Automatic State Capture of Self-Migrating Computations in MESSENGERS
نویسندگان
چکیده
With self-migrating computations, the main challenge is the extraction and subsequent restoration of the computation's state during migration. This is very diicult when the navigational statement may be placed anywhere in the code and hence many systems place the burden of state capture on the application programmer. We describe an intermediate approach, where the use of navigational statements is restricted to the top level of the self-migrating computation. This permits an ee-cient implementation of a fully transparent state capture and restoration. We demonstrate that this approach is applicable not only to interpreted mobile code but also to compiled self-migrating computations executing entirely in native mode.
منابع مشابه
Automatic State Capture of Self-Migrating Computations
Self-migrating computations are entities that can transfer themselves at runtime between diierent physical nodes in a network using navigational commands. The main challenge is the extraction and subsequent restoration of the computation's state during migration. This is very diicult when the navigational statement may be placed anywhere in the code and hence many systems place the burden of st...
متن کاملتخمین چنددوربینی حالت سه بعدی انسان با برازش افکنش مدل اسکلت سه بعدی مفصل دار در تصاویر سایه نما
Automatic capture and analysis of human motion, based on images or video is important issue in computer vision due to the vast number of applications in animation, surveillance, biomechanics, Human Computer Interaction, entertainment and game industry. In these applications, it is clear that 3D human pose estimation is an essential part. Therefore, its accuracy has a great effect on the perform...
متن کاملSensor Computations in Modular Self Reconfigurable Robots
Sensors play important roles in automatic systems; smart systems have to be equipped with smart sensors. PolyBot, a modular self-reconfigurable robot developed at the Palo Alto Research Center, is designed with a rich set of sensors in each of its 5cm-cubed modules. These include infrared (IR), accelerometers, potentiometers, force, and touch sensors. These sensors are used: to determine the cu...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملEffectiveness of Compassion Therapy on Self-coherence, Post-divorce Adjustment and Negative Automatic Thoughts in Divorced Women
Introduction: Divorce reduces the health of each couple, especially women and one of the treatment methods derived from the third wave of psychotherapy which about that has been done little research is compassion therapy. Therefore, present research aimed to determine the effectiveness of compassion therapy on self-coherence, post-divorce adjustment and negative automatic thoughts in divorced w...
متن کامل