363 research outputs found

    Sieve Extension: Externally Stored Lists

    Full text link

    A programmable client-server model: Robust extensibility via DSLs

    Get PDF
    International audienceThe client-server model has been successfully used to support a wide variety of families of services in the context of distributed systems. However, its server-centric nature makes it insensitive to fast changing client characteristics like terminal capabilities, network features, user preferences and evolving needs. To overcome this key limitation, we present an approach to enabling a server to adapt to different clients by making it programmable. A service-description language is used to program server adaptations. This language is designed as a domain-specific language to offer expressiveness and conciseness without compromising safety and security. We show that our approach makes servers adaptable without requiring the deployment of new protocols or server implementations. We illustrate our approach with the Internet Message Access Protocol (IMAP). An IMAP server is made programmable and a language, named Pems, is introduced to program robust variations of e-mail services. Our approach is uniformly used to develop a platform for multimedia communication services. This platform is composed of programmable servers for telephony services, e-mail processing, remote-document processing and stream adapters

    Survey and Analysis of Production Distributed Computing Infrastructures

    Full text link
    This report has two objectives. First, we describe a set of the production distributed infrastructures currently available, so that the reader has a basic understanding of them. This includes explaining why each infrastructure was created and made available and how it has succeeded and failed. The set is not complete, but we believe it is representative. Second, we describe the infrastructures in terms of their use, which is a combination of how they were designed to be used and how users have found ways to use them. Applications are often designed and created with specific infrastructures in mind, with both an appreciation of the existing capabilities provided by those infrastructures and an anticipation of their future capabilities. Here, the infrastructures we discuss were often designed and created with specific applications in mind, or at least specific types of applications. The reader should understand how the interplay between the infrastructure providers and the users leads to such usages, which we call usage modalities. These usage modalities are really abstractions that exist between the infrastructures and the applications; they influence the infrastructures by representing the applications, and they influence the ap- plications by representing the infrastructures

    Blockchain's adoption in IoT: The challenges, and a way forward

    Full text link
    © 2018 Elsevier Ltd The underlying technology of Bitcoin is blockchain, which was initially designed for financial value transfer only. Nonetheless, due to its decentralized architecture, fault tolerance and cryptographic security benefits such as pseudonymous identities, data integrity and authentication, researchers and security analysts around the world are focusing on the blockchain to resolve security and privacy issues of IoT. However, presently, not much work has been done to assess blockchain's viability for IoT and the associated challenges. Hence, to arrive at intelligible conclusions, this paper carries out a systematic study of the peculiarities of the IoT environment including its security and performance requirements and progression in blockchain technologies. We have identified the gaps by mapping the security and performance benefits inferred by the blockchain technologies and some of the blockchain-based IoT applications against the IoT requirements. We also discovered some practical issues involved in the integration of IoT devices with the blockchain. In the end, we propose a way forward to resolve some of the significant challenges to the blockchain's adoption in IoT

    Virtualization Components of the Modern Hypervisor

    Get PDF
    Virtualization is the foundation on which cloud services build their business. It supports the infrastructure for the largest companies around the globe and is a key component for scaling software for the ever-growing technology industry. If companies decide to use virtualization as part of their infrastructure it is important for them to quickly and reliably have a way to choose a virtualization technology and tweak the performance of that technology to fit their intended usage. Unfortunately, while many papers exist discussing and testing the performance of various virtualization systems, most of these performance tests do not take into account components that can be configured to improve performance for certain scenarios. This study provides a comparison of how three hypervisors (VMWare vSphere, Citrix XenServer, and KVM) perform under different sets of configurations at this point and which system workloads would be ideal for these configurations. This study also provides a means in which to compare different configurations with each other so that implementers of these technologies have a way in which to make informed decisions on which components should be enabled for their current or future systems

    Methods for the Study of Marine Biodiversity

    Get PDF
    Recognition of the threats to biodiversity and its importance to society has led to calls for globally coordinated sampling of trends in marine ecosystems. As a step to defining such efforts, we review current methods of collecting and managing marine biodiversity data. A fundamental component of marine biodiversity is knowing what, where, and when species are present. However, monitoring methods are invariably biased in what taxa, ecological guilds, and body sizes they collect. In addition, the data need to be placed, and/or mapped, into an environmental context. Thus a suite of methods will be needed to encompass representative components of biodiversity in an ecosystem. Some sampling methods can damage habitat and kill species, including unnecessary bycatch. Less destructive alternatives are preferable, especially in conservation areas, such as photography, hydrophones, tagging, acoustics, artificial substrata, light-traps, hook and line, and live-traps. Here we highlight examples of operational international sampling programmes and data management infrastructures, notably the Continuous Plankton Recorder, Reef Life Survey, and detection of Harmful Algal Blooms and MarineGEO. Data management infrastructures include the World Register of Marine Species for species nomenclature and attributes, the Ocean Biogeographic Information System for distribution data, Marine Regions for maps, and Global Marine Environmental Datasets for global environmental data. Existing national sampling programmes, such as fishery trawl surveys and intertidal surveys, may provide a global perspective if their data can be integrated to provide useful information. Less utilised and emerging sampling methods, such as artificial substrata, light-traps, microfossils and eDNA also hold promise for sampling the less studied components of biodiversity. All of these initiatives need to develop international standards and protocols, and long-term plans for their governance and support.published_or_final_versio
    corecore