90 Hits in 4.0 sec

Integrated fault-tolerant multicast and anycast routing algorithms

W. Jia, G. Xu, W. Zhao
2000 IEE Proceedings - Computers and digital Techniques  
routing algorithms taking advantage of short delay, high throughput and load sharing. (3) Fault-tolerant algorithms for both anycast and multicast routing using backup paths restoring techniques.  ...  A group of replicated (or mirrored) servers that provides anycast service may also provide multicast services and needs multicast to consistently update, whereas anycast routing may help a multicast request  ...  Introduction Internet multicast communication services have been widely recognised as a very useful tool for many internet applications such as audio and video conferencing, replicated database updating  ... 
doi:10.1049/ip-cdt:20000532 fatcat:3pphxdtkh5cmhfvjlgvu4wegsy

Synchronised Range Queries

Vinoth Suryanarayanan, Rob Minson, Georgios K. Theodoropoulus
2009 2009 13th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications  
To localise data access, this thesis also provides mechanisms to distribute shared state in an adaptive manner such that the distribution reflects access patterns of simulating nodes.  ...  The algorithms are evaluated within the implementation of PDES-MAS framework using various agent based simulation traces.  ...  It uses Scribe [20] to build a scalable application level multicast infrastructure on top of Pastry.  ... 
doi:10.1109/ds-rt.2009.31 dblp:conf/dsrt/SuryanarayananMT09 fatcat:moufqpoyajhrjnwmd55cjopmte

Hardware Acceleration of an Image Processing System for Dielectrophoretic Loading of Single Neurons Inside Micro-Wells of Microelectrode Arrays

Xiaojun Zhai, Fadi Jaber, Faycal Bensaali, Arti Mishra
2015 2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim)  
Thomas, and Mark Sumner q A System Design for the Regulated Distribution of Automotive Fuel Using RFID Karthik Srinivasan and Gaurav Roy Papers by Session q Online Localisation of Partial Discharge  ...  Investigation of the Performance of Induction Wind Generator by Using Space Vector Representation Bakuria, Koba q Artificial Neural Network and Mobile Applications in Medical Diagnosis Balogun, Adeola  ... 
doi:10.1109/uksim.2015.28 dblp:conf/uksim/ZhaiJBM15 fatcat:3ucomluvhfblray5petax7hn3y

Duplex narrowcasting operations for multipresent groupware avatars on mobile devices

Michael Cohen, Owen Noel Newton Fernando, Uresh Chanaka Duminduwardena, Makoto Kawaguchi
2009 International Journal of Wireless and Mobile Computing  
Featuring multiple icons in a '2.5D' application, the interface can be used to control motion, sensitivity, and audibility of avatars in a teleconference.  ...  The apparent paradoxes of multipresence, having avatars in multiple places simultaneously, are resolvable by an 'autofocus' feature, which uses reciprocity to project overlaid soundscapes and simulate  ...  They can then use the downloaded applications and content whenever they want, without having to reconnect to the internet.  ... 
doi:10.1504/ijwmc.2009.029348 fatcat:p6pb62bh4fdnpk5q4pmstlgehe

Behavioural semantics for asynchronous components

R. Ameur-Boulifa, L. Henrio, O. Kulankhina, E. Madelaine, A. Savu
2017 Journal of Logical and Algebraic Methods in Programming  
Software components are a valuable programming abstraction that enables a compositional design of complex applications.  ...  We use the pNet intermediate language to express the semantics of hierarchical distributed components communicating asynchronously by a request-reply mechanism.  ...  To ensure the safety of distributed applications, we propose to use formal methods to be able to verify the correct behaviour of distributed applications.  ... 
doi:10.1016/j.jlamp.2017.02.003 fatcat:d75p3am4krbo5fepxdzrcjp4dm

Churn-Resilient Protocol for Massive Data Dissemination in P2P Networks

Zhenyu Li, Gaogang Xie, Kai Hwang, Zhongcheng Li
2011 IEEE Transactions on Parallel and Distributed Systems  
The scheme appeals especially to webscale applications in digital content delivery, network worm containment, and consumer relationship management over hundreds of datacenters in cloud computing services  ...  We present new data dissemination algorithms using this proximity-aware overlay design. We simulated P2P networks up to 20,000 nodes to validate the claimed advantages.  ...  Application layer multicast using peer-to-peer (P2P) overlay networks is a promising alternative to IP multicast.  ... 
doi:10.1109/tpds.2011.15 fatcat:x5ntmlyi7nhu3f7ugj66kd6ye4

ESCAPE: A Component-Based Policy Framework for Sense and React Applications [chapter]

Giovanni Russello, Leonardo Mostarda, Naranker Dulay
2008 Lecture Notes in Computer Science  
While applications components are used to implement basic functionalities (sense and reaction) our framework allows the specification of application-domain requirements.  ...  With the introduction of nodes sporting actuators, Wireless Sensor Networks (WSNs) are being used for realising such applications. Sensor and actuator nodes are capable of interact locally.  ...  Localised computation.  ... 
doi:10.1007/978-3-540-87891-9_14 fatcat:j63qtc5itrbxtnjbqc3hmoryym

Protocols by Default [chapter]

Nicholas Ng, Jose Gabriel de Figueiredo Coutinho, Nobuko Yoshida
2015 Lecture Notes in Computer Science  
This merging process is fully automated through the use of an aspect-oriented compilation approach.  ...  The code generation process starts with the definition of the global topology using a protocol specification language based on parameterised multiparty session types (MPST).  ...  The endpoint protocols are localised projection versions of the global protocol.  ... 
doi:10.1007/978-3-662-46663-6_11 fatcat:6alwdcibi5ajba2uizaywdcdoi

Middleware and architectures for space-based and situated computing

Valentin Cristea, Ciprian Dobre, Alexandru Costan, Florin Pop
2011 International Journal of Space-Based and Situated Computing (IJSSC)  
The aim is to sustain systems that collect information about contexts and user actions over a period of time and supply it to applications that dynamically adapt to context changes.  ...  Situated computing systems have various architectures, but most of them include a middleware layer that supports equipment with limited computing resources and offers functionalities that simplify applications  ...  The predicate model supports the use of different reasoning mechanisms.  ... 
doi:10.1504/ijssc.2011.039106 fatcat:o3x6jis77bdhxl3cm57oah6oye

Exploiting Tightly-Coupled Cores

Daniel Bates, Alex Bradbury, Andreas Koltes, Robert Mullins
2014 Journal of Signal Processing Systems  
Inter-core communication is only possible via memory, and control over a core's resources is localised.  ...  An alternative approach is to permit specialisation by tailoring the way a large number of homogeneous cores are used.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution License which permits any use, distribution, and reproduction in any medium, provided the original author(s)  ... 
doi:10.1007/s11265-014-0944-6 fatcat:oaujz5oqqncrlotwnv2sxp6qvy

Exploiting tightly-coupled cores

Daniel Bates, Alex Bradbury, Andreas Koltes, Robert Mullins
2013 2013 International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation (SAMOS)  
Inter-core communication is only possible via memory, and control over a core's resources is localised.  ...  An alternative approach is to permit specialisation by tailoring the way a large number of homogeneous cores are used.  ...  Open Access This article is distributed under the terms of the Creative Commons Attribution License which permits any use, distribution, and reproduction in any medium, provided the original author(s)  ... 
doi:10.1109/samos.2013.6621138 dblp:conf/samos/BatesBKM13 fatcat:yxoa5sxlrzg4lebxigqf4y5w6m

An architecture for tailoring cooperative multi-user displays

Richard Bentley, Tom Rodden, Peter Sawyer, Ian Sommerville
1992 Proceedings of the 1992 ACM conference on Computer-supported cooperative work - CSCW '92  
We conclude that the architecture is equally applicable to other Command and Control domains, where a shared information space forms the focus for the work taking place.  ...  This paper considers the problems associated with the development of tailorable cooperative interfaces and proposes an architecture which allows such interfaces to be developed using an incremental, user-centred  ...  The majority of shared window systems use a centralised agent to multiplex output from applications onto a number of display screens and to route input from each display to the appropriate applications  ... 
doi:10.1145/143457.143478 dblp:conf/cscw/BentleyRSS92 fatcat:wmdofdhko5eshp6qetpcqlutju

ESB federation for large-scale SOA

Françoise Baude, Christophe Hammerling, Jean-Pierre Lorre, Imen Filali, Fabrice Huet, Virginie Legrand, Elton Mathias, Philippe Merle, Cristian Ruz, Reto Krummenacher, Elena Simperl
2010 Proceedings of the 2010 ACM Symposium on Applied Computing - SAC '10  
The registry entries are replicated among all the bus nodes using a distributed hash table over a multicast channel.  ...  CAN axis represent subjects, predicates, objects of RDF triples. Space is partitioning into zones.  ... 
doi:10.1145/1774088.1774597 dblp:conf/sac/BaudeFHCMMRKSHL10 fatcat:rlxytcg2pffjnec7qa3cgtytbe

SpiNNaker - programming model

2014 IEEE transactions on computers  
Multicast Messages An MC message is (intended to be) used for device-level communication within a simulation.  ...  The solid lines show information flow, and the predicate relationships are shown by the dotted curved lines.  ... 
doi:10.1109/tc.2014.2329686 fatcat:gas4bqmryzblnjymj3dubab7hy

Towards an Analysis of Dynamic Gossip in Netkat [chapter]

Malvin Gattinger, Jana Wagemaker
2018 Lecture Notes in Computer Science  
In this paper we analyse the dynamic gossip problem using the algebraic network programming language Netkat.  ...  We show that a reinterpretation of Netkat in which we keep track of the state of switches allows us to model Learn New Secrets, a well-studied protocol for dynamic gossip.  ...  This observation is motivated by the application to dynamic gossip, but also applies to Netkat in general.  ... 
doi:10.1007/978-3-030-02149-8_17 fatcat:5esuu5bs4vhbjct7xuhleku3ta
« Previous Showing results 1 — 15 out of 90 results