202 research outputs found

    Concurrent Computing with Shared Replicated Memory

    Get PDF
    The behavioural theory of concurrent systems states that any concurrent system can be captured by a behaviourally equivalent concurrent Abstract State Machine (cASM). While the theory in general assumes shared locations, it remains valid, if different agents can only interact via messages, i.e. sharing is restricted to mailboxes. There may even be a strict separation between memory managing agents and other agents that can only access the shared memory by sending query and update requests to the memory agents. This article is dedicated to an investigation of replicated data that is maintained by a memory management subsystem, whereas the replication neither appears in the requests nor in the corresponding answers. We show how the behaviour of a concurrent system with such a memory management can be specified using concurrent communicating ASMs. We provide several refinements of a high-level ground model addressing different replication policies and internal messaging between data centres. For all these refinements we analyse their effects on the runs such that decisions concerning the degree of consistency can be consciously made.Comment: 23 page

    Discrete Particle Swarm Optimization for the minimum labelling Steiner tree problem

    Get PDF
    Particle Swarm Optimization is an evolutionary method inspired by the social behaviour of individuals inside swarms in nature. Solutions of the problem are modelled as members of the swarm which fly in the solution space. The evolution is obtained from the continuous movement of the particles that constitute the swarm submitted to the effect of the inertia and the attraction of the members who lead the swarm. This work focuses on a recent Discrete Particle Swarm Optimization for combinatorial optimization, called Jumping Particle Swarm Optimization. Its effectiveness is illustrated on the minimum labelling Steiner tree problem: given an undirected labelled connected graph, the aim is to find a spanning tree covering a given subset of nodes, whose edges have the smallest number of distinct labels

    Automated Validation of State-Based Client-Centric Isolation with TLA <sup>+</sup>

    Get PDF
    Clear consistency guarantees on data are paramount for the design and implementation of distributed systems. When implementing distributed applications, developers require approaches to verify the data consistency guarantees of an implementation choice. Crooks et al. define a state-based and client-centric model of database isolation. This paper formalizes this state-based model in, reproduces their examples and shows how to model check runtime traces and algorithms with this formalization. The formalized model in enables semi-automatic model checking for different implementation alternatives for transactional operations and allows checking of conformance to isolation levels. We reproduce examples of the original paper and confirm the isolation guarantees of the combination of the well-known 2-phase locking and 2-phase commit algorithms. Using model checking this formalization can also help finding bugs in incorrect specifications. This improves feasibility of automated checking of isolation guarantees in synthesized synchronization implementations and it provides an environment for experimenting with new designs.</p

    Duckietown: An Innovative Way to Teach Autonomy

    Get PDF
    Teaching robotics is challenging because it is a multidisciplinary, rapidly evolving and experimental discipline that integrates cutting-edge hardware and software. This paper describes the course design and first implementation of Duckietown, a vehicle autonomy class that experiments with teaching innovations in addition to leveraging modern educational theory for improving student learning. We provide a robot to every student, thanks to a minimalist platform design, to maximize active learning; and introduce a role-play aspect to increase team spirit, by modeling the entire class as a fictional start-up (Duckietown Engineering Co.). The course formulation leverages backward design by formalizing intended learning outcomes (ILOs) enabling students to appreciate the challenges of: (a) heterogeneous disciplines converging in the design of a minimal self-driving car, (b) integrating subsystems to create complex system behaviors, and (c) allocating constrained computational resources. Students learn how to assemble, program, test and operate a self-driving car (Duckiebot) in a model urban environment (Duckietown), as well as how to implement and document new features in the system. Traditional course assessment tools are complemented by a full scale demonstration to the general public. The “duckie” theme was chosen to give a gender-neutral, friendly identity to the robots so as to improve student involvement and outreach possibilities. All of the teaching materials and code is released online in the hope that other institutions will adopt the platform and continue to evolve and improve it, so to keep pace with the fast evolution of the field.National Science Foundation (U.S.) (Award IIS #1318392)National Science Foundation (U.S.) (Award #1405259

    Towards a just and fair Internet: applying Rawls’ principles of justice to Internet regulation

    Get PDF
    I suggest that the social justice issues raised by Internet regulation be exposed and examined by using a methodology adapted from that described by John Rawls in A Theory of Justice. Rawls’ theory uses the hypothetical scenario of people deliberating about the justice of social institutions from the ‘original position’ as a method of removing bias in decision-making about justice. The original position imposes a ‘veil of ignorance’ that hides the particular circumstances of individuals from them so that they will not be influenced by self-interest. I adapt Rawls’ methodology by introducing an abstract description of information technology to those deliberating about justice from within the original position. This abstract description focuses on information devices that users can use to access information (and which may record information about them as well) and information networks that information devices use to communicate. The abstractness of this description prevents the particular characteristics of the Internet and the computing devices in use from influencing the decisions about the just use and regulation of information technology and networks. From this abstract position, the principles of justice that the participants accept for the rest of society will also apply to the computing devices people use to communicate, and to Internet regulatio

    REST4Mobile: A framework for enhanced usability of REST services on smartphones

    Get PDF
    Considering end-user research and proliferation of smartphones and REpresentational State Transfer (REST) interfaces, we envisage that smartphone owners can innovate to compose applications on the small screen. This paper presents the design and evaluation of a REST service development framework (viz, REST4Mobile) with the aim to enhance the usability when consuming on smartphones. Our design process uses the usability factors identified in our previous work as primary constraints for modeling the framework and a corresponding composition tool. Thus, sample REST services are developed with and then without the framework, and usability of composing the services on smartphones is evaluated. Evaluation was conducted by deploying the component REST services, the composition tool, and the resulting composite apps on a local machine. As the task of service composition is conducted directly on the smartphone's screen, the evaluation process is designed to be repeatable on remote servers and on the cloud. Results showed that constraints can be added into the REST architectural style on the basis of the influences of domain specific terms and human cognitive capabilities on the naming and size of the Uniform Resource Identifiers (URIs). In addition, the principles embodying the framework are found to be influential factors in enhancing the usability of REST services on smartphones

    A characteristics framework for Semantic Information Systems Standards

    Get PDF
    Semantic Information Systems (IS) Standards play a critical role in the development of the networked economy. While their importance is undoubted by all stakeholders—such as businesses, policy makers, researchers, developers—the current state of research leaves a number of questions unaddressed. Terminological confusion exists around the notions of “business semantics”, “business-to-business interoperability”, and “interoperability standards” amongst others. And, moreover, a comprehensive understanding about the characteristics of Semantic IS Standards is missing. The paper addresses this gap in literature by developing a characteristics framework for Semantic IS Standards. Two case studies are used to check the applicability of the framework in a “real-life” context. The framework lays the foundation for future research in an important field of the IS discipline and supports practitioners in their efforts to analyze, compare, and evaluate Semantic IS Standard
    corecore