𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Middleware 2003: ACM/IFIP/USENIX International Middleware Conference, Rio de Janeiro, Brazil, June 16-20, 2003, Proceedings (Lecture Notes in Computer Science, 2672)

✍ Scribed by Markus Endler


Publisher
Springer
Year
2003
Tongue
English
Leaves
525
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Next-generation distributed applications and systems are increasingly developed using middleware. This dependency poses hard R&D challenges, including - tency hiding, masking partial failure, information assurance and security, legacy integration, dynamic service partitioning and load balancing, and end-to-end quality of service speci?cation and enforcement. To address these challenges, researchers and practitioners must discover and validate techniques, patterns, and optimizations for middleware frameworks, multi-level distributed resource management, and adaptive and re?ective middleware architectures. Following the success of the past IFIP/ACM Middleware conferences (Lake District/UK, Palisades/USA, and Heidelberg/Germany) and building upon the success of past USENIX COOTS conferences, the Middleware 2003 conference is the premier international event for middleware research and technology. The scope of the conference is the design, implementation, deployment, and eval- tion of distributed system platforms, architectures, and applications for future computing and communication environments. This year, we had a record of 158 submissions, among which the top 25 - pers were selected for inclusion in the technical program of the conference. All papers were evaluated by at least three reviewers with respect to their origin- ity,technicalmerit,presentationquality,andrelevancetotheconferencethemes. The selected papers present the latest results and breakthroughs on middleware research in areas including peer-to-peer computing, publish-subscriber archit- tures, component- and Web-based middleware, mobile systems, and adaptive computing.

✦ Table of Contents


Middleware 2003
Preface
Organization
Table of Contents
Approximate Object Location and Spam Filtering on Peer-to-Peer Systems
1 Introduction
2 Background: Structured P2P Overlays
2.1 Routing
2.2 Data Location
3 Approximate DOLR
3.1 Approximate DOLR Design
3.2 A Basic ADOLR Prototype on Tapestry
3.3 Optimizing ADOLR Location
3.4 Concurrent Publication
4 Approximate Text Addressing
4.1 Finding Text Similarity
4.2 Trade-offs
5 Decentralized Spam Filtering
5.1 Basic Operation
5.2 Enhancements and Optimizations
6 Evaluation
6.1 Fingerprint on Random Text
6.2 Fingerprint on Real Email
6.3 Efficient Fingerprint Routing w/ TTLs
7 Related Work
8 Ongoing and Future Work
References
1 Analysis of Robustness of Text Fingerprinting
Efficient Peer-to-Peer Keyword Searching
1 Introduction
1.1 Non-goals
1.2 Overview
2 System Model
2.1 Partitioning
2.2 Centralized or Distributed Organization
2.3 Ranking of Results
2.4 Update Discovery
2.5 Placement
3 Efficient Support for Peer-to-Peer Search
3.1 Bloom Filters
3.2 Caches
3.3 Incremental Results
3.4 Virtual Hosts
3.5 Discussion
3.6 Ranking of Results
3.7 Load Balancing
4 Simulation Infrastructure
4.1 Goals
4.2 Design
4.3 Validation
5 Experimental Results
5.1 Scalability and Virtual Hosts
5.2 Bloom Filters and Caching
5.3 Putting It All Together
6 Related Work
7 Conclusions
References
NaradaBrokering: A Distributed Middleware Framework and Architecture for Enabling Durable Peer-to-Peer Grids
1 Introduction
2 NaradaBrokering
2.1 Broker Organization
2.2 Dissemination of Events
2.3 Failures and Recovery
2.4 JMS Compliance
2.4.1 JMS Performance Data
3 Support for P2P Interactions in NaradaBrokering
3.1 JXTA
3.2 JXTA & NaradaBrokering
3.2.1 The Interaction Model
3.2.2 Interaction Disseminations
3.3 Performance Measurements
4 NaradaBrokering’s Transport Framework
4.1 Some Performance Measurements
5 Performance Monitoring and Aggregation
6 Security Framework
7 Conclusions and Future Work
Bibliography
A Framework for Event Composition in Distributed Systems
1 Introduction
2 Motivation
2.1 Application Scenario: The Active O.ce
3 Related Work
4 Design and Architecture
4.1 Publish/Subscribe Infrastructure Support
4.2 Composite Event Detection Framework
5 Composite Event Detection
5.1 Composite Event Detectors
5.2 Core Composite Event Language
6 Distributed Detection
6.1 Mobile Composite Event Detectors
6.2 Distribution Policy
6.3 Detection Policy
7 Implementation Using JMS
7.1 Evaluation and Results
8 Further Work: Higher-Level Specification Languages
9 Conclusions
References
A Appendix: Formalising the Time and Event Models
A.1 Definition of Interval Timestamps
A.2 Formalising Describable Events and Input Sequences
B Appendix: Generating Composite Event Detectors
Content Distribution for Publish/Subscribe Services
1 Introduction
2 A Publish/Subscribe System with Content Distribution Engine
3 Content Delivery Strategies
3.1 Access-Time Strategy Based on Access Pattern
3.2 Push-Time Strategy Based on Subscription Information and Matching
3.3 Push-Time and Access-Time Schemes Based on Subscription Information and Access Pattern
3.4 Summary of Strategies
4 Workload and Simulator
4.1 Publishing Stream Generation
4.2 Request Stream Generation
4.3 Subscription Generation
5 Experiments
5.1 Metrics and Experiment Setup
5.2 Comparing Dual-Methods and Dual-Caches
5.3 Overall Hit Ratio with Perfect Subscriptions
5.4 Influence of Subscription Quality
5.5 Hit Ratio versus Time
5.6 Traffic Overhead
6 Related Work
7 Conclusion
References
Supporting Mobility in Content-Based Publish/Subscribe Middleware
1 Introduction
2 Content-Based Publish/Subscribe
2.1 Publish/Subscribe Systems
2.2 Content-Based Routing
3 Publish/Subscribe Systems and Mobility
3.1 Mobility Issues in Publish/Subscribe Middleware
3.2 Physical Mobility
3.3 Logical Mobility
4 Notification Delivery with Roaming Clients
4.1 Main Idea
4.2 Discussion
5 Location-Dependent Filters for Logical Mobility
5.1 Main Idea
5.2 Example
5.3 Adaptivity
5.4 Discussion
6 Conclusions
References
Fine-Grained Dynamic Adaptation of Distributed Components
1 Introduction
2 The Comet Middleware
2.1 Principles
2.2 Example: Distributed Multimedia
2.3 Component Internals
3 Dynamic Adaptation in Comet
3.1 Protocols and Roles
3.2 Other Role Categories
3.3 Put It All Together: Dynamic Distributed Debugging
4 Quantitative Evaluation
5 Verification Contracts
5.1 Typing Contracts
5.2 Access Contracts
5.3 Security Contracts
6 Related Work
7 Conclusion
References
A Middleware for Context-Aware Agents in Ubiquitous Computing Environments
1 Introduction
2 Why a Middleware for Context-Awareness?
3 Context Model
3.1 The Context Predicate
3.2 Ontologies to Describe Context Predicates
4 Gaia
5 Enabling Context-Awareness
5.1 Overview of Context Infrastructure
5.2 Use of Different Reasoning Mechanisms by Different Agents
5.3 Context Providers
5.4 Context Synthesizers
5.5 Context Consumers (or Context-Aware Applications)
5.6 Context Provider Lookup Service
5.7 Context History
6 Ontologies for Semantic Interoperability
6.1 Ontologies in Gaia
6.2 The Ontology Server
6.3 Ontologies for Smoother Interaction between Agents
7 Implementation
8 Related Work
9 Future Work
10 Conclusion
References
Adaptable Architectural Middleware for Programming-in-the-Small-and-Many
1 Introduction
2 Middleware Objectives
3 Middleware Core
3.1 Architectural Abstractions
3.2 Efficiency
3.3 Scalability
4 Middleware Extensions
4.1 Connector Extensions
2672b162.pdf
4 Middleware Extensions
4.1 Connector Extensions
4.2 Component Extensions
4.3 Event Extensions
4.4 Other Extensions
5 Tool Support
5.1 Modeling and Analysis
5.2 Deployment and Run-Time Monitoring
6 Further Evaluation and Experience
6.1 Dynamic Service Discovery
6.2 Military Deployment
6.3 Airborne System
7 Related Work
8 Conclusions and Future Work
References
Opportunistic Channels: Mobility-Aware Event Delivery
1 Introduction
2 System Architecture
2.1 Overview of JECho
2.2 Broker Adaptation Architecture
3 Opportunistic Channels in Mobile Environments
3.1 Mobility Adaptation
3.2 Modulator Handoff
3.3 Experimental Evaluation
4 Load Balancing in Opportunistic Channels
4.1 Adaptations for Load Balancing
4.2 Experimental Evaluation
5 Related Work
5.1 Publish/Subscribe Systems
5.2 Mobile IP and Its Location Management
5.3 Adaptations in Mobile Environments
6 Conclusions and Future Work
References
Congestion Control in a Reliable Scalable Message-Oriented Middleware
1 Introduction
1.1 System Model
2 The Congestion Control Problem
3 Congestion Control Protocols
3.1 PHB-Driven Congestion Control
3.2 SHB-Driven Congestion Control
4 Implementation in the Gryphon Broker
5 Experimental Results
6 Related Work
7 Conclusion
References
On Shouting "Fire!": Regulating Decoupled Communication in Distributed Systems
1 Introduction
2 An Institutional Alarm Policy -- A Motivating Example
2.1 An Alarm Policy for a Hospital
2.2 On the Communal Nature of Policy $AP$
3 Law-Governed Interaction (LGI) -- An Overview
3.1 On the Nature of LGI Lawsh and Their Decentralized Enforcement
3.2 The Deployment of LGI
4 Implementation of the Alarm Policy
4.1 Law $cal AP$ to Regulate Alarms
5 On the Performance of the Proposed Mechanism
5.1 Load on the Mediator
5.2 Congestion Caused by Unruly Informers
5.3 Throughput of the Mediation and End-to-End Latency
6 Conclusion
References
Performance Comparison of Middleware Architectures for Generating Dynamic Web Content
1 Introduction
2 Background
2.1 PHP (Hypertext Preprocessor)
2.2 Java HTTP Servlets
2.3 Enterprise Java Beans
2.4 Summary
3 Benchmarks
3.1 Online Bookstore Benchmark
3.2 Auction Site Benchmark
4 Hardware and Software Environment
4.1 Client Emulation Implementation
4.2 Application Logic Implementation
4.3 Software Environment
4.4 Hardware Platform
4.5 Measurement Methodology
4.6 Configurations
5 Experimental Results for the Online Bookstore
5.1 Shopping Mix
5.2 Browsing Mix
5.3 Ordering Mix
5.4 Summary
6 Experimental Results for the Auction Site
6.1 Bidding Mix
6.2 Browsing Mix
6.3 Summary
7 Related Work
8 Conclusions
References
Prefetching Based on Web Usage Mining
1 Introduction
2 Related Work
2.1 Sequential Prediction
2.2 Web Usage Mining
2.3 Prefetching
3 Predicting User Access Patterns
3.1 The Fuzzy LZ Learning Technique
3.2 Evaluation of Fuzzy-LZ
4 System Deployment on Experimental Test Bed
4.1 Experimental Design
4.2 Measurements and Results
5 Concluding Remarks
References
Distributed Versioning: Consistent Replication for Scaling Back-End Databases of Dynamic Content Web Sites
1 Introduction
2 Environment
2.1 Programming Model
2.2 Consistency Model
2.3 Cluster Architecture
3 Distributed Versioning
3.1 Lazy Read-One, Write-All Replication
3.2 Assigning and Using Version Numbers
3.3 1-Copy Serializability and Absence of Deadlock
3.4 Limiting the Number of Conflicts
3.5 Reducing Conflict Duration
3.6 Rationale
4 Implementation
4.1 Overview
4.2 Transaction Start
4.3 Read and Write
4.4 Completion of Reads and Writes
4.5 Early Version Releases
4.6 Commit/Abort
4.7 1-Copy-Serializability
4.8 Load Balancing
4.9 Fault Tolerance and Data Availability
5 Loose Consistency Models
5.1 Definition
5.2 Implementation of Loose Consistency Methods
6 Benchmarks
6.1 TPC-W
6.2 Auction Site Benchmark
6.3 Bulletin Board
6.4 Client Emulation
7 Experimental Environment and Methodology
7.1 Hardware
7.2 Software
7.3 Simulation Methodology
8 Results
8.1 Comparison of Distributed Versioning and Conservative 2PL
8.2 Comparison of Distributed Versioning and Loose Consistency Methods
9 Related Work
10 Conclusions
References
Abstraction of Transaction Demarcation in Component-Oriented Platforms
1 Introduction
2 What Transaction Demarcation Is
2.1 The Policies
2.2 The Domains
3 Challenges for Transaction Demarcation
3.1 Transaction Demarcation Abstraction
3.2 Transaction Monitor Abstraction
3.3 Organization of TD Policies
3.4 Integration of New TD Policies
4 Open Transaction Demarcation Framework
4.1 Overview
4.2 Abstraction of Transactional Monitor
4.3 Abstraction of Transaction Demarcation
4.4 Integration of New TD Policies
5 Java Open Transaction Demarcation Framework
5.1 Transaction Monitor Wrapper
5.2 Transaction Domain
5.3 Transaction Policy
5.4 Platform Usage
6 Experimentations
6.1 Context and Scenario
6.2 The Memory Evaluation
6.3 The CPU Evaluation
6.4 Example of Heterogeneity in Middleware: EJB over OTS
7 Lessons
8 Conclusion and Perspectives
References
Optimising Java RMI Programs by Communication Restructuring
1 Introduction
1.1 Contributions
1.2 Structure
2 Related Work
3 The Veneer Framework
4 Optimisations
4.1 Call Aggregation
4.2 Server Forwarding
4.3 Plan Caching
5 Maintaining Semantics
5.1 Differences between Local and Remote Calls
5.2 Call-Backs
6 Experimental Evaluations
6.1 Vector Arithmetic
6.2 The MUD Example
7 Future Work
8 Conclusion
References
The JBoss Extensible Server
1 Introduction
1.1 The Foundation
1.2 The Building
1.3 Organization of This Paper
2 JMX Foundation
2.1 Dynamic MBeans and Standard MBeans
2.2 The MBean Server
2.3 Reflection in JMX
3 Service Components
3.1 Service Lifecycle
3.2 Service Descriptors
3.3 Dependency Management
3.4 Deployment and Undeployment
3.5 Class Loading Issues
3.6 Unified Class Loaders
3.7 Dynamic Proxy Usage
4 Meta-level Architecture for Generalized EJBs
4.1 Reified Method Invocations
4.2 Remote Invocation Architecture
4.3 Containers
4.4 Interceptors as Pluggable Aspects
5 Project History
6 Ongoing and Future Work
7 Related Work
8 Concluding Remarks
References
Flexible and Adaptive QoS Control for Distributed Real-Time and Embedded Middleware
1 Introduction and Background
2 Related Work
2.1 Our Earlier DRE Middleware Efforts
2.2 Other Adaptive DRE Middleware Efforts
3 Managing End-to-End Real-Time QoS via Middleware-Mediated Resource Management Mechanisms
3.1 Priority-Based OS Resource Management
3.2 Priority-Based Network Resource Management
3.3 Reservation-Based OS Resource Management
3.4 Reservation-Based Network Resource Management
4 Applying Managed QoS in DRE Applications
5 Empirical Results
5.1 Priority-Based End-to-End Adaptive QoS
5.2 Reservation-Based End-to-End Adaptive QoS
6 Concluding Remarks
References
Large-Scale Service Overlay Networking with Distance-Based Clustering
1 Introduction
2 Assumptions
2.1 Service Model
2.2 Overlay Networks
3 HFC Topology Construction
3.1 Distance Map Obtainment
3.2 Clustering by Graph Theory
3.3 Selection of Border Proxies
4 Service Routing Information Distribution
5 Hierarchical Service Path Finding
5.1 Inter-cluster Service Path Finding
5.2 Intra-cluster Service Path Finding
6 Performance Studies
6.1 State Information Maintenance Overhead
6.2 Service Path Efficiency
7 Conclusions
References
A Step Towards a New Generation of Group Communication Systems
1 Introduction
1.1 Context
1.3 Contribution: A New Architecture
1.2 Traditional Group Communication Architecture
2 Existing Group Communication Architectures
2.1 Monolithic Systems
2.2 Modular Protocol Stacks
2.3 Discussion
3 The New Architecture
3.1 Overview of the New Architecture
3.2 Augmented Version of the New Architecture
3.3 Full Version of the New Architecture
4 Assessment of the New Architecture
4.1 Less Complex Stack
4.2 More Powerful Stack (Provides More Functionalities)
4.3 Higher Responsiveness
4.4 Minor Efficiency Issue
5 Conclusion
References
A Middleware-Based Application Framework for Active Space Applications
1 Introduction
2 Active Space Applications’ Key Issues
2.1 Resource-Awareness
2.2 Multi-device
2.3 User-Centrism
2.4 Run-Time Adaptation
2.5 Mobility
2.6 Context-Sensitivity
2.7 Active Space Independence
3 Application Model
3.1 Model
3.2 Presentation
3.3 Controller
3.4 Adapter
3.5 Coordinator
4 Application Mapping
5 Application Management
5.1 Application Instantiation
5.2 Application Termination
5.3 Application Suspension and Resumption
5.4 Application Reliability
5.5 Application Mobility
6 Addressing the Active Space Application Development Key Issues
7 Music Player Example
7.1 Implementation Details
7.2 Instantiating and Using the Application
8 Performance Evaluation
9 Related Work
10 Conclusions and Future Work
References
A Proactive Middleware Platform for Mobile Computing
1 Introduction
2 Motivation
2.1 Requirements
2.2 An Infrastructure for Proactive Adaptation
2.3 Related Work
3 System Architecture
3.1 Step 1: Generic Support for Run-Time Extensions with PROSE
3.2 Step 2: Extension Management with MIDAS
3.3 Example of MIDAS
4 Application Development for Proactive Environments
4.1 Basic Design
4.2 Application
4.3 Adaptation Example
4.4 Applications of the Adaptation Example
4.5 Discussion
5 Conclusion
References
A Flexible Middleware System for Wireless Sensor Networks
1 Introduction
2 Background
2.1 Wireless Sensor Networks (WSN)
2.2 Middleware Technology
2.3 WSN Middleware Requirements
2.4 The Web Services Technology
3 Proposed Middleware Service
3.1 Sensor Network Physical Components
3.2 System Components According to the Service-Oriented Architecture Pattern
3.3 Interoperability Stacks
4 System Operation
4.1 Step 1 – Initial Set Up
4.2 Step 2 – Interest Advertisement
4.3 Step 3 – Data Advertisement
4.4 Step 4 – Cluster Formation
5 Discussion
6 Related Work
7 Conclusions and Future Works
References
A Middleware Service for Mobile Ad Hoc Data Sharing, Enhancing Data Availability
1 Introduction
2 Middleware Service for Data Sharing within Collaborative Mobile Ad Hoc Groups
2.1 Secure Group Management
2.2 Data Management
3 Adaptive Data Replication for Enhanced Availability
3.1 Peers Profile
3.2 Work and Preventive Replicas
4 Assessment
5 Conclusion
References
Author Index


πŸ“œ SIMILAR VOLUMES


Middleware 2003: ACM/IFIP/USENIX Interna
✍ Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, John Kubiatowi πŸ“‚ Library πŸ“… 2003 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Next-generation distributed applications and systems are increasingly developed using middleware. This dependency poses hard R&D challenges, including - tency hiding, masking partial failure, information assurance and security, legacy integration, dynamic service partitioning and load balancing,

Middleware 2004: ACM/IFIP/USENIX Interna
✍ Hans-Arno Jacobsen (editor) πŸ“‚ Library πŸ“… 2004 πŸ› Springer 🌐 English

<span>Middleware systems compriseprogrammingmodels, abstractions,protocols,and services to facilitate the design, the development, the integration, and the - ployment of distributed applications in heterogeneous computing environments. Conceptually, the term β€œmiddleware” refers to a layer of softwar

Middleware 2006: ACM/IFIP/USENIX 7th Int
✍ Maarten van Steen (editor), Michi Henning (editor) πŸ“‚ Library πŸ“… 2006 πŸ› Springer 🌐 English

<p><span>This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 7th International Middleware Conference 2006, held in Melbourne, Australia, in November/December 2006. The 21 revised full papers are organized in topical sections on performance, composition, management, publish/subscrib

Middleware 2004: ACM/IFIP/USENIX Interna
✍ Elias Sinderson, Vish Magapu, Ronald Mak (auth.), Hans-Arno Jacobsen (eds.) πŸ“‚ Library πŸ“… 2004 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Middleware systems compriseprogrammingmodels, abstractions,protocols,and services to facilitate the design, the development, the integration, and the - ployment of distributed applications in heterogeneous computing environments. Conceptually, the term β€œmiddleware” refers to a layer of software a

Middleware 2004: ACM/IFIP/USENIX Interna
✍ Elias Sinderson, Vish Magapu, Ronald Mak (auth.), Hans-Arno Jacobsen (eds.) πŸ“‚ Library πŸ“… 2004 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Middleware systems compriseprogrammingmodels, abstractions,protocols,and services to facilitate the design, the development, the integration, and the - ployment of distributed applications in heterogeneous computing environments. Conceptually, the term β€œmiddleware” refers to a layer of software a

Middleware 2004: ACM/IFIP/USENIX Interna
✍ Elias Sinderson, Vish Magapu, Ronald Mak (auth.), Hans-Arno Jacobsen (eds.) πŸ“‚ Library πŸ“… 2004 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Middleware systems compriseprogrammingmodels, abstractions,protocols,and services to facilitate the design, the development, the integration, and the - ployment of distributed applications in heterogeneous computing environments. Conceptually, the term β€œmiddleware” refers to a layer of software a