distributed system
Recently Published Documents


TOTAL DOCUMENTS

2180
(FIVE YEARS 324)

H-INDEX

48
(FIVE YEARS 4)

2022 ◽  
Vol 6 (POPL) ◽  
pp. 1-27
Author(s):  
Andrew K. Hirsch ◽  
Deepak Garg

We present Pirouette, a language for typed higher-order functional choreographic programming. Pirouette offers programmers the ability to write a centralized functional program and compile it via endpoint projection into programs for each node in a distributed system. Moreover, Pirouette is defined generically over a (local) language of messages, and lifts guarantees about the message type system to its own. Message type soundness also guarantees deadlock freedom. All of our results are verified in Coq.


2022 ◽  
Vol 12 (2) ◽  
pp. 636
Author(s):  
Yi-Fan Tseng ◽  
Shih-Jie Gao

With the rise of technology in recent years, more people are studying distributed system architecture, such as the e-government system. The advantage of this architecture is that when a single point of failure occurs, it does not cause the system to be invaded by other attackers, making the entire system more secure. On the other hand, inner product encryption (IPE) provides fine-grained access control, and can be used as a fundamental tool to construct other cryptographic primitives. Lots of studies for IPE have been proposed recently. The first and only existing decentralized IPE was proposed by Michalevsky and Joye in 2018. However, some restrictions in their scheme may make it impractical. First, the ciphertext size is linear to the length of the corresponding attribute vector; second, the number of authorities should be the same as the length of predicate vector. To cope with the aforementioned issues, we design the first decentralized IPE with constant-size ciphertext. The security of our scheme is proven under the ℓ-DBDHE assumption in the random oracle model. Compared with Michalevsky and Joye’s work, ours achieves better efficiency in ciphertext length and encryption/decryption cost.


Author(s):  
Dr Anand Sharma

SaaS is software as a service. In previous days when the concept of providing the facility of distributed system from where information can be shared was introduced then the concept of Application service provider came into the picture. The idea was to provide application-based services to the companies using client server techniques. It became popular. SaaS is introduced to provide software also as a service which is upgraded version of the ASP. In this paper SaaS will be discussed in detail. There are two main types of SaaS. The challenges in implementation of SaaS will also be discussed.


10.6036/10118 ◽  
2022 ◽  
Vol 97 (1) ◽  
pp. 64-70
Author(s):  
Manikandan Selvaraj ◽  
Manigandan Thathan

The increased availability of protections of distributed system is a major role by ensuring the continuity of electrical power supply. The optimization process for a distributed system is to coordinate with overcurrent relay protection with adaptive overcurrent relay model. Here the protection of the system is an important factor since the protection methods play a vital role in distributed systems. The conventional methods discussed the current in the power system to reduce the fault current tolerance value by using various optimization algorithms like Antlion and Butterfly optimization techniques. The distributed three-phase system uses the IEEE bus network with adaptive overcurrent relay model, which produces the best output as compared to the conventional method. Here the particle swarm optimization (C-SBO) procedure is used to improve the relay setting and it reduces the fault current across the relay.


Author(s):  
Yihao Tian

Data management is an administrative mechanism that involves the acquisitions, validations, storage, protection, and processing of data needed by its users to ensure that data are accessible, reliable, and timely. It is a challenging task to manage protections for information properties. With the emphasis on distributed systems and Internet-accessible systems, the need for efficient information security management is increasingly important. In the paper, artificial intelligence-assisted dynamic modeling (AI-DM) is used for data management in a distributed system. Distributed processing is an effective way to enhance the efficiency of database systems. Therefore, each distributed database structure’s functionality depends significantly on its proper architecture in implementing fragmentation, allocation, and replication processes. The proposed model is a dynamically distributed internet database architecture. This suggested model enables complex decision-making on fragmentation, distribution, and duplication. It provides users with links from anywhere to the distributed database. AI-DM has an improved allocation and replication strategy where no query performance information is accessible at the initial stage of the distributed database design. AI-DM findings show that the proposed database model leads to the reliability and efficiency of the enhanced system. The final results are obtained by analyzing the dynamic modeling ratio is 87.6%, increasing decision support ratio is 88.7%, the logistic regression ratio is 84.5%, the data reliability ratio is 82.2%, and the system ratio is 93.8%.


2021 ◽  
Vol Volume 17, Issue 4 ◽  
Author(s):  
G. Michele Pinna

The execution of an event in a complex and distributed system where the dependencies vary during the evolution of the system can be represented in many ways, and one of them is to use Context-Dependent Event structures. Event structures are related to Petri nets. The aim of this paper is to propose what can be the appropriate kind of Petri net corresponding to Context-Dependent Event structures, giving an operational flavour to the dependencies represented in a Context/Dependent Event structure. Dependencies are often operationally represented, in Petri nets, by tokens produced by activities and consumed by others. Here we shift the perspective using contextual arcs to characterize what has happened so far and in this way to describe the dependencies among the various activities.


Author(s):  
Kshirod Kumar Rout ◽  
Debani Prasad Mishra ◽  
Surender Reddy Salkuti

In highly automated devices, deadlock is a case that occurs when no system can permit its event which may give irrelevant economic losses. A process can request or release resources that are either available or are on hold by others. If a process requesting a resource is not available at any time, then that process enters into the waiting state. But if a waiting state is not converted into its present state, it enters more than two processes are having an indefinite waiting state. The proposed algorithm gives an efficient way for deadlock detection. For the implementation of this work, C++ and python as the basic programming language are used. It gives an idea about how resources are allocated, and how few processes result in deadlock.


2021 ◽  
Vol 2132 (1) ◽  
pp. 012017
Author(s):  
Tong Zhang ◽  
Mingyan Song ◽  
Yue Sui ◽  
Hanlin Chen ◽  
Jian Tan

Abstract This paper proposes a method invention, namely an efficient NFT data inspection method with minimum granularity and probability comparison. The invention establishes a fast comparison method of AI model and data, that is, the direct comparison of small files priority and the maximum-minimum interval comparison. The invention takes the substantial identity inside the NFT data and the processing method of NFT data coincidence into account, so that the data content outside the token of the NFT publicly shared by the AI distributed system can also be unique on the Internet. Therefore, it can avoid the problem of incremental packaging and repeated packaging, and can successfully balance the efficiency and security of the comparison process. portions given in this document


Sign in / Sign up

Export Citation Format

Share Document