8,221 research outputs found
Formal Derivation of Concurrent Garbage Collectors
Concurrent garbage collectors are notoriously difficult to implement
correctly. Previous approaches to the issue of producing correct collectors
have mainly been based on posit-and-prove verification or on the application of
domain-specific templates and transformations. We show how to derive the upper
reaches of a family of concurrent garbage collectors by refinement from a
formal specification, emphasizing the application of domain-independent design
theories and transformations. A key contribution is an extension to the
classical lattice-theoretic fixpoint theorems to account for the dynamics of
concurrent mutation and collection.Comment: 38 pages, 21 figures. The short version of this paper appeared in the
Proceedings of MPC 201
Coastal Resource Management in the Wider Caribbean: Resilience, Adaptation, and Community Diversity
The Caribbean Sea is the second largest sea in the world, including more than 30 insular and continental countries with an approximate population of 35 million. In addition to its highly fractionalized territory, it is characterized by a great linguistic and cultural diversity, a phenomenon enhanced by increasing internal migrations and the expansion of tourism. The implementation of coastal management programs, often embedded in top-down approaches, is therefore faced with a series of ecological and social constraints, explaining why they have had only limited success. This book presents an alternative look at existing coastal management initiatives in the North America (Caribbean); focusing on the need to pay more attention to the local community. Emphasizing the great heterogeneity of Caribbean communities, the book shows how the diversity of ecosystems and cultures has generated a significant resilience and capacity to adapt, in which the notion of community itself has to be re-examined. The concluding chapter presents lessons learned and a series of practical recommendations for decision-makers
Recommended from our members
Construction of a support tool for the design of the activity structures based computer system architectures
This thesis was submitted for the degree of Doctor of Philosophy and was awarded by Brunel University.This thesis is a reapproachment of diverse design concepts, brought to bear upon the computer system
engineering problem of identification and control of highly constrained multiprocessing (HCM)
computer machines. It contributes to the area of meta/general systems methodology, and brings
a new insight into the design formalisms, and results afforded by bringing together various design
concepts that can be used for the construction of highly constrained computer system architectures.
A unique point of view is taken by assuming the process of identification and control of HCM
computer systems to be the process generated by the Activity Structures Methodology (ASM).
The research in ASM has emerged from the Neuroscience research, aiming at providing the
techniques for combining the diverse knowledge sources that capture the 'deep knowledge' of this
application field in an effective formal and computer representable form. To apply the ASM design
guidelines in the realm of the distributed computer system design, we provide new design definitions
for the identification and control of such machines in terms of realisations. These realisation definitions
characterise the various classes of the identification and control problem. The classes covered
consist of:
1. the identification of the designer activities,
2. the identification and control of the machine's distributed structures of behaviour,
3. the identification and control of the conversational environment activities (i.e. the randomised/
adaptive activities and interactions of both the user and the machine environments),
4. the identification and control of the substrata needed for the realisation of the machine, and
5. the identification of the admissible design data, both user-oriented and machineoriented,
that can force the conversational environment to act in a self-regulating
manner.
All extent results are considered in this context, allowing the development of both necessary
conditions for machine identification in terms of their distributed behaviours as well as the substrata
structures of the unknown machine and sufficient conditions in terms of experiments on the unknown
machine to achieve the self-regulation behaviour.
We provide a detailed description of the design and implementation of the support software tool
which can be used for aiding the process of constructing effective, HCM computer systems, based
on various classes of identification and control. The design data of a highly constrained system, the
NUKE, are used to verify the tool logic as well as the various identification and control procedures.
Possible extensions as well as future work implied by the results are considered.Government of Ira
Run-time Variability with First-class Contexts
Software must be regularly updated to keep up with changing requirements. Unfortunately, to install an update, the system must usually be restarted, which is inconvenient and costly. In this dissertation, we aim at overcoming the need for restart by enabling run-time changes at the programming language level. We argue that the best way to achieve this goal is to improve the support for encapsulation, information hiding and late binding by contextualizing behavior. In our approach, behavioral variations are encapsulated into context objects that alter the behavior of other objects locally. We present three contextual language features that demonstrate our approach. First, we present a feature to evolve software by scoping variations to threads. This way, arbitrary objects can be substituted over time without compromising safety. Second, we present a variant of dynamic proxies that operate by delegation instead of forwarding. The proxies can be used as building blocks to implement contextualization mechanisms from within the language. Third, we contextualize the behavior of objects to intercept exchanges of references between objects. This approach scales information hiding from objects to aggregates. The three language features are supported by formalizations and case studies, showing their soundness and practicality. With these three complementary language features, developers can easily design applications that can accommodate run-time changes
Porting the Chorus Supervisor and Related Low-Level Functions to the PA-RISC
This document is part of a series of reports describing the design decisions made in porting the Chorus Operating System to the Hewlett-Packard 9000 Series 800 workstation.
The Supervisor is the name given by Chorus to a collection of low-level functions that are machine dependent and have to be implemented when Chorus is ported from one machine to another. The Supervisor is responsible for interrupt, trap and exception handling, managing low-level thread initialization, context switch, kernel initialization, managing simple devices (timer and console) and offering a low-level debugger. This document describes the port of the Supervisor and related low-level functions.
The informacion contained in this paper will be of interest, to people who wish to understand:
• The main characteristics of Chorus and PA-RISC architecture that are useful in understanding the port of the Chorus Supervisor. • The requirements and implementation of the Chorus Supervisor. • The requirements and implementation of Chorus page fault interface • The requirements and implementation Chorus System call interface • The requirements and implementation of \u27mutex\u27 interface which is a part of the Chorus system call interface for efficient thread synchronization. • Reasons for the modifications to the portable layers of Chorus kernel to implement the above requirements. A summary of the modifications is also presented.
It is useful to read the port overview before reading this document. It is also a good idea to have the Precision Architecture and Instruction Set Reference Manual and Chorus v3.3 implementation guide on hand although it is not absolutely necessary
Narrative and Belonging: The Politics of Ambiguity, The Jewish State, and the Thought of Edward Said and Hannah Arendt
At the core of this thesis, I examine the difficulties of giving an account of oneself in modern associational life. By integrating the theory and political activism of both Edward Said and Hannah Arendt, I follow the Zionist response to European antisemitism and the Palestinian responses to Jewish settler colonialism. Both parties struggle against their ambiguous presence within local and regional hegemonic social taxonomy, and within the world order. Contemporarily, this struggle takes place in the protracted conflict between Israeli and local Arab groups, which has been managed through violence and objectification, as opposed to allowing the dynamism and reconfiguration of political subjectivities. In their later writings, Arendt and Said respond to the violence and resentment that arises from the form of the nation-state by prescribing, and arguably practicing, an understanding of politics where the “other” is constitutive of the “self.” By seeing this relation of alternity as the contemporary heir to diasporic Judaism and Jewish cosmopolitanism, I argue that this project holds the historical traction to reinvigorate the future beyond static and growing violence and dispossession
Design of testbed and emulation tools
The research summarized was concerned with the design of testbed and emulation tools suitable to assist in projecting, with reasonable accuracy, the expected performance of highly concurrent computing systems on large, complete applications. Such testbed and emulation tools are intended for the eventual use of those exploring new concurrent system architectures and organizations, either as users or as designers of such systems. While a range of alternatives was considered, a software based set of hierarchical tools was chosen to provide maximum flexibility, to ease in moving to new computers as technology improves and to take advantage of the inherent reliability and availability of commercially available computing systems
- …