine (6) Locate agent (7) Create pipes (8) Activate agent Performance Issues in TACOMA Dag Johansen 1 Nils P. Sudmann 1 Robbert van Renesse 2 1 Department of Computer Science, University oftroms, NORWAY??? 2 Department of Computer Science, Cornell University,

More information

Internet Pricing. Abstract. 1 Introduction. 2 Interconnection. Md. Rafiqul Hasan Chowdhury Helsinki University of Technology

Internet Pricing. Abstract. 1 Introduction. 2 Interconnection. Md. Rafiqul Hasan Chowdhury Helsinki University of Technology Internet Pricing Md. Rafiqul Hasan Chowdhury Helsinki University of Technology rafiqul.chowdhury@hut.fi Abstract Internet pricing can be seen from two points of view - between service providers and end-users

More information

Client-server Basics. 1. Motivation

Client-server Basics. 1. Motivation Page 1 of 8 Client-server Basics Oxford Brookes University 2004 Contents 1. Motivation 2. Basic Model of the Web 3. Extensions - Caching and Proxies 4. High Performance Web Servers 5. Web Services Appendices

More information

Computer Principles and Components 1

Computer Principles and Components 1 Computer Principles and Components 1 Course Map This module provides an overview of the hardware and software environment being used throughout the course. Introduction Computer Principles and Components

More information

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1

AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 AQU Information Systems Fundamentals Spring 2012 Pg. 9.1 c h a p t e r 9 THE INTERNET & THE NEW INFORMATION TECHNOLOGY INFRASTRUCTURE 9.1 LEARNING OBJECTIVES Describe features of infrastructure & connectivity

More information

ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX

ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX ROUTE OPTIMIZATION EXTENSION FOR THE MOBILE INTERNET PROTOCOL IN LINUX M. L. Jiang and Y. C. Tay ABSTRACT The base Mobile Internet Protocol (Mobile IP)[1] provides a means for portable computers to roam

More information

Optimal Path Planning with A* Search Algorithm

Optimal Path Planning with A* Search Algorithm Optimal Path Planning with A* Search Algorithm M. Michael Nourai Department of Computer Science University of Massachusetts Lowell mnourai@cs.uml.edu ABSTRACT In this paper I describe my findings and implementation

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

Securely Access Services Over AWS PrivateLink. January 2019

Securely Access Services Over AWS PrivateLink. January 2019 Securely Access Services Over AWS PrivateLink January 2019 Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date

More information

Chapter 6 Architectural Design. Chapter 6 Architectural design

Chapter 6 Architectural Design. Chapter 6 Architectural design Chapter 6 Architectural Design 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process for identifying

More information

Providing File Services using a Distributed Hash Table

Providing File Services using a Distributed Hash Table Providing File Services using a Distributed Hash Table Lars Seipel, Alois Schuette University of Applied Sciences Darmstadt, Department of Computer Science, Schoefferstr. 8a, 64295 Darmstadt, Germany lars.seipel@stud.h-da.de

More information

Artificial Intelligence: Analysis of various Agent Programming Languages

Artificial Intelligence: Analysis of various Agent Programming Languages Artificial Intelligence: Analysis of various Agent Programming Languages Ashish Bishnoi 1, Rupal Gupta 2 1,2 Department of Computer Applications, CCSIT, TMU, Moradabad 1 ashishbishnoi04@gmail.com 2 rupalgupta07@gmail.com

More information

TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine

TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine Tapio Sokura, Taneli Korhonen, Mikael M. Nordman, and Matti Lehtonen Power Systems and High Voltage Engineering Laboratory P.O.Box 3000

More information

Creative Digital Spaces Technology Encourages Inspired Human Communication

Creative Digital Spaces Technology Encourages Inspired Human Communication Creative Digital Spaces Technology Encourages Inspired Human Communication Keiju Okabayashi Masashi Uyama Junichi Yura Riichiro Take The new technology Creative Digital Spaces Technology is based on the

More information

JXTA for J2ME Extending the Reach of Wireless With JXTA Technology

JXTA for J2ME Extending the Reach of Wireless With JXTA Technology JXTA for J2ME Extending the Reach of Wireless With JXTA Technology Akhil Arora Carl Haywood Kuldip Singh Pabla Sun Microsystems, Inc. 901 San Antonio Road Palo Alto, CA 94303 USA 650 960-1300 The Wireless

More information

Towards a Reference Architecture for Open Hypermedia

Towards a Reference Architecture for Open Hypermedia Towards a Reference Architecture for Open Hypermedia 1. Introduction Kaj Grønbæk Computer Science Department Aarhus University kgronbak@daimi.aau.dk Uffe Kock Wiil The Danish National Centre for IT Research

More information

Chapter 5 INTRODUCTION TO MOBILE AGENT

Chapter 5 INTRODUCTION TO MOBILE AGENT Chapter 5 INTRODUCTION TO MOBILE AGENT 135 Chapter 5 Introductions to Mobile Agent 5.1 Mobile agents What is an agent? In fact a software program is containing an intelligence to help users and take action

More information

How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners

How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners How Cisco IT Improves Commerce User Experience by Securely Sharing Internal Business Services with Partners Offloading XML processing to the ACE XML Gateway improves service performance and simplifies

More information

CHAPTER 10 KNOWLEDGE TRANSFER IN THE E-WORLD

CHAPTER 10 KNOWLEDGE TRANSFER IN THE E-WORLD TEST YOUR UNDERSTANDING 1. What is the e-commerce? How does it relate to knowledge management, knowledge transfer, knowledge sharing? E-commerce is the ability to conduct business via electronic networks

More information

Featured Archive. Saturday, February 28, :50:18 PM RSS. Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact

Featured Archive. Saturday, February 28, :50:18 PM RSS. Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact Saturday, February 28, 2009 03:50:18 PM To search, type and hit ente SEARCH RSS Home Interviews Reports Essays Upcoming Transcripts About Black and White Contact SUBSCRIBE TO OUR MAILING LIST First Name:

More information

BPP: A Protocol for Exchanging Pricing Information between Autonomous Systems

BPP: A Protocol for Exchanging Pricing Information between Autonomous Systems BPP: A Protocol for Exchanging Pricing Information between Autonomous Systems Vincent Oberle, Hartmut Ritter, Klaus Wehrle University of Karlsruhe Institute of Telematics Zirkel 2, D 76128 Karlsruhe, Germany

More information

NGN: Carriers and Vendors Must Take Security Seriously

NGN: Carriers and Vendors Must Take Security Seriously Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place

More information

An Architecture For Computational Grids Based On Proxy Servers

An Architecture For Computational Grids Based On Proxy Servers An Architecture For Computational Grids Based On Proxy Servers P. V. C. Costa, S. D. Zorzo, H. C. Guardia {paulocosta,zorzo,helio}@dc.ufscar.br UFSCar Federal University of São Carlos, Brazil Abstract

More information

Characterizing your Objects

Characterizing your Objects Characterizing your Objects Reprinted from the Feb 1992 issue of The Smalltalk Report Vol. 2, No. 5 By: Rebecca J. Wirfs-Brock In this column I ll describe some vocabulary I find useful to characterize

More information

Agent-Enabling Transformation of E-Commerce Portals with Web Services

Agent-Enabling Transformation of E-Commerce Portals with Web Services Agent-Enabling Transformation of E-Commerce Portals with Web Services Dr. David B. Ulmer CTO Sotheby s New York, NY 10021, USA Dr. Lixin Tao Professor Pace University Pleasantville, NY 10570, USA Abstract:

More information

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud

W H I T E P A P E R : O P E N. V P N C L O U D. Implementing A Secure OpenVPN Cloud W H I T E P A P E R : O P E N. V P N C L O U D Implementing A Secure OpenVPN Cloud Platform White Paper: OpenVPN Cloud Platform Implementing OpenVPN Cloud Platform Content Introduction... 3 The Problems...

More information

Creating and Running Mobile Agents with XJ DOME

Creating and Running Mobile Agents with XJ DOME Creating and Running Mobile Agents with XJ DOME Kirill Bolshakov, Andrei Borshchev, Alex Filippoff, Yuri Karpov, and Victor Roudakov Distributed Computing & Networking Dept. St.Petersburg Technical University

More information

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered

5/9/2014. Recall the design process. Lecture 1. Establishing the overall structureof a software system. Topics covered Topics covered Chapter 6 Architectural Design Architectural design decisions Architectural views Architectural patterns Application architectures Lecture 1 1 2 Software architecture The design process

More information

WebBiblio Subject Gateway System:

WebBiblio Subject Gateway System: WebBiblio Subject Gateway System: An Open Source Solution for Internet Resources Management 1. Introduction Jack Eapen C. 1 With the advent of the Internet, the rate of information explosion increased

More information

An Agent-Oriented Executive Model for Service Choreography

An Agent-Oriented Executive Model for Service Choreography J. Basic. Appl. Sci. Res., 1(10)1739-1744, 2011 2011, TextRoad Publication ISSN 2090-424X Journal of Basic and Applied Scientific Research www.textroad.com An Agent-Oriented Executive Model for Service

More information

CO-OP Mobile: Mobile App for ipads. April 18, 2013

CO-OP Mobile: Mobile App for ipads. April 18, 2013 CO-OP Mobile: Mobile App for ipads April 18, 2013 1 Today s Presenters DIANEZABLIT Product Marketing Manager RANDYTHOMPSON Senior Product Manager 2 Agenda Marketplace Mobile Trends CO-OP Mobile Overview

More information

Introducing Robotics Vision System to a Manufacturing Robotics Course

Introducing Robotics Vision System to a Manufacturing Robotics Course Paper ID #16241 Introducing Robotics Vision System to a Manufacturing Robotics Course Dr. Yuqiu You, Ohio University c American Society for Engineering Education, 2016 Introducing Robotics Vision System

More information

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017

EDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017 This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,

More information

Customize. Building a Customer Portal Using Business Portal. Microsoft Dynamics GP. White Paper

Customize. Building a Customer Portal Using Business Portal. Microsoft Dynamics GP. White Paper Customize Microsoft Dynamics GP Building a Customer Portal Using Business Portal White Paper Helps you implement a customer portal and create web pages and web parts specifically designed for your customers.

More information

Introduction to the Active Everywhere Database

Introduction to the Active Everywhere Database Introduction to the Active Everywhere Database INTRODUCTION For almost half a century, the relational database management system (RDBMS) has been the dominant model for database management. This more than

More information

THE FUTURE OF PERSONALIZATION IS VISUAL WHITE PAPER

THE FUTURE OF PERSONALIZATION IS VISUAL WHITE PAPER WHITE PAPER The Future of Personalization is Visual 1 It s hard to believe that ecommerce has been around for more than two decades, and juggernaut sites like Amazon and ebay were first launched in the

More information

Internet Client-Server Systems 4020 A

Internet Client-Server Systems 4020 A Internet Client-Server Systems 4020 A Instructor: Jimmy Huang jhuang@yorku.ca http://www.yorku.ca/jhuang/4020a.html Motivation Web-based Knowledge & Data Management A huge amount of Web data how to organize,

More information

PRISM - FHF The Fred Hollows Foundation

PRISM - FHF The Fred Hollows Foundation PRISM - FHF The Fred Hollows Foundation MY WORKSPACE USER MANUAL Version 1.2 TABLE OF CONTENTS INTRODUCTION... 4 OVERVIEW... 4 THE FHF-PRISM LOGIN SCREEN... 6 LOGGING INTO THE FHF-PRISM... 6 RECOVERING

More information

LECTURE 11: Applications

LECTURE 11: Applications LECTURE 11: Applications An Introduction to MultiAgent Systems http://www.csc.liv.ac.uk/~mjw/pubs/imas 11-1 Application Areas Agents are usefully applied in domains where autonomous action is required.

More information

NETWORK THREATS DEMAN

NETWORK THREATS DEMAN SELF-DEFENDING NETWORK NETWORK THREATS DEMAN NEW SECURITY: STRATEGIES TECHNOLOGIES Self-Propagating Threats A combination of: self propagating threats Collaborative applications Interconnected environments

More information

A Mobile Agent-Based Framework for Active Networks. Ichiro Satoh

A Mobile Agent-Based Framework for Active Networks. Ichiro Satoh A Mobile -Based Framework for Active Networks Ichiro Satoh Department of Information Sciences, Ochanomizu University 2-1-1 Otsuka Bunkyo-ku Tokyo 112-8610, Japan E-mail: ichiro@is.ocha.ac.jp IEEE Systems,

More information

Sistemi ICT per il Business Networking

Sistemi ICT per il Business Networking Corso di Laurea Specialistica Ingegneria Gestionale Sistemi ICT per il Business Networking B2B Integration Docente: Vito Morreale (vito.morreale@eng.it) 1 B2B Interactions Businesses are constantly searching

More information

Firewalls 1. Firewalls. Alexander Khodenko

Firewalls 1. Firewalls. Alexander Khodenko Firewalls 1 Firewalls Alexander Khodenko May 01, 2003 Firewalls 2 Firewalls Firewall is defined as a linkage in a network, which relays only those data packets that are clearly intended for and authorized

More information

An Appropriate Search Algorithm for Finding Grid Resources

An Appropriate Search Algorithm for Finding Grid Resources An Appropriate Search Algorithm for Finding Grid Resources Olusegun O. A. 1, Babatunde A. N. 2, Omotehinwa T. O. 3,Aremu D. R. 4, Balogun B. F. 5 1,4 Department of Computer Science University of Ilorin,

More information

Authoring and Maintaining of Educational Applications on the Web

Authoring and Maintaining of Educational Applications on the Web Authoring and Maintaining of Educational Applications on the Web Denis Helic Institute for Information Processing and Computer Supported New Media ( IICM ), Graz University of Technology Graz, Austria

More information

THE NEW COLLABORATIVE WORKFORCE. Enterprise Communications, Advanced.

THE NEW COLLABORATIVE WORKFORCE. Enterprise Communications, Advanced. THE NEW COLLABORATIVE WORKFORCE Enterprise Communications, Advanced. Table of contents 3 Teamwork and collaboration without boundaries 8 Collaboration tools for the digital age 4 Communications that go

More information

ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX

ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ROUTE OPTIMIZATION EXTENSITON FOR THE MOBILE INTERNET PROTOCOL IN LINUX ABSTRACT The base Mobile Internet Protocol (Mobile IP) provides a means for portable computers to roam freely, changing its point

More information

MCAP: Multiple Client Access Protocol Ravindra Singh Rathore SML College Jhunjhunu, Rajasthan India

MCAP: Multiple Client Access Protocol Ravindra Singh Rathore SML College Jhunjhunu, Rajasthan India MCAP: Multiple Client Access Protocol Ravindra Singh Rathore SML College Jhunjhunu, Rajasthan India (ravindrathore@gmail.com) Abstract - We have implicitly assumed that the client-side software of a web-based

More information

(Refer Slide Time: 1:26)

(Refer Slide Time: 1:26) Information Security-3 Prof. V Kamakoti Department of Computer science and Engineering Indian Institute of Technology Madras Basics of Unix and Network Administration Operating Systems Introduction Mod01,

More information

INTELLIGENT SYSTEMS OVER THE INTERNET

INTELLIGENT SYSTEMS OVER THE INTERNET INTELLIGENT SYSTEMS OVER THE INTERNET Web-Based Intelligent Systems Intelligent systems use a Web-based architecture and friendly user interface Web-based intelligent systems: Use the Web as a platform

More information

Topics on Web Services COMP6017

Topics on Web Services COMP6017 Topics on Web Services COMP6017 Dr Nicholas Gibbins nmg@ecs.soton.ac.uk 2013-2014 Module Aims Introduce you to service oriented architectures Introduce you to both traditional and RESTful Web Services

More information

Lecture 1. Chapter 6 Architectural design

Lecture 1. Chapter 6 Architectural design Chapter 6 Architectural Design Lecture 1 1 Topics covered Architectural design decisions Architectural views Architectural patterns Application architectures 2 Software architecture The design process

More information

PROFESSIONAL DEVELOPMENT COURSES. May - December Institute for Professional Excellence

PROFESSIONAL DEVELOPMENT COURSES. May - December Institute for Professional Excellence PROFESSIONAL DEVELOPMENT COURSES May - December 2018 Institute for Professional Excellence INSTITUTE FOR PROFESSIONAL EXCELLENCE (IPEx) Training to Advance Your Career Davenport University s IPEx offers

More information

SALVO-a fourth-generation language for personal computers

SALVO-a fourth-generation language for personal computers SALVO-a fourth-generation language for personal computers by MARVIN ELDER Software Automation, Inc. Dallas, Texas ABSTRACT Personal computer users are generally nontechnical people. Fourth-generation products

More information

Cascade Vulnerability Problem Simulator Tool

Cascade Vulnerability Problem Simulator Tool Cascade Vulnerability Problem Simulator Tool Christian Servin and Martine Ceberio Department of Computer Science University of Texas at El Paso El Paso, TX 79968-0518, USA christians@miners.utep.edu Abstract

More information

Installation Guide Advanced Authentication - Logon Filter. Version 6.1

Installation Guide Advanced Authentication - Logon Filter. Version 6.1 Installation Guide Advanced Authentication - Logon Filter Version 6.1 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government

More information

Intercloud Security. William Strickland COP 6938 Fall 2012 University of Central Florida 10/08/2012

Intercloud Security. William Strickland COP 6938 Fall 2012 University of Central Florida 10/08/2012 Intercloud Security William Strickland COP 6938 Fall 2012 University of Central Florida 10/08/2012 Overview Problem and motivation Intercloud concept Security issues in Intercloud Intercloud trust model

More information

Operating system. Hardware

Operating system. Hardware Chapter 1.2 System Software 1.2.(a) Operating Systems An operating system is a set of programs designed to run in the background on a computer system, giving an environment in which application software

More information

A web application serving queries on renewable energy sources and energy management topics database, built on JSP technology

A web application serving queries on renewable energy sources and energy management topics database, built on JSP technology International Workshop on Energy Performance and Environmental 1 A web application serving queries on renewable energy sources and energy management topics database, built on JSP technology P.N. Christias

More information

ITCAM for Transactions: updating Web Response Time agent configuration to address Transaction Tracking overload

ITCAM for Transactions: updating Web Response Time agent configuration to address Transaction Tracking overload ITCAM for Transactions: updating Web Response Time agent configuration to address Transaction Tracking overload Preface This document records the technical challenges encountered during a particular Agentless

More information

BT One Cloud Cisco UK Schedule to the General Terms

BT One Cloud Cisco UK Schedule to the General Terms BT One Cloud Cisco UK Schedule to the General Terms Contents A note on you... 2 1 Service Summary... 2 2 Standard Service Components... 2 3 Service Options... 2 4 Service Management Boundary... 3 5 Associated

More information

A Framework for Optimizing IP over Ethernet Naming System

A Framework for Optimizing IP over Ethernet Naming System www.ijcsi.org 72 A Framework for Optimizing IP over Ethernet Naming System Waleed Kh. Alzubaidi 1, Dr. Longzheng Cai 2 and Shaymaa A. Alyawer 3 1 Information Technology Department University of Tun Abdul

More information

THE IMPACT OF E-COMMERCE ON DEVELOPING A COURSE IN OPERATING SYSTEMS: AN INTERPRETIVE STUDY

THE IMPACT OF E-COMMERCE ON DEVELOPING A COURSE IN OPERATING SYSTEMS: AN INTERPRETIVE STUDY THE IMPACT OF E-COMMERCE ON DEVELOPING A COURSE IN OPERATING SYSTEMS: AN INTERPRETIVE STUDY Reggie Davidrajuh, Stavanger University College, Norway, reggie.davidrajuh@tn.his.no ABSTRACT This paper presents

More information

Minsoo Ryu. College of Information and Communications Hanyang University.

Minsoo Ryu. College of Information and Communications Hanyang University. Software Reuse and Component-Based Software Engineering Minsoo Ryu College of Information and Communications Hanyang University msryu@hanyang.ac.kr Software Reuse Contents Components CBSE (Component-Based

More information

CS 354R: Computer Game Technology

CS 354R: Computer Game Technology CS 354R: Computer Game Technology AI Fuzzy Logic and Neural Nets Fall 2018 Fuzzy Logic Philosophical approach Decisions based on degree of truth Is not a method for reasoning under uncertainty that s probability

More information

Issues in Testing Electronic Commerce Systems

Issues in Testing Electronic Commerce Systems Issues in Testing Electronic Commerce Systems Kassem Saleh 1 and Robert Probert University of Ottawa, School of Information Technology and Engineering (SITE) P.O.Box 450, Stn A, Ottawa, Ontario, Canada

More information

1 Mobile Agents. 2 What is a Mobile Agent? 2.1 Mobile agent = code + state

1 Mobile Agents. 2 What is a Mobile Agent? 2.1 Mobile agent = code + state 1 Mobile Agents And now for something completely different. To date, we have concentrated on programming the network with what can be termed traditional techniques. Specifically, the use of the client/server

More information

7/22/2008. Transformations

7/22/2008. Transformations Bandwidth Consumed by s Global Websites Bandwidth Consumed by What is? 7 Countries More than 76 million active customer accounts Approximately 1.3 million active seller accounts Hundreds of thousand of

More information

Vanessa Gentry 12/4/2015 Ben Byrnes Improving Internet Quality at Longwood

Vanessa Gentry 12/4/2015 Ben Byrnes Improving Internet Quality at Longwood Michael Lee White Paper Vanessa Gentry 12/4/2015 Ben Byrnes Improving Internet Quality at Longwood Abstract In the modern information age, the importance of having a proper internet connection has increased

More information

ISI December NBMA Address Resolution Protocol (NARP) Status of this Memo

ISI December NBMA Address Resolution Protocol (NARP) Status of this Memo Network Working Group Request for Comments: 1735 Category: Experimental J. Heinanen Telecom Finland R. Govindan ISI December 1994 Status of this Memo NBMA Address Resolution Protocol (NARP) This memo defines

More information

Fairness in bandwidth allocation for ABR congestion avoidance algorithms

Fairness in bandwidth allocation for ABR congestion avoidance algorithms Fairness in bandwidth allocation for ABR congestion avoidance algorithms Bradley Williams, Neco Ventura Dept of Electrical Engineering, University of Cape Town, Private Bag, Rondebosch, South Africa {bwillia,

More information

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System

Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Distributed Scheduling for the Sombrero Single Address Space Distributed Operating System Donald S. Miller Department of Computer Science and Engineering Arizona State University Tempe, AZ, USA Alan C.

More information

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4 Color Spectrum: Next Paradigm for Decentralized Apps Table of Contents Table of Contents 1 Introduction 1 Color Spectrum Overview 3 Two-tier Architecture of Color Spectrum 4 Clouds in Color Spectrum 4

More information

Brochure 2018 SIMPLE LOW PRICE RELIABLE

Brochure 2018 SIMPLE LOW PRICE RELIABLE Brochure 2018 SIMPLE LOW PRICE RELIABLE Welcome Choosing a new phone system? Can you imagine a new business phone system that makes crystal clear calls to anyone, anywhere with lots of new business features?

More information

Technologies for E-Commerce Agents and Bots

Technologies for E-Commerce Agents and Bots Technologies for E-Commerce Agents and Bots slide credits: Peter McBurney, Univ of Liverpool E-commerce 2004, Prentice Hall - Michael Huhns, Agents as Web Services, 2002 Introduction Software agents: -also

More information

Communication. Distributed Systems Santa Clara University 2016

Communication. Distributed Systems Santa Clara University 2016 Communication Distributed Systems Santa Clara University 2016 Protocol Stack Each layer has its own protocol Can make changes at one layer without changing layers above or below Use well defined interfaces

More information

Datacenter replication solution with quasardb

Datacenter replication solution with quasardb Datacenter replication solution with quasardb Technical positioning paper April 2017 Release v1.3 www.quasardb.net Contact: sales@quasardb.net Quasardb A datacenter survival guide quasardb INTRODUCTION

More information

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model) Data Communication Introduction of Communication The need to communicate is part of man s inherent being. Since the beginning of time the human race has communicated using different techniques and methods.

More information

Location Traceability of Users in Location-based Services

Location Traceability of Users in Location-based Services Location Traceability of Users in Location-based Services Yutaka Yanagisawa Hidetoshi Kido Tetsuji Satoh, NTT Communication Science Laboratories, NTT Corporation Graduate School of Information Science

More information

Theory of Network Communication

Theory of Network Communication Theory of Network Communication Dr. Christian Scheideler Johns Hopkins University, Sept. 8 2004 1 Introduction The goal of this lecture is to give an introduction to the state of the art in the theory

More information

Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy. Matrix Equinox 3.0 Issue 1.0 December 15, 2016 Proprietary Use pursuant to the terms of your signed agreement or policy. December 2016 Matrix: Equinox 3.0 1 ALL INFORMATION IS BELIEVED TO BE CORRECT AT

More information

Protocol for Tetherless Computing

Protocol for Tetherless Computing Protocol for Tetherless Computing S. Keshav P. Darragh A. Seth S. Fung School of Computer Science University of Waterloo Waterloo, Canada, N2L 3G1 1. Introduction Tetherless computing involves asynchronous

More information

PROFESSIONAL PYTHON BY LUKE SNEERINGER DOWNLOAD EBOOK : PROFESSIONAL PYTHON BY LUKE SNEERINGER PDF

PROFESSIONAL PYTHON BY LUKE SNEERINGER DOWNLOAD EBOOK : PROFESSIONAL PYTHON BY LUKE SNEERINGER PDF Read Online and Download Ebook PROFESSIONAL PYTHON BY LUKE SNEERINGER DOWNLOAD EBOOK : PROFESSIONAL PYTHON BY LUKE SNEERINGER PDF Click link bellow and free register to download ebook: PROFESSIONAL PYTHON

More information

- The Cost of Network Latency -

- The Cost of Network Latency - - The Cost of Network Latency - Network latency in the U.S. has risen steadily with the deployment of more communications networks and increased complexity of internetworking. Just as air travel involves

More information

3 Steps for Managing RF Interference Challenges

3 Steps for Managing RF Interference Challenges WHITE PAPER 3 Steps for Managing RF Interference Challenges TABLE OF CONTENTS» Introduction» STEP ONE: Identify non-wi-fi interferers» STEP TWO: Locate non-wi-fi interferers» STEP THREE: Identify Wi-Fi

More information

BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus

BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus BOSTON UNIVERSITY Metropolitan College MET CS342 Data Structures with Java Dr. V.Shtern (Fall 2011) Course Syllabus 1. Course Objectives Welcome to MET CS342 Data Structures with Java. The intent of this

More information

TN3270 AND TN5250 INTERNET STANDARDS

TN3270 AND TN5250 INTERNET STANDARDS 51-10-55 DATA COMMUNICATIONS MANAGEMENT TN3270 AND TN5250 INTERNET STANDARDS Ed Bailey INSIDE Enterprise Data and Logic; User Productivity and Confidence; Newer Platforms and Devices; How Standardization

More information

Doctoral Studies and Research Proposition. Diversity in Peer-to-Peer Networks. Mikko Pervilä. Helsinki 24 November 2008 UNIVERSITY OF HELSINKI

Doctoral Studies and Research Proposition. Diversity in Peer-to-Peer Networks. Mikko Pervilä. Helsinki 24 November 2008 UNIVERSITY OF HELSINKI Doctoral Studies and Research Proposition Diversity in Peer-to-Peer Networks Mikko Pervilä Helsinki 24 November 2008 UNIVERSITY OF HELSINKI Department of Computer Science Supervisor: prof. Jussi Kangasharju

More information

Week - 01 Lecture - 04 Downloading and installing Python

Week - 01 Lecture - 04 Downloading and installing Python Programming, Data Structures and Algorithms in Python Prof. Madhavan Mukund Department of Computer Science and Engineering Indian Institute of Technology, Madras Week - 01 Lecture - 04 Downloading and

More information

Intelligent Traffic System: Road Networks with Time-Weighted Graphs

Intelligent Traffic System: Road Networks with Time-Weighted Graphs Intelligent Traffic System: Road Networks with Time-Weighted Graphs Hatem F. Halaoui Haigazian University, Lebanon Abstract Driving direction traffic Systems are becoming needed systems among many Geographical

More information

AirBespoke Inventory Tracking System

AirBespoke Inventory Tracking System Colorado School of Mines Field Session AirBespoke Inventory Tracking System Client: Kylen McClintock Written by: Peter Palumbo, Kyle Thistlewood, Nhan Tran, Minh Vu June 22, 2016 Contents 1 Introduction

More information

Subnet Multicast for Delivery of One-to-Many Multicast Applications

Subnet Multicast for Delivery of One-to-Many Multicast Applications Subnet Multicast for Delivery of One-to-Many Multicast Applications We propose a new delivery scheme for one-to-many multicast applications such as webcasting service used for the web-based broadcasting

More information

6.088/6.084 Robotics Project Subject Information and Syllabus

6.088/6.084 Robotics Project Subject Information and Syllabus 6.088/6.084 Robotics Project Subject Information and Syllabus Staff: Prof. Daniela Rus (Course Coordinator), Rm 32-374, rus@csail.mit.edu, x8-7567 Dr. Nikolaus Correll, Rm 32-375, nikolaus@csail.mit.edu,

More information

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010 Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010 Lou Topfl Director, New Technology Product Development Engineering AT&T Agenda What is the Cloud? Types of Cloud

More information

Data Services. Reliable, high-speed data connectivity. Group Ltd

Data Services. Reliable, high-speed data connectivity. Group Ltd Data Services Reliable, high-speed data connectivity Group Ltd Discover businessgrade, high-speed data connectivity Harness cloud services - converge data and voice Our family of high-speed IP connectivity

More information

Client Side Content Screening Framework Architecture

Client Side Content Screening Framework Architecture Client Side Content Screening Framework Architecture Approved Version 1.0 14 Jun 2007 Open Mobile Alliance OMA-AD-Client_Side_CS_FW-V1_0-20070614-A OMA-AD-Client_Side_CS_FW-V1_0-20070614-A Page 2 (14)

More information

Communication in Distributed Systems

Communication in Distributed Systems Communication in Distributed Systems Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università

More information