• Documents
  • Authors
  • Tables

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 25
Next 10 →

Interposition Agents: Transparently Interposing User Code at the System Interface

by Michael B. Jones - In Proceedings of the 14th ACM Symposium on Operating Systems Principles
"... 1.1. Terminology Many contemporary operating systems utilize a system Many contemporary operating systems provide an call interface between the operating system and its clients. interface between user code and the operating system Increasing numbers of systems are providing low-level services based ..."
Abstract - Cited by 183 (0 self) - Add to MetaCart
1.1. Terminology Many contemporary operating systems utilize a system Many contemporary operating systems provide an call interface between the operating system and its clients. interface between user code and the operating system Increasing numbers of systems are providing low-level services based

An Interposition Agent for the Legion File System

by Brian S. White, Marty Humphrey, Andrew S. Grimshaw , 2002
"... Wide-area operating systems, or grids, present users with access to a broad range of computational resources and storage facilities. To cope with the resulting heterogeneity, current solutions such as Legion operate at user level. While this provides desirable portability, lower levels of a host suc ..."
Abstract - Add to MetaCart
NFS daemon, or lnfsd, which interposes an NFS client and Legion to provide seamless access to the Legion name space from a Unix environment. lnfsd overcomes the insecurities of its NFS heritage and mitigates the performance degradation of interposition through well-known file system techniques

Parrot: Transparent User-Level Middleware for Data Intensive Computing

by Douglas Thain, Miron Livny - In Workshop on Adaptive Grid Middleware , 2003
"... Distributed computing continues to be an alphabet-soup of services and protocols for managing computation and storage. To live in this environment, applications require middleware that can transparently adapt standard interfaces to new distributed systems; such software is known as an interposition ..."
Abstract - Cited by 50 (23 self) - Add to MetaCart
Distributed computing continues to be an alphabet-soup of services and protocols for managing computation and storage. To live in this environment, applications require middleware that can transparently adapt standard interfaces to new distributed systems; such software is known as an interposition

Transparent program transformations in the presence of opaque code

by Eli Tilevich - In GPCE , 2006
"... User-level indirection is the automatic rewriting of an application to interpose code that gets executed upon program actions such as object field access, method call, object construction, etc. Several useful domain-specific and domain-independent (typically called aspect-oriented) mechanisms employ ..."
Abstract - Cited by 5 (2 self) - Add to MetaCart
. These problems are real: the native behavior of Java system classes, for instance, invalidates the transparency of several user-level indirection techniques in the recent research literature. In this paper, we demonstrate the problem of employing user-level indirection in the presence of native code. We

Transparent Migration and Rollback for Unmodified Applications in Workstation Clusters

by Stefan Petri, Matthias Bolz, Horst Langendörfer - IN WORKSTATION CLUSTERS. INFORMATIK-BERICHT 98-02 , 1998
"... Programmers and users of compute intensive scientific applications often do not want to (or even cannot) code load balancing and fault tolerance into their programs. The P / BEAM system [PL95, PSLS96] uses a global virtual name space to provide migration and rollback transparency in user space for d ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Programmers and users of compute intensive scientific applications often do not want to (or even cannot) code load balancing and fault tolerance into their programs. The P / BEAM system [PL95, PSLS96] uses a global virtual name space to provide migration and rollback transparency in user space

Migration and Rollback Transparency for Arbitrary Distributed Applications in Workstation Clusters

by Stefan Petri, Matthias Bolz, Horst Langendörfer , 1998
"... Programmers and users of compute intensive scientific applications often do not want to (or even cannot) code load balancing and fault tolerance into their programs. The P / BEAM system [PL95, PSLS96] uses a global virtual name space to provide migration and rollback transparency in user space for d ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Programmers and users of compute intensive scientific applications often do not want to (or even cannot) code load balancing and fault tolerance into their programs. The P / BEAM system [PL95, PSLS96] uses a global virtual name space to provide migration and rollback transparency in user space

Hijack: Taking control of cots systems for real-time user-level services

by Gabriel Parmer, Richard West - In Proc. 13th IEEE Real-Time and Embedded Technology and Applications Symposium , 2007
"... This paper focuses on a technique to empower commercial-off-the-shelf (COTS) systems with an execution environment, and corresponding services, to support realtime and embedded applications. By leveraging COTS systems, we are able to reduce the potentially expensive maintenance and development costs ..."
Abstract - Cited by 6 (4 self) - Add to MetaCart
such as Linux, Hijack provides the basis for predictable thread execution at user-level. No changes to the kernel source code are required to support this approach. Instead, Hijack works by using a combination of kernel module support and an interposed execution environment between traditional process address

MAGE: Multi-Agent Graphical Environment

by Leen-kiat Soh, Htiseyin Sevay, Costas Tsatsoulis
"... This paper describes our continuing research effort towards building a graphical development environment for rapidly creating, visualizing, and testing multi-agent software applications. Our system, Multi-Agent Graphical Environment (MAGE), addresses the need for enabling existing programs to be inc ..."
Abstract - Add to MetaCart
to be incorporated into agent-based software frameworks with minimal programming and the need for creating new agents and linking them to others. Users can create new agents and convert legacy programs to agents using the graphical user interface in MAGE and a messaging API at the source code level. Since MAGE

Knowledge-based Autonomous Agents for Pervasive Computing Using

by O L. Koch
"... Project AgentLight is a multiagent system-building framework targeting handheld and embedded computational devices. AgentLight applications will run in J2ME and J2SE environments using as little as 128 KBytes of RAM. The platform provides a built-in first-order logic inference system and interface f ..."
Abstract - Add to MetaCart
Society 1541-4922/03/$17.00 @ 2003 IEEE l The autonomous agent system infrastructure should work transparently and should be interconnected either on a desktop computer or a mobile phone l The application’s core code should run on J2SE and J2ME l The system should be extensible and configurable enough

unknown title

by Pasquale De Meo A, Giovanni Quattrone A, Giorgio Terracina B, Domenico Ursino A
"... IOS Press Utilization of intelligent agents for supporting citizens in their access to e-government services 1 ..."
Abstract - Add to MetaCart
IOS Press Utilization of intelligent agents for supporting citizens in their access to e-government services 1
Next 10 →
Results 1 - 10 of 25
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University