22,781 research outputs found

    A study of System Interface Sets (SIS) for the host, target and integration environments of the Space Station Program (SSP)

    Get PDF
    System interface sets (SIS) for large, complex, non-stop, distributed systems are examined. The SIS of the Space Station Program (SSP) was selected as the focus of this study because an appropriate virtual interface specification of the SIS is believed to have the most potential to free the project from four life cycle tyrannies which are rooted in a dependance on either a proprietary or particular instance of: operating systems, data management systems, communications systems, and instruction set architectures. The static perspective of the common Ada programming support environment interface set (CAIS) and the portable common execution environment (PCEE) activities are discussed. Also, the dynamic perspective of the PCEE is addressed

    The Role of International Rules in Blockchain-Based Cross-Border Commercial Disputes

    Get PDF
    [excerpt] The concept of online dispute resolution (ODR) is not new. 1 But, with the advent of Web 3.0, the distributed web that facilitates pseudonymous and cross-border transactions via blockchain\u27s distributed ledger technology, 2 the idea of, and pressing need for, appropriate dispute resolution models for blockchain-based disputes to support this novel system of distributed consensus and trust of which blockchain proponents boast, is a primary concern in rapid development. 3 The common goal of each project is to utilize smart contracts to facilitate superior, quicker[,] and less expensive proceedings by eliminating so many of the tedious and protracted trappings of traditional arbitral proceedings, such as the sending and receiving of documents via courier. , Despite myriad approaches, all emerging blockchain-based dispute resolution services (BDR solutions) generally seek to bridge the divide between automated performance mechanisms, like smart contracts, and the human judgment traditionally required to settle legal disputes.5 How our existing legal frameworks must develop to ensure that smart contracts 6 facilitate, rather than frustrate, the parties\u27 intent is a critically important question to ask as the blockchain stack\u27s infrastructure and application layers are being built and, ultimately, scaled. Indeed, interest is high in the race to create alternative dispute resolution mechanisms to resolve disputes arising from blockchain-based commercial transactions that, due to the transnational, borderless, pseudonymous, and distributed nature of blockchain, clearly necessitate international solutions.

    Using Popular Media and a Collaborative Approach to Teaching Grounded Theory Research Methods

    Full text link
    Popular movies were used in a doctoral-level qualitative research methods course as a way to help students learn about how to collect and analyze qualitative observational data in order to develop a grounded theory. The course was designed in such a way that collaboration was central to the generation of knowledge. Using media depictions had the practical advantage of enabling the group to create fieldnotes from a common set of data collected simultaneously in a short period of time. Fictional representations in popular media can provide the basis to learn about both the methods and foundational assumptions for conducting qualitative research, including the challenges of bracketing prior assumptions

    Study of Network Security and Cryptography

    Get PDF
    With the approach of the World Wide Web and the development of online business applications and interpersonal organizations, associations over the world produce a lot of information every day. Information security is the most extreme basic issue in guaranteeing safe transmission of data through the web. Likewise network security issues are presently getting to be essential as society is moving towards computerized data age. As an ever increasing number of clients interface with the web it pulls in a great deal of digital criminals. It contains approval of access to data in a system, controlled by the system head. The undertaking of network security not just requires guaranteeing the security of end frameworks however of the whole network. In this paper, an endeavor has been made to audit the different Network Security and Cryptographic ideas. [1]

    What to Fix? Distinguishing between design and non-design rules in automated tools

    Full text link
    Technical debt---design shortcuts taken to optimize for delivery speed---is a critical part of long-term software costs. Consequently, automatically detecting technical debt is a high priority for software practitioners. Software quality tool vendors have responded to this need by positioning their tools to detect and manage technical debt. While these tools bundle a number of rules, it is hard for users to understand which rules identify design issues, as opposed to syntactic quality. This is important, since previous studies have revealed the most significant technical debt is related to design issues. Other research has focused on comparing these tools on open source projects, but these comparisons have not looked at whether the rules were relevant to design. We conducted an empirical study using a structured categorization approach, and manually classify 466 software quality rules from three industry tools---CAST, SonarQube, and NDepend. We found that most of these rules were easily labeled as either not design (55%) or design (19%). The remainder (26%) resulted in disagreements among the labelers. Our results are a first step in formalizing a definition of a design rule, in order to support automatic detection.Comment: Long version of accepted short paper at International Conference on Software Architecture 2017 (Gothenburg, SE

    SoK: Distributed Computing in ICN

    Full text link
    Information-Centric Networking (ICN), with its data-oriented operation and generally more powerful forwarding layer, provides an attractive platform for distributed computing. This paper provides a systematic overview and categorization of different distributed computing approaches in ICN encompassing fundamental design principles, frameworks and orchestration, protocols, enablers, and applications. We discuss current pain points in legacy distributed computing, attractive ICN features, and how different systems use them. This paper also provides a discussion of potential future work for distributed computing in ICN.Comment: 10 pages, 3 figures, 1 table. Accepted by ACM ICN 202
    • โ€ฆ
    corecore