scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Distributed Systems Online in 2008"


Journal ArticleDOI
TL;DR: A review of Parallel Metaheuristics, Enrique Alba, ed, suggests that the current generation of meta-analyses is likely to be biased towards probabilistic results.
Abstract: A review of Parallel Metaheuristics, Enrique Alba, ed.

90 citations


Journal ArticleDOI
TL;DR: This review of emerging grids sets out to develop a comprehensive classification of both traditional and emerging grid systems, with an aim to motivate further research and to help establish a solid foundation in this rapidly developing field.
Abstract: Advances in grid computing are stimulating the emergence of novel types of grids, such as accessible, manageable, interactive, and personal grids. More and more researchers are realizing emerging grids' potential to bridge the gap between grid technologies and users. This review of emerging grids sets out to develop a comprehensive classification of both traditional and emerging grid systems, with an aim to motivate further research and to help establish a solid foundation in this rapidly developing field.

63 citations


Journal ArticleDOI
TL;DR: COSMOS is a component-based framework for managing context information in ubiquitous context-aware applications that decomposes context observation policies into fine-grained units called context nodes, which it implements as software components.
Abstract: Ubiquitous applications are characterized by variations in their execution context. Their correct operation requires some continual adaptations based on the observation of this context. The design and implementation of these observation policies is thus the cornerstone of any ubiquitous application. COSMOS is a component-based framework for managing context information in ubiquitous context-aware applications. COSMOS decomposes context observation policies into fine-grained units called context nodes, which it implements as software components. These units perform basic context-related operations, such as gathering data from a system or network probe and computing threshold or average values. The framework assembles these units with a set of well-identified architectural design patterns. A mobile computing scenario illustrates the framework's benefits.

57 citations


Journal ArticleDOI
TL;DR: This article presents an approach to specify architectural constraints while following a model-driven development approach and shows how this approach can be applied to improve the efficiency of component-based software development.
Abstract: In component-based software development, a composition of connected components represents a software system's architecture This component framework supports adaptation through application variability The adaptation decision is made at runtime by resolving the variation points and computing the utility of all application variants Following the application variability model, a huge number of application variants may arise, many of which are not feasible in reality Architectural constraints may be applied to filter out such infeasible variants before checking their utilities This article presents an approach to specify architectural constraints while following a model-driven development approach

36 citations


Journal ArticleDOI
TL;DR: An introductory parallel computing course aims to introduce students to this technology shift and to explain that parallelism calls for a different way of thinking and new programming skills.
Abstract: Parallel computing is rapidly entering mainstream computing, and multicore processors can now be found in the heart of supercomputers, desktop computers, and laptops. Consequently, applications will increasingly need to be parallelized to fully exploit the multicore processor throughput gains that are becoming available. Unfortunately, writing parallel code is more complex than writing serial code. An introductory parallel computing course aims to introduce students to this technology shift and to explain that parallelism calls for a different way of thinking and new programming skills. The course covers theoretical topics and offers practical experience in writing parallel algorithms on state-of-the-art parallel computers, parallel programming environments, and tools.

35 citations


Journal ArticleDOI
TL;DR: Graduates of computer science and software engineering programs are typically employed to develop industry-strength software, with different emphases: development of new algorithms versusDevelopment of large, complex software systems versus development of small embedded software and device drivers.
Abstract: Graduates of computer science (CS) and software engineering (SE) programs are typically employed to develop industry-strength software. Computer engineering (CE) programs focus primarily on computing-system design, often with significant software components. These three programs have different emphases: development of new algorithms versus development of large, complex software systems versus development of small embedded software and device drivers. All three areas require good SE practices.

30 citations


Journal ArticleDOI
TL;DR: DAVIM is adaptable middleware that enables dynamic management of services and isolation between simultaneously running applications.
Abstract: Middleware services facilitate sensor-network application development. DAVIM is adaptable middleware that enables dynamic management of services and isolation between simultaneously running applications.

27 citations


Journal ArticleDOI
TL;DR: In the past year, SaaS has emerged from its pioneering group of start-ups and medium-sized vendors delivering software on demand to be embraced by software giants such as Oracle and SAP to become a catalyst for more interactive, iterative software development.
Abstract: In the past year, SaaS has emerged from its pioneering group of start-ups and medium-sized vendors delivering software on demand to be embraced by software giants such as Oracle and SAP. Some veteran technologists and industry analysts also see SaaS as a catalyst for more interactive, iterative software development.

25 citations


Journal ArticleDOI
TL;DR: Researchers and developers are finding great opportunities in youth-oriented social networking sites, but legal and privacy issues are emerging as the platforms expand.
Abstract: Researchers and developers are finding great opportunities in youth-oriented social networking sites, but legal and privacy issues are emerging as the platforms expand.

19 citations


Journal ArticleDOI
G. Goth1
TL;DR: The United Kingdom has become the latest microcosm illustrating the dizzying complexity governments face as they attempt to balance stifling terror on the Internet with free speech and information access.
Abstract: The fight against terror on the World Wide Web, chat rooms, and forums tends to take a maddeningly circular route. Politicians demand a crackdown on the terrorist presence on the Web, calling on ISPs to develop new technologies that will block access to terrorist sites or to detect their origin and shut them down. Just as quickly, the sites' operators relaunch from another host. Courts have found numerous efforts to thwart terror to be an abridgment of users' rights of free speech; white-hat security analysts cringe when the political posturing leads to dismantling sites they've been surreptitiously monitoring. In the past two months, the United Kingdom has become the latest microcosm illustrating the dizzying complexity governments face as they attempt to balance stifling terror on the Internet with free speech and information access.

12 citations


Journal ArticleDOI
TL;DR: Google and Microsoft are both fielding pilot programs of new technologies for networked, interoperable electronic health records systems that will allow patients to synchronize their records between their various healthcare providers, including dynamic uploading of new data.
Abstract: Network-enabled communication has revolutionized financial services, retail sales, auctions, and business-to-business transactions. But one of the largest global economy's sectors - healthcare - remains locked in a technological netherworld- part paper, part digital, and almost entirely user- unfriendly. Public officials and healthcare industry executives acknowledge that switching from paper-based to network-enabled digital records would save billions of dollars per year. Google and Microsoft are both fielding pilot programs of new technologies for networked, interoperable electronic health records systems. The new technologies, Google Health and Microsoft HealthVault, are classified as personal health records (PHRs), which are a subset of industry-recognized electronic health records (EHRs). Eventually, the two technologies will allow patients to synchronize their records between their various healthcare providers, including dynamic uploading of new data that will then be available to any authorized doctor, nurse, or pharmacist, regardless of their institutional affiliation. The approaches are different: Google Health is a front-end application, while HealthVault is a database that users will augment with via third-party applications. However, the goal is the same in both cases: patients will have ultimate control of their medical records.

Journal ArticleDOI
TL;DR: Two North American telecommunications regulatory agencies are proactively entering into some gritty details of network management, and the results might announce a new era of strengthened regulatory capabilities to enforce net neutrality.
Abstract: Two North American telecommunications regulatory agencies are proactively entering into some gritty details of network management. The results might announce a new era of strengthened regulatory capabilities to enforce net neutrality. The new traffic-management discussion centers on how far Internet service providers (ISPs) can go in limiting customers' bandwidth and how much information they must disclose about how they're doing it. In the US, the Federal Communications Commission found that cable ISP Comcast illegally used deep packet inspection (DPI) technology to throttle application-specific P2P packets. Specifically, Comcast separated BitTorrent P2P packets from the message transport, then used TCP reset packets to make the P2P packets look as though they were coming from other end users' computers.

Journal ArticleDOI
TL;DR: The role and place of software engineering in modern computing curricula is described, focusing on dependable systems that can be implemented using microprocessors and programmable logic.
Abstract: This article describes the role and place of software engineering in modern computing curricula, focusing on dependable systems that can be implemented using microprocessors and programmable logic. In this time of the increasing role of software and proliferation of computing in all areas of technology and human endeavor, there is critical need for education of engineers who can understand the system as a whole, appreciating both software and hardware and their mutual connection. The similarity and difference of approaches between traditional computing software and modern programmable-logic hardware is discussed. Modern systems require good engineering considering not only the system's functionality but also dependability and safety.

Journal ArticleDOI
TL;DR: A review of Developing Multi-Agent Systems with JADE by Fabio Luigi Bellifemine, Giovanni Caire, and Dominic Greenwood.
Abstract: A review of Developing Multi-Agent Systems with JADE by Fabio Luigi Bellifemine, Giovanni Caire, and Dominic Greenwood

Journal ArticleDOI
TL;DR: The wild card that might preclude Microsoft's Eclipse isn't a revolutionary online approach or a blockbuster acquisition, rather, it might emerge from the global rise of a new category of computer, the ultra-low-cost PC, or ULPC.
Abstract: The wild card that might preclude Microsoft's Eclipse isn't a revolutionary online approach or a blockbuster acquisition. Rather, it might emerge from the global rise of a new category of computer, the ultra-low-cost PC, or ULPC. This category combines attributes of feature-laden personal computers with network-dependent thin clients to deliver either a "best of both worlds" or an acceptable performance compromise, depending on your perspective.

Journal ArticleDOI
TL;DR: While the IEEE Task Group for the 802.11n network standard stalls on ratification, successful network deployments proceed apace, especially in universities, and the Wi-Fi Alliance has been certifying the interoperability of the new gear's Draft 2.0 version since June 2007.
Abstract: While the IEEE Task Group for the 802.11n network standard stalls on ratification, successful network deployments proceed apace, especially in universities. The IEEE 802.11n Task Group keeps pushing back the date for full ratification of the latest edition of the popular wireless network standard. The market, however, isn't waiting. Spearheaded by universities, the 802.11n technology has recently entered "enterprise" architectures with a flourish. According to the BT survey, While many new technologies take years to be adopted, 802.11n appears to be exceeding the typical adoption curve. Although the IEEE might not be ready to ratify its standard, the Wi-Fi Alliance - an umbrella group of 802.11 technology vendors - has been certifying the interoperability of the new gear's Draft 2.0 version since June 2007. Alliance executive director Edgar Figueroa sainteroperability of the new gear's Draft 2.0 version sinceys the 11n technology is booming in the marketplace.

Journal ArticleDOI
TL;DR: If teachers can share educational content rather than creating their own, they increase the number of quality resources available to them, but in sharing these resources, IPR issues such as copyright ownership and licensing must be considered.
Abstract: Distributed computing teaching environments (and e-science education in general) require a supportive policy framework that encourages cooperation and sharing. If teachers can share educational content rather than creating their own, they increase the number of quality resources available to them. However, in sharing these resources, IPR issues such as copyright ownership and licensing must be considered.

Journal ArticleDOI
TL;DR: A backbone structure that provides ocean-wide Internet coverage could provide an alternative to satellite uplinks and use next-generation long-range surface radio technology to provide medium- to high-bandwidth Internet access.
Abstract: Satellite-based Internet access, the preferred solution for remote locations on the ocean, either offers a low-bandwidth connection or is very expensive to deploy. A backbone structure that provides ocean-wide Internet coverage could provide an alternative to satellite uplinks. With a wide-area network forming a mesh of nodes using floating and moving objects as well as coastal facilities, the network would use next-generation long-range surface radio technology to provide medium- to high-bandwidth Internet access. To achieve high-bandwidth Internet access under these circumstances, the backbone must leverage state-of-the-art sensor network technology, autonomous routing mechanisms, and self-organizing abilities.

Journal ArticleDOI
TL;DR: A review of Grid Computing For Developers by Vladimir Silva finds that grid computing for developers needs to be considered as a whole rather than as an end-to-end system.
Abstract: The book is divided into four parts. The first part, Theory and Foundations, provides a nice, simple introduction to the history of high-performance and distributed computing concepts. It explores the evolution of distributed systems from the early distributed computing paradigm to modern Grid environments. Silva presents computational economy, resource management, Internet computing, and P2P concepts concisely, while studying enterprise computing in more detail. The book also presents Grid computing concepts and current Grid computing initiatives in science and technology.

Journal ArticleDOI
TL;DR: A review of Designing Distributed Learning Environments with Intelligent software Agents with Intelligent Software Agents, Fuhua Oscar Lin, ed.
Abstract: A review of Designing Distributed Learning Environments with Intelligent Software Agents, Fuhua Oscar Lin, ed.

Journal ArticleDOI
TL;DR: There are relatively few reports on best practices in teaching Grid topics that teachers can follow when they start building a new Grid-related course, but some discuss semester-long courses for advanced computer science or computer engineering students.
Abstract: Grid technologies serving large distributed systems can help address many application areas' computing and storage needs. Consequently, the scientific and large-scale information processing communities are increasingly interested in studying large-scale distributed systems, such as Grid-based ones. Unfortunately, there are relatively few reports on best practices in teaching Grid topics that teachers can follow when they start building a new Grid-related course. Part 1 of this two-part department surveys reported efforts. Most of these efforts concern training activities organized by research teams for Grid user communities, but some discuss semester-long courses for advanced computer science or computer engineering students.

Journal ArticleDOI
TL;DR: The second installment of this department presents curriculum details and the results of the students' assessments of the school.
Abstract: In 2003, the distributed computing community began the international summer schools in grid computing series (www.iceage-eu.org/issgc08/index.cfm), now in its sixth year. These schools aim to bring together leading experts and practitioners in the field with selected international students, who will return to their home communities to pass their knowledge and enthusiasm on to others. The second installment of this department presents curriculum details and the results of the students' assessments of the school.

Journal ArticleDOI
TL;DR: GILDA, related summer and winter school experiences, multimiddleware integration, t-infrastructure, and academic courses are described, concluding with an analysis and recommendations.
Abstract: In the first article of this series, we identified the need for teaching environments that provide infrastructure to support education and training in distributed computing. Training infrastructure, or t-infrastructure, is analogous to the teaching laboratory in biology and is a vital tool for educators and students. In practice, t- infrastructure includes the computing equipment, digital communications, software, data, and support staff necessary to teach a course. The International Summer Schools in Grid Computing (ISSGC) series and the first International Winter School on Grid Computing (IWSGC 08) used the Grid INFN Laboratory of Dissemination Activities (GILDA) infrastructure so students could gain hands-on experience with middleware. Here, we describe GILDA, related summer and winter school experiences, multimiddleware integration, t-infrastructure, and academic courses, concluding with an analysis and recommendations.

Journal ArticleDOI
TL;DR: Both the US and the EU are moving toward biometrically enabled travel documents and new border-control proposals meant to combine greater security and more convenience for legitimate travelers, but technology and policy differences characterize a bumpy journey.
Abstract: Both the US and the EU are moving toward biometrically enabled travel documents and new border-control proposals meant to combine greater security and more convenience for legitimate travelers. However, technology and policy differences characterize a bumpy journey.

Journal ArticleDOI
TL;DR: The goal is to empower application developers to create self-organizing and robust actuator and sensor network (AS-Net) applications with minimal expert knowledge.
Abstract: Our vision is driven by rapid progress in hardware development, such as miniaturizing computing devices. On the software side, however, application development for such a setting is challenging for several reasons. One is the heterogeneity of devices and networking technologies, which vastly increases application development complexity. Other reasons include frequent reconfigurations and communication faults (such as network partitioning) that have to be handled appropriately. These reasons present problems for software developers - they can't predetermine configurations or anticipate all of the potential runtime faults that might occur. Furthermore, users might not be willing or able to handle complex configuration or communication issues - they want to install their devices and use applications. Thus, devices and applications must be able to work as autonomously as possible, with little to no manual user intervention. Specifically, applications must be able to adapt at runtime to a changing environment and recover from faults.Here, we elaborate on ideas we presented in a previous paper2 and discuss in more detail a model- driven approach to developing and adapting autonomous control applications. In contrast to conventional approaches, we use the application model not only for design and deployment but also for dynamically adapting the application at runtime. This is in line with research that emphasizes the importance of exploiting the latent knowledge contained in models at runtime.3 Our goal is to empower application developers to create self-organizing and robust actuator and sensor network (AS-Net) applications with minimal expert knowledge. Our work is part of the Model-Driven Development of Self-Organizing Control Applications project (www.kbs.tu-berlin.de/modoc).

Journal ArticleDOI
TL;DR: Service providers are building IP-based multiservice networks for supporting the residential and corporate markets by using a common infrastructure to carry traffic and creating synergies and cost efficiency in terms of capital and operational expenditures.
Abstract: face of IP-based data networks Multimedia applications (video streaming, online gaming, and so on), social networks, and file-sharing have steadily increased the number of end users and, subsequently, the bandwidth they require to meet their application demands Service providers are building IP-based multiservice networks for supporting the residential and corporate markets by using a common infrastructure to carry traffic and creating synergies and cost efficiency in terms of capital and operational expenditures These markets will demand more from the new services in terms of quality of service, personalization, and accessibility

Journal ArticleDOI
TL;DR: This installment is an introduction to a description of experiences in addressing e-infrastructure education and training issues at national and international levels.
Abstract: Governments and other funding agencies worldwide have recently been investing in the development of research- and production-quality e-infrastructures. To allow for the full development and use of these technologies, the necessary infrastructure must be in place, and researchers of all disciplines- and ultimately all citizens--must acquire the skills required to access the available services. Therefore, it's vital to develop policies to support e-infrastructure education and training. However, distributed computing teaching must address issues beyond the strictly technological. This installment is an introduction to a description of experiences in addressing these issues at national and international levels.

Journal ArticleDOI
TL;DR: The promise of cross-organizational computing and communications has long been a holy grail for network architects, but when the needs of disparate communities are not aligned, the results can be embarrassing, at the very least.
Abstract: The promise of cross-organizational computing and communications has long been a holy grail for network architects. From the dawn of the Arpanet to today's deployments of service-oriented architectures (SOAs) and remotely hosted applications, wider reuse of standards-compliant software components has been a constant goal. The rise of social networks and Web 2.0 principles are the latest trends in reusing software on nonhierarchical architectures. When these architectures work - when user identities are protected, when process security is ensured, and when there is consensus on both technical and contextual attributes of a given piece of software - the cross-organizational model has great potential. However, when the needs of disparate communities are not aligned, the results can be embarrassing, at the very least.

Journal ArticleDOI
TL;DR: The International Summer Schools in Grid Computing have provided numerous international students with the opportunity to learn grid systems, as detailed in part 2 of this series (http://doi.org/10.1109/MDSO.2008.20).
Abstract: The International Summer Schools in Grid Computing (ISSGC) have provided numerous international students with the opportunity to learn grid systems, as detailed in part 2 of this series (http://doi.ieeecomputersociety.org/10.1109/MDSO.2008.20). The International Winter School on Grid Computing 2008 (IWSGC 08) followed the successful summer schools, opening up the ISSGC experience to a wider range of students because of its online format. IWSGC 08 repurposed summer school materials and added resources such as the ICEAGE digital library and summer-school-tested t-Infrastructures such as GILDA (Grid INFN Laboratory for Dissemination Activities). The winter schools shared the goals of the summer school, which emphasized disseminating grid knowledge.

Journal ArticleDOI
TL;DR: Call it what you will - single sign-on, federated identity, one-stop authentication - letting users sign on to the Internet once and securely access network resources anywhere has been one of the industry's enduring quests.
Abstract: Call it what you will - single sign-on, federated identity, one-stop authentication - letting users sign on to the Internet once and securely access network resources anywhere has been one of the industry's enduring quests.