Active System Integrity Fences
نویسنده
چکیده
This paper describes the architecture of a WrappingBased Self-Modeling System that includes all of the models and processes we have mentioned in our previous papers on the subject of methods for mitigating the effects of the Get Stuck theorems. To make the description more concrete, we have selected a particular application domain example: “active system integrity fences”, that protect and defend a complex computing system or network (called the host system) from all enemies, foreign and domestic. An “active integrity fence” sits on an interface between two system components, with an explicit notion of the characteristics expected in the traffic (in both directions), derived from expectations provided at design time and observations collected at run time. We do not describe a particular host system, since our primary interest is in the protector system, and we expect that it applies to any host system for which we can specify the expected internal interactions. We define the relevant models and processes, and how they interact with each other and with the host system. We also provide a short description of the Wrapping infrastructure that holds the system together and organizes and executes all of its behavior, both protective and mission.
منابع مشابه
Development of the renal glomerulus: good neighbors and good fences.
The glomerulus of the mammalian kidney is an intricate structure that contains an unusual filtration barrier that retains higher molecular weight proteins and blood cells in the circulation. Recent studies have changed our conception of the glomerulus from a relatively static structure to a dynamic one, whose integrity depends on signaling between the three major cell lineages: podocytes, endot...
متن کاملMending Fences with Self-Invalidation and Self-Downgrade
Cache coherence protocols based on self-invalidation and self-downgrade have recently seen increased popularity due to their simplicity, potential performance efficiency, and low energy consumption. However, such protocols result in memory instruction reordering, thus causing extra program behaviors that are often not intended by the programmers. We propose a novel formal model that captures th...
متن کاملOptimal array of sand fences
Sand fences are widely applied to prevent soil erosion by wind in areas affected by desertification. Sand fences also provide a way to reduce the emission rate of dust particles, which is triggered mainly by the impacts of wind-blown sand grains onto the soil and affects the Earth's climate. Many different types of fence have been designed and their effects on the sediment transport dynamics st...
متن کاملConnectivity as a Measure of Power System Integrity
Measures of network structural integrity useful in the analysis and synthesis of power systems are discussed. Signal flow methodology is applied to derive an expression for the paths between sources and sinks in a power network. Connectivity and reach ability properties of the network are obtained using the minors of a modified connectivity matrix. Node-connectivity, branch connectivity and mix...
متن کاملLines around Fragments: Effects of Fencing on Large Herbivores
People construct fences to delineate land ownership and to control access to land. Fences accomplish several purposes, notable among them are containing livestock or wildlife raised for profit or subsistence, excluding use of vegetation within areas to be conserved, and reducing conflicts between wildlife and humans. In addition to these intended purposes, fences may also offer unanticipated be...
متن کامل