Application Developers (application + developers)

Distribution by Scientific Domains


Selected Abstracts


Behaviour-based multiplayer collaborative interaction management

COMPUTER ANIMATION AND VIRTUAL WORLDS (PREV: JNL OF VISUALISATION & COMPUTER ANIMATION), Issue 1 2006
Qingping Lin
Abstract A collaborative virtual environment (CVE) allows geographically dispersed users to interact with each other and objects in a common virtual environment via network connections. One of the successful applications of CVE is multiplayer on-line role-playing game. To support massive interactions among virtual entities in a large-scale CVE and maintain consistent status of the interaction among users with the constraint of limited network bandwidth, an efficient collaborative interaction management method is required. In this paper, we propose a behaviour-based interaction management framework for supporting multiplayer role-playing CVE applications. It incorporates a two-tiered architecture which includes high-level role behaviour-based interaction management and low-level message routing. In the high level, interaction management is achieved by enabling interactions based on collaborative behaviour definitions. In the low level, message routing controls interactions according to the run-time status of the interactive entities. Collaborative Behaviour Description Language is designed as a scripting interface for application developers to define collaborative behaviours of interactive entities and simulation logics/game rules in a CVE. We demonstrate and evaluate the performance of the proposed framework through a prototype system and simulations. Copyright © 2006 John Wiley & Sons, Ltd. [source]


Concurrent workload mapping for multicore security systems

CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 10 2009
Benfano Soewito
Abstract Multicore based network processors are promising components to build real-time and scalable security systems to protect the networks and systems. The parallel nature of the processing system makes it challenging for application developers to concurrently program security systems for high performance. In this paper we present an automatic programming methodology that considers application complexity, traffic variation, and attack signatures update. In particular, our mapping algorithm concurrently takes advantage of parallelism in the level of tasks, applications, and packets to achieve optimal performance. We present results that show the effectiveness of the analysis, mapping, and the performance of the model methodology. Copyright © 2009 John Wiley & Sons, Ltd. [source]


MyCoG.NET: a multi-language CoG toolkit

CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 14 2007
A. Paventhan
Abstract Grid application developers utilize Commodity Grid (CoG) toolkits to access Globus Grid services. Existing CoG toolkits are language-specific and have, for example, been developed for Java, Python and the Matlab scripting environment. In this paper we describe MyCoG.NET, a CoG toolkit supporting multi-language programmability under the Microsoft .NET framework. MyCoG.NET provides a set of classes and APIs to access Globus Grid services from languages supported by the .NET Common Language Runtime. We demonstrate its programmability using FORTRAN, C++, C# and Java, and discuss its performance over LAN and WAN infrastructures. We present a Grid application, in the field of experimental aerodynamics, as a case study to show how MyCoG.NET can be exploited. We demonstrate how scientists and engineers can create and use domain-specific workflow activity sets for rapid application development using Windows Workflow Foundation. We also show how users can easily extend and customize these activities. Copyright © 2006 John Wiley & Sons, Ltd. [source]


Advanced eager scheduling for Java-based adaptive parallel computing

CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE, Issue 7-8 2005
Michael O. Neary
Abstract Javelin 3 is a software system for developing large-scale, fault-tolerant, adaptively parallel applications. When all or part of their application can be cast as a master,worker or branch-and-bound computation, Javelin 3 frees application developers from concerns about inter-processor communication and fault tolerance among networked hosts, allowing them to focus on the underlying application. The paper describes a fault-tolerant task scheduler and its performance analysis. The task scheduler integrates work stealing with an advanced form of eager scheduling. It enables dynamic task decomposition, which improves host load-balancing in the presence of tasks whose non-uniform computational load is evident only at execution time. Speedup measurements are presented of actual performance on up to 1000 hosts. We analyze the expected performance degradation due to unresponsive hosts, and measure actual performance degradation due to unresponsive hosts. Copyright © 2005 John Wiley & Sons, Ltd. [source]


Application creation for IMS systems through macro-enablers and Web 2.0 technologies

BELL LABS TECHNICAL JOURNAL, Issue 1 2010
Anne Y. Lee
Rapid creation of an unlimited number of innovative new applications has been a promise of the IP Multimedia Subsystem (IMS) from the beginning. However, over the years, attention has been paid more to the development of the IMS foundation than methods for the IMS services factory,which is as it should be. The time has come to now address applications creation. This paper describes a way to enable carriers, third-party application developers, and the public to quickly produce new applications using IMS building blocks and application frameworks as well as Web 2.0 technologies and support for IMS + Internet applications mashups. IMS building blocks and application frameworks are macro application enablers. © 2010 Alcatel-Lucent. [source]


The support of mobile internet applications in UMTS networks through the open service access

BELL LABS TECHNICAL JOURNAL, Issue 2 2001
Musa R. Unmehopa
Third-generation wireless networks are expected to enable the mobile Internet to become a reality, offering fast Internet access and high-speed data services to mobile subscribers. For network operators to allow for the rapid development of innovative value-added applications on the scale seen in the Internet today, the wireless core network needs to be opened up for third-party applications provided by independent software vendors (ISVs). The Third-Generation Partnership Project (3GPP) is currently working on the production of technical specifications to provide a mechanism that would permit ISVs a standard interface to access network capabilities traditionally available to network operators. Within 3GPP, this mechanism is commonly referred to as the open service access (OSA). This open service access is predominantly targeted at Universal Mobile Telecommunications System (UMTS) networks, allowing application developers to access the feature-rich core network capabilities. This open access enables network operators to offer innovative services to their subscribers allowing the ability to differentiate themselves in a competitive market. With the imminent commercial deployment of the General Packet Radio Service (GPRS), existing fixed-line Internet service providers (ISPs) can now offer mobile Internet to end users in a UMTS environment where the responsibility of the network operator is reduced to providing IP connectivity. The increased competition from ISPs poses a big threat to the revenue stream of the network operator. This paper explores the possibilities of OSA to facilitate network operators in providing the mutual support of network capabilities and Internet content. These possibilities would allow the network operator to become a value-added mobile Internet service provider (VAM-ISP). © 2002 Lucent Technologies Inc. [source]