05.12.2012 Views

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

NASA Scientific and Technical Aerospace Reports

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

20060001877 New York Univ., New York, NY USA<br />

Modeling of Concurrent Web Sessions with Bounded Inconsistency in Shared Data<br />

Totok, Alex<strong>and</strong>er; Karamcheti, Vijay; Jan. 1, 2005; 20 pp.; In English<br />

Contract(s)/Grant(s): N66001-00-1-8920; N66001-01-1-8929<br />

Report No.(s): AD-A440429; CIMS-TR-2005-868; No Copyright; Avail.: Defense <strong>Technical</strong> Information Center (DTIC)<br />

Client interactions with modern web-accessible network services are typically organized into sessions involving multiple<br />

requests that read <strong>and</strong> write shared application data. Therefore when executed concurrently, web sessions may invalidate each<br />

other’s data. Depending on the nature of the business represented by the service, allowing the session with invalid data to<br />

progress might lead to financial penalties for the service provider, while blocking the session’s progress <strong>and</strong> deferring its<br />

execution (e.g., by relaying its h<strong>and</strong>ling to the customer service) will most probably result in user dissatisfaction. A<br />

compromise would be to tolerate some bounded data inconsistency, which would allow most of the sessions to progress, while<br />

limiting the potential financial loss incurred by the service. In order to quantitatively reason about these tradeoffs, the service<br />

provider can benefit from models that predict metrics, such as the percentage of successfully completed sessions, for a certain<br />

degree of tolerable data inconsistency. This paper develops such analytical models of concurrent web sessions with bounded<br />

inconsistency in shared data for three popular concurrency control algorithms. We illustrate our models using the sample buyer<br />

scenario from the TPC-W e-Commerce benchmark, <strong>and</strong> validate them by showing their close correspondence to measured<br />

results of concurrent session execution in both a simulated <strong>and</strong> a real web server environment. Our models take as input<br />

parameters of service usage, which can be obtained through profiling of incoming client requests. We augment our web<br />

application server environment with a profiling <strong>and</strong> automated decision making infrastructure which is shown to successfully<br />

choose, based on the specified performance metric, the best concurrency control algorithm in real time in response to changing<br />

service usage patterns.<br />

DTIC<br />

Computerized Simulation; Internets; Mathematical Models<br />

20060001890 California Polytechnic State Univ., San Luis Obispo, CA USA<br />

Proceedings of the Annual ONR/CADRC Decision-Support Workshop (6th), Held in Quantico, Virginia, on 8-9 Sep<br />

2004. Interoperability<br />

Pohl, Jens G.; Nov. 1, 2004; 313 pp.; In English<br />

Report No.(s): AD-A440458; No Copyright; Avail.: Defense <strong>Technical</strong> Information Center (DTIC)<br />

In my introduction to this year’s conference I will address six questions that I believe come to the core of our conference<br />

theme of interoperability. Do we human beings resist change? Is it in fact a human problem <strong>and</strong> not a technical problem that<br />

we are dealing with? Can non-human intelligence exist? Do we even have a need for intelligent software? How did software,<br />

particularly intelligent software (i.e., if we accept that there is such a thing) evolve over the past several decades, <strong>and</strong> what<br />

is all this talk about a Semantic Web environment? And, finally, what does the future hold in the next five to ten years?<br />

DTIC<br />

Conferences; Decision Support Systems; Interoperability<br />

20060001891 Maryl<strong>and</strong> Univ., College Park, MD USA<br />

Using Rhythms of Relationships to Underst<strong>and</strong> Email Archives<br />

Perer, Adam; Shneiderman, Ben; Oard, Douglas W.; Jan. 1, 2005; 21 pp.; In English; Original contains color illustrations<br />

Contract(s)/Grant(s): N66001-00-2-8910<br />

Report No.(s): AD-A440461; No Copyright; Avail.: Defense <strong>Technical</strong> Information Center (DTIC)<br />

Due to email’s ubiquitous nature, millions of users are intimate with the technology. However, most users are only<br />

familiar with managing their own email, which is an inherently different task than exploring an email archive. Historians <strong>and</strong><br />

social scientists believe that email archives are important artifacts for underst<strong>and</strong>ing the individuals <strong>and</strong> communities they<br />

represent. In order to underst<strong>and</strong> the conversations evidenced in an archive, context is needed. In this paper, we present a new<br />

way to gain this necessary context: analyzing the temporal rhythms of social relationships. We provide methods for<br />

constructing meaningful rhythms from the email headers by identifying relationships <strong>and</strong> interpreting their attributes. With<br />

these visualization techniques, email archive explorers can uncover insights that may have been otherwise hidden in the<br />

archive. We apply our methods to an individual’s fifteen-year email archive, which consists of about 45,000 messages <strong>and</strong> over<br />

4, 000 relationships.<br />

DTIC<br />

Documents; Electronic Mail<br />

146

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!