26,866 research outputs found
Research issues in real-time database systems
Cataloged from PDF version of article.Today's real-time systems are characterized by managing large volumes of data.
Efficient database management algorithms for accessing and manipulating data are
required to satisfy timing constraints of supported applications. Real-time database
systems involve a new research area investigating possible ways of applying database
systems technology to real-time systems. Management of real-time information through
a database system requires the integration of concepts from both real-time systems and
database systems. Some new criteria need to be developed to involve timing constraints
of real-time applications in many database systems design issues, such as
transaction/query processing, data buffering, CPU, and IO scheduling. In this paper, a
basic understanding of the issues in real-time database systems is provided and the
research efforts in this area are introduced. Different approaches to various problems of
real-time database systems are briefly described, and possible future research directions
are discussed
A quantitative model of the initiation of DNA replication in Saccharomyces cerevisiae predicts the effects of system perturbations.
BackgroundEukaryotic cell proliferation involves DNA replication, a tightly regulated process mediated by a multitude of protein factors. In budding yeast, the initiation of replication is facilitated by the heterohexameric origin recognition complex (ORC). ORC binds to specific origins of replication and then serves as a scaffold for the recruitment of other factors such as Cdt1, Cdc6, the Mcm2-7 complex, Cdc45 and the Dbf4-Cdc7 kinase complex. While many of the mechanisms controlling these associations are well documented, mathematical models are needed to explore the network's dynamic behaviour. We have developed an ordinary differential equation-based model of the protein-protein interaction network describing replication initiation.ResultsThe model was validated against quantified levels of protein factors over a range of cell cycle timepoints. Using chromatin extracts from synchronized Saccharomyces cerevisiae cell cultures, we were able to monitor the in vivo fluctuations of several of the aforementioned proteins, with additional data obtained from the literature. The model behaviour conforms to perturbation trials previously reported in the literature, and accurately predicts the results of our own knockdown experiments. Furthermore, we successfully incorporated our replication initiation model into an established model of the entire yeast cell cycle, thus providing a comprehensive description of these processes.ConclusionsThis study establishes a robust model of the processes driving DNA replication initiation. The model was validated against observed cell concentrations of the driving factors, and characterizes the interactions between factors implicated in eukaryotic DNA replication. Finally, this model can serve as a guide in efforts to generate a comprehensive model of the mammalian cell cycle in order to explore cancer-related phenotypes
Stochastic association of neighboring replicons creates replication factories in budding yeast
Peer reviewedPublisher PD
The role of the host in a cooperating mainframe and workstation environment, volumes 1 and 2
In recent years, advancements made in computer systems have prompted a move from centralized computing based on timesharing a large mainframe computer to distributed computing based on a connected set of engineering workstations. A major factor in this advancement is the increased performance and lower cost of engineering workstations. The shift to distributed computing from centralized computing has led to challenges associated with the residency of application programs within the system. In a combined system of multiple engineering workstations attached to a mainframe host, the question arises as to how does a system designer assign applications between the larger mainframe host and the smaller, yet powerful, workstation. The concepts related to real time data processing are analyzed and systems are displayed which use a host mainframe and a number of engineering workstations interconnected by a local area network. In most cases, distributed systems can be classified as having a single function or multiple functions and as executing programs in real time or nonreal time. In a system of multiple computers, the degree of autonomy of the computers is important; a system with one master control computer generally differs in reliability, performance, and complexity from a system in which all computers share the control. This research is concerned with generating general criteria principles for software residency decisions (host or workstation) for a diverse yet coupled group of users (the clustered workstations) which may need the use of a shared resource (the mainframe) to perform their functions
Modeling genome-wide replication kinetics reveals a mechanism for regulation of replication timing
We developed analytical models of DNA replication that include probabilistic initiation of origins, fork progression, passive replication, and asynchrony.We fit the model to budding yeast genome-wide microarray data probing the replication fraction and found that initiation times correlate with the precision of timing.We extracted intrinsic origin properties, such as potential origin efficiency and firing-time distribution, which cannot be done using phenomenological approaches.We propose that origin timing is controlled by stochastically activated initiators bound to origin sites rather than explicit time-measuring mechanisms
Recommended from our members
Analysis of operating system diversity for intrusion tolerance
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what extent failure diversity is observed in practical deployment depends on how diverse are the components that constitute the system. In this paper, we present a study with operating system's (OS's) vulnerability data from the NIST National Vulnerability Database (NVD). We have analyzed the vulnerabilities of 11 different OSs over a period of 18 years, to check how many of these vulnerabilities occur in more than one OS. We found this number to be low for several combinations of OSs. Hence, although there are a few caveats on the use of NVD data to support definitive conclusions, our analysis shows that by selecting appropriate OSs, one can preclude (or reduce substantially) common vulnerabilities from occurring in the replicas of the intrusion-tolerant system
- …