Modular network interface for distributed information navigation systems

2014;
: pp. 47-56
1
Lviv Polytechnic National University, Department of Electronic Computing Machines
2
Lviv Polytechnic National University

A modular approach providing unification by dividing a network interface into the universal and special parts in the context of distributed information navigation systems is proposed. The main principles of such approach and its software implementation are considered in the article. It is shown that the efficiency of the modular structure of the interface of distributed navigation systems, including the development time and speed of data processing, depends on the techniques used for their implementation and tools of object-oriented technologies.

  1.  L. Pierce and S. Tragoudas, “Threshold network synthesis”, ACM Journal on JETC, vol. 10, no. 2, pp. 17-21, 2014.
  2.  P. Wettin, A. Vidapalapati, A. Gangul, and P. P. Pande, “Complex network-enabled robust wireless network-on-chip architectures”,  ACM Journal on JETC, vol. 9, no. 3, pp. 24-30, 2013.
  3. R.Beckman, K.Channakeshava, F.Huang, J.Kim, A.Marathe, M.Marathe, S.Saha, G.Pei, and V.S. Anil Kumar, “Integrated Multi-Network Modeling Environment for Spectrum Management”, IEEE Journal on Selected Areas in Communication, special issue on Network Science, vol. 31, no. 6, pp.1158-1168, 2013.
  4. P. Dourish, R. E. Grinter, J. Delgado de la Flor, and M. Joseph, “Security in the wild: user strategies for managing security as an everyday, practical problem,” Personal and Ubiquitous Computing (ACM/Springer), vol. 8, no. 6, pp. 391-401, November 2004.
  5. R. J. Wirfs-Brock, “Refreshing patterns,” IEEE Software, vol. 23, no. 3, pp. 45-47, May/June 2006.
  6. H. H. Thompson and R. Ford, “Perfect storm: The insider, naivety, and hostility,” ACM Queue (Special Issue: Surviving Network Attacks), vol. 2, no. 4, pp. 58-65, June 2004.
  7. D. P. Anderson, “BOINC: A System for Public-Resource Computing and Storage”, in Proc. of the Intl. Workshop on Grid Computing. IEEE, pp. 4-10, 2004.
  8. H. Blohm, Hierarchical Arrangement of Modified Class Loaders and Token Driven Class Loaders and Methods of Use, United States Patent 7.536.412.B2. 2009.
  9. M. D.Dikaiakos, G. Pallis, D. Katsaros, P. Mehra, and A.Vakali, “Cloud Computing - Distributed Internet Computing for IT and Scientific Research”, IEEE Internet Computing, vol. 13, no. 5, pp. 10-13, 2009.
  10. K.Geihs, Selbst-Adaptive Software. Informatik Spektrum. Springer. pp. 133-145, 2007.
  11. R. L. Grossmann, “The Case for Cloud Computing”, IEEE IT Professional, vol. 11, no. 2, pp. 23-27, 2009.
  12. G. Pei and V.S. Anil Kumar, “Distributed Approximation Algorithms for Maximum Link Scheduling and Local Broadcasting in the Physical Interference Model”, in Proc. IEEE INFOCOM 2013, pp. 1339-1347. Turin, Italy, April 14-19, 2013.
  13. C.Kuhlman C, V.S. Anil Kumar, and S. Ravi, “Controlling opinion propagation in online networks”, Computer Networks, vol. 57, no. 10, pp. 2121-2132, 2013.
  14. G. Pei, S. Parthasarathy, A. Srinivasan, and V.S. Anil Kumar, “Approximation algorithms for throughput maximization in wireless networks with delay constraints”, in Proc. IEEE INFOCOM. Shanghai, China, April 10-15, 2011.
  15. V.S. Anil Kumar, M. Marathe, and S. Parthasarathy, “Cross-layer capacity estimation and throughput maximization in wireless networks”. In Algorithms for Next Generation Networks, pp. 67-98, 2010.
  16. L. Pierce and S. Tragoudas, “Threshold network synthesis”, ACM Journal on JETC, vol.10, no. 2, pp. 17-21, 2014.
  17.  P. Wettin, A. Vidapalapati, A. Gangul, and P. P. Pande, “Complex network-enabled robust wireless network-on-chip architectures”, ACM Journal on JETC, vol. 9, no. 3, pp. 24-30, 2013.
  18. R.Beckman, K.Channakeshava, F.Huang, J.Kim, A.Marathe, M.Marathe, S.Saha, G.Pei, and V.S. Anil Kumar, “Integrated Multi-Network Modeling Environment for Spectrum Management”, IEEE Journal on Selected Areas in Communication, special issue on Network Science, vol. 31, no. 6, pp. 1158-1168, 2013.
  19. C. Ottow, F. van Vliet, and P.-T. de Boer, and A. Pras, “Impact of IPv6 on Network and Web Application Penetration Testing”, in Proc.  EUNICE 2012 (LNCS 7479), Budapest, Hungary, August 2012. 
  20. P. Dourish, R. E. Grinter, J. Delgado de la Flor, and M. Joseph, “Security in the wild: userstrategies for managing security as an everyday, practical problem,” Personal and Ubiquitous Computing (ACM/Springer),, vol. 8, no. 6, pp. 391-401, November 2004.
  21. R. J. Wirfs-Brock, “Refreshing patterns,” IEEE Software,  vol. 23, no. 3, pp. 45-47, May/June 2006.