Filters








8,962 Hits in 2.9 sec

Implementing atomic actions on decentralized data

David P. Reed
1983 ACM Transactions on Computer Systems  
Synchronization of accesses to shared data and recovering the state of such data in the case of failures are really two aspects of the same problem--implementing atomic actions on a related set of data  ...  In particular, the correct construction and execution of a new atomic action can be accomplished without knowledge of all other atomic actions in the system that might execute concurrently.  ...  ACKNOWLEDGMENTS Jerry Saltzer read and criticized numerous drafts of this paper, and earlier performed the same task for the dissertation on which it is based.  ... 
doi:10.1145/357353.357355 fatcat:zccsekc73ndyzgeebow3pbg7he

Implementing atomic actions on decentralized data (Extended Abstract)

David P. Reed
1979 Proceedings of the seventh symposium on Operating systems principles - SOSP '79  
In the full paper, we first define atomic actions and discuss the problems of implementing atomic actions in a decentralized system.  ...  We concentrate here particularly on the application of this method to the implementation of atomic actions.  ... 
doi:10.1145/800215.806584 dblp:conf/sosp/Reed79 fatcat:s4gp2pt6ujdrzkozh2d7bgdybi

Bringing Runtime Verification Home [chapter]

Antoine El-Hokayem, Yliès Falcone
2018 Lecture Notes in Computer Science  
We leverage a recent approach to decentralized RV of decentralized specifications, where monitors have their own specifications and communicate together to verify more general specifications.  ...  We implemented two peripheries to process sensor trace data: SensorBool and SensorThresh.  ...  Cumin, for providing the collected data. This article is based upon work from COST Action ARVI IC1402, supported by the European Cooperation in Science and Technology.  ... 
doi:10.1007/978-3-030-03769-7_13 fatcat:7up6vjqpo5ewlghoh7z2rehgs4

Influence-based model decomposition for reasoning about spatially distributed physical systems

Chris Bailey-Kellogg, Feng Zhao
2001 Artificial Intelligence  
Influence-based model decomposition uses a decentralized model, called an influence graph, as a key data abstraction representing influences of controls on distributed physical fields.  ...  and designing decentralized controllers for spatially distributed systems.  ...  Similarly, such a clumping makes it hard to individually determine control actions, since the actions taken by one control strongly affect the necessary actions of another (e.g., heat from one source affects  ... 
doi:10.1016/s0004-3702(01)00090-x fatcat:snukysniqveadnxwek53accrs4

Ontological Smart Contracts in OASIS: Ontology for Agents, Systems, and Integration of Services (Extended Version) [article]

Domenico Cantone, Carmelo Fabio Longo, Marianna Nicolosi-Asmundo, Daniele Francesco Santamaria, Corrado Santoro
2021 arXiv   pre-print
agent interactions, define activation mechanisms that trigger agent actions, and define constraints and contract terms on OSCs.  ...  Conditionals and OSCs, as defined in OASIS, are applied to extend with ontological capabilities digital public ledgers such as the blockchain and smart contracts implemented on it.  ...  In order to reduce the cost of transactions and the time required to compute them, data-oriented applications need to rely on a decentralized server to store information.  ... 
arXiv:2012.01410v3 fatcat:566sam4cx5f2jhcv6o4xqcn3ym

Approaching decentralized non-repudiation

H. Kamdem Fezeu, T. Djotio, R. Oulad Haj Thami
2018 EAI Endorsed Transactions on Ubiquitous Environments  
Securing data exchanges is a major preoccupation, and several techniques have been developed to reach that aim. The predominant model for such exchange is that which relies on trusted third-parties.  ...  decentralized networks ever more relevant.  ...  in decentralized networks, as well as overlaid on existing infrastructure.  ... 
doi:10.4108/eai.12-1-2018.153559 fatcat:t7wnygucabc7lhiljrlynvspmm

Scalable Transaction Management on Cloud Data Management Systems

Salve Bhagyashri Salve Bhagyashri
2013 IOSR Journal of Computer Engineering  
As the problem of building scalable trans-action management mechanisms for multi-row transactions on key-value storage systems .  ...  The second model is based on a hybrid approach in which the conflict detection techniques are implemented by a dedicated service.  ...  We implement and evaluate the above approaches in both fully decentralized model and service-based model.  ... 
doi:10.9790/0661-1056574 fatcat:le2pra4hczajxcop5kko6oglii

Mechanisms for environments in multi-agent systems: Survey and opportunities

Eric Platon, Marco Mamei, Nicolas Sabouret, Shinichi Honiden, H. Van Dyke Parunak
2006 Autonomous Agents and Multi-Agent Systems  
The constituent atoms consist of multiple data repositories to store information in a decentralized way.  ...  Constituent atoms: Multiplicity of data spaces to store the overlay data.  ... 
doi:10.1007/s10458-006-9000-7 fatcat:35ik2rbpsffzfbrrfrcepcqasy

Bringing Runtime Verification Home – A Case Study on the Hierarchical Monitoring of Smart Homes using Decentralized Specifications [article]

Antoine El-Hokayem, Yliès Falcone
2019 arXiv   pre-print
We leverage a recent approach to decentralized RV of decentralized specifications, where monitors have their own specifications and communicate together to verify more general specifications.  ...  We leverage the hierarchies, modularity and re-use afforded by decentralized specifications to: (1) scale beyond existing centralized RV techniques, and (2) greatly reduce computation and communication  ...  Monitoring Data Structures and Their Operations The data structures memory and EHE operate over atoms, where an atom is an encoding of atomic propositions.  ... 
arXiv:1808.05487v2 fatcat:hr3z6sq4jjb75efat33rtlrdii

Scalable Transaction Management with Snapshot Isolation on Cloud Data Management Systems

Vinit Padhye, Anand Tripathi
2012 2012 IEEE Fifth International Conference on Cloud Computing  
The second architecture is based on a hybrid approach in which the conflict detection techniques are implemented by a dedicated service.  ...  In the first system architecture all transaction management functions are executed in a fully decentralized manner by the application processes.  ...  Based on these approaches, we investigate decentralized techniques for implementing serializable transactions on Cloud-based NoSQL databases.  ... 
doi:10.1109/cloud.2012.102 dblp:conf/IEEEcloud/PadhyeT12 fatcat:su4npesiznfxvh67j4fdapx4ry

Design-by-contract for reusable components and realizable architectures

Mert Ozkaya, Christos Kloukinas
2014 Proceedings of the 17th international ACM Sigsoft symposium on Component-based software engineering - CBSE '14  
it from then on.  ...  Connector frameworks so far allow designers to specify systems that are unrealizable in a decentralized manner, as they allow designers to impose global interaction constraints.  ...  on their actions.  ... 
doi:10.1145/2602458.2602463 dblp:conf/cbse/OzkayaK14 fatcat:xfappy7qq5g2jiqxfhrixrd7py

Scalable Transaction Management with Snapshot Isolation for NoSQL Data Storage Systems

Vinit Padhye, Anand Tripathi
2015 IEEE Transactions on Services Computing  
In the first system architecture all transaction management functions are executed in a fully decentralized manner by the application processes.  ...  The second architecture is based on a hybrid approach in which the conflict detection functions are performed by a dedicated service.  ...  Not performing all steps of the commit protocol as one atomic action raises a number of issues.  ... 
doi:10.1109/tsc.2013.47 fatcat:p5yylbindjdrditzejixvukpk4

Distributed B-Tree with Weak Consistency [chapter]

Gregor V. Bochmann, Shah Asaduzzaman
2013 Lecture Notes in Computer Science  
Highly parallel operations are desired by modern-day cloud computing platforms on high-volume and highly dynamic sets of data.  ...  This motivates decentralized indexing structures for data-organization that avoid any performance bottleneck.  ...  Fig. 1 . 1 Consistent decentralized implementation of the B-tree. The view of the tree from processor F (left).  ... 
doi:10.1007/978-3-642-40148-0_12 fatcat:l5cst2i5uzhvjou4bexgtjnagq

A Model-Based Approach to Secure Multiparty Distributed Systems [chapter]

Najah Ben Said, Takoua Abdellatif, Saddek Bensalem, Marius Bozga
2016 Lecture Notes in Computer Science  
To illustrate the approach, we present a framework that implements our method and use it to secure an online social network application.  ...  Unlike existing methods dealing with verification of low-level cryptographic protocols, we propose a novel model-based approach based on model transformations to build a secure-by-construction multiparty  ...  Information flow control relies on annotating system data and/or actions with specific levels of security and use specific methods for checking non-interference, that is, absence of leakage, between different  ... 
doi:10.1007/978-3-319-47166-2_62 fatcat:r5ykgo7yjrhvxnp5rtrjgex5au

Seven challenges for RESTful transaction models

Nandana Mihindukulasooriya, Miguel Esteban-Gutiérrez, Raúl García-Castro
2014 Proceedings of the 23rd International Conference on World Wide Web - WWW '14 Companion  
However, one of the main drawbacks of RESTful services is the lack of standard mechanisms to support advanced quality-ofservice requirements that are common to enterprises.  ...  Transaction processing is one of the essential features of enterprise information systems and several transaction models have been proposed in the past years to fulfill the gap of transaction processing  ...  One thing to note is that while atomicity and isolation are guaranteed by the transaction protocols, consistency validation and durability are mostly guaranteed by the implementation (thus are not included  ... 
doi:10.1145/2567948.2579218 dblp:conf/www/MihindukulasooriyaGG14 fatcat:tveorlvzibglxktydekxnbaid4
« Previous Showing results 1 — 15 out of 8,962 results