scispace - formally typeset
Search or ask a question

Showing papers on "Systems architecture published in 2002"


Proceedings ArticleDOI
28 Sep 2002
TL;DR: An in-depth study of applying wireless sensor networks to real-world habitat monitoring and an instance of the architecture for monitoring seabird nesting environment and behavior is presented.
Abstract: We provide an in-depth study of applying wireless sensor networks to real-world habitat monitoring. A set of system design requirements are developed that cover the hardware design of the nodes, the design of the sensor network, and the capabilities for remote data access and management. A system architecture is proposed to address these requirements for habitat monitoring in general, and an instance of the architecture for monitoring seabird nesting environment and behavior is presented. The currently deployed network consists of 32 nodes on a small island off the coast of Maine streaming useful live data onto the web. The application-driven design exercise serves to identify important areas of further work in data sampling, communications, network retasking, and health monitoring.

4,623 citations


Journal ArticleDOI
TL;DR: The hardware aspects of reconfigurable computing machines, from single chip architectures to multi-chip systems, including internal structures and external coupling are explored, and the software that targets these machines is focused on.
Abstract: Due to its potential to greatly accelerate a wide variety of applications, reconfigurable computing has become a subject of a great deal of research. Its key feature is the ability to perform computations in hardware to increase performance, while retaining much of the flexibility of a software solution. In this survey, we explore the hardware aspects of reconfigurable computing machines, from single chip architectures to multi-chip systems, including internal structures and external coupling. We also focus on the software that targets these machines, such as compilation tools that map high-level algorithms directly to the reconfigurable substrate. Finally, we consider the issues involved in run-time reconfigurable systems, which reuse the configurable hardware during program execution.

1,666 citations


Book ChapterDOI
20 Aug 2002
TL;DR: This paper presents Aurora, a new DBMS that is currently under construction at Brandeis University, Brown University, and M.I.T. and describes the basic system architecture, a stream-oriented set of operators, optimization tactics, and support for real-time operation.
Abstract: This paper introduces monitoring applications, which we will show differ substantially from conventional business data processing. The fact that a software system must process and react to continual inputs from many sources (e.g., sensors) rather than from human operators requires one to rethink the fundamental architecture of a DBMS for this application area. In this paper, we present Aurora, a new DBMS that is currently under construction at Brandeis University, Brown University, and M.I.T. We describe the basic system architecture, a stream-oriented set of operators, optimization tactics, and support for real-time operation.

963 citations


Patent
28 Jun 2002
TL;DR: In this article, a computer system models human memory by deriving associations between objects, events, and the context of the computer user or users, which can be dynamically generated, changing depending on the behavior of the user and context.
Abstract: A computer system models human memory by deriving associations between objects, events, and the context of the computer user or users. These associations can be dynamically generated, changing depending on the behavior of the user and context. Examples of areas in which this system can be used include time management (e.g., a calendar that presents time-based groupings of objects), people management (e.g., use analysis of user communications to rank importance of people to the user, groupings, and associations between people/groups and other objects such as documents, email), and general computer management (e.g., use analysis of user behavior to identify important objects and objects that are related to a current focus and context of the computer user).

709 citations


Proceedings ArticleDOI
07 Aug 2002
TL;DR: This work presents the Fjords architecture for managing multiple queries over many sensors, and shows how it can be used to limit sensor resource demands while maintaining high query throughput.
Abstract: If industry visionaries are correct, our lives will soon be full of sensors, connected together in loose conglomerations via wireless networks, each monitoring and collecting data about the environment at large. These sensors behave very differently from traditional database sources: they have intermittent connectivity, are limited by severe power constraints, and typically sample periodically and push immediately, keeping no record of historical information. These limitations make traditional database systems inappropriate for queries over sensors. We present the Fjords architecture for managing multiple queries over many sensors, and show how it can be used to limit sensor resource demands while maintaining high query throughput. We evaluate our architecture using traces from a network of traffic sensors deployed on Interstate 80 near Berkeley and present performance results that show how query throughput, communication costs and power consumption are necessarily coupled in sensor environments.

561 citations


Journal ArticleDOI
TL;DR: Using the definitions of bounded component behavior and protocol conformance relation, the designer can verify the adherence of a component's implementation to its specification at runtime, while the correctness of refining the specification can be verified at design time.
Abstract: In this paper, we propose a means to enhance an architecture description language with a description of component behavior. A notation used for this purpose should be able to express the "interplay" on the component's interfaces and reflect step-by-step refinement of the component's specification during its design. In addition, the notation should be easy to comprehend and allow for formal reasoning about the correctness of the specification refinement and also about the correctness of an implementation in terms of whether it adheres to the specification. Targeting all these requirements together, the paper proposes employing behavior protocols which are based on a notation similar to regular expressions. As proof of the concept, the behavior protocols are used in the SOFA architecture description language at three levels: interface, frame, and architecture. Key achievements of this paper include the definitions of bounded component behavior and protocol conformance relation. Using these concepts, the designer can verify the adherence of a component's implementation to its specification at runtime, while the correctness of refining the specification can be verified at design time.

395 citations


Journal ArticleDOI
TL;DR: A self-adaptive distributed agent-based defense immune system based on biological strategies is developed within a hierarchical layered architecture and the results validate the use of a distributed-agent biological system approach toward the computer security problems of virus elimination and ID.
Abstract: With increased global interconnectivity and reliance on e-commerce, network services and Internet communication, computer security has become a necessity Organizations must protect their systems from intrusion and computer virus attacks Such protection must detect anomalous patterns by exploiting known signatures while monitoring normal computer programs and network usage for abnormalities Current anti-virus and network intrusion detection (ID) solutions can become overwhelmed by the burden of capturing and classifying new viral strains and intrusion patterns To overcome this problem, a self-adaptive distributed agent-based defense immune system based on biological strategies is developed within a hierarchical layered architecture A prototype interactive system is designed, implemented in Java and tested The results validate the use of a distributed-agent biological system approach toward the computer security problems of virus elimination and ID

383 citations


Journal ArticleDOI
TL;DR: This work introduces the MavHome project and its underlying architecture, and three prediction algorithms that are central to home operations are presented and demonstrate the effectiveness of these algorithms on synthetic and/or actual smart home data.
Abstract: The goal of the MavHome project is to create a home that acts as a rational agent. The agent seeks to maximize inhabitant comfort and minimize operation cost. To achieve these goals, the agent must be able to predict the mobility patterns and device usages of the inhabitants. We introduce the MavHome project and its underlying architecture. The role of prediction algorithms within the architecture is discussed, and three prediction algorithms that are central to home operations are presented. We demonstrate the effectiveness of these algorithms on synthetic and/or actual smart home data.

353 citations


Proceedings ArticleDOI
18 Nov 2002
TL;DR: This paper presents tools and methods that implement infrastructure elements in the context of an overall architecture-based vision for building self-healing systems, and concludes with a gap analysis of the current infrastructure vs. the overall vision.
Abstract: Our approach to creating self-healing systems is based on software architecture, where repairs are done at the level of a software system's components and connectors. In our approach, event-based software architectures are targeted because they offer significant benefits for run-time adaptation. Before an automated planning agent can decide how to repair a self-healing system, a significant infrastructure must be in place to support making the planned repair. Specifically, the self-healing system must be built using a framework that allows for run-time adaptation, there must be a language in which to express the repair plan, and there must be a reconfiguration agent that can execute the repair plan once it is created. In this paper, we present tools and methods that implement these infrastructure elements in the context of an overall architecture-based vision for building self-healing systems. The paper concludes with a gap analysis of our current infrastructure vs. the overall vision, and our plans for fulfilling that vision.

216 citations


Journal ArticleDOI
TL;DR: A solution approach for the efficient use of network capacity that takes into consideration driver's personal preferences for mode, routing and departure/arrival time is suggested.
Abstract: Developing real-time approaches to manage roadway network congestion over time and space is a difficult problem. While many approaches to solving networking problems have been posed, the roadway routing problem is fundamentally different in that route choice behavior rests solely with the flow entities (drivers). The challenge is to find and implement solutions that achieve an efficient reallocation of network capacity over time and space without seriously violating any individual user’s preferences for mode, routing, departure, and/or arrival time. This paper proposes a solution approach based on cooperative multi-agent-based principled negotiation between agents that represent network managers, information service providers, and drivers equipped with route guidance systems. It is demonstrated that the cooperative, multi-agent approach is a natural extension of the National ITS Architecture. Furthermore, the approach is highly scalable and adaptable to a variety of networks and user populations.

174 citations


Journal ArticleDOI
TL;DR: An agent-based resource management system, ARMS, is implemented for grid computing that utilises the performance prediction techniques of the PACE toolkit to provide quantitative data regarding the performance of complex applications running on a local grid resource.
Abstract: Resource management is an important component of a grid computing infrastructure. The scalability and adaptability of such systems are two key challenges that must be addressed. In this work an agent-based resource management system, ARMS, is implemented for grid computing. ARMS utilises the performance prediction techniques of the PACE toolkit to provide quantitative data regarding the performance of complex applications running on a local grid resource. At the meta-level, a hierarchy of homogeneous agents are used to provide a scalable and adaptable abstraction of the system architecture. Each agent is able to cooperate with other agents and thereby provide service advertisement and discovery for the scheduling of applications that need to utilise grid resources. A case study with corresponding experimental results is included to demonstrate the efficiency of the resource management and scheduling system.

Proceedings ArticleDOI
19 Jun 2002
TL;DR: This paper proposes a hierarchical design space exploration methodology that initially uses symbolic constraint satisfaction to rapidly prune the design space, followed by a system wide performance estimation to further reduce the number of candidate designs.
Abstract: In addition to integrating different Intellectual Property cores, heterogeneous embedded systems provide several architecture knobs such as voltage, operating frequency, configuration, etc. that can be varied to optimize performance. Such flexibilities results in a large design space making system optimization a very challenging task. Moreover, such systems operate in mobile and other power constrained environments. Therefore, in addition to rapid exploration of a large design space a designer has to optimize both time and energy performance. To address these issues, we propose a hierarchical design space exploration methodology. Our methodology initially uses symbolic constraint satisfaction to rapidly prune the design space. This pruning process is followed by a system wide performance estimation to further reduce the number of candidate designs. Finally, detailed simulation using low-level simulators are performed to select an appropriate design. Our methodology is implemented by integrating two tools, DESERT and HiPerE, into the M model based Integrated simuLAtioN (MILAN) framework. DESERT uses Ordered Binary Decision Diagrams based symbolic search to rapidly explore a large design space and identifies candidate designs that meet the user specified performance constraints. HiPerE provides rapid estimation of system wide energy and latency based on component level simulations and also facilitates energy optimization. MILAN provides the required modeling support for these tools and also facilitates component specific multi-granular simulations through seamless integration of various simulators.

Journal ArticleDOI
TL;DR: The approach extensively prunes the potentially large configuration space by taking advantage of parameter dependencies and has successfully incorporated into the parameterized SOC tuning environment (Platune) and applied it to a number of applications.
Abstract: In this work, we provide a technique for efficiently exploring the power/performance design space of a parameterized system-on-chip (SOC) architecture to find all Pareto-optimal configurations. These Pareto-optimal configurations will represent the range of power and performance tradeoffs that are obtainable by adjusting parameter values for a fixed application that is mapped on the SOC architecture. Our approach extensively prunes the potentially large configuration space by taking advantage of parameter dependencies. We have successfully applied our technique to explore Pareto-optimal configurations of our SOC architecture for a number of applications.

Journal ArticleDOI
TL;DR: The article introduces an architecture, the MASST system architecture, which supports dynamic information and knowledge exchange among the cooperating agents, and uses a dynamic blackboard as an interagent communication paradigm to facilitate factual data, business rule, and command exchange between cooperating MASST agents.
Abstract: A distributed problem solving system can be characterized as a group of individual cooperating agents running to solve common problems. As dynamic application domains continue to grow in scale and complexity, it becomes more difficult to control the purposeful behavior of agents, especially when unexpected events may occur. This article presents an information and knowledge exchange framework to support distributed problem solving. From the application viewpoint the article concentrates on the stock trading domain; however, many presented solutions can be extended to other dynamic domains. It addresses two important issues: how individual agents should be interconnected so that their resources are efficiently used and their goals accomplished effectively; and how information and knowledge transfer should take place among the agents to allow them to respond successfully to user requests and unexpected external situations. The article introduces an architecture, the MASST system architecture, which supports dynamic information and knowledge exchange among the cooperating agents. The architecture uses a dynamic blackboard as an interagent communication paradigm to facilitate factual data, business rule, and command exchange between cooperating MASST agents. The critical components of the MASST architecture have been implemented and tested in the stock trading domain, and have proven to be a viable solution for distributed problem solving based on cooperating agents.

Journal ArticleDOI
TL;DR: This paper describes an experimental mobile data mining system that allows intelligent monitoring of time-critical financial data from a hand-held PDA and explores one particular aspect of the system---automated construction of personalized focus area that calls for user's attention.
Abstract: This paper describes an experimental mobile data mining system that allows intelligent monitoring of time-critical financial data from a hand-held PDA. It presents the overall system architecture and the philosophy behind the design. It explores one particular aspect of the system---automated construction of personalized focus area that calls for user's attention. This module works using data mining techniques. The paper describes the data mining component of the system that employs a novel Fourier analysis-based approach to efficiently represent, visualize, and communicate decision trees over limited bandwidth wireless networks. The paper also discusses a quadratic programming-based personalization module that runs on the PDAs and the multi-media based user-interfaces. It reports experimental results using an ad hoc peer-to-peer IEEE 802.11 wireless network.

Journal ArticleDOI
07 Nov 2002
TL;DR: This paper categorizes target tracking systems based on characteristics of scenes, tasks, and system architectures, and presents a real-time cooperative multitarget tracking system that can track multiple moving objects persistently even under complicated dynamic environments in the real world.
Abstract: Target detection and tracking is one of the most important and fundamental technologies to develop real-world computer vision systems such as security and traffic monitoring systems. This paper first categorizes target tracking systems based on characteristics of scenes, tasks, and system architectures. Then we present a real-time cooperative multitarget tracking system. The system consists of a group of active vision agents (AVAs), where an AVA is a logical model of a network-connected computer with an active camera. All AVAs cooperatively track their target objects by dynamically exchanging object information with each other With this cooperative tracking capability, the system as a whole can track multiple moving objects persistently even under complicated dynamic environments in the real world. In this paper we address the technologies employed in the system and demonstrate their effectiveness.

Proceedings ArticleDOI
Paul Lukowicz1, Holger Junker1, Mathias Stäger1, T. von Buren, Gerhard Tröster 
29 Sep 2002
TL;DR: A distributed, multi-sensor system architecture designed to provide a wearable computer with a wide range of complex context information that devotes particular attention to sensor placement, system partitioning as well as resource requirements given by the power consumption, computational intensity and communication overhead.
Abstract: This paper describes a distributed, multi-sensor system architecture designed to provide a wearable computer with a wide range of complex context information. Starting from an analysis of useful high level context information we present a top down design that focuses on the peculiarities of wearable applications. Thus, our design devotes particular attention to sensor placement, system partitioning as well as resource requirements given by the power consumption, computational intensity and communication overhead. We describe an implementation of our architecture and initial experimental results obtained with the system.

01 Jan 2002
TL;DR: An overview of the Artequakt system architecture is presented here and the three key components of that architecture are explained in detail, namely knowledge extraction, information management and biography construction.
Abstract: The Artequakt project seeks to automatically generate narrative biographies of artists from knowledge that has been extracted from the Web and maintained in a knowledge base. An overview of the system architecture is presented here and the three key components of that architecture are explained in detail, namely knowledge extraction, information management and biography construction. Conclusions are drawn from the initial experiences of the project and future progress is detailed.

Proceedings ArticleDOI
02 Oct 2002
TL;DR: In this paper, the authors highlight the challenges posed by the need for security during system architecture design for wireless handsets, and provide an overview of emerging techniques to address them, including low-complexity cryptographic algorithms, security enhancements to embedded processors, and advanced system architectures for wireless devices that are enabled by new system level design methodologies.
Abstract: Security is critical to a wide range of current and future wireless data applications and services. This paper highlights the challenges posed by the need for security during system architecture design for wireless handsets, and provides an overview of emerging techniques to address them. We focus on the computational requirements for securing wireless data transactions, revealing a gap between these requirements and the trends in processing capabilities of embedded processors used in wireless handsets. We also demonstrate that the use of security protocols causes significant degradation in battery life, a problem that will worsen due to the slow growth in battery capacities. These trends point to a wireless security processing gap that, unless addressed, will impede the deployment of secure high-speed wireless data and multi-media applications. We discuss approaches that are currently being pursued to bridge this gap, including low-complexity cryptographic algorithms, security enhancements to embedded processors, and advanced system architectures for wireless handsets that are enabled by new system level design methodologies.

Book ChapterDOI
23 Sep 2002
TL;DR: The development of the DLV system has started as a research projectfinanced by FWF (the Austrian Science Funds) in 1996, and has evolved into an international collaboration over the years.
Abstract: The development of the DLV system has started as a research projectfinanced by FWF (the Austrian Science Funds) in 1996,and has evolved into an international collaboration over the years. Currently, the University of Calabria and TU Wien participate in the project, supported by a scientific-technological collaboration between Italy and Austria. At the time of writing, the latest version of the system has been released on April 12, 2002.

Book ChapterDOI
17 Jun 2002
TL;DR: In this article, a case study of twenty releases of a telecommunication software system containing a few million lines of code is presented to show how retrospective analysis may be performed to evaluate architectural stability.
Abstract: Many organizations are now pursuing software architecture as a way to control their software development and evolution costs and challenges. A software architecture describes a system's structure and global properties and thus determines not only how the system should be constructed but also guides its evolution. An important challenge is to able to evaluate the "goodness" of a proposed architechture. I suggest stability or resilience as a primary criterion for evaluating an architecture. The stability of an architecture is a measure of how well it accomodates the evolution of the system without requiring changes to th architecture. As opposed to traditional predictive approaches to architecture evalution, I suggest retrospective analysis for evaluating architectural stability by examining the amount of change applied in successive releases of a software product. I review the results of a case study of twenty releases of a telecommunication software system containing a few million lines of code to show how retrospective analysis may be performed.

Proceedings ArticleDOI
30 Sep 2002
TL;DR: The system architecture of a mobile outdoor augmented reality system for the Archeoguide project is presented and the first results obtained from experiments made during trials at ancient Olympia in Greece are concluded.
Abstract: We present the system architecture of a mobile outdoor augmented reality system for the Archeoguide project. We begin with a short introduction to the project. Then we present the hardware we chose for the mobile system and we describe the system architecture we designed for the software implementation. We conclude this paper with the first results obtained from experiments we made during our trials at ancient Olympia in Greece.

Patent
07 Aug 2002
TL;DR: A multimedia signal processing system as discussed by the authors utilizes an easily manipulated, low-cost storage and display system that allows the user to view a television program and instantly review previous scenes within the program, while the user can store selected programs while simultaneously watching or reviewing another.
Abstract: A multimedia signal processing system utilizes an easily manipulated, low-cost storage and display system that allows the user to view a television program and instantly review previous scenes within the program. The invention also allows the user to store selected programs while simultaneously watching or reviewing another. A versatile system architecture enables providing the invention in multiple configurations, each adapted to receive input signals from a different source. At the highest level, the system includes an input section and an output section. Across all configurations, the output section remains substantially the same, while the input section varies according to the signal type and the source. Thus, several configurations are provided, each one requiring only minor system board modifications. The system architecture thus simplifies the design and manufacturing challenge presented by producing units to serve different markets, such as digital satellite, digital cable and analog cable.

Proceedings ArticleDOI
10 Jun 2002
TL;DR: A programmable security processor platform to support both public-key and private key operations using the proposed methodology is designed, and its performance is evaluated through extensive system simulations as well as hardware prototyping.
Abstract: Security protocols are critical to enabling the growth of a wide range of wireless data services and applications. However, they impose a high computational burden that is mismatched with the modest processing capabilities and battery resources available on wireless clients. Bridging the security processing gap, while retaining sufficient programmability in order to support a wide range of current and future security protocol standards, requires the use of novel system architectures and design methodologies.We present the system-level design methodology used to design a programmable security processor platform for next-generation wireless handsets. The platform architecture is based on (i) a configurable and extensible processor that is customized for efficient domain-specific processing, and (ii) layered software libraries implementing cryptographic algorithms that are optimized to the hardware platform. Our system-level design methodology enables the efficient co design of optimal cryptographic algorithms and an optimized system architecture. It includes novel techniques for algorithmic exploration and tuning, performance characterization and macro-modeling of software libraries, and architecture refinement based on selection of instruction extensions to accelerate performance-critical, computation-intensive operations. We have designed a programmable security processor platform to support both public-key and private key operations using the proposed methodology, and have evaluated its performance through extensive system simulations as well as hardware prototyping. Our experiments demonstrate large performance improvements (e.g., 31.0X for DES, 33.9X for 3DES, 17.4X for AES, and upto 66.4X for RSA) compared to well-optimized software implementations on a state-of-the-art embedded processor.

Proceedings ArticleDOI
28 Aug 2002
TL;DR: A solution which combines real-time communication with mobility with mobility (based on radio transmission) and multimedia transmission ( based on IP tunnelling via PROFIBUS-DP) through RFieldbus is described.
Abstract: Driven by the demand on more flexible systems in manufacturing and process automation systems, investigations are made in the field of wireless communication. This paper describes a solution which combines real-time communication (based on PROFIBUS-DP) with mobility (based on radio transmission) and multimedia transmission (based on IP tunnelling via PROFIBUS-DP). The requirements on such a system are listed. The industrial environmental conditions, concerning the radio propagation, are explained and the relevant radio technologies are assessed. The system architecture as well as the device architecture of RFieldbus are presented.

Proceedings Article
01 Jan 2002
TL;DR: In this paper, the authors define a dependability modeling and model-based evaluation approach based on UML models, which is used in the early phases of the system design to capture system dependability attributes like reliability and availabiUty, thus providing guidelines for the choice among different architectural and design solutions.
Abstract: The work in this paper is devoted to the definition of a dependability modeling and model based evaluation approach based on UML models. It is to be used in the early phases of the system design to capture system dependability attributes like reliability and availabiUty, thus providing guidelines for the choice among different architectural and design solutions. We show how structural UML diagrams can be processed to filter out the dependability related information and how a system-wide dependability model is constructed. Due to the modular construction, this model can be refined later as more detailed information becomes available. We discuss the model refinement based on the General Resource Model, an extension of UML. We show that the dependability model can be constructed automatically by using graph transformation techniques.

Book
01 Oct 2002
TL;DR: The editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers from academia and industry to discuss their latest research in the architecture, design, programming, and use of these devices.
Abstract: From the Publisher: As the demand for digital communication networks has increased, so have the challenges in network component design. To meet ever-escalating performance, flexibility, and economy requirements, the networking industry has opted to build products around network processors. These new chips range from task-specific processors, such as classification and encryption engines, to more general-purpose packet or communications processors. Programmable yet application-specific, their designs are tailored to efficiently implement communications applications such as routing, protocol analysis, voice and data convergence, firewalls, VPNs, and QoS. Network processor design is an emerging field with issues and opportunities both numerous and formidable. To help meet this challenge, the editors of this volume created the first Workshop on Network Processors, a forum for scientists and engineers from academia and industry to discuss their latest research in the architecture, design, programming, and use of these devices. In addition to including the results of the Workshop in this volume, the editors also present specially commissioned material from practicing designers, who discuss their companies' latest network processors. Network Processor Design: Issues and Practices is an essential reference on network processors for graduate students, researchers, and practicing designers. KEY FEATURES: * Includes contributions from major academic and industrial research labs including Aachen University of Technology; Cisco Systems; Infineon Technologies; Intel Corp.; North Carolina State University; Swiss Federal Institute of Technology; University of California, Berkeley; University of Dortmund;University of Washington; and Washington University. * Examines the latest network processors from Agere Systems, Cisco, IBM, Intel, Motorola, Sierra Inc., and TranSwitch. Author Biography: Patrick Crowley is currently a Ph.D. candidate in the Department of Computer Science and Engineering at the University of Washington. Before arriving in Seattle, he earned a B.A. degree, summa cum laude, from Illinois Wesleyan University where he studied Mathematics, Physics and Computer Science. Crowley's research interests are in the area of computer systems architecture, with a present focus on the design and analysis of programmable packet processing systems. He is an active participant in the architecture research community and a reviewer for several conferences (ASPLOS, ISCA) and journals (IEEE TOCS). He was an organizer and member of the program committee of the HPCA8 Workshop on Network Processors (2002). Upon completing his Ph.D., Crowley intends to pursue a university research and teaching career. Mark A. Franklin received his B.A., B.S.E.E. and M.S.E.E. from Columbia University, and his Ph.D. in EE from Carnegie-Mellon University. He is currently at Washington University in St. Louis where he has a joint appointment in Electrical Engineering and Computer Science, and holds the Urbauer Chair in Engineering. He founded and is Director of the Computer and Communications Research Center and until recently was the Director of the Undergraduate Program in Computer Engineering. Dr. Franklin is engaged in research, teaching and consulting in the areas of computer and communications architectures, ASIC and embedded processor design, parallel and distributed systems, and systems performance evaluation. He is a Fellow of the IEEE, a member of the ACM, and has been an organizer and reviewer for numerous professional conferences including the HPCA8 Workshop on Network Processors (2002). He has been Chair of the IEEE TCCA (Technical Committee on Computer Architecture), and Vice-Chairman of the ACM SIGARCH (Special Interest Group on Computer Architecture). Haldun Hadimioglu received his BS and MS degrees in Electrical Engineering at Middle East Technical University, Ankara Turkey and his Ph.D. in Computer Science from Polytechnic University in New York. He is currently an Industry Associate Professor in the Computer Science Department and a member of the Computer Engineering faculty at the Polytechnic University. He worked as a research engineer at PETAS, Ankara Turkey (1980-1982). Dr. Hadimioglu's research and teaching interests include Computer Architecture, Parallel and Distributed Systems, Networking and VLSI Design. He was a guest editor of the special issue on "Advances in High Performance Memory Systems," IEEE Transactions on Computers (Nov 2001) and has reviewed papers for leading journals such as the IEEE Transactions on Computers. Hadimioglu is a member of the IEEE, the ACM, and Sigma Xi. He has been an organizer of various workshops including, the ISCA Memory Wall (2000), ISCA Memory Performance Issues (2002, 2001) and HPCA8 Workshop on Network Processors (2002). He received Dedicated Faculty and Outstanding Faculty awards from Polytechnic students in 1995 and 1993, respectively. Peter Z. Onufryk received his B.S.E.E. from Rutgers University, M.S.E.E. from Purdue University, and Ph.D. in Electrical and Computer Engineering from Rutgers University. He is currently a director in the Internetworking Products Division at Integrated Device Technology, Inc. where he is responsible for architecture definition and validation of communications products. Before joining IDT, Peter was a researcher for thirteen years at AT&T Labs - Research (formally AT&T Bell Labs) where he worked on communications systems and parallel computer architectures. These included a number of parallel, cache-coherent multiprocessor and dataflow based machines that were targeted towards high performance military systems. Other work there focused on packet telephony and early network processors. Onufryk is a member of the IEEE. He was an organizer and program committee member of the HPCA8 Workshop on Network Processors 2002. Peter was the architect of four communications processors as well as numerous ASICs, boards, and systems.

Journal ArticleDOI
TL;DR: An Internet-based HVAC system architecture that combines Web technology, networking, and functions of direct digital control is proposed that enables users to make cost-effective energy decisions and quickly identify trouble spots of HvAC systems to minimize system down time.
Abstract: Significant advances in Internet and computer technology have made it possible to develop an Internet-based control, monitoring, and operation scheduling system for heating, ventilation, and air-conditioning (HVAC) systems. The proposed system architecture includes such features as control, measurement, networking, and reporting. This article addresses issues in architecture selection, electronics, embedded processors and software, and Internet technologies. This article also proposes an Internet-based HVAC system architecture that combines Web technology, networking, and functions of direct digital control. The proposed system also includes technologies needed for supporting real-time digital thermostat control, data gathering, remote access and occupancy control, light sensing control, and views of the history of HVAC utilization. This system enables users to make cost-effective energy decisions and quickly identify trouble spots of HVAC systems to minimize system down time.

Patent
20 Jun 2002
TL;DR: In this paper, a distributed computing system may include a node computing device configured to perform computations for the second portion of the application, a persistent data storage queue in communication with the node computing devices, and the persistent data storages configured to store the second part of an application.
Abstract: In one aspect, the present invention features a system including a local computing device in communication with a distributed computing system, the local computing device configured to perform computations for a first portion of a computer software application and to send a second portion of the application for computation on the distributed computing system. According to such an aspect, the distributed computing system may include a node computing device configured to perform computations for the second portion of the application, a persistent data storage queue in communication with the node computing device, the persistent data storage configured to store the second portion of the application, wherein a minimum availability of the distributed computing system is defined by an availability of the persistent data storage, and a compute function deployed on the distributed computing system, the second portion of the application including a job with an input, wherein the input has a task to be performed by the compute function, and wherein the input need not be supplied to the job at a time of job creation.

Journal ArticleDOI
TL;DR: The system presented reuses GSM and GPRS mechanisms for user authentication, access control, subscriber management, operator roaming, and billing, while still being compatible with wireless Internet service provider networks and IETF and IEEE protocols such as RADIUS, EAP, and IEEE 802.1x.
Abstract: This article presents a system architecture, design considerations, and rationale for a mobile operator wireless LAN. The article also discusses the system implementation and performance issues. The system presented reuses GSM and GPRS mechanisms for user authentication, access control, subscriber management, operator roaming, and billing, while still being compatible with wireless Internet service provider networks and IETF and IEEE protocols such as RADIUS, EAP, and IEEE 802.1x. The architecture is a result of research carried out by Nokia between 1999 and 2002. The designed architecture has also been verified in a complete system implementation.