Academia.eduAcademia.edu

Network computing

1,489 papers
106 followers
AI Powered
Network computing is a field of computer science that focuses on the design, implementation, and management of distributed systems that enable multiple computers to communicate and share resources over a network. It encompasses protocols, architectures, and technologies that facilitate data exchange and collaborative processing among interconnected devices.
Transmission across neocortical synapses depends on the frequency of presynaptic activity (Thomson & Deuchars, 1994). Interpyramidal synapses in layer V exhibit fast depression of synaptic transmission, while other types of synapses... more
Self-organizing computational models with specific intracortical connections can explain many functional features of visual cortex, such as topographic orientation and ocular dominance maps. However, due to their computational... more
A distributed system is one in which components located at networked computers communicate and coordinate their actions only by passing messages. The research areas of multi-agent systems and distributed systems coincide, and form the... more
Chromium Renderserver (CRRS) is software infrastructure that provides the ability for one or more users to run and view image output from unmodified, interactive OpenGL and X11 applications on a remote, parallel computational platform... more
Chromium Renderserver (CRRS) is software infrastructure that provides the ability for one or more users to run and view image output from unmodified, interactive OpenGL and X11 applications on a remote, parallel computational platform... more
Chromium Renderserver (CRRS) is software infrastructure that provides the ability for one or more users to run and view image output from unmodified, interactive OpenGL and X11 applications on a remote, parallel computational platform... more
Computer architects increasingly depend on the use of software tools to evaluate and investigate the design of computer systems. It is therefore very important that educators in this eld promote extensive tool-based student... more
The computational science community has long been at the forefront of advanced computing, because of its persistent need to solve problems that require resources beyond those provided by the most powerful computers of the day. Examples of... more
A novel simulation framework is described that uses a client-server paradigm combined with a discrete event simulator to allow the simulation modules to be distributed around a centralized core. The framework also simplifies the creation... more
The Supercomputer Toolkit constructs parallel computation networks by connecting processor modules. These connections are set by the user prior to a run and are static during the run. The Technion's Toolkit prototype was used to run a... more
This paper introduces an analytical method for approximating the performability of a firm realtime system modeled by a multi-server queue. The service discipline in the queue is earliestdeadline-first (EDF), which is an optimal scheduling... more
Some of the costs associated with system virtualization using a virtual machine monitor (VMM) or hypervisor (HV) can be attributed to the need to virtualize peripheral devices and to then manage the virtualized resources for large numbers... more
Internet has been growing at an amazing rate and it becomes pervasive in all aspects of our l i f e On the other hand, the ubiquity of networked computers and their services has signijicantly increased their vulnerability to virus and... more
As mobile and embedded computing devices become more pervasive, it is becoming obvious that the nature of interactions between users and computers must evolve. Applications need to become increasingly autonomous and invisible, by placing... more
As the cost of computing technology is decreasing and networks & internetworks of computers expand in scope, the discovery and location of resources becomes an essential function of the networked computing environment. In light of the... more
We discuss the use of Condor, a distributed resource management system, as a provider of computational resources for NEOS, an environment for solving optimization problems over the Internet. We also describe how problems are submitted and... more
We discuss a novel nano-electronic computing paradigm in which cells composed of interacting quantum dots are employed in a locally-interconnected architecture. We develop a network-theoretic description in terms of appropriate local... more
A honey pot is a technique of cloud computing that is proposed for capturing hackers or tracking unusual methods of attack. This technique will seize, recognize and duplicate the hacker behavior. It works in a Cloud environment where... more
Large scale High Performance Computing and Communication (HPCC) applications (e.g. Video-on-Demand, and HPDC) would require storage and processing capabilities which are beyond existing single computer systems. The current advances in... more
Background Phylogenetic profiles record the occurrence of homologs of genes across fully sequenced organisms. Proteins with similar profiles are typically components of protein complexes or metabolic pathways. Various existing methods... more
Computer security is of growing importance in the increasingly networked computing environment.This work examines the issue of high-performance network security, specifically integrity, by focusing on integrating security into network... more
Wireless Mobile Communication systems will be more sophisticated and wide spread in future. This growth demands not only for capacity increase, but also high quality of service and better coverage without increase in the radio frequency... more
From the 1990s on, one of the most important challenges facing computer science researchers has been the design and construction of software tools to exploit Internet computing. At the same time, the development of agent technology has... more
Morphometric analysis is one of the important study in the natural sciences in general, and geomorphology and hydrology in particular, to describe the nature of surface drainage networks. The study area lies in north of Iraq, in... more
This paper introduces an analytical method for approximating the performance of a two-class priority M/M/1 system. The system is fully non-preemptive. More specifically, the prioritized class-1 jobs are real-time and served with the... more
We consider transmission policies for multiple users sharing a single wireless link to a base station. The noise, and hence the probability of correct transmission of a packet, depends on the state of the user receiving the packet. The... more
This FY03 final report on Wet Etch Figuring involves a 2D thermal tool. Its purpose is to flatten (0.3 to 1 mm thickness) sheets of glass faster thus cheaper than conventional sub aperture tools. An array of resistors on a circuit board... more
Internet has been growing at an amazing rate and it becomes pervasive in all aspects of our l i f e On the other hand, the ubiquity of networked computers and their services has signijicantly increased their vulnerability to virus and... more
Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the computing resources. With the network-centric model,... more
Resumo-O esquema de arbitragem tipicamente usado nos barramentos de campo "tempo-real" baseia-se num scheduler do tipo off-line que gera uma tabela estática e cíclica contendo a atribuição de tempo de barramento às transacções associadas... more
This report presents results of the San Gabriel Valley Smart Shuttle (SGVSS) Field Operational Test (FOT). Results are drawn from a comprehensive evaluation of the FOT conducted over a three-year period. The SGVSS attempted to integrate... more
Classical client/server interaction primitives such as remote procedure call or rendezvous are not adequate when we need to describe the behaviour of three or more processes that need to collaborate simultaneously in order to solve a... more
The Mneme project is an investigation of techniques for integrating programming language and database features to provide better support for cooperative, information-intensive tasks such as computer-aided software engineering. The project... more
This research focuses on the performance and timing behavior of a two level survivability architecture. The lower level of the architecture involves attack analysis based on kernel attack signatures and survivability handlers. Higher... more
In June 1997 an industry consortium announced that it was working on a mobile extension of the Open Group's Network Computer Reference Profile [NCRP] to address the unique requirements of the many new mobile computing devices. (For... more
We propose DSL, a new Scalable Distributed Data Structure for the dictionary problem, based on a version of Skip Lists, as an alternative to both random trees and deterministic height balanced trees. Our scheme exhibits, with high... more
Computer-supported cooperative work environments change some of the underlying beliefs about solutions that have been built for distributed computing. Electronic mail and file transfers have worked efficiently and effectively by breaking... more
This study examined the pattern of use of different forms of contact between grandparents and grandchildren, and especially the use of new technologies (SMS, e-mail) and factors affecting this. Questionnaire data are reported from 408... more
Large scale High Performance Computing and Communication (HPCC) applications (e.g. Video-on-Demand, and HPDC) would require storage and processing capabilities which are beyond existing single computer systems. The current advances in... more
results in high latency and low bandwidth to web-enabled clients and prevents the timely delivery of software. We present an algorithm for modifying delta compressed files so that the compressed versions may be reconstructed without... more
In-place reconstruction of delta compressed data allows information on devices with limited storage capability to be updated efficiently over low-bandwidth channels. Delta compression encodes a version of data compactly as a small set of... more
In Distributed Interactive Applications (DIAs) embedded priority, the sender node forwards data to receivers due to their respective priorities. One application level multicast protocol: the priority-based directed minimum spanning tree... more
Distributed Embedded Systems (DESs) carrying out critical tasks must be highly reliable and hard in real-time. Moreover, to operate in dynamic operational contexts in an effective and efficient manner, they must also be adaptive.... more
We present an a.e. complexity hierarchy for nondeterministic time, and show that it is essential ly the best result of this sort that can be proved using relativizable proof techniques.
Recently, unmanned aerial vehicles (UAVs) enhance connectivity and accessibility for civilian and military applications. A group of UAVs with on-board cameras usually monitors or collects information about designated areas. The UAVs can... more
The widely used Message Passing Interface (MPI) is complex and rich. As a result, application developers require automated tools to avoid and to detect MPI programming errors. We present the Marmot Umpire Scalable Tool (MUST) that detects... more