Request - Based Mediated Execution
نویسنده
چکیده
data structures are useful in any system, as a means of separating interfaces from implementations. Normally, data structures are considered as concrete within the scope of an implementation module, and abstract everywhere else that they are visible in the program. Thus an abstract data structure has global extent, although its internals are only visible within a specific scope. But when a program involves multiple levels of abstraction, it is no longer reasonable to assume high-level definitions have global extent. For example, a CPU or an OS kernel has no understanding of the classes defined in a Java program running in user mode; yet the lower levels must be able to execute on behalf of the Java program. This is because the concrete bit-level representations of the Java classes are exposed to the lower levels of the system: the JVM itself, the OS kernel, and the CPU.
منابع مشابه
Investigation on Reliability Estimation of Loosely Coupled Software as a Service Execution Using Clustered and Non-Clustered Web Server
Evaluating the reliability of loosely coupled Software as a Service through the paradigm of a cluster-based and non-cluster-based web server is considered to be an important attribute for the service delivery and execution. We proposed a novel method for measuring the reliability of Software as a Service execution through load testing. The fault count of the model against the stresses of users ...
متن کاملEnhancing SOAP Performance by achieving Service Differentiation and Predictability
Simple Object Access Protocol (SOAP) based web services have become a widely used middleware for heterogeneous distributed systems over the years. Although the driving factor of its popularity has been the simple text based nature of eXtensible Markup Languge (XML) SOAP, the same reason has resulted web services being overlooked for certain classes of applications. To this date, binary based mi...
متن کاملSupply Chain Simulation in a Devs / Corba Execution Environment
The emerging electronic commerce and rapidly changing business environments place strong requirements on a next-generation supply-chain analyzer to simulate the flow of goods through the entire supply chain in a timely manner. Such requirements include scalable and efficient model execution and support for flexible future extensibility based on an open industry standard. This paper presents des...
متن کاملA New Approach to Mutual Exclusion for Tackling Selfish Nodes in a Distributed Spectrum
In distributed systems, it is difficult to predict whether the node is genuine or not and this may lead to the addition of selfish/ malicious nodes. The selfish/malicious nodes are the nodes that continue the execution of their codes for unknown/prolonged duration. For allotting the nodes with resources, the mutual exclusion algorithms, either token based, non-token based quorum-based or agreem...
متن کاملParsimony-Based Approach for Obtaining Resource-Efficient and Trustworthy Execution
We propose a resource-efficient way to execute requests in Byzantine-fault-tolerant replication that is particularly well-suited for services in which request processing is resource-intensive. Previous efforts took a failure-masking all-active approach of using all 2t+1 execution replicas to execute all requests, where t is the maximum number of failures tolerated. We describe an asynchronous e...
متن کاملThe Impact of Deductive, Inductive, and L1-Based Consciousness-Raising Tasks on EFL Learners' Acquisition of the Request Speech Act
The necessity and importance of teaching pragmatics has come to light by many researchers (e.g. Rose & Kasper, 2001). Due to the consensus over the need to teach pragmatic competence, the main issue now centers on the question of how we should teach this competence in the most effective way. Consistent with this line of research, the present study aimed to investigate the effectiveness of deduc...
متن کامل