36,034 research outputs found
Programming your way out of the past: ISIS and the META Project
The ISIS distributed programming system and the META Project are described. The ISIS programming toolkit is an aid to low-level programming that makes it easy to build fault-tolerant distributed applications that exploit replication and concurrent execution. The META Project is reexamining high-level mechanisms such as the filesystem, shell language, and administration tools in distributed systems
The ISIS project: Fault-tolerance in large distributed systems
The semi-annual status report covers activities of the ISIS project during the second half of 1989. The project had several independent objectives: (1) At the level of the ISIS Toolkit, ISIS release V2.0 was completed, containing bypass communication protocols. Performance of the system is greatly enhanced by this change, but the initial software release is limited in some respects. (2) The Meta project focused on the definition of the Lomita programming language for specifying rules that monitor sensors for conditions of interest and triggering appropriate reactions. This design was completed, and implementation of Lomita is underway on the Meta 2.0 platform. (3) The Deceit file system effort completed a prototype. It is planned to make Deceit available for use in two hospital information systems. (4) A long-haul communication subsystem project was completed and can be used as part of ISIS. This effort resulted in tools for linking ISIS systems on different LANs together over long-haul communications lines. (5) Magic Lantern, a graphical tool for building application monitoring and control interfaces, is included as part of the general ISIS releases
GISIP: Evaluation and Dissemination, Technical Report, Deliverable 4 of the EC Project, Best Practice GIS Integrated Processes (GISIP), Project number, 20.915
Status of the Instream Flow Issue in Arkansas, 1987
Expansion of Arkansas\u27 population with concurrent increases in the state\u27s domestic, industrial, and agricultural water uses and possible out-of-state diversion are placing substantial demands on the state\u27s water resources. In an attempt to address this growing concern, Act 1051 (1985) of the Arkansas legislature was passed requiring the determination of present and future state water needs. A specific area of this mandate was the quantification of instream flow requirements. Basic instream flow needs are maintenance of the aquatic ecosystem and dependent riparian environment. Flow reservation may compliment other instream uses such as recreation, navigation, water quality, and groundwater recharge. However, offstream uses (e.g. irrigation and industry) may compete for these same flows and often at the most critical time of year. In order to answer questions concerning instream flow requirements, over 40 methods of instream flow determination have been developed, the majority in the semi-arid western United States. These individual procedures may be classified into four major methodologies: (1) discharge, (2) single transect, (3)multiple transect, and (4) regression analysis of historical data. Requirements of these four types vary according to necessary level of expertise, time and effort expended, and monetary outlay. In one year, requests for fish and wildlife instream flow needs for approximately 60 stream reaches throughout Arkansas limited the possible options. Modification and further development of a well-known method is outlined as an initial step in the process of quantifying Arkansas\u27 instream flow needs. Examples are given for some of the major river basins throughout the state
Quantum interference and the spin orbit interaction in mesoscopic normal-superconducting junctions
We calculate the quantum correction to the classical conductance of a
disordered mesoscopic normal-superconducting (NS) junction in which the
electron spatial and spin degrees of freedom are coupled by an appreciable spin
orbit interaction. We use random matrix theory to describe the scattering in
the normal part of the junction and consider both quasi-ballistic and diffusive
junctions. The dependence of the junction conductance on the Schottky barrier
transparency at the NS interface is also considered. We find that the quantum
correction is sensitive to the breaking of spin rotation symmetry even when the
junction is in a magnetic field and time reversal symmetry is broken. We
demonstrate that this sensitivity is due to quantum interference between
scattering processes which involve electrons and holes traversing closed loops
in the same direction. We explain why such processes are sensitive to the spin
orbit interaction but not to a magnetic field. Finally we consider the effect
of the spin orbit interaction on the phenomenon of ``reflectionless
tunnelling.''Comment: Revised version, one new figure and revised text. This is the final
version which will appear in Journal de Physqiue 1. Latex plus six postscript
figure
Scalable boson-sampling with time-bin encoding using a loop-based architecture
We present an architecture for arbitrarily scalable boson-sampling using two
nested fiber loops. The architecture has fixed experimental complexity,
irrespective of the size of the desired interferometer, whose scale is limited
only by fiber and switch loss rates. The architecture employs time-bin
encoding, whereby the incident photons form a pulse train, which enters the
loops. Dynamically controlled loop coupling ratios allow the construction of
the arbitrary linear optics interferometers required for boson-sampling. The
architecture employs only a single point of interference and may thus be easier
to stabilize than other approaches. The scheme has polynomial complexity and
could be realized using demonstrated present-day technologies.Comment: 7 pages, 7 figure
- …
