Summary We defineinterface, module and the meaning ofM offers I, whereM denotes a module andI an interface. For a moduleM and disjoint interfacesU andL, the meaning ofM using L offers U is also defined. For a linear hierarchy of modules and interfaces,M1, I1, M2, I2, ...,Mn, In, we present the following composition theorem: IfM1 offersI1 and, fori=2, ...,n, Mi usingIi–1 offersIi, then the hierarchy of modules offersIn.Our theory is applied to solve a problem posed by Leslie Lamport at the 1987 Lake Arrowhead Workshop. We first present a formal specification of a serializable database interface. We then provide specifications of two modules, one based upon two-phase locking and the other multi-version timestamps; the two-phase locking module uses an interface offered by a physical database. We prove that each module offers the serializable interface.
Simon S. Lam is Chairman of the Department of Computer Sciences at the University of Texas at Austin and holds and endowed professorship. His research interests are in the areas of computer networks, communication protocols, performance models, formal methods, and network security. He serves on the editorial boards ofIEEE Transactions on Software Engineering andPerformance Evaluation. He is an IEEE Fellow, and was a corecipient of the 1975 Leonard G. Abraham Prize Paper Award from the IEEE Communications Society. He organized and was program chairman of the first ACM SIGCOMM Symposium on Communications Architectures and Protocols in 1983. He received the BSEE degree (with Distinction) from Washington State University in 1969, and the MS and Ph.D. degrees from the University of California at Los Angeles in 1970 and 1974 respectively. Prior to joining the University of Texas faculty, he was with the IBM T.J. Watson Research Center from 1974 to 1977.
A. Udaya Shankar received the B. Tech. degree in Electrical Engineering from the Indian Institute of Technology, Kanpur, in 1976, the M.S. degree in Computer Engineering from Syracuse University, Syracuse, NY, in 1978, and the Ph.D. degree in Electrical Engineering from the University of Texas at Austin, in 1982. Since January 1983, he has been with the University of Maryland, College Park, where he is now an Associate Professor of Computer Science. Since September 1985, he has been with the Institute for Advanced Computer Studies at the University of Maryland. His current research interests include the modeling and analysis of distributed systems and network protocols, from both correctness and performance aspects. He is a member of IEEE and ACM.The work of Simon S. Lam was supported by National Science Foundation grants no. NCR-8613338 and no. NCR-9004464. The work of A. Udaya Shankar was supported by National Science Foundation grants no. ECS-8502113 and no. NCR-8904590 相似文献
All the components necessary for realizing location-aware computing are available in the marketplace today. What has hindered the widespread deployment of location-based systems is the lack of an integration architecture that scales with user populations. The authors have completed the initial implementation of Rover, a system designed to achieve this sort of integration and to automatically tailor information and services to a mobile user's location. Their studies have validated Rover's underlying software architecture, which achieves system scalability through high-resolution, application-specific resource scheduling at the servers and network. The authors believe that this technology will greatly enhance the user experience in many places, including museums, amusement and theme parks, shopping malls, game fields, offices, and business centers. They designed the system specifically to scale to large user populations and expect its benefits to increase with them. 相似文献
Wireless sensor networks face numerous limitations. Security and Privacy are the two most essential parameters that require consideration in wireless sensor networks for conveying responsive information amid basic applications. High density and limited communication range of sensor nodes, forwarding packets in sensor networks have caused the performance of during multi-hop data transmission. Hence communication with different devices these days are not secure, due to the absence of centralized monitoring and overprotective requirements. This paper is related to speak about Distributed Denial of Service which debilitates the ability of the network and the data being transmitted. The earlier system guarantees the WSN through a self arranged and confined procedure between the nodes in the sensor environment. Here, the authors present the Centralized Detect Eliminate and Control algorithm for authorization and centralized monitoring component to discover the node that has turned into a victim node and to get rid of the information communicated to the fatality node from the neighbour nodes. Overprotective of the communication between the nodes leads to dependability. The simulation results improve the malicious node detection rate and increase the various parameters like throughput and reduce the average delay. This leads to, the overall detection rate built, eventually enhancing the parameters of the network environment.
Sea surface temperature (SST) measurements from the Advanced Microwave Scanning Radiometer for the Earth Observing System (AMSR‐E) and the Tropical Rainfall Measuring Mission (TRMM) Microwave Imager (TMI) are compared with near‐surface temperature (foundation SST) in situ measurements obtained from Argo floats over the Indian Ocean. Spatial variation was compared for 2002–2006 and 11 floats were used for temporal variation collocated observations. The results show that TMI and AMSR‐E SST measurements are slightly overestimated during the pre‐ and post‐monsoon seasons and underestimated during the monsoon season. Statistical analysis shows that the SST from the AMSR‐E is better correlated with the Argo foundation SST compared to the TMI. The standard deviation (SD) and root mean square error (RMSE) for AMSR‐E SST are 0.58°C and 0.35°C, respectively, over the Equatorial Indian Ocean (EIO). The corresponding values for the TMI are 0.66°C and 0.47°C. Over the Arabian Sea the SD values are slightly higher compared to the EIO values, whereas RMSE values are less for both TMI and AMSR‐E SST. These retrieval accuracies are above the expected retrieval accuracy. The seasonal average spatial distribution of AMSR‐E SST shows a better match with the Argo foundation SST compared to TMI SST distributions. The robustness of the good spatial match during the monsoon season may be attributed to strong winds. 相似文献
Journal of Materials Science: Materials in Electronics - Electromagnetic interference (EMI) shielding has potential importance due to rapid growth in electronic technology. In recent days, carbon... 相似文献
Production of ω-3 fatty acid concentrates from seal blubber oil (SBO) and menhaden oil (MHO) upon enzymatic hydrolysis by
Candida cylindracea lipase was optimized. In this process, the content of total ω-3 fatty acids, Y1; eicosapentaenoic acid, Y2; and docosahexaenoic acid, Y3, in the final product was maximized. A three-factor central composite rotatable design was used to study the effect of enzyme
concentration (X1), reaction time (X2), and reaction temperature (X3). Second-order polynomial regression models for Y1, Y2, and Y3 were employed to generate response surfaces. After hydrolysis, a maximum of 54.3% total ω-3 fatty acids was obtained from
SBO at an enzyme concentration of 308 U/g oil, a reaction time of 40 h, and a reaction temperature of 37°C. Similarly, a maximum
of 54.5% total ω-3 fatty acids was obtained from MHO at an enzyme concentration of 340 U/g oil, a reaction time of 45 h, and
a reaction temperature of 38°C. 相似文献
The investigation pertains to establishing a simulation methodology for understanding the separation characteristics of a typical hydrocyclone where the work was carried out using a commercially available CFD software. The studies included water flow profiles, water throughput {\&} product split, particle distribution etc. and the simulated results are further validated with suitably performed experiments. The work essentially highlights the performance of the hydrocyclone using numerical studies where water is used as a primary phase and solid particles as secondary ones. This methodology is expected to be useful in the design of hydrocyclones and optimizing the processes. 相似文献
We introduce linear cyclic codes over the ring F2+uF 2={0,1,u,u¯=u+1}, where u2=0 and study them by analogy with the Z4 case. We give the structure of these codes on this new alphabet. Self-dual codes of odd length exist as in the case of Z4-codes. Unlike the Z4 case, here free codes are not interesting. Some nonfree codes give rise to optimal binary linear codes and extremal self-dual codes through a linear Gray map 相似文献