114 research outputs found

    Forum Session at the First International Conference on Service Oriented Computing (ICSOC03)

    Get PDF
    The First International Conference on Service Oriented Computing (ICSOC) was held in Trento, December 15-18, 2003. The focus of the conference ---Service Oriented Computing (SOC)--- is the new emerging paradigm for distributed computing and e-business processing that has evolved from object-oriented and component computing to enable building agile networks of collaborating business applications distributed within and across organizational boundaries. Of the 181 papers submitted to the ICSOC conference, 10 were selected for the forum session which took place on December the 16th, 2003. The papers were chosen based on their technical quality, originality, relevance to SOC and for their nature of being best suited for a poster presentation or a demonstration. This technical report contains the 10 papers presented during the forum session at the ICSOC conference. In particular, the last two papers in the report ere submitted as industrial papers

    SyD: A Middleware Testbed for Collaborative Applications over Small Heterogeneous Devices and Data Stores

    Full text link
    Abstract. Currently, it is possible to develop a collaborative application running on a collection of heterogeneous, possibly mobile, devices, each potentially hosting data stores, using existing middleware technologies such as JXTA, BREW, compact.NET and J2ME. However, they require too many ad-hoc techniques as well as cumbersome and time-consuming programming. Our System on Mobile Devices (SyD) middleware, on the other hand, has a modular architecture that makes such application de-velopment very systematic and streamlined. The architecture supports transactions over mobile data stores, with a range of remote group invo-cation options and embedded interdependencies among such data store objects. The architecture further provides a persistent uniform object view, group transaction with Quality of Service (QoS) speci¯cations, and XML vocabulary for inter-device communication. This paper presents the basic SyD concepts, introduces the architecture and the design of the SyD middleware and its components. We also provide guidelines fo

    SPAWN: Service Provision in Ad-hoc Wireless Networks

    Get PDF
    The increasing ubiquity of wireless mobile computing platforms has opened up the potential for unprecedented levels of communication, coordination and collaboration among mobile computing devices, most of which will occur in an ad hoc, on-demand manner. This paper describes SPAWN, a middleware supporting service provision in ad-hoc wireless networks. The aim of SPAWN is to provide the software resources on mobile devices that facilitate electronic collaboration. This is achieved by applying the principles of service oriented computing (SOC), an emerging paradigm that has seen success in wired settings. SPAWN is an adaptation and extension of the Jini model of SOC to ad-hoc networks. The key contributions of SPAWN are (1) a completely decentralized service advertisement and request system that is geared towards handling the unpredictability and dynamism of mobile ad-hoc networks, (2) an automated code management system that can fetch, use and dispose of binaries on an on-demand basis, (3) a mechanism supporting the logical mobility of services, (4) an upgrade mechanism to extend the life cycle of services, and (5) a lightweight security model that secures all interactions, which is essential in an open environment. We discuss the software architecture, a Java implementation, sample applications and an empirical evaluation of the system

    Adapting mobile systems using logical mobility primitives

    Get PDF
    Mobile computing devices, such as personal digital assistants and mobile phones, are becoming increasingly popular, smaller, more capable and even fashionable personal items. Combined with the recent advent of wireless networking techniques, users are equipped with mobile devices of significant computational abilities, which are able to wirelessly access information by dynamically connecting to many different networks. Despite the ubiquity of mobile devices, mobile systems are built using monolithic architectures, use a small set of predefined interaction paradigms and do not exploit or adapt to the dynamicity of their local or remote context. Applications deployed on mobile devices face considerable challenges posed by their changing surroundings. One of the main peculiarities of mobile devices is heterogeneity, which may occur in software, hardware and network protocols. Mobile systems may carry a large number of different applications, use different operating systems and middleware and, often, have more than one network interface. A further challenge is their considerable variation in the computational resources available, such as battery power, CPU speed, network bandwidth and volatile and persistent memory. Moreover, mobile computing systems are highly dynamic systems, in terms of their surroundings, implying that the requirements for applications deployed on a mobile device are a moving target. Changes in the requirements (such as integration with a new service) may require changes to the application. Consequently, these changes may mean that the application behaviour needs to adapt. This thesis argues that the potential of the ubiquity of mobile devices cannot be realised using static and monolithic architectures, as mobile systems need to be able to adapt to accommodate changes to their environment. It investigates the use of three technologies to offer adaptation to mobile devices: Logical mobility techniques, component systems and middleware technologies. More specifically, this thesis presents the SATIN (System Adaptation Targeting Integrated Networks) component metamodel, a lightweight local component metamodel that offers the flexible use of logical mobility primitives. The metamodel is instantiated to build the SATIN middleware system, a component-based mobile computing middleware that uses the mobility primitives exported by the metamodel to reconfigure itself and applications running on top of it. The suitability of SATIN for the creation of adaptable mobile systems is demonstrated, by using it to implement and evaluate a number of applications showing different aspects of adaptation. Moreover, existing projects are reengineered to run as SATIN components, showing the flexibility of the approach and the advantages gained over the originals

    Engineering Automation for Reliable Software Interim Progress Report (10/01/2000 - 09/30/2001)

    Get PDF
    Prepared for: U.S. Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-2211The objective of our effort is to develop a scientific basis for producing reliable software that is also flexible and cost effective for the DoD distributed software domain. This objective addresses the long term goals of increasing the quality of service provided by complex systems while reducing development risks, costs, and time. Our work focuses on "wrap and glue" technology based on a domain specific distributed prototype model. The key to making the proposed approach reliable, flexible, and cost-effective is the automatic generation of glue and wrappers based on a designer's specification. The "wrap and glue" approach allows system designers to concentrate on the difficult interoperability problems and defines solutions in terms of deeper and more difficult interoperability issues, while freeing designers from implementation details. Specific research areas for the proposed effort include technology enabling rapid prototyping, inference for design checking, automatic program generation, distributed real-time scheduling, wrapper and glue technology, and reliability assessment and improvement. The proposed technology will be integrated with past research results to enable a quantum leap forward in the state of the art for rapid prototyping.U. S. Army Research Office P.O. Box 12211 Research Triangle Park, NC 27709-22110473-MA-SPApproved for public release; distribution is unlimited

    Coordinated collaboration for e-commerce based on the multiagent paradigm.

    Get PDF
    Lee Ting-on.Thesis (M.Phil.)--Chinese University of Hong Kong, 2000.Includes bibliographical references (leaves 116-121).Abstracts in English and Chinese.Acknowledgments --- p.iAbstract --- p.iiChapter 1 --- Introduction --- p.1Chapter 1.1 --- Roadmap to the Thesis --- p.5Chapter 2 --- Software Agents and Agent Frameworks --- p.7Chapter 2.1 --- Software Agent --- p.7Chapter 2.1.1 --- Advantages of Agent --- p.10Chapter 2.1.2 --- Roles of Agent --- p.11Chapter 2.2 --- Agent Frameworks --- p.13Chapter 2.3 --- Communication Services and Concepts --- p.15Chapter 2.3.1 --- Message Channel --- p.15Chapter 2.3.2 --- Remote Procedure Call --- p.16Chapter 2.3.3 --- Event Channel --- p.17Chapter 2.4 --- Component --- p.18Chapter 3 --- Related Work --- p.20Chapter 3.1 --- Collaboration Behaviors --- p.20Chapter 3.2 --- Direct Coordination --- p.22Chapter 3.3 --- Meeting-oriented Coordination --- p.23Chapter 3.4 --- Blackboard-based Coordination --- p.24Chapter 3.5 --- Linda-like Coordination --- p.25Chapter 3.6 --- Reactive Tuple Spaces --- p.26Chapter 4 --- Background and Foundations --- p.27Chapter 4.1 --- Choice of Technologies --- p.27Chapter 4.2 --- Jini Technology --- p.28Chapter 4.2.1 --- The Lookup Service --- p.29Chapter 4.2.2 --- Proxy --- p.31Chapter 4.3 --- JavaSpaces --- p.32Chapter 4.4 --- Grasshopper Architecture --- p.33Chapter 5 --- The CoDAC Framework --- p.36Chapter 5.1 --- Requirements for Enabling Collaboration --- p.37Chapter 5.1.1 --- Consistent Group Membership --- p.37Chapter 5.1.2 --- Atomic Commitment --- p.39Chapter 5.1.3 --- Uniform Reliable Multicast --- p.40Chapter 5.1.4 --- Fault Tolerance --- p.40Chapter 5.2 --- System Components --- p.41Chapter 5.2.1 --- Distributed Agent Adapter --- p.42Chapter 5.2.2 --- CollaborationCore --- p.44Chapter 5.3 --- System Infrastructure --- p.45Chapter 5.3.1 --- Agent --- p.45Chapter 5.3.2 --- Distributed Agent Manager --- p.46Chapter 5.3.3 --- Collaboration Manager --- p.46Chapter 5.3.4 --- Kernel --- p.46Chapter 5.4 --- Collaboration --- p.47Chapter 5.5.1 --- Global Collaboration --- p.48Chapter 5.5.2 --- Local Collaboration --- p.48Chapter 6 --- Collaboration Life Cycle --- p.50Chapter 6.1 --- Initialization --- p.50Chapter 6.2 --- Resouces Gathering --- p.53Chapter 6.3 --- Results Delivery --- p.54Chapter 7 --- Protocol Suite --- p.55Chapter 7.1 --- The Group Membership Protocol --- p.56Chapter 7.1.1 --- Join Protocol --- p.56Chapter 7.1.2 --- Leave Protocol --- p.57Chapter 7.1.3 --- Recovery Protocol --- p.59Chapter 7.1.4 --- Proof --- p.61Chapter 7.2 --- Atomic Commitment Protocol --- p.62Chapter 7.3 --- Uniform Reliable Multicast --- p.63Chapter Chapter 8 --- Implementation --- p.66Chapter 8.1 --- Interfaces and Classes --- p.66Chapter 8.1.1 --- The CoDACAdapterInterface --- p.66Chapter 8.1.2 --- The CoDACEventListener --- p.69Chapter 8.1.3 --- The DAAdapter --- p.71Chapter 8.1.4 --- The DAManager --- p.75Chapter 8.1.5 --- The CoDACInternalEventListener --- p.77Chapter 8.1.6 --- The CollaborationManager --- p.77Chapter 8.1.7 --- The CollaborationCore --- p.78Chapter 8.2 --- Messaging Mechanism --- p.79Chapter 8.3 --- Nested Transaction --- p.84Chapter 8.4 --- Fault Detection --- p.85Chapter 8.5 --- Atomic Commitment Protocol --- p.88Chapter 8.5.1 --- Message Flow --- p.89Chapter 8.5.2 --- Timeout Actions --- p.91Chapter Chapter 9 --- Example --- p.93Chapter 9.1 --- System Model --- p.93Chapter 9.2 --- Auction Lifecycle --- p.94Chapter 9.2.1 --- Initialization --- p.94Chapter 9.2.2 --- Resource Gathering --- p.98Chapter 9.2.3 --- Results Delivery --- p.100Chapter Chapter 10 --- Discussions --- p.104Chapter 10.1 --- Compatibility --- p.104Chapter 10.2 --- Hierarchical Group Infrastructure --- p.106Chapter 10.3 --- Flexibility --- p.107Chapter 10.4 --- Atomicity --- p.108Chapter 10.5 --- Fault Tolerance --- p.109Chapter Chapter 11 --- Conclusion and Future Work --- p.111Chapter 11.1 --- Conclusion --- p.111Chapter 11.2 --- Future Work --- p.112Chapter 11.2.1 --- Electronic Commerce --- p.112Chapter 11.2.2 --- Workflow Management --- p.114Bibliography --- p.116Publication List --- p.12

    Evolution of network computing paradigms: applications of mobile agents in wired and wireless networks

    Get PDF
    The World Wide Web (or Web for short) is the largest client-server computing system commonly available, which is used through its widely accepted universal client (the Web browser) that uses a standard communication protocol known as the HyperText Transfer Protocol (HTTP) to display information described in the HyperText Markup Language (HTML). The current Web computing model allows the execution of server-side applications such as Servlets and client-side applications such as Applets. However, it offers limited support for another model of network computing where users would be able to use remote, and perhaps more powerful, machines for their computing needs. The client-server model enables anyone with a Web-enabled device ranging from desktop computers to cellular telephones, to retrieve information from the Web. In today's information society, however, users are overwhelmed by the information with which they are confronted on a daily basis. For subscribers of mobile wireless data services, this may present a problem. Wireless handheld devices, such as cellular telephones are connected via wireless networks that suffer from low bandwidth and have a greater tendency for network errors. In addition, wireless connections can be lost or degraded by mobility. Therefore, there a need for entities that act on behalf of users to simplify the tasks of discovering and managing network computing resources. It has been said that software agents are a solution in search of a problem. Mobile agents, however, are inherently distributed in nature, and therefore they represent a natural view of a distributed system. They provide an ideal mechanism for implementing complex systems, and they are well suited for applications that are communicationscentric such as Web-based network computing. Another attractive area of mobile agents is processing data over unreliable networks (such as wireless networks). In such an environment, the low reliability network can be used to transfer agents rather than a chunk. of data. The agent can travel to the nodes of the network, collect or process information without the risk of network disconnection, then return home. The publications of this doctorate by published works report on research undertaken in the area of distributed systems with emphasis on network computing paradigms, Web-based distributed computing, and the applications of mobile agents in Web-based distributed computing and wireless computing. The contributions of this collection of related papers can be summarized in four points. First, I have shown how to extend the Web to include computing resources; to illustrate the feasibility of my approach I have constructed a proof of concept implementation. Second, a mobile agent-based approach to Web-based distributed computing, that harness the power of the Web as a computing resource, has been proposed and a system has been prototyped. This, however, means that users will be able to use remote machines to execute their code, but this introduces a security risk. I need to make sure that malicious users cannot harm the remote system. For this, a security policy design pattern for mobile Java code has been developed. Third, a mediator-based approach to wireless client/server computing has been proposed and guidelines for implementing it have been published. This approach allows access to Internet services and distributed object systems from resource-constraint handheld wireless devices such as cellular telephones. Fourth and finally, a mobile agent-based approach to the Wireless Internet has been designed and implemented. In this approach, remote mobile agents can be accessed and used from wireless handheld devices. Handheld wireless devices will benefit greatly from this approach since it overcomes wireless network limitations such as low bandwidth and disconnection, and enhances the functionality of services by being able to operate without constant user input

    An investigation on sun microsystems Jini technology

    Get PDF
    Sun Microsystems introduced the JiniTM Technology as its vision of the future in networking, where services can be registered dynamically and he used easily regardless of their location in the network. This is an investigation of feasibility on such claims made by Sun regarding JiniTM and comparisons with the directly similar Universal Plug and Play from Microsoft. The aim is to implement a simple application of the JiniTM Technology in order to demonstrate its capabilities as a contribution to the distributed computing research
    • …
    corecore