Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1498)
- Environmental Sciences (1305)
- Physics (905)
- Engineering (810)
- Chemistry (762)
-
- Life Sciences (712)
- Social and Behavioral Sciences (672)
- Earth Sciences (632)
- Mathematics (595)
- Oceanography and Atmospheric Sciences and Meteorology (358)
- Statistics and Probability (354)
- Computer Engineering (338)
- Astrophysics and Astronomy (234)
- Education (234)
- Geology (227)
- Natural Resources and Conservation (217)
- Arts and Humanities (201)
- Natural Resources Management and Policy (195)
- Databases and Information Systems (193)
- Electrical and Computer Engineering (185)
- Applied Mathematics (177)
- Environmental Indicators and Impact Assessment (175)
- Environmental Health and Protection (154)
- Business (152)
- Science and Mathematics Education (152)
- Law (137)
- Sustainability (137)
- Water Resource Management (123)
- Information Security (121)
- Institution
-
- University of Nebraska - Lincoln (947)
- University of Wollongong (359)
- Wright State University (302)
- TÜBİTAK (220)
- Selected Works (185)
-
- Singapore Management University (163)
- Missouri University of Science and Technology (158)
- University of Nevada, Las Vegas (157)
- Brigham Young University (139)
- Louisiana State University (135)
- SelectedWorks (116)
- Old Dominion University (112)
- University of Kentucky (108)
- Utah State University (107)
- Embry-Riddle Aeronautical University (97)
- Edith Cowan University (92)
- Chinese Chemical Society | Xiamen University (86)
- Wayne State University (84)
- COBRA (83)
- Clemson University (81)
- Air Force Institute of Technology (76)
- William & Mary (76)
- Georgia State University (75)
- Portland State University (71)
- University of Central Florida (70)
- University of Massachusetts Amherst (70)
- University of Tennessee, Knoxville (69)
- Technological University Dublin (68)
- University of Northern Iowa (63)
- University of Texas at Arlington (62)
- Keyword
-
- Invasive species (66)
- Environmental science--Experiments; Ecology--Experiments; Atmospheric physics--Experiments; (37)
- CMMB (36)
- Human–wildlife conflicts (28)
- Water (28)
-
- Climate change (27)
- GeoQUEST (27)
- Groundwater (26)
- Mathematics (26)
- [RSTDPub] (26)
- Natural resources (25)
- Conservation (24)
- Coyote (24)
- Management (24)
- Data (23)
- Geology (23)
- 2007 (21)
- Natural resource management (21)
- Physics (21)
- College for Professional Studies (20)
- History (20)
- California (19)
- Chemistry (19)
- Computer science (19)
- Landslides (19)
- Research and Technical Reports (19)
- School of Computer & Information Science (19)
- United States (19)
- Environment (18)
- Machine learning (18)
- Publication
-
- Faculty of Informatics - Papers (Archive) (209)
- Theses and Dissertations (198)
- Computer Science & Engineering Syllabi (160)
- Research Collection School Of Computing and Information Systems (158)
- Faculty Publications (142)
-
- Faculty of Science - Papers (Archive) (120)
- United States Department of Agriculture Wildlife Services: Staff Publications (114)
- Electronic Theses and Dissertations (104)
- Journal of Electrochemistry (86)
- Turkish Journal of Chemistry (83)
- Nebraska Tractor Tests (75)
- Journal of Modern Applied Statistical Methods (64)
- Masters Theses (61)
- Kno.e.sis Publications (57)
- Managing Vertebrate Invasive Species (56)
- Physics Faculty Publications (56)
- Sci-Tech News (55)
- Human–Wildlife Interactions (54)
- LSU Master's Theses (52)
- Publications (52)
- United States Geological Survey: Staff Publications (50)
- Doctoral Dissertations (49)
- Turkish Journal of Mathematics (48)
- All Computer Science and Engineering Research (47)
- LSU Doctoral Dissertations (47)
- Physics Faculty Research & Creative Works (47)
- Browse all Theses and Dissertations (43)
- Dissertations (43)
- Thai Environment (43)
- Open Educational Resources (42)
- Publication Type
Articles 6151 - 6180 of 6763
Full-Text Articles in Physical Sciences and Mathematics
The Effect Of Object Color On Depth Ordering, Reynold Bailey, Cindy Grimm, Christopher Davoli, Richard Abrams
The Effect Of Object Color On Depth Ordering, Reynold Bailey, Cindy Grimm, Christopher Davoli, Richard Abrams
All Computer Science and Engineering Research
The relationship between color and perceived depth for realistic, colored objects with varying shading was explored. Background: Studies have shown that warm-colored stimuli tend to appear nearer in depth than cool-colored stimuli. The majority of these studies asked human observers to view physically equidistant, colored stimuli and compare them for relative depth. However, in most cases, the stimuli presented were rather simple: straight colored lines, uniform color patches, point light sources, or symmetrical objects with uniform shading. Additionally, the colors were typically highly saturated. Although such stimuli are useful for isolating and studying depth cues in certain contexts, they leave …
Emergent Task Allocation For Mobile Robots Through Intentions And Directives, Nuzhet Atay, Burchan Bayazit
Emergent Task Allocation For Mobile Robots Through Intentions And Directives, Nuzhet Atay, Burchan Bayazit
All Computer Science and Engineering Research
Multi-robot systems require efficient and accurate planning in order to perform mission-critical tasks. However, algorithms that find the optimal solution are usually computationally expensive and may require a large number of messages between the robots as the robots need to be aware of the global spatiotemporal information. In this paper, we introduce an emergent task allocation approach for mobile robots. Each robot uses only the information obtained from its immediate neighbors in its decision. Our technique is general enough to be applicable to any task allocation scheme as long as a utilization criteria is given. We demonstrate that our approach …
Expression Profiling Of Human Donor Lungs To Understand Primary Graft Dysfunction After Lung Transplantation, Monika Ray, Sekhar Dharmarajan, Johannes Freudenberg, Weixiong Zhang, Alexander G. Patterson
Expression Profiling Of Human Donor Lungs To Understand Primary Graft Dysfunction After Lung Transplantation, Monika Ray, Sekhar Dharmarajan, Johannes Freudenberg, Weixiong Zhang, Alexander G. Patterson
All Computer Science and Engineering Research
Lung transplantation is the treatment of choice for end-stage pulmonary diseases. A limited donor supply has resulted in 4000 patients on the waiting list. Currently, 10-20% of donor organs offered for transplantation are deemed suitable under the selection criteria, of which 15-25% fails due to primary graft dysfunction (PGD). This has resulted in increased efforts to search for alternative donor lungs selection criteria. In this study, we attempt to further our understanding of PGD by observing the changes in gene expression across donor lungs that developed PGD versus those that did not. Our second goal is to use a machine …
Determining Alpha-Helix Correspondence For Protein Structure Prediction From Cryo-Em Density Maps, Master's Thesis, May 2007, Sasakthi S. Abeysinghe
Determining Alpha-Helix Correspondence For Protein Structure Prediction From Cryo-Em Density Maps, Master's Thesis, May 2007, Sasakthi S. Abeysinghe
All Computer Science and Engineering Research
Determining protein structure is an important problem for structural biologists, which has received a significant amount of attention in the recent years. In this thesis, we describe a novel, shape-modeling approach as an intermediate step towards recovering 3D protein structures from volumetric images. The input to our method is a sequence of alpha-helices that make up a protein, and a low-resolution volumetric image of the protein where possible locations of alpha-helices have been detected. Our task is to identify the correspondence between the two sets of helices, which will shed light on how the protein folds in space. The central …
Splice: A Standardized Peripheral Logic And Interface Creation Engine, Justin Thiel
Splice: A Standardized Peripheral Logic And Interface Creation Engine, Justin Thiel
All Computer Science and Engineering Research
Recent advancements in FPGA technology have allowed manufacturers to place general-purpose processors alongside user-configurable logic gates on a single chip. At first glance, these integrated devices would seem to be the ideal deployment platform for hardware-software co-designed systems, but some issues, such as incompatibility across vendors and confusion over which bus interfaces to support, have impeded adoption of these platforms. This thesis describes the design and operation of Splice, a software-based code generation tool intended to address these types of issues by providing a bus-independent structure that allows end-users to easily integrate their customized peripheral logic into embedded systems. To …
Price Of Asynchrony: Queuing Under Ideally Smooth Congestion Control, Maxim Podlesny, Sergey Gorinsky
Price Of Asynchrony: Queuing Under Ideally Smooth Congestion Control, Maxim Podlesny, Sergey Gorinsky
All Computer Science and Engineering Research
The ability of TCP (Transmission Control Protocol) or alternative congestion control algorithms to operate successfully in networks with small link buffers has recently become a subject of intensive research. In this paper, we investigate fundamental limitations on minimum buffer requirements for any congestion control. We present an idealized protocol where all flows always transmit at their fair rates. The ideally smooth congestion control causes link queuing only due to asynchrony of flow arrivals, which is intrinsic to computer networks. Our analysis and simulations for different distributions of flow interarrival times agree that the buffer size needed for a fixed loss …
Curing Regular Expressions Matching Algorithms From Insomnia, Amnesia, And Acalulia, Sailesh Kumar, Balakrishnan Chandrasekaran, Jonathan Turner, George Varghese
Curing Regular Expressions Matching Algorithms From Insomnia, Amnesia, And Acalulia, Sailesh Kumar, Balakrishnan Chandrasekaran, Jonathan Turner, George Varghese
All Computer Science and Engineering Research
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detection systems (NIDS) are among the most widely deployed such system; popular NIDS use a collection of signatures of known security threats and viruses, which are used to scan each packet's payload. Today, signatures are often specified as regular expressions; thus the core of the NIDS comprises of a regular expressions parser, such parsers are traditionally implemented as finite automata. Deterministic Finite Automata (DFA) are fast, therefore they are often desirable at high network …
Hexa: Compact Data Structures For Faster Packet Processing, Sailesh Kumar, Jonathan Turner, Patrick Crowley, Michael Mitzenmacher
Hexa: Compact Data Structures For Faster Packet Processing, Sailesh Kumar, Jonathan Turner, Patrick Crowley, Michael Mitzenmacher
All Computer Science and Engineering Research
Directed graphs with edge labels are used in packet processing algorithms for a variety of network applications. In this paper we present a novel representation for such graph that significantly reduces the memory required for such graphs. This approach called History-based Encoding, eXecution and Addressing (HEXA) challenges the conventional assumption that graph data structures must store pointers of log2n bits to identify successor nodes. HEXA takes advantage of implict information to reduce the information that must be stored explicitly. We demonstrate that the binary tries used for IP route lookup can be implemented using just two bytes per stored prefix …
Architecture For Document Clustering In Reconfigurable Hardware, Master's Thesis, December 2006, Adam G. Covington
Architecture For Document Clustering In Reconfigurable Hardware, Master's Thesis, December 2006, Adam G. Covington
All Computer Science and Engineering Research
High-performance document clustering systems enable similar documents to automatically self-organize into groups. In the past, the large amount of computational time needed to cluster documents prevented practical use of such systems with a large number of documents. A full hardware implementation of K-means clustering has been designed and implemented in reconfigurable hardware that rapidly clusters a half million documents. Documents and concepts are represented as vectors with 4000 dimensions. The circuit was implemented in Field Programmable Gate Array (FPGA) logic and uses four parallel cosine distance metrics to cluster document vectors together. An exploration of the effect of the integer …
Improving Individual Flow Performance With Multiple Queue Fair Queuing, Manfred Georg, Christopher Jechlitschek, Sergey Gorinsky
Improving Individual Flow Performance With Multiple Queue Fair Queuing, Manfred Georg, Christopher Jechlitschek, Sergey Gorinsky
All Computer Science and Engineering Research
Fair Queuing (FQ) algorithms provide isolation between packet flows, allowing max-min fair sharing of a link even when flows misbehave. However, fairness comes at the expense of per-flow state. To keep the memory requirement independent of the flow count, the router can isolate aggregates of flows, rather than individual flows. We investigate the feasibility of protecting individual flows under such aggregate isolation in the context of Multiple Queue Fair Queuing (MQFQ), where the router maintains a fixed number of queues and associates multiple queues with each flow. MQFQ places packets in the shortest queue associated with their flow. The redundancy …
Link Layer Support For Unified Radio Power Management In Wireless Sensor Networks, Master's Thesis, May 2007, Kevin Klues
Link Layer Support For Unified Radio Power Management In Wireless Sensor Networks, Master's Thesis, May 2007, Kevin Klues
All Computer Science and Engineering Research
Radio power management is of paramount concern in wireless sensor networks that must achieve long lifetimes on scarce amounts of energy. While a multitude of power management protocols have been proposed in the past, the lack of system support for flexibly integrating them with a diverse set of applications and network platforms has made them difficult to use. Instead of proposing yet another power management protocol, this thesis focuses on providing link layer support towards realizing a Unified Power Management Architecture (UPMA) for flexible radio power management in wireless sensor networks. In contrast to the monolithic approaches adopted by existing …
Scheduling Induced Bounds And The Verification Of Preemptive Real-Time Systems, Terry Tidwell, Christopher Gill, Venkita Subramonian
Scheduling Induced Bounds And The Verification Of Preemptive Real-Time Systems, Terry Tidwell, Christopher Gill, Venkita Subramonian
All Computer Science and Engineering Research
Distributed real-time and embedded (DRE) systems have stringent constraints on timeliness and other properties whose assurance is crucial to correct system behavior. Our previous research has shown that detailed models of essential middleware mechanisms can be developed, composed, and for constrained examples verified tractably, using state of the art timed automata model checkers. However, to apply model checking to a wider range of real-time systems, particularly those involving more general forms of preemptive concurrency, new techniques are needed to address decidability and tractability concerns. This paper makes three contributions to research on formal verification and validation of DRE systems. First, …
Optimal Discrete Rate Adaptation For Distributed Real-Time Systems, Yingming Chen, Chenyang Lu, Xenofon Kutsoukos
Optimal Discrete Rate Adaptation For Distributed Real-Time Systems, Yingming Chen, Chenyang Lu, Xenofon Kutsoukos
All Computer Science and Engineering Research
Many distributed real-time systems face the challenge of dynamically maximizing system utility in response to fluctuations in system workload. We present the MultiParametric Rate Adaptation (MPRA) algorithm for discrete rate adaptation in distributed real-time systems with end-to-end tasks. The key novelty and advantage of MPRA is that it can efficiently produce optimal solutions in response to workload variations such as dynamic task arrivals. Through offline preprocessing MPRA transforms an NP-hard utility optimization problem to the evaluation of a piecewise linear function of the CPU utilization. At run time MPRA produces optimal solutions by evaluating the function based on the CPU …
Single Cell Expression Profiling Reveals Major Disruption Of Dna Repair Capacity In Incipient Alzheimer's Disease, Monika Ray, Weixiong Zhang
Single Cell Expression Profiling Reveals Major Disruption Of Dna Repair Capacity In Incipient Alzheimer's Disease, Monika Ray, Weixiong Zhang
All Computer Science and Engineering Research
Understanding the pathogenesis in the early stages of late-onset Alzheimer's disease (LOAD) can help in gaining important mechanistic insights into this devastating neurodegenerative disorder. Alzheimer's disease (AD) is characterised by extensive cell death with disease progression. In this paper laser capture microdissection (LCM) based gene expression profiling, which is able to profile gene expression in a single cell type, is employed to analyse the gene expression regulation of incipient AD. Our analysis shows that LCM based gene expression profiling of neurons has a critical advantage over the conventional gene expression profiling method which uses samples of mixed cell types and …
Control Of A Robotic Arm Using Low-Dimensional Emg And Ecog Biofeedback, Timothy M. Blackely, William D. Smart
Control Of A Robotic Arm Using Low-Dimensional Emg And Ecog Biofeedback, Timothy M. Blackely, William D. Smart
All Computer Science and Engineering Research
In this dissertation we describe a system that uses a low dimensional input derived from electromyography and electrocorticography data to control a robot. The work involves creating a system that allows signals recorded directly from a human body to allow control of a small robot arm. We compare direct joystick control with electromyogram (EMG) input to determine if one input system is superior, or if the quality of control between them is comparable. We also verify the system that is used to record the electromyogram signals is adaptable to other forms of biosignal input; in particular, direct connection to a …
Configurable Component Middleware For Distributed Real-Time Systems With Aperiodic And Periodic Tasks, Yuanfang Zhang, Christopher Gill, Chenyang Lu
Configurable Component Middleware For Distributed Real-Time Systems With Aperiodic And Periodic Tasks, Yuanfang Zhang, Christopher Gill, Chenyang Lu
All Computer Science and Engineering Research
Many distributed real-time applications must handle mixed periodic and aperiodic tasks with diverse requirements. However, existing middleware lacks flexible configuration mechanisms needed to manage end-to-end timing easily for a wide range of different applications with both periodic and aperiodic tasks. The primary contribution of this work is the design, implementation and performance evaluation of the first configurable component middleware services for admission control and load balancing of aperiodic and periodic tasks in distributed real-time systems. Empirical results demonstrate the need for and effectiveness of our configurable component middleware approach in supporting different applications with periodic and aperiodic tasks.
A Fingerspelling Sign Language Visualization , Carol S. Brickman
A Fingerspelling Sign Language Visualization , Carol S. Brickman
All Computer Science and Engineering Research
The goal of the Fingerspell Visualization Project is to research methods to improve learning of reading skills through sign language. The techniques are centered on Fingerspelling as the method to bridge stages of skill development. Visualization of a string of text in images of a hand performing the letters of the alphabet in standardized fingerspell sign language positions provide Full Motion Learning as opposed to learning from single pictures.
Distributed Allocation Of Workflow Tasks In Manets, Rohan Sen, Gruia-Catalin Roman, Christopher Gill
Distributed Allocation Of Workflow Tasks In Manets, Rohan Sen, Gruia-Catalin Roman, Christopher Gill
All Computer Science and Engineering Research
When multiple participants work on a workflow that represents a large, collaborative activity, it is important to have a well defined process to determine the portions of the workflow that each participant is responsible for executing. In this paper, we describe a process and related algorithms required to assign tasks in a workflow, to hosts that are willing to carry out the execution of these tasks, and thereby contributing to the completion of the activity. This problem is a stylized form of the multi-processor scheduling algorithm which has been shown to be NP-Hard. Further complicating the issue is that we …
Lower Bounds On Queuing And Loss At Highly Multiplexed Links, Maxim Podlesny, Sergey Gorinsky
Lower Bounds On Queuing And Loss At Highly Multiplexed Links, Maxim Podlesny, Sergey Gorinsky
All Computer Science and Engineering Research
Explicit and delay-driven congestion control protocols strive to preclude overflow of link buffers by reducing transmission upon incipient congestion. In this paper, we explore fundamental limitations of any congestion control with respect to minimum queuing and loss achievable at highly multiplexed links. We present and evaluate an idealized protocol where all flows always transmit at equal rates. The ideally smooth congestion control causes link queuing only due to asynchrony of flow arrivals, which is intrinsic to computer networks. With overprovisioned buffers, our analysis and simulations for different smooth distributions of flow interarrival times agree that minimum queuing at a fully …
Implementing Legba: Fine-Grained Memory Protection, Sheffield, Sowell, Wilson
Implementing Legba: Fine-Grained Memory Protection, Sheffield, Sowell, Wilson
All Computer Science and Engineering Research
Fine-grained hardware protection could provide a powerful and effective means for isolating untrusted code. However, previous techniques for providing fine-grained protection in hardware have lead to poor performance. Legba has been proposed as a new caching architecture, designed to reduce the granularity of protection, without slowing down the processor. Unfortunately, the designers of Legba have not attempted an implementation. Instead, all of their analysis is based purely on simulations. We present an implementation of the Legba design on a MIPS Core Processor, along with an analysis of our observations and results.
Configuring Low Cost Metanetworks On A Shared Substrate, Jing Lu, Jonathan Turner
Configuring Low Cost Metanetworks On A Shared Substrate, Jing Lu, Jonathan Turner
All Computer Science and Engineering Research
In a diversified internet, meta-networks (“metanets?for short) share a common substrate and offer value-added services to millions of users around the globe. Therefore, configuring low-cost metanets with links having enough bandwidth to accommodate all anticipated user traffic is critical to the success of the metanets. In this paper, we propose a novel pruning algorithm that configures metanets on any given substrate in a cost-efficient way. In contrast to other testbed configuration systems, we solve the metanet configuration problem from a higher level specification and produces a network that is dimensioned to handle the specified traffic. To the best of our …
Customizing Component Middleware For Distributed Real-Time Systems With Aperiodic And Periodic Tasks, Yuanfang Zhang, Christopher Gill, Chenyang Lu
Customizing Component Middleware For Distributed Real-Time Systems With Aperiodic And Periodic Tasks, Yuanfang Zhang, Christopher Gill, Chenyang Lu
All Computer Science and Engineering Research
Many distributed real-time applications must handle mixed aperiodic and periodic tasks with diverse requirements. However, existing middleware lacks flexible configuration mechanisms needed to manage end-to-end timing easily for a wide range of different applications with both aperiodic and periodic tasks. The primary contribution of this work is the design, implementation and performance evaluation of the first configurable component middleware services for admission control and load balancing of aperiodic and periodic tasks in distributed real-time systems. Empirical results demonstrate the need for, and the effectiveness of, our configurable component middleware approach in supporting different applications with aperiodic and periodic tasks.
Roadmap Analysis Of Protein-Protein Interactions. Master's Thesis, August 2007, Brian C. Haynes
Roadmap Analysis Of Protein-Protein Interactions. Master's Thesis, August 2007, Brian C. Haynes
All Computer Science and Engineering Research
The ability to effectively model the interaction between proteins is an important and open problem. In molecular biology it is well accepted that from sequence arises form and from form arises function but relating structure to function remains a challenge. The function of a given protein is defined by its interactions. Likewise a malfunction or a change in protein-protein interactions is a hallmark of many diseases. Many researchers are studying the mechanisms of protein-protein interactions and one of the overarching goals of the community is to predict whether two proteins will bind, and if so what the final conformation will …
Mobile Wireless Sensor Network Connectivity Repair With K-Redundanc, Nuzhet Atay, Burchan Bayazit
Mobile Wireless Sensor Network Connectivity Repair With K-Redundanc, Nuzhet Atay, Burchan Bayazit
All Computer Science and Engineering Research
Connectivity is an important requirement for wireless sensor networks especially in real-time monitoring and data transfer applications. However, node movements and failures change the topology of the initial deployed network, which can result in partitioning of the communication graph. In this paper, we present a method for maintaining and repairing the communication network of a dynamic mobile wireless sensor network. We assume that we cannot control the motion of wireless sensor nodes, but there are robots whose motion can be controlled by the wireless sensor nodes to maintain and repair the connectivity of the network. At the heart of our …
Combined Controllers That Follow Imperfect Input Motions For Humanoid Robots, Gazihan Alankus, Burchan O. Bayazit
Combined Controllers That Follow Imperfect Input Motions For Humanoid Robots, Gazihan Alankus, Burchan O. Bayazit
All Computer Science and Engineering Research
Humanoid robots have the potential to become a part of everyday life as their hardware and software challenges are being solved. In this paper we present a system that gets as input a motion trajectory in the form of motion capture data, and produces a controller that controls a humanoid robot in real-time to achieve a motion trajectory that is similar to the input motion data. The controller expects the input motion data not to be dynamically feasible for the robot and employs a combined controller with corrective components to keep the robot balanced while following the motion. Since the …
Leveraging Est Evidence To Automatically Predict Alternatively Spliced Genes, Master's Thesis, December 2006, Robert Zimmermann
Leveraging Est Evidence To Automatically Predict Alternatively Spliced Genes, Master's Thesis, December 2006, Robert Zimmermann
All Computer Science and Engineering Research
Current methods for high-throughput automatic annotation of newly sequenced genomes are largely limited to tools which predict only one transcript per gene locus. Evidence suggests that 20-50% of genes in higher eukariotic organisms are alternatively spliced. This leaves the remainder of the transcripts to be annotated by hand, an expensive time-consuming process. Genomes are being sequenced at a much higher rate than they can be annotated. We present three methods for using the alignments of inexpensive Expressed Sequence Tags in combination with HMM-based gene prediction with N-SCAN EST to recreate the vast majority of hand annotations in the D.melanogaster genome. …
Perpetual: Byzantine Fault Tolerance For Federated Distributed Applications, Sajeeva L. Pallemulle, Haraldur D. Thorvaldsson, Kenneth J. Goldman
Perpetual: Byzantine Fault Tolerance For Federated Distributed Applications, Sajeeva L. Pallemulle, Haraldur D. Thorvaldsson, Kenneth J. Goldman
All Computer Science and Engineering Research
Modern distributed applications rely upon the functionality of services from multiple providers. Mission-critical services, possibly shared by multiple applications, must be replicated to guarantee correct execution and availability in spite of arbitrary (Byzantine) faults. Furthermore, shared services must enforce strict fault isolation policies to prevent cascading failures across organizational and application boundaries. Most existing protocols for Byzantine fault-tolerant execution do not support interoperability between replicated services while others provide poor fault isolation. Moreover, existing protocols place impractical limitations on application development by disallowing long-running threads of computation, asynchronous operation invocation, and asynchronous request processing. We present Perpetual, a protocol that …
Experimental Evaluation Of A Coarse-Grained Switch Scheduler, Charlie Wiseman, Jon Turner, Ken Wong, Brandon Heller
Experimental Evaluation Of A Coarse-Grained Switch Scheduler, Charlie Wiseman, Jon Turner, Ken Wong, Brandon Heller
All Computer Science and Engineering Research
Modern high performance routers rely on sophisticated interconnection networks to meet ever increasing demands on capacity. Regulating the flow of packets through these interconnects is critical to providing good performance, particularly in the presence of extreme traffic patterns that result in sustained overload at output ports. Previous studies have used a combination of analysis and idealized simulations to show that coarse-grained scheduling of traffic flows can be effective in preventing congestion, while ensuring high utilization. In this paper, we study the performance of a coarse-grained scheduler in a real router with a scalable architecture similar to those found in high …
Strong Performance Guarantees For Asynchronous Buffered Crossbar Schedulers, Jonathon Turner
Strong Performance Guarantees For Asynchronous Buffered Crossbar Schedulers, Jonathon Turner
All Computer Science and Engineering Research
Crossbar-based switches are commonly used to implement routers with throughputs up to about 1 Tb/s. The advent of crossbar scheduling algorithms that provide strong performance guarantees now makes it possible to engineer systems that perform well, even under extreme traffic conditions. Until recently, such performance guarantees have only been developed for crossbars that switch cells rather than variable length packets. Cell-based crossbars incur a worst-case bandwidth penalty of up to a factor of two, since they must fragment variable length packets into fixed length cells. In addition, schedulers for cell-based crossbars may fail to deliver the expected performance guarantees when …
Byzantine Fault-Tolerant Web Services For N-Tier And Service Oriented Architectures, Sajeeva L. Pallemulle, Kenneth J. Goldman
Byzantine Fault-Tolerant Web Services For N-Tier And Service Oriented Architectures, Sajeeva L. Pallemulle, Kenneth J. Goldman
All Computer Science and Engineering Research
Web Services that provide mission-critical functionality must be replicated to guarantee correct execution and high availability in spite of arbitrary (Byzantine) faults. Existing approaches for Byzantine fault-tolerant execution of Web Services are inadequate to guarantee correct execution due to several major limitations. Some approaches do not support interoperability between replicated Web Services. Other approaches do not provide fault isolation guarantees that are strong enough to prevent cascading failures across organizational and application boundaries. Moreover, existing approaches place impractical limitations on application development by not supporting long-running active threads of computation, fully asynchronous communication, and access to host specific information. We …