116 research outputs found

    PETRI NET BASED MODELING OF PARALLEL PROGRAMS EXECUTING ON DISTRIBUTED MEMORY MULTIPROCESSOR SYSTEMS

    Get PDF
    The development of parallel programs following the paradigm of communicating sequen- tial processes to be executed on distributed memory multiprocessor systems is addressed. The key issue in programming parallel machines today is to provide computerized tools supporting the development of efficient parallel software, i.e. software effectively har- nessing the power of parallel processing systems. The critical situations where a parallel programmer needs help is in expressing a parallel algorithm in a programming language, in getting a parallel program to work and in tuning it to get optimum performance (for example speedup). . We show that the Petri net formalism is higly suitable as a performance modeling technique for asynchronous parallel systems, by introducing a model taking care of the parallel program, parallel architecture and mapping influences on overall system perfor- mance. PRM -net (Program-Resource- Mapping) models comprise a Petri net model of the multiple flows of control in a parallel program, a Petri net model of the parallel hardware and the process-to-processor mapping information into a single integrated performance model. Automated analysis of PRM-net models addresses correctness and performance of parallel programs mapped to parallel hardware. Questions upon the correctness of parallel programs can be answered by investigating behavioural properties of Petri net programs like liveness, reachability, boundedness, mutualy exclusiveness etc. Peformance of parallel programs is usefully considered only in concern with a dedicated target hard- ware. For this reason it is essential to integrate multiprocessor hardware characteristics into the specification of a parallel program. The integration is done by assigning the concurrent processes to physical processing devices and communication patterns among parallel processes to communication media connecting processing elements yielding an in- tegrated, Petri net based performance model. Evaluation of the integrated model applies simulation and markovian analysis to derive expressions characterising the peformance of the program being developed. Synthesis and decomposition rules for hierarchical models naturally give raise to use PRM-net models for graphical, performance oriented parallel programming, support- ing top-down (stepwise refinement) as well as bottom-up development approaches. The graphical representation of Petri net programs visualizes phenomena like parallelism, syn- chronisation, communication, sequential and alternative execution. Modularity of pro- gram blocks aids reusability, prototyping is promoted by automated code generation on the basis of high level program specifications

    SPECI, a simulation tool exploring cloud-scale data centres

    Full text link
    There is a rapid increase in the size of data centres (DCs) used to provide cloud computing services. It is commonly agreed that not all properties in the middleware that manages DCs will scale linearly with the number of components. Further, "normal failure" complicates the assessment of the per-formance of a DC. However, unlike in other engineering domains, there are no well established tools that allow the prediction of the performance and behav-iour of future generations of DCs. SPECI, Simulation Program for Elastic Cloud Infrastructures, is a simulation tool which allows exploration of aspects of scaling as well as performance properties of future DCs

    A Novel Approach for Distributed Simulation of Wireless Mobile Systems

    Full text link

    satin: A Component Model for Mobile Self Organisation

    Get PDF
    We have recently witnessed a growing interest in self organising systems, both in research and in practice. These systems re-organise in response to new or changing conditions in the environment. The need for self organisation is often found in mobile applications; these applications are typically hosted in resource-constrained environments and may have to dynamically reorganise in response to changes of user needs, to heterogeneity and connectivity challenges, as well as to changes in the execution context and physical environment. We argue that physically mobile applications benefit from the use of self organisation primitives. We show that a component model that incorporates code mobility primitives assists in building self organising mobile systems. We present satin, a lightweight component model, which represents a mobile system as a set of interoperable local components. The model supports reconfiguration, by offering code migration services. We discuss an implementation of the satin middleware, based on the component model and evaluate our work by adapting existing open source software as satin components and by building and testing a system that manages the dynamic update of components on mobile hosts

    Seven HCI Grand Challenges

    Get PDF
    This article aims to investigate the Grand Challenges which arise in the current and emerging landscape of rapid technological evolution towards more intelligent interactive technologies, coupled with increased and widened societal needs, as well as individual and collective expectations that HCI, as a discipline, is called upon to address. A perspective oriented to humane and social values is adopted, formulating the challenges in terms of the impact of emerging intelligent interactive technologies on human life both at the individual and societal levels. Seven Grand Challenges are identified and presented in this article: Human-Technology Symbiosis; Human-Environment Interactions; Ethics, Privacy and Security; Well-being, Health and Eudaimonia; Accessibility and Universal Access; Learning and Creativity; and Social Organization and Democracy. Although not exhaustive, they summarize the views and research priorities of an international interdisciplinary group of experts, reflecting different scientific perspectives, methodological approaches and application domains. Each identified Grand Challenge is analyzed in terms of: concept and problem definition; main research issues involved and state of the art; and associated emerging requirements

    Internet of things: where to be is to trust

    Get PDF
    [EN] Networks' creation is getting more and more required, anytime, anywhere. Devices that can participate on these networks can be quite different among them. Sensors, mobiles, home appliances, or other type of devices will have to collaborate to increase and improve the services provided to clients. In the same way, network configuration, security mechanisms establishment, and optimal performance control must be done by them. Some of these devices could have limited resources to work, sometimes even resources restriction not existing, they must work to optimize network traffic. In this article, we center our researching on spontaneous networks. We propose a secure spontaneous ad-hoc network, based on direct peer-to-peer interaction and communities' creation to grant a quick, easy, and secure access to users to surf the Web. Each device will have an identity in the network. Each community will also have an identity and will act as a unity on a world based on Internet connection. Security will be established in the moment they access to the network through the use of the trust chain generated by nodes. Trust is modified by each node on the basis of nodes behaviorLacuesta, R.; Palacios-Navarro, G.; Cetina Englada, C.; Peñalver Herrero, ML.; Lloret, J. (2012). Internet of things: where to be is to trust. EURASIP Journal on Wireless Communications and Networking. (203):1-16. doi:10.1186/1687-1499-2012-203S116203Lipnack J, Stamps J: Virtual Teams: Researching Across Space, Time, and Organizations with Technology. New York: John Wiley and Sons; 1997.Ahuja MK, Carley KN: Network structure in virtual organizations, organization science, Vol. 10, No. 6, Special Issue: Communication Processes for Virtual Organizations, November–December. 1999, 741-757.Mowshowitz A: Virtual organization. Commun ACM 1997, 40(9):30-37. 10.1145/260750.260759Preuß S: CH Cap, Overview of spontaneous networking-evolving concepts and technologies, in Rostocker Informatik-Berichte. Rostock: Fachbereich Informatik der Universit; 2000:113-123.Feeney LM, Ahlgren B, Westerlund A: Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Commun Mag 2001, 39(6):176-181. 10.1109/35.925687Latvakoski J, Pakkala D, Pääkkönen P: A communication architecture for spontaneous systems. IEEE Wirel Commun 2004, 11(3):36-42. 10.1109/MWC.2004.1308947Mani M, Nguyen A-M, Crespi N: SCOPE: a prototype for spontaneous P2P social networking. Proceedings of 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops) 2010, 220-225.Legendre F, de Amorim MD, Fdida S: Implicit merging of overlapping spontaneous networks. Proceedings of Vehicular Technology Conference 2004, 3050-3054.Zarate Silva VH, De Cruz Salgado EI, Ramos Quintana F: AWISPA: an awareness framework for collaborative spontaneous networks. 36th Annual Frontiers in Education Conference 2006, 27-31.Perkins CE, Bhagwat P: Highly dynamic destination sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM’94 1994, 234-244.Johnson DB, Maltz DA, Broch J: DSR: The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. Boston, MA: Ad Hoc Networking (Addison-Wesley Longman Publishing; 2001.Perkins C, Belding-Royer E, Das S: Ad hoc on-demand distance vector (AODV) routing, RFC 3561. 2003.Park V, Corson MS: IETF MANET Internet Draft “draft-ietf-MANET-tora-spe03.txt”, November 2000. 2012. Accessed March http://tools.ietf.org/html/draft-ietf-manet-tora-spec-03Viana AC, De Amorim MD, Fdida S, de Rezende JF: Self-organization in spontaneous networks: the approach of DHT-based routing protocols. Ad Hoc Networks 2005, 3(5):589-606. 10.1016/j.adhoc.2004.08.006Lacuesta R, Peñalver L: IP addresses configuration in spontaneous networks. In Proceedings of the 9th WSEAS International Conference on Computers. Athens, Greece; 2005:1-6.Alvarez-Hamelin JI, Viana AC, de Amorim M Dias: Architectural considerations for a self-configuring routing scheme for spontaneous networks, Technical Report 1. 2005.Lacuesta R, Peñalver L: Automatic configuration of ad-hoc networks: establishing unique IP link-local addresses. In Proceedings of the International Conference on Emerging Security Information, Systems and Technologies (SECURWARE’07). Valencia, Spain; 2007:157-162.Foulks EF: Social network therapies and society: an overview. Contemp Fam Therapy 1985, 3(4):316-320.IBM: A Smarter Planet. 2012. http://www.ibm.com/smarterplanetMontenegro G, Kushalnagar N, Hui J, Culler D: RFC 4944: Transmission of IPv6 Packets over IEEE 802.15.4 Networks. 2007.Alcaraz C, Najera P, Lopez J, Roman R: Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?, 1st International workshop on the security of The internet of Things (SecIoT). tokyo (Japan); 2010. . Accessed January 2012 1er International Workshop on the Security of The Internet of Things (SecIoT 2010) http://www.nics.uma.es/seciot10/files/pdf/alcaraz_seciot10_paper.pdfFerscha A, Davies N, Schmidt A, Streitz N: Pervasive Socio-Technical Fabric. Procedia Computer Science 2011, 7: 88-91.Hubaux JP, Buttyán L, Capkun S: The quest for security in mobile ad-hoc networks, in Proceedings of the ACM Symposium on Mobile Ad-hoc Networking and Computing. 2001, 146-155.Wang Y, Varadharajan V: Interaction trust evaluation in decentralized environments, e-commerce and web technologies. In Proceedings of 5th International Conference on Electronic Commerce and Web Technologies, vol LNCS 3182. Springer; 2004:144-153.Jimin L, Junbao L, Aiguo A, Zhenpeng L: Two-way trust evaluation based on feedback. in Conference on Logistics Systems and Intelligent Management 2010, 3: 1910-1914.Daskapan S, Nurtanti I, Van den Berg J: Trust algorithms in P2P file sharing networks. Int J Internet Technol Secured Trans 2010, 2(1–2):174-200.Maña A, Koshutanski H, Pérez EJ: A trust negotiation based security framework for service provisioning in load-balancing clusters. Comput Secur 2012, 31(1):4-25. 10.1016/j.cose.2011.11.006Stajano F, Anderson R: The resurrecting duckling security issues for ad-hoc wireless networks. Security Protocols, 7th International Workshop Proceedings, Lecture notes in Computer Science, LNCS 1296 1999, 172-194.Balfanz D, Smetters DK, Stewart P, ChiWong H: Talking to strangers: authentication in ad-hoc wireless networks, in Symposium on Network and Distributed Systems Security (NDSS’02). San Diego, CA; 2002.Capkun S, Hubaux JP, Buttyán L: Mobility helps security in ad-hoc networks. In Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing. MD, USA: Annapolis; 2003:46-56.Metzger MJ: Privacy, trust, and disclosure: exploring barriers to electronic commerce. J Comput-Mediat Commun 2004, 9(4). http://jcmc.indiana.edu/vol9/issue4/metzger.html 2004, 9(4)

    Innovation und Trends für Mobiles Lernen

    Full text link
    Der Beitrag zeigt aktuelle Trends im Bereich der mobilen und ubiquitären Lerntechnologien auf, welche die klassischen Konzepte von Mobilem Lernen erweitern: a) Mobiler und allgegenwärtiger Zugang zu Lerninhalten b) unterbrechungsfreie Lernunterstützung oder "Seamless Learning Support", die nahtlose Integration von Lernunterstützung in gemischten Lernszenarien, c) Smartphones und Sensoren im Mobilen Lernen, d) Mobile Gaming und mobile Augmented Reality und e) situierte eingebettete Displays. Anhand dieser Trends werden die Konsequenzen für das didaktische Design und darunter liegende Lernkonzepte diskutiert
    corecore