130 Hits in 3.5 sec

Communication primitives for ubiquitous systems or RPC considered harmful

U. Saif, D.J. Greaves
Proceedings 21st International Conference on Distributed Computing Systems Workshops  
This position paper considers other alternatives and proposes the use of comvets (conditional, mobility aware events) as the unifying generic communication paradigm for such systems.  ...  state in ubiquitous systems.  ...  Acknowledgements We would like to thank Jean Beacon for her insightful comments that helped us improve the paper.  ... 
doi:10.1109/cdcs.2001.918712 dblp:conf/icdcsw/SaifG01 fatcat:w24ukkmicve2pfvic5mr66kwl4

From Distributed Systems to Ubiquitous Computing [chapter]

Friedemann Mattern, Peter Sturm
2003 Kommunikation in Verteilten Systemen (KiVS)  
We summarize trends in communication paradigms for networked systems, mention wellestablished as well as innovative software infrastructures for distributed systems (such as COM+, CORBA, .NET and Jini)  ...  We then discuss issues in spontaneous networking, and we explain the vision of Ubiquitous Computing and its intriguing prospects.  ...  Most of them, however, do not incorporate XML schemas and are thus limited to a fixed set of primitive data types, as are traditional RPC systems.  ... 
doi:10.1007/978-3-642-55569-5_1 fatcat:z7o23us56zadrm55xcdzn2gb5y

Reifying communication at the application level

Andrew P. Black, Jie Huang, Jonathan Walpole
2001 Proceedings of the 2001 international workshop on Multimedia middleware - M3W  
The ability to hide communication is a great strength of RPC and RMS.  ...  Summary We believe that middleware for adaptive streaming applications should reify communication at the application level, rather than hiding it like RPC, or exposing it in implementation terms.  ... 
doi:10.1145/985135.985146 fatcat:av3e7goysbdsxjhxlehbfeyyda

Extreme-scale computing services over MPI: Experiences, observations and features proposal for next-generation message passing interface

Judicael A Zounmevo, Dries Kimpe, Robert Ross, Ahmad Afsahi
2014 The international journal of high performance computing applications  
In this paper, we present our experiences in using MPI as a network transport for a large-scale distributed storage system.  ...  methods, or portable but less performant interfaces such as BSD sockets.  ...  Acknowledgements We thank the anonymous reviewers for their insightful comments.  ... 
doi:10.1177/1094342014548864 fatcat:mu2igx56mnazpgmcgpuv67b3ka

The Many Facets of Mediation [chapter]

A. Bennaceur, B. Nuseibeh
2017 Managing Trade-Offs in Adaptable Software Architectures  
Through dynamic composition, software systems can adapt their structure and behaviour in dynamic and heterogeneous environments such as ubiquitous computing environments.  ...  ., RPC or data stream) in order to construct more complex connectors.  ...  RPC represents the most common interaction pattern in distributed systems.  ... 
doi:10.1016/b978-0-12-802855-1.00012-5 fatcat:tjglhaxyiradfedssetr77c57m

Ambient-oriented programming

Jessie Dedecker, Tom Van Cutsem, Stijn Mostinckx, Theo D'Hondt, Wolfgang De Meuter
2005 Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications - OOPSLA '05  
Developing software for such mobile networks is extremely hard in conventional programming languages because the network is dynamically defined.  ...  the necessity for non-blocking communication primitives.  ...  Other approaches adapt the RPC protocol by supporting queuing of RPCs [22] or enabling rebinding of resources [35] .  ... 
doi:10.1145/1094855.1094867 dblp:conf/oopsla/DedeckerCMDM05 fatcat:dokjs6mkkbavvpbu7rjqpnvodm

Principled Schedulability Analysis for Distributed Storage Systems using Thread Architecture Models

Suli Yang, Jing Liu, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
2018 USENIX Symposium on Operating Systems Design and Implementation  
or impossible to realize various scheduling disciplines.  ...  We use Thread Architecture Models (TAMs) to describe the behavior and interactions of different threads in a system, and show both how to construct TAMs for existing systems and utilize TAMs to identify  ...  Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and may not reflect the views of NSF, DOE, or other institutions.  ... 
dblp:conf/osdi/YangLAA18 fatcat:e7zfbwq3u5eehocuev7nbnkuxy

Methodology for the Rapid Development of Scalable HPC Data Services

Matthieu Dorier, Philip Carns, Kevin Harms, Robert Latham, Robert Ross, Shane Snyder, Justin Wozniak, Samuel Gutierrez, Bob Robey, Brad Settlemyer, Galen Shipman, Jerome Soumagne (+3 others)
2018 2018 IEEE/ACM 3rd International Workshop on Parallel Data Storage & Data Intensive Scalable Computing Systems (PDSW-DISCS)  
There is growing evidence in the scientifc computing community that parallel file systems are not sufficient for all HPC storage workloads.  ...  This realization has motivated extensive research in new storage system designs.  ...  implementing Remote Procedure Calls (RPC) and optimized for HPC systems.  ... 
doi:10.1109/pdsw-discs.2018.00013 dblp:conf/sc/DorierCHLRSWGRS18 fatcat:agaxisl4dvhunkai6lncj4f6oa

Middleware technologies for cloud of things: a survey

Amirhossein Farahzadi, Pooyan Shams, Javad Rezazadeh, Reza Farahbakhsh
2018 Digital Communications and Networks  
Middleware sits between things and applications that make a reliable platform for communication among things with different interfaces, operating systems, and architectures.  ...  There are several factors to be considered in design and implementation of a CoT platform. One of the most important and challenging problems is the heterogeneity of different objects.  ...  CoT can utilize system performance by taking advantage of cloud services but, exchanging massive control or data packets can be harmful to this system and make it less efficient.  ... 
doi:10.1016/j.dcan.2017.04.005 fatcat:k2pqzzxj6bd5lj2yaxj3pk6pc4

Semantic Interoperability in the IoT

Oscar Novo, Mario Di Francesco
2020 ACM Transactions on Internet of Things  
For this publication, the author carried out a gap analysis of the existing network transition technologies in IoT and performed a more thorough evaluation of the mechanism previously implemented in Publication  ...  Aspects such as global connectivity or addressability are essential in the development of full ubiquitous IoT system.  ...  However, new IoT applications (e.g., autonomous vehicles, industrial IoT, or medical healthcare) are all exposed to security attacks where a security breach can eventually harm the environment or humans  ... 
doi:10.1145/3375838 fatcat:4w3ynmghjjc2ln3qlkl3p5nwrq

Persia: An Open, Hybrid System Scaling Deep Learning-based Recommenders up to 100 Trillion Parameters [article]

Xiangru Lian, Binhang Yuan, Xuefeng Zhu, Yulong Wang, Yongjun He, Honghuan Wu, Lei Sun, Haodong Lyu, Chengjun Liu, Xing Dong, Yiqiao Liao, Mingnan Luo (+15 others)
2021 arXiv   pre-print
called Persia (short for parallel recommendation training system with hybrid acceleration) to support this hybrid training algorithm.  ...  Deep learning based models have dominated the current landscape of production recommender systems.  ...  Unlike the traditional usage of RPC, where the communication is mainly responsible for transmitting small objects with complex serialization and deserialization mechanism, Persia demands a RPC implementation  ... 
arXiv:2111.05897v3 fatcat:qff55xnw2nfirn3yden4ojjava

Mobile Phone Sensing: A New Application Paradigm

Shaukat Ali, Shah Khusro
2016 Indian Journal of Science and Technology  
A generalized architecture for people-centric mobile sensing applications is proposed for increasing the potentials of researchers and developers, and saving them from being divided into separate islands  ...  Mobile phone sensing applications should optimally exploit the potentials of mobile phones for effective solutions.  ...  Primitives are transferred to the backend server using XML-RPC calls using either WiFi or GPRS. Once primitives are received by the backend server, they are stored in the MySQL database.  ... 
doi:10.17485/ijst/2016/v9i19/53088 fatcat:szw7k2w3tzabbiwq46zhq7vvay

Structuring Protocol Implementations to Protect Sensitive Data

Petr Marchenko, Brad Karp
2010 USENIX Security Symposium  
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution of application code with  ...  As evidence that this problem is poorly understood, we first identify two attacks that lead to disclosure of sensitive data in two published state-ofthe-art designs for exploit-resistant cryptographic  ...  We further thank Andrea Bittau for sharing code for his checkpoint-restore server performance optimizations.  ... 
dblp:conf/uss/MarchenkoK10 fatcat:levifyyyr5b2tefjzbidgyrnxm

A Taxonomy of Cyber Attacks on SCADA Systems

Bonnie Zhu, Anthony Joseph, Shankar Sastry
2011 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing  
to securing SCADA systems versus traditional Information Technology (IT) systems.  ...  In order to understand the potential danger and to protect SCADA systems, in this paper, we highlight their difference from standard IT systems and present a set of security property goals.  ...  ATTACKS ON THE COMMUNICATION STACK We break down the attacks on the communication stack by using the TCP/IP or the Internet reference model and highlight some of those may have more potentials in harming  ... 
doi:10.1109/ithings/cpscom.2011.34 dblp:conf/ithings/ZhuJS11 fatcat:m2ck2jax2vejlapxvw2et5r2iy

Deterministic Executable Models Verified Efficiently at Runtime - An Architecture for Robotic and Embedded Systems

Vladimir Estivill-Castro, René Hexel
2017 Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development  
In this paper, we take matters one step further and describe a uniform modelling and development paradigm for software systems that can monitor the quality of software systems as they execute, set-up,  ...  We illustrate the approach with case studies from robotics and embedded systems.  ...  In the systems engineering and robotics communities, state-machines are ubiquitous.  ... 
doi:10.5220/0006116700290040 dblp:conf/modelsward/Estivill-Castro17 fatcat:joomt5h4dzb45dixk2w4me35iy
« Previous Showing results 1 — 15 out of 130 results