Towards Next Generation Panel at SAINT 2002

Slides:



Advertisements
Similar presentations
Hidden Metric Spaces and Navigability of Complex Networks
Advertisements

Costas Busch Louisiana State University CCW08. Becomes an issue when designing algorithms The output of the algorithms may affect the energy efficiency.
Delay Analysis and Optimality of Scheduling Policies for Multihop Wireless Networks Gagan Raj Gupta Post-Doctoral Research Associate with the Parallel.
Adopt Algorithm for Distributed Constraint Optimization
1 Intrusion Monitoring of Malicious Routing Behavior Poornima Balasubramanyam Karl Levitt Computer Security Laboratory Department of Computer Science UCDavis.
Teaser - Introduction to Distributed Computing
Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks By C. K. Toh.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Networks FIAS Summer School 6th August 2008 Complex Networks 1.
1 Sensor Networks and Networked Societies of Artifacts Jose Rolim University of Geneva.
PTIDES: Programming Temporally Integrated Distributed Embedded Systems Yang Zhao, EECS, UC Berkeley Edward A. Lee, EECS, UC Berkeley Jie Liu, Microsoft.
On management aspects of future ICT systems Associate Professor Evgeny Osipov Head of Dependable Communication and Computation group Luleå University of.
Distributed systems Module 2 -Distributed algorithms Teaching unit 1 – Basic techniques Ernesto Damiani University of Bozen Lesson 2 – Distributed Systems.
Report WG1 Software-Intensive Systems and New Computing Paradigms Cannes November 12-14, 2008 WG Leader: Martin Wirsing WG Depu ty Leaders: Jean-Pierre.
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Lecture 6: Introduction to Distributed Computing.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
Andreas Larsson, Philippas Tsigas SIROCCO Self-stabilizing (k,r)-Clustering in Clock Rate-limited Systems.
1 MSCS 237 Communication issues. 2 Colouris et al. (2001): Is a system in which hardware or software components located at networked computers communicate.
Future & Emerging Technologies in the Information Society Technologies programme of European Commission Future & Emerging Technologies in the Information.
Advanced Computer Networks Topic 2: Characterization of Distributed Systems.
Distributed Systems and Algorithms Sukumar Ghosh University of Iowa Spring 2011.
University of Zagreb, Croatia Synchronization inspired by fireflies Iva Bojić University of Zagreb, Croatia Faculty of Electrical Engineering and Computing.
1 Advanced Behavioral Model Part 1: Processes and Threads Part 2: Time and Space Chapter22~23 Speaker: 陳 奕 全 Real-time and Embedded System Lab 10 Oct.
Parallel Computing.
CS 484 Designing Parallel Algorithms Designing a parallel algorithm is not easy. There is no recipe or magical ingredient Except creativity We can benefit.
Distributed Computing Systems CSCI 4780/6780. Scalability ConceptExample Centralized servicesA single server for all users Centralized dataA single on-line.
Global Hybrid Control and Cooperative Mobile Robotics Yi Guo Center for Engineering Science Advanced Research Computer Science and Mathematics Division.
CS 351/ IT 351 Modeling and Simulation Technologies Review ( ) Dr. Jim Holten.
Adversary Models in Wireless Networks: Research Challenges Radha Poovendran Network Security Lab (NSL) University of Washington.
DEPARTMENT/SEMESTER ME VII Sem COURSE NAME Operation Research Manav Rachna College of Engg.
Vaughan Roberts UK Session 4 – Block 4 Barcelona May ACTIVE NETWORKS FOR THE ACCOMMODATION OF DISPERSED GENERATION.
What is a distributed system? A network of processes. The nodes are processes, and the edges are communication channels.
Medium Access Control. MAC layer covers three functional areas: reliable data delivery access control security.
These slides are based on the book:
Chapter 1 Characterization of Distributed Systems
Presented by Tae-Seok Kim
Dynamic connection system
Fair K-Mutual Exclusion Algorithm for Peer to Peer Systems
Parallel and Distributed Simulation Techniques
What contribution can automated reasoning make to e-Science?
On Multi-Arm Manipulation Planning
A Network Virtual Machine for Real-Time Coordination Services
James D. Z. Ma Department of Electrical and Computer Engineering
Anne Pratoomtong ECE734, Spring2002
Gabor Madl Ph.D. Candidate, UC Irvine Advisor: Nikil Dutt
Efficient Decentralized Monitoring of Safety in Distributed Systems
Koushik Sen Abhay Vardhan Gul Agha Grigore Rosu
CPSC 531: System Modeling and Simulation
postgrad. Sergiy Korotunov prof. Galyna Tabunshchyk
Lecture 7: Introduction to Distributed Computing.
DrillSim July 2005.
Mobile Agents.
Distributed Channel Assignment in Multi-Radio Mesh Networks
DATA RETRIEVAL IN ADHOC NETWORKS
Topology and Dynamics of Complex Networks
Distributed Control Applications Within Sensor Networks
COMP60621 Fundamentals of Parallel and Distributed Systems
Deterministic and Semantically Organized Network Topology
Presented By: Darlene Banta
Introducing complex networks into quantum regime
Physics data processing with SOA
Lecture 8 Processes and events Local and global states Time
In Distributed Systems
Synthesizing Controllers for Multi-Lane Traffic Maneuvers
COMP60611 Fundamentals of Parallel and Distributed Systems
Hwajung Lee ITEC452 Distributed Computing Lecture 1 Introduction to Distributed Systems.
Distributed Systems and Algorithms
Presentation transcript:

Towards Next Generation Panel at SAINT 2002 Gul Agha Professor of Computer Science and Computational Science and Engineering University of Illinois at Urbana-Champaign http://www.osl.cs.uiuc.edu

Research Directions What are the programming models for Applications on the Internet? Massively parallel, distributed and mobile. Multi-agent Systems Actors Network Embedded Systems Integration of continuous and discrete processes.

Large Scale Actor Systems Reasoning about large-scale agent systems. Asynchrony: Autonomous agents that communicate asynchronously. Modularity: Concurrent components each with several agents. Locality and Non-interference: Message are the only means of information flow. Mobility: Reconfiguration and extension of systems.

Formal Methods Probabilistic reasoning about distributed and mobile real-time systems: Techniques for analysis of algorithms. Performance models. Models must account for: Stochastic duration of actions. Probabilistic behavior of node or system. Uncertainty in the environment.

Metrics for Large-Scale Systems Probabilities on evolution of system. Quantifying robustness, stability, timeliness, … Summations over execution paths for statistical metrics..

Models of Time Global synchronous wall clock Synchronization is too tight Too detailed an execution model Asynchronous, distributed time Vector clocks are too expensive Application behavior is complicated Need a more expressive model of time: Notion of distance and distribution. Space-Time cone of causal influence.

Past causally connected Causality and Time t Future causality R P Q Not Causally related x S Past causally connected y

Agents with Bounded Resources Each agent has bounded resources. Dynamic binding of agents to computational and network resources. Control of Multi-Agent Systems by bounding resources: Stability Efficiency Optimizing search Preventing denial of service attacks

Coordination Algorithms Large-scale systems where: Nodes and links have variable capabilities. Real-time requirements in the absence of a predefined global clock. Faults are common.

Example: Global Snapshot Consistent with causal relations. Real-time constraints: Duration of snapshot “skew”. Completion time of snapshot. Scalable Minimize number of messages. Dynamic topology of nodes and channels. Notion of approximation in snapshots: Farther apart nodes have larger skews.

New Directions Hybrid Systems More complex middleware Network Embedded Systems More complex middleware Naming Computational Reflection World-Wide Computer Mobility Grid-based computing