189 research outputs found

    A Framework for Dynamic Reconfiguration of Distributed Programs

    Get PDF
    Current techniques for a software engineer to change a computer program are limited to static activities once the application begins executing, there are few reliable ways to reconfigure it. We have developed a general framework for reconfigurating application software dynamically. A sound method for managing changes in a running program allows developers to perform maintenance activities without loss of the overall system's service. The same methods also support some forms of load balancing in a distributed system, and research in software fault tolerance. Our goal has been to create an environment for organizing and effecting software reconfiguration activities dynamically. First we present the overall framework within which reconfiguration is possible, then we describe our formal approach for programmers to capture the state of a process abstractly. Next, we describe our implementation of this method within an environment for experimenting with program reconfiguration. We conclude with a summary of the key research problems that we are continuing to pursue in this area. (Also cross-referenced as UMIACS-TR-93-78

    Writing Distributed Programs in Polylith

    Get PDF
    Polylith is a software interconnection system that allows programmers to configure applications from mixed-language software components (modules), and then execute those applications in diverse environments. In general, communication between components can be implemented with TCP/IP or XNS protocols in a network; via shared memory between light-weight threads on a tightly coupled multiprocessor; using custom-hardware channels between processors; or using simply a 'branch' instruction within the same process space. Flexibility in how components are interconnected is made possible by a 'software bus' organization. This document serves as a manual for programmers who wish to use one particular software busthe TCP/IP-based network bus. (Also cross-referenced as UMIACS-TR-90-149

    Practicing physiotherapy in Danish private practice: an ethical perspective.

    Get PDF
    Despite an increasingly growth of professional guidelines, textbooks and research about ethics in health care, awareness about ethics in Danish physiotherapy private practice seen vague. This article explores how physiotherapists in Danish private practice, from an ethical perspective, perceive to practice physiotherapy. The empirical data consists of interviews with twenty-one physiotherapists. The interviews are analysed from a hermeneutic approach, inspired by Ricoeur's textual interpretation of distanciation. The analysis follows three phases: naïve reading, structural analysis and comprehensive analysis. Four main themes are constructed: Beneficence as the driving force; Disciplining the patient through the course of physiotherapy; Balancing between being a trustworthy professional and a businessperson; The dream of a code of practice. Private practice physiotherapy is embedded in a structural frame directed by both political and economical conditions that shape the conditions for practicing physiotherapy. It means that beneficence in practice is a balance between the patient, the physiotherapists themselves and the business. Beneficence towards the patient is expressed as an implicit demand. Physiotherapeutic practice is expressed as being an integration of professionalism and personality which implies that the physiotherapists also have to benefit themselves. Private practice seems to be driven by a paternalistic approach towards the patient, where disciplining the patient is a crucial element of practice, in order to optimise profit. Physiotherapists wish for a more beneficent practice in the future by aiming at bridging 'to be' and 'ought to be'

    The Epstein-Barr Virus G-Protein-Coupled Receptor Contributes to Immune Evasion by Targeting MHC Class I Molecules for Degradation

    Get PDF
    Epstein-Barr virus (EBV) is a human herpesvirus that persists as a largely subclinical infection in the vast majority of adults worldwide. Recent evidence indicates that an important component of the persistence strategy involves active interference with the MHC class I antigen processing pathway during the lytic replication cycle. We have now identified a novel role for the lytic cycle gene, BILF1, which encodes a glycoprotein with the properties of a constitutive signaling G-protein-coupled receptor (GPCR). BILF1 reduced the levels of MHC class I at the cell surface and inhibited CD8+ T cell recognition of endogenous target antigens. The underlying mechanism involves physical association of BILF1 with MHC class I molecules, an increased turnover from the cell surface, and enhanced degradation via lysosomal proteases. The BILF1 protein of the closely related CeHV15 c1-herpesvirus of the Rhesus Old World primate (80% amino acid sequence identity) downregulated surface MHC class I similarly to EBV BILF1. Amongst the human herpesviruses, the GPCR encoded by the ORF74 of the KSHV c2-herpesvirus is most closely related to EBV BILF1 (15% amino acid sequence identity) but did not affect levels of surface MHC class I. An engineered mutant of BILF1 that was unable to activate G protein signaling pathways retained the ability to downregulate MHC class I, indicating that the immune-modulating and GPCR-signaling properties are two distinct functions of BILF1. These findings extend our understanding of the normal biology of an important human pathogen. The discovery of a third EBV lytic cycle gene that cooperates to interfere with MHC class I antigen processing underscores the importance of the need for EBV to be able to evade CD8+ T cell responses during the lytic replication cycle, at a time when such a large number of potential viral targets are expressed

    Enveloping Sophisticated Tools into Process-Centered Environments

    Get PDF
    We present a tool integration strategy based on enveloping pre-existing tools without source code modifications or recompilation, and without assuming an extension language, application programming interface, or any other special capabilities on the part of the tool. This Black Box enveloping (or wrapping) idea has existed for a long time, but was previously restricted to relatively simple tools. We describe the design and implementation of, and experimentation with, a new Black Box enveloping facility intended for sophisticated tools --- with particular concern for the emerging class of groupware applications

    An infectious aetiology for childhood brain tumours? Evidence from space–time clustering and seasonality analyses

    Get PDF
    To investigate whether infections or other environmental exposures may be involved in the aetiology of childhood central nervous system tumours, we have analysed for space–time clustering and seasonality using population-based data from the North West of England for the period 1954 to 1998. Knox tests for space–time interactions between cases were applied with fixed thresholds of close in space, <5 km, and close in time, <1 year apart. Addresses at birth and diagnosis were used. Tests were repeated replacing geographical distance with distance to the Nth nearest neighbour. N was chosen such that the mean distance was 5 km. Data were also examined by a second order procedure based on K-functions. Tests for heterogeneity and Edwards' test for sinusoidal variation were applied to examine changes of incidence with month of birth or diagnosis. There was strong evidence of space–time clustering, particularly involving cases of astrocytoma and ependymoma. Analyses of seasonal variation showed excesses of cases born in the late Autumn or Winter. Results are consistent with a role for infections in a proportion of cases from these diagnostic groups. Further studies are needed to identify putative infectious agents
    corecore