1,379 research outputs found
Paramecium: An Extensible Object-Based Kernel
In this paper we describe the design of an extensible kernel, called Paramecium. This kernel uses an object-based software architecture which together with instance naming, late binding and explicit overrides enables easy reconfiguration. Determining which components reside in the kernel protection domain is up to the user. An certification authority or one of its delegates certifies which components are trustworthy and therefore permitted to run in the kernel protection domain. These delegates may include validation programs, correctness provers, and system administrators. The main advantage of certifications is that it can handle trust and sharing in a non-cooperative environment
Towards Object-based Wide Area Distributed Systems
In order to facilitate the construction of wide area distributed systems, it is necessary that we adopt a model that simplifies application development. In this position paper we advocate an object-based approach. Our approach allows for flexibility because many of the technical details of distribution, such as communication protocols, consistency rules, etc. can be hidden behind the objects' interfaces. In addition, we allow distributed objects to offer alternative implementations for an interface. A client may choose the most suitable implementation. We discuss the use of distributed objects as the means to this end, and compare our approach to existing ones. 1 Introduction Wide area distributed applications pose varying demands on the underlying operating systems, often making the development of the application itself a difficult task. For example, development of distributed applications often requires the following: ffl Support for expressing communication at a sufficiently high..
Concurrent Computing with Shared Replicated Memory
The behavioural theory of concurrent systems states that any concurrent
system can be captured by a behaviourally equivalent concurrent Abstract State
Machine (cASM). While the theory in general assumes shared locations, it
remains valid, if different agents can only interact via messages, i.e. sharing
is restricted to mailboxes. There may even be a strict separation between
memory managing agents and other agents that can only access the shared memory
by sending query and update requests to the memory agents. This article is
dedicated to an investigation of replicated data that is maintained by a memory
management subsystem, whereas the replication neither appears in the requests
nor in the corresponding answers. We show how the behaviour of a concurrent
system with such a memory management can be specified using concurrent
communicating ASMs. We provide several refinements of a high-level ground model
addressing different replication policies and internal messaging between data
centres. For all these refinements we analyse their effects on the runs such
that decisions concerning the degree of consistency can be consciously made.Comment: 23 page
Hot and repulsive traffic flow
We study a message passing model, applicable also to traffic problems. The
model is implemented in a discrete lattice, where particles move towards their
destination, with fluctuations around the minimal distance path. A repulsive
interaction between particles is introduced in order to avoid the appearance of
traffic jam. We have studied the parameter space finding regions of fluid
traffic, and saturated ones, being separated by abrupt changes. The improvement
of the system performance is also explored, by the introduction of a
non-constant potential acting on the particles. Finally, we deal with the
behavior of the system when temporary failures in the transmission occurs.Comment: 22 pages, uuencoded gzipped postscript file. 11 figures include
An Object Model for Flexible Distributed Systems
this paper we describe a new model for constructing operating systems and applications in an integrated fashion. Compared to current approaches we provide high-level primitives for supporting distributed and parallel applications. We also provide the flexibility to configure both applications and kernels to only include the functionality that is actually used. The model we describe is based on objects. Objects are used to structure both applications programs and operating system kernels. They also provide the application interface to the operating system kernel, and access to hardware devices for both kernels and applications. By providing structuring mechanisms for large (distributed) objects, we believe that applications will be are easier to build. At the same time we provide flexibility by allowing extensions of operating system kernels and applications with new objects at run time[8], and by providing a way to bind to objects dynamically. An important aspect of a distributed system is the scalability of the system [6]. A scalable system should not depend on centralized resources or on algorithms that need global information. At the same time, a flexible system can use different algorithms depending on the situation. For example, the use of broadcasting and multicasting on a local Ethernet can be quite effective but should be avoided on a world wide scale. In this paper we discuss an object model that provides two kinds of objects: local objects and distributed objects. In Section 2 we describe the nondistributed (local) objects, followed by distributed objects in Section 3. We compare our work to that of others in Section 4. 2 Local object
Spacings of Quarkonium Levels with the Same Principal Quantum Number
The spacings between bound-state levels of the Schr\"odinger equation with
the same principal quantum number but orbital angular momenta
differing by unity are found to be nearly equal for a wide range of power
potentials , with . Semiclassical approximations are in accord with this behavior. The
result is applied to estimates of masses for quarkonium levels which have not
yet been observed, including the 2P states and the 1D
states.Comment: 20 pages, latex, 3 uuencoded figures submitted separately (process
using psfig.sty
Enhancing Transport Efficiency by Hybrid Routing Strategy
Traffic is essential for many dynamic processes on real networks, such as
internet and urban traffic systems. The transport efficiency of the traffic
system can be improved by taking full advantage of the resources in the system.
In this paper, we propose a dual-strategy routing model for network traffic
system, to realize the plenary utility of the whole network. The packets are
delivered according to different "efficient routing strategies" [Yan, et al,
Phys. Rev. E 73, 046108 (2006)]. We introduce the accumulate rate of packets,
{\eta} to measure the performance of traffic system in the congested phase, and
propose the so-called equivalent generation rate of packet to analyze the
jamming processes. From analytical and numerical results, we find that, for
suitable selection of strategies, the dual- strategy system performs better
than the single-strategy system in a broad region of strategy mixing ratio. The
analytical solution to the jamming processes is verified by estimating the
number of jammed nodes, which coincides well with the result from simulation.Comment: 6 pages, 3 figure
Electromagnetic form factors in the J/\psi mass region: The case in favor of additional resonances
Using the results of our recent analysis of e^+e^- annihilation, we plot the
curves for the diagonal and transition form factors of light hadrons in the
time-like region up to the production threshold of an open charm quantum
number. The comparison with existing data on the decays of J/\psi into such
hadrons shows that some new resonance structures may be present in the mass
range between 2 GeVand the J/\psi mass. Searching them may help in a better
understanding of the mass spectrum in both the simple and a more sophisticated
quark models, and in revealing the details of the three-gluon mechanism of the
OZI rule breaking in K\bar K channel.Comment: Formulas are added, typo is corrected, the text is rearranged.
Replaced to match the version accepted in Phys Rev
Right Handed Weak Currents in Sum Rules for Axialvector Constant Renormalization
The recent experimental results on deep inelastic polarized lepton scattering
off proton, deuteron and He together with polari% zed neutron
-decay data are analyzed. It is shown that the problem of Ellis-Jaffe
and Bjorken sum rules deficiency and the neutron paradox could be solved
simultaneously by assuming the small right handed current (RHC) admixture in
the weak interaction Lagrangian. The possible RHC impact on pion-nucleon
-term and Gamow-Teller sum rule for nuclear reactions is
pointed out.Comment: to be published in Phys. Rev. Lett. LaTeX, 8 pages, 21 k
- …
