Topic
Database-centric architecture
About: Database-centric architecture is a research topic. Over the lifetime, 1799 publications have been published within this topic receiving 48836 citations.
Papers published on a yearly basis
Papers
More filters
••
27 Jun 2014TL;DR: This paper discusses the importance of data provenance and presents an open cloud architecture named CloudProv, a framework to integrate, model, and monitor the provenance data, and a design of the proposed framework and its components along with a prototype implementation.
Abstract: Provenance of electronic data is an important piece of the metadata of a data object. Making systems provenance-aware can greatly benefit all parties involved. This paper discusses the importance of data provenance and presents an open cloud architecture named CloudProv, a framework to integrate, model, and monitor the provenance data. Our elastic cloud architecture will provide an open APIs which allows independent organizations to develop applications that can share and integrate provenance data across internal and external organizational boundaries. We propose a method to model the collected provenance information in such a way that can be used for continuous compliance monitoring and for root cause analysis. We have implemented a prototype of our framework, and used it to verify how we can generate a service model for provenance data using a small, but interesting set of data. We present a design of our proposed framework and its components along with a prototype implementation.
20 citations
••
22 Apr 2003TL;DR: This paper proposes several integrated security architecture designs for client-server group communication systems and discusses the performance and accompanying trust issues of each proposed architecture and presents experimental results that demonstrate the superior scalability of an integrated architecture.
Abstract: This paper proposes several integrated security architecture designs for client-server group communication systems. In an integrated architecture, security services are implemented in servers, in contrast to a layered architecture where the same services are implemented in clients. We discuss the performance and accompanying trust issues of each proposed architecture and present experimental results that demonstrate the superior scalability of an integrated architecture.
20 citations
••
07 Mar 1990
TL;DR: An architecture for providing weak-consistency replication for databases in an internetwork is presented, designed to make the databases highly available and to operate reliably under difficult conditions, such as unreliable communication, low-bandwidth communication, network partitions, and host failures.
Abstract: An architecture for providing weak-consistency replication for databases in an internetwork is presented. It is designed to make the databases highly available and to operate reliably under difficult conditions, such as unreliable communication, low-bandwidth communication, network partitions, and host failures. Updates are stored in logs until they have been propagated to all database sites and properly delivered to the databases. A novel approach called mediation is used to provide integrated support for reliable replication and log purging. Other interesting features include requiring minimal support from database management systems, support of multiple weak-consistency methods, and easy tuning of the architecture's basic algorithms to particular environments. >
20 citations
••
27 Jun 2014TL;DR: This paper compares the results of resilience evaluation between the original version of the middleware and a modified version of that middleware in which the adaptation mechanisms are implemented using Rainbow, a framework for architecture-based self-adaptation.
Abstract: Architecture-based self-adaptation is considered as a promising approach to drive down the development and operation costs of complex software systems operating in ever changing environments. However, there is still a lack of evidence supporting the arguments for the beneficial impact of architecture-based self-adaptation on resilience with respect to other customary approaches, such as embedded code-based adaptation. In this paper, we report on an empirical study about the impact on resilience of incorporating architecture-based self-adaptation in an industrial middleware used to collect data in highly populated networks of devices. To this end, we compare the results of resilience evaluation between the original version of the middleware, in which adaptation mechanisms are embedded at the code-level, and a modified version of that middleware in which the adaptation mechanisms are implemented using Rainbow, a framework for architecture-based self-adaptation. Our results show improved levels of resilience in architecture-based compared to embedded code-based self-adaptation.
20 citations
•
TL;DR: The Port-Based Adaptable Agent Architecture provides user-level access to the three forms of software adaptability: parametric fine tuning, algorithmic change, and code mobility.
Abstract: To facilitate the design of large-scale, self-adaptive systems, we have developed the Port-Based Adaptable Agent Architecture. This distributed, multiagent architecture allows systems to be created with the flexibility and modularity required for the rapid construction of software systems that analyze and dynamically modify themselves to improve performance. This architecture provides user-level access to the three forms of software adaptability: parametric fine tuning, algorithmic change, and code mobility. In this paper, we present the architecture, describe port-based agents, and outline several applications where this flexible architecture has proven useful.
19 citations