-
The first superconducting final focus quadrupole prototype of the FCC-ee study
Authors:
A. Thabuis,
M. Koratzinos,
G. Kirby,
M. Liebsch,
C. Petrone
Abstract:
A single aperture Canted-Cosine-Theta (CCT) quadrupole magnet, made of NbTi superconductors, has been developed for the final focus region of the FCC-ee study. The conductor layout is optimised to mitigate edge effects on one of the two sides of the magnet that typically lead to undesired higher-order multipoles. Experimental results of a prototype, including paraffin wax impregnation and cryogeni…
▽ More
A single aperture Canted-Cosine-Theta (CCT) quadrupole magnet, made of NbTi superconductors, has been developed for the final focus region of the FCC-ee study. The conductor layout is optimised to mitigate edge effects on one of the two sides of the magnet that typically lead to undesired higher-order multipoles. Experimental results of a prototype, including paraffin wax impregnation and cryogenic temperature measurements, are presented. The magnet exhibits no training behaviour, surpassing the nominal current during the initial ramp. Field quality is excellent, with higher-order multipoles below $1\times 10^{-4}$ units, consistent with simulations and room temperature tests. These findings confirm the potential of superconducting CCT magnets to offer compact solutions for applications demanding stringent field quality.
△ Less
Submitted 30 May, 2024;
originally announced May 2024.
-
Unit interval parking functions and the $r$-Fubini numbers
Authors:
S. Alex Bradt,
Jennifer Elder,
Pamela E. Harris,
Gordon Rojas Kirby,
Eva Reutercrona,
Yuxuan,
Wang,
Juliet Whidden
Abstract:
We recall that unit interval parking functions of length $n$ are a subset of parking functions in which every car parks in its preference or in the spot after its preference, and Fubini rankings of length $n$ are rankings of $n$ competitors allowing for ties. We present an independent proof of a result of Hadaway, which establishes that unit interval parking functions and Fubini rankings are in bi…
▽ More
We recall that unit interval parking functions of length $n$ are a subset of parking functions in which every car parks in its preference or in the spot after its preference, and Fubini rankings of length $n$ are rankings of $n$ competitors allowing for ties. We present an independent proof of a result of Hadaway, which establishes that unit interval parking functions and Fubini rankings are in bijection. We also prove that the cardinality of these sets are given by Fubini numbers. In addition, we give a complete characterization of unit interval parking functions by determining when a rearrangement of a unit interval parking function is again a unit interval parking function. This yields an identity for the Fubini numbers as a sum of multinomials over compositions. Moreover, we introduce a generalization of Fubini rankings, which we call the $r$-Fubini rankings of length $n+r$. We show that this set is in bijection with unit interval parking functions of length $n+r$ where the first $r$ cars have distinct preferences. We conclude by establishing that these sets are enumerated by the $r$-Fubini numbers.
△ Less
Submitted 12 January, 2024;
originally announced January 2024.
-
Mesas of Stirling permutations
Authors:
Nicolle González,
Pamela E. Harris,
Gordon Rojas Kirby,
Mariana Smit Vega Garcia,
Bridget Eileen Tenner
Abstract:
Given a Stirling permutation w, we introduce the mesa set of w as the natural generalization of the pinnacle set of a permutation. Our main results characterize admissible mesa sets and give closed enumerative formulas in terms of rational Catalan numbers by providing an explicit bijection between mesa sets and rational Dyck paths.
Given a Stirling permutation w, we introduce the mesa set of w as the natural generalization of the pinnacle set of a permutation. Our main results characterize admissible mesa sets and give closed enumerative formulas in terms of rational Catalan numbers by providing an explicit bijection between mesa sets and rational Dyck paths.
△ Less
Submitted 21 June, 2023;
originally announced June 2023.
-
Unit-Interval Parking Functions and the Permutohedron
Authors:
Lucas Chaves Meyles,
Pamela E. Harris,
Richter Jordaan,
Gordon Rojas Kirby,
Sam Sehayek,
Ethan S**arn
Abstract:
Unit-interval parking functions are subset of parking functions in which cars park at most one spot away from their preferred parking spot. In this paper, we characterize unit-interval parking functions by understanding how they decompose into prime parking functions and count unit-interval parking functions when exactly $k<n$ cars do not park in their preference. This count yields an alternate pr…
▽ More
Unit-interval parking functions are subset of parking functions in which cars park at most one spot away from their preferred parking spot. In this paper, we characterize unit-interval parking functions by understanding how they decompose into prime parking functions and count unit-interval parking functions when exactly $k<n$ cars do not park in their preference. This count yields an alternate proof of a result of Hadaway and Harris establishing that unit-interval parking functions are enumerated by the Fubini numbers. Then, our main result, establishes that for all integers $0\leq k<n$, the unit-interval parking functions of length $n$ with displacement $k$ are in bijection with the $k$-dimensional faces of the permutohedron of order $n$. We conclude with some consequences of this result.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
Pinnacle sets of signed permutations
Authors:
Nicolle González,
Pamela E. Harris,
Gordon Rojas Kirby,
Mariana Smit Vega Garcia,
Bridget Eileen Tenner
Abstract:
Pinnacle sets record the values of the local maxima for a given family of permutations. They were introduced by Davis-Nelson-Petersen-Tenner as a dual concept to that of peaks, previously defined by Billey-Burdzy-Sagan. In recent years pinnacles and admissible pinnacles sets for the type $A$ symmetric group have been widely studied. In this article we define the pinnacle set of signed permutations…
▽ More
Pinnacle sets record the values of the local maxima for a given family of permutations. They were introduced by Davis-Nelson-Petersen-Tenner as a dual concept to that of peaks, previously defined by Billey-Burdzy-Sagan. In recent years pinnacles and admissible pinnacles sets for the type $A$ symmetric group have been widely studied. In this article we define the pinnacle set of signed permutations of types $B$ and $D$. We give a closed formula for the number of type $B$/$D$ admissible pinnacle sets and answer several other related enumerative questions.
△ Less
Submitted 24 March, 2023; v1 submitted 6 January, 2023;
originally announced January 2023.
-
Repetitions of Pak-Stanley Labels in $G$-Shi Arrangements
Authors:
Cara Bennett,
Lucy Martinez,
Ava Mock,
Gordon Rojas Kirby,
Robin Truax
Abstract:
Given a simple graph $G$, one can define a hyperplane arrangement called the $G$-Shi arrangement. The Pak-Stanley algorithm labels the regions of this arrangement with $G_\bullet$-parking functions. When $G$ is a complete graph, we recover the Shi arrangement, and the Pak-Stanley labels give a bijection with ordinary parking functions. However, for proper subgraphs $G \subset K_n$, while the Pak-S…
▽ More
Given a simple graph $G$, one can define a hyperplane arrangement called the $G$-Shi arrangement. The Pak-Stanley algorithm labels the regions of this arrangement with $G_\bullet$-parking functions. When $G$ is a complete graph, we recover the Shi arrangement, and the Pak-Stanley labels give a bijection with ordinary parking functions. However, for proper subgraphs $G \subset K_n$, while the Pak-Stanley labels still include every $G_{\bullet}$-parking function, some appear more than once. These repetitions of Pak-Stanley labels are a topic of interest in the study of $G$-Shi arrangements and $G_{\bullet}$-parking functions. Furthermore, $G_{\bullet}$-parking functions are connected to many other combinatorial objects (for example, superstable configurations in chip-firing). In studying these repetitions, we can draw on existing results about these objects such as Dhar's Burning Algorithm. Conversely, our results have implications for the study of these objects as well. The key insight of our work is the introduction of a combinatorial model called the Three Rows Game. Analyzing the histories of this game and how they induce identical outcomes lets us characterize the multiplicities of the Pak-Stanley labels. Using this model, we develop a classification theorem for the multiplicities of the Pak-Stanley labels of the regions in the $P_n$-Shi arrangement, where $P_n$ is the path graph on $n$ vertices. Then, we generalize the Three Rows Game into the $T$-Three Rows Game. This allows us to study the multiplicities of the Pak-Stanley labels of the regions in $T$-Shi arrangements, where $T$ is any tree. Finally, we discuss the possibilities and difficulties in applying our method to arbitrary graphs. In particular, we analyze multiplicities in the case when $G$ is a cycle graph, and prove a uniqueness result for maximal $G_{\bullet}$-parking functions for all graphs using the Three Rows Game.
△ Less
Submitted 24 October, 2022;
originally announced October 2022.
-
Design of a Canted-cosine-theta orbit corrector for the High Luminosity LHC
Authors:
K. Pepitone,
G. Kirby,
R. Ruber,
A. Ahl,
M. Canale,
I. Dugic,
L. Gentini,
M. Johansson,
G. Karlsson,
J. Kovacikova,
J. Lindström,
A. Olsson,
M. Olvegård
Abstract:
The High Luminosity LHC requires dipole orbit correctors grouped in double aperture magnet assemblies. They provide a field of 3.1 T at 100 A in an aperture of 70 mm. The current standard design is a classical cosine-theta layout made with ribbon cable. However, the electric insulation of the ribbon cable is not radiation-resistant enough to withstand the radiation load expected in the coming year…
▽ More
The High Luminosity LHC requires dipole orbit correctors grouped in double aperture magnet assemblies. They provide a field of 3.1 T at 100 A in an aperture of 70 mm. The current standard design is a classical cosine-theta layout made with ribbon cable. However, the electric insulation of the ribbon cable is not radiation-resistant enough to withstand the radiation load expected in the coming years of LHC operation. A new design, based on a radiation-resistant cable with polyimide insulator, that can replace the existing orbit correctors at their end-of-life, is needed. The challenge is to design a magnet that fits directly into the existing positions and that can operate with the same busbars, passive quench protection, and power supplies as existing magnets. We propose a self-protected canted-cosine-theta (CCT) design. We take the opportunity to explore new concepts for the CCT design to produce a cost-effective and high-quality design with a more sustainable use of resources. The new orbit corrector design meets high requirements on the field quality while kee** within the same mechanical volume and maximum excitation current.
A collaboration of Swedish universities and Swedish industry has been formed for the development and production of a prototype magnet following a concurrent engineering (CE) methodology to reduce the time needed to produce a functional CCT magnet. The magnet has a 1 m long CCT dipole layout consisting of two coils. The superconductor is a commercially available 0.33 mm wire with polyimide insulation in a 6-around-1 cable. The channels in the coil formers, that determine the CCT layout, allow for 2 x 5 cable layers. A total of 70 windings makes that the coil current can be kept below 100 A. We will present the detailed design and preliminary quench simulations.
△ Less
Submitted 21 February, 2022;
originally announced February 2022.
-
Potential of the Sterile Insect Technique for Control of Deer Ticks, $\textit{Ixodes scapularis}$
Authors:
Thomas G. Kirby,
Julie C. Blackwood
Abstract:
The deer tick, $\textit{Ixodes scapularis}$, is a vector for numerous human diseases, including Lyme disease, anaplasmosis, and babesiosis. Concern is rising in the US and abroad as the population and range of this species grow and new diseases emerge. Herein I consider the potential for control of $\textit{I. scapularis}$ using the Sterile Insect Technique (SIT), which acts by reducing net fertil…
▽ More
The deer tick, $\textit{Ixodes scapularis}$, is a vector for numerous human diseases, including Lyme disease, anaplasmosis, and babesiosis. Concern is rising in the US and abroad as the population and range of this species grow and new diseases emerge. Herein I consider the potential for control of $\textit{I. scapularis}$ using the Sterile Insect Technique (SIT), which acts by reducing net fertility through release of sterile males. I construct a population model with density-dependent and -independent growth, migration, and an Allee effect (decline of the population when it is small), and use this model to simulate sterile tick release in both single- and multi-patch frameworks. I test two key concerns with implementing $\textit{I. scapularis}$ SIT: that the ticks' lengthy life course could make control take too long and that low migration might mean sterile males need thorough manual dispersal to all parts of the control area. Results suggest that typical $\textit{I. scapularis}$ SIT programs will take about eight years, a prediction near the normal range for the technique, but that thorough distribution of sterile ticks over the control area is indeed critical, increasing expense substantially by necessitating aerial release. With particularly high rearing costs also expected for $\textit{I. scapularis}$, the latter finding suggests that cost-effectiveness improvements to aerial release may be a prerequisite to $\textit{I. scapularis}$ SIT.
△ Less
Submitted 13 September, 2021;
originally announced September 2021.
-
Enumerating $k$-Naples Parking Functions Through Catalan Objects
Authors:
João Pedro Carvalho,
Pamela E. Harris,
Gordon Rojas Kirby,
Nico Tripeny,
Andrés R. Vindas-Meléndez
Abstract:
This paper studies a generalization of parking functions named $k$-Naples parking functions, where backward movement is allowed. One consequence of backward movement is that the number of ascending $k$-Naples is not the same as the number of descending $k$-Naples. This paper focuses on generalizing the bijections of ascending parking functions with combinatorial objects enumerated by the Catalan n…
▽ More
This paper studies a generalization of parking functions named $k$-Naples parking functions, where backward movement is allowed. One consequence of backward movement is that the number of ascending $k$-Naples is not the same as the number of descending $k$-Naples. This paper focuses on generalizing the bijections of ascending parking functions with combinatorial objects enumerated by the Catalan numbers in the setting of both ascending and descending $k$-Naples parking functions. These combinatorial objects include Dyck paths, binary trees, triangulations of polygons, and non-crossing partitions. Using these bijections, we enumerate both ascending and descending $k$-Naples parking functions.
△ Less
Submitted 3 September, 2021;
originally announced September 2021.
-
Magnetic Measurements at Warm of the First FCC-ee Final Focus Quadrupole Prototype
Authors:
M. Koratzinos,
G. Kirby,
C. Petrone,
M. Liebsch
Abstract:
The first FCC-ee final focus quadrupole prototype has been designed, manufactured, assembled and tested at warm. The prototype is a single aperture quadrupole magnet of the CCT type. One edge of the magnet was designed with local multipole cancellation, whereas the other was left with the conventional design. An optimized rotating induction-coil sensor was used. A technique was developed to take i…
▽ More
The first FCC-ee final focus quadrupole prototype has been designed, manufactured, assembled and tested at warm. The prototype is a single aperture quadrupole magnet of the CCT type. One edge of the magnet was designed with local multipole cancellation, whereas the other was left with the conventional design. An optimized rotating induction-coil sensor was used. A technique was developed to take into account field distortions due to the environment of the test and distinguish them from magnet effects, demonstrating an excellent field quality for the prototype.
△ Less
Submitted 27 May, 2021;
originally announced May 2021.
-
Proof of Concept of High-Temperature Superconducting Screens for Magnetic Field-Error Cancellation in Accelerator Magnets
Authors:
L. Bortot,
M. Mentink,
C. Petrone,
J. Van Nugteren,
G. Deferne,
T. Koettig,
G. Kirby,
M. Pentella,
J. C. Perez,
F. O. Pincot,
G. De Rijk,
S. Russenschuck,
A. P. Verweij,
S. Schöps
Abstract:
Accelerators magnets must have minimal magnetic field imperfections for reducing particle-beam instabilities. In the case of coils made of high-temperature superconducting (HTS) tapes, the field imperfections from persistent currents need to be carefully evaluated. In this paper we study the use of superconducting screens based on HTS tapes for reducing the magnetic field imperfections in accelera…
▽ More
Accelerators magnets must have minimal magnetic field imperfections for reducing particle-beam instabilities. In the case of coils made of high-temperature superconducting (HTS) tapes, the field imperfections from persistent currents need to be carefully evaluated. In this paper we study the use of superconducting screens based on HTS tapes for reducing the magnetic field imperfections in accelerator magnets. The screens exploit the magnetization by persistent currents to cancel out the magnetic field error. The screens are aligned with the main field components, such that only the undesired field components are compensated. The screens are passive, self-regulating, and do not require any external source of energy. Measurements in liquid nitrogen at 77 Kelvin show for dipole-field configurations a significant reduction of the magnetic-field error up to a factor of four. The residual error is explained via numerical simulations, accounting for the geometrical imperfections in the HTS screens, thus achieving satisfactory agreement with experimental results. Simulations show that if screens are increased in width and thickness, and operated at 4.5 Kelvin, field errors may be eliminated almost entirely for the typical excitation cycles of accelerator magnets.
△ Less
Submitted 26 March, 2021;
originally announced March 2021.
-
Numerical Analysis of the Screening Current-Induced Magnetic Field in the HTS Insert Dipole Magnet Feather-M2.1-2
Authors:
Lorenzo Bortot,
Matthias Mentink,
Carlo Petrone,
Jeroen Van Nugteren,
Glyn Kirby,
Mariano Pentella,
Arjan Verweij,
Sebastian Schöps
Abstract:
Screening currents are field-induced dynamic phenomena which occur in superconducting materials, leading to persistent magnetization. Such currents are of importance in ReBCO tapes, where the large size of the superconducting filaments gives rise to strong magnetization phenomena. In consequence, superconducting accelerator magnets based on ReBCO tapes might experience a relevant degradation of th…
▽ More
Screening currents are field-induced dynamic phenomena which occur in superconducting materials, leading to persistent magnetization. Such currents are of importance in ReBCO tapes, where the large size of the superconducting filaments gives rise to strong magnetization phenomena. In consequence, superconducting accelerator magnets based on ReBCO tapes might experience a relevant degradation of the magnetic field quality in the magnet aperture, eventually leading to particle beam instabilities. Thus, persistent magnetization phenomena need to be accurately evaluated. In this paper, the 2D finite element model of the Feather-M2.1-2 magnet is presented. The model is used to analyze the influence of the screening current-induced magnetic field on the field quality in the magnet aperture. The model relies on a coupled field formulation for eddy current problems in time-domain. The formulation is introduced and verified against theoretical references. Then, the numerical model of the Feather-M2.1-2 magnet is detailed, highlighting the key assumptions and simplifications. The numerical results are discussed and validated with available magnetic measurements. A satisfactory agreement is found, showing the capability of the numerical tool in providing accurate analysis of the dynamic behavior of the Feather-M2.1-2 magnet.
△ Less
Submitted 6 January, 2021; v1 submitted 19 May, 2020;
originally announced May 2020.
-
Weight $q$-multiplicities for representations of the exceptional Lie algebra $\mathfrak{g}_2$
Authors:
Jerrell Cockerham,
Melissa Gutiérrez González,
Pamela E. Harris,
Marissa Loving,
Amaury V. Miniño,
Joseph Rennie,
Gordon Rojas Kirby
Abstract:
Given a simple Lie algebra $\mathfrak{g}$, Kostant's weight $q$-multiplicity formula is an alternating sum over the Weyl group whose terms involve the $q$-analog of Kostant's partition function. For $ξ$ (a weight of $\mathfrak{g}$), the $q$-analog of Kostant's partition function is a polynomial-valued function defined by $\wp_q(ξ)=\sum c_i q^i$ where $c_i$ is the number of ways $ξ$ can be written…
▽ More
Given a simple Lie algebra $\mathfrak{g}$, Kostant's weight $q$-multiplicity formula is an alternating sum over the Weyl group whose terms involve the $q$-analog of Kostant's partition function. For $ξ$ (a weight of $\mathfrak{g}$), the $q$-analog of Kostant's partition function is a polynomial-valued function defined by $\wp_q(ξ)=\sum c_i q^i$ where $c_i$ is the number of ways $ξ$ can be written as a sum of $i$ positive roots of $\mathfrak{g}$. In this way, the evaluation of Kostant's weight $q$-multiplicity formula at $q = 1$ recovers the multiplicity of a weight in a highest weight representation of $\mathfrak{g}$. In this paper, we give closed formulas for computing weight $q$-multiplicities in a highest weight representation of the exceptional Lie algebra $\mathfrak{g}_2$.
△ Less
Submitted 27 March, 2020; v1 submitted 17 March, 2020;
originally announced March 2020.
-
On Kostant's weight $q$-multiplicity formula for $\mathfrak{sl}_{4}(\mathbb{C})$
Authors:
Rebecca E. Garcia,
Pamela E. Harris,
Marissa Loving,
Lucy Martinez,
David Melendez,
Joseph Rennie,
Gordon Rojas Kirby,
Daniel Tinoco
Abstract:
The $q$-analog of Kostant's weight multiplicity formula is an alternating sum over a finite group, known as the Weyl group, whose terms involve the $q$-analog of Kostant's partition function. This formula, when evaluated at $q=1$, gives the multiplicity of a weight in a highest weight representation of a simple Lie algebra. In this paper, we consider the Lie algebra $\mathfrak{sl}_4(\mathbb{C})$ a…
▽ More
The $q$-analog of Kostant's weight multiplicity formula is an alternating sum over a finite group, known as the Weyl group, whose terms involve the $q$-analog of Kostant's partition function. This formula, when evaluated at $q=1$, gives the multiplicity of a weight in a highest weight representation of a simple Lie algebra. In this paper, we consider the Lie algebra $\mathfrak{sl}_4(\mathbb{C})$ and give closed formulas for the $q$-analog of Kostant's weight multiplicity. This formula depends on the following two sets of results. First, we present closed formulas for the $q$-analog of Kostant's partition function by counting restricted colored integer partitions. These formulas, when evaluated at $q=1$, recover results of De Loera and Sturmfels. Second, we describe and enumerate the Weyl alternation sets, which consist of the elements of the Weyl group that contribute nontrivially to Kostant's weight multiplicity formula. From this, we introduce Weyl alternation diagrams on the root lattice of $\mathfrak{sl}_4(\mathbb{C})$, which are associated to the Weyl alternation sets. This work answers a question posed in 2019 by Harris, Loving, Ramirez, Rennie, Rojas Kirby, Torres Davila, and Ulysse.
△ Less
Submitted 5 January, 2020;
originally announced January 2020.
-
Visualizing the Support of Kostant's Weight Multiplicity Formula for the Rank Two Lie Algebras
Authors:
Pamela E. Harris,
Marissa Loving,
Juan Ramirez,
Joseph Rennie,
Gordon Rojas Kirby,
Eduardo Torres Davila,
Fabrice O. Ulysse
Abstract:
The multiplicity of a weight in a finite-dimensional irreducible representation of a simple Lie algebra g can be computed via Kostant's weight multiplicity formula. This formula consists of an alternating sum over the Weyl group (a finite group) and involves a partition function known as Kostant's partition function. Motivated by the observation that, in practice, most terms in the sum are zero, o…
▽ More
The multiplicity of a weight in a finite-dimensional irreducible representation of a simple Lie algebra g can be computed via Kostant's weight multiplicity formula. This formula consists of an alternating sum over the Weyl group (a finite group) and involves a partition function known as Kostant's partition function. Motivated by the observation that, in practice, most terms in the sum are zero, our main results describe the elements of the Weyl alternation sets. The Weyl alternation sets are subsets of the Weyl group which contributes nontrivially to the multiplicity of a weight in a highest weight representation of the Lie algebras so_4(C), so_5(C), sp_4(C), and the exceptional Lie algebra g_2. By taking a geometric approach, we extend the work of Harris, Lescinsky, and Mabie on sl_3(C), to provide visualizations of these Weyl alternation sets for all pairs of integral weights λand μof the Lie algebras considered.
△ Less
Submitted 22 August, 2019;
originally announced August 2019.
-
A Generalization of Parking Functions Allowing Backward Movement
Authors:
Alex Christensen,
Pamela E. Harris,
Zakiya Jones,
Marissa Loving,
Andrés Ramos Rodríguez,
Joseph Rennie,
Gordon Rojas Kirby
Abstract:
Classical parking functions are defined as the parking preferences for $n$ cars driving (from west to east) down a one-way street containing parking spaces labeled from $1$ to $n$ (from west to east). Cars drive down the street toward their preferred spot and park there if the spot is available. Otherwise, the car continues driving down the street and takes the first available parking space, if su…
▽ More
Classical parking functions are defined as the parking preferences for $n$ cars driving (from west to east) down a one-way street containing parking spaces labeled from $1$ to $n$ (from west to east). Cars drive down the street toward their preferred spot and park there if the spot is available. Otherwise, the car continues driving down the street and takes the first available parking space, if such a space exists. If all cars can park using this parking rule, we call the $n$-tuple containing the cars' parking preferences a parking function.
In this paper, we introduce a generalization of the parking rule allowing cars whose preferred space is taken to first proceed up to $k$ spaces west of their preferred spot to park before proceeding east if all of those $k$ spaces are occupied. We call parking preferences which allow all cars to park under this new parking rule $k$-Naples parking functions of length $n$. This generalization gives a natural interpolation between classical parking functions, the case when $k=0$, and all $n$-tuples of positive integers $1$ to $n$, the case when $k\geq n-1$. Our main result provides a recursive formula for counting $k$-Naples parking functions of length $n$. We also give a characterization for the $k=1$ case by introducing a new function that maps $1$-Naples parking functions to classical parking functions, i.e. $0$-Naples parking functions. Lastly, we present a bijection between $k$-Naples parking functions of length $n$ whose entries are in weakly decreasing order and a family of signature Dyck paths.
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
On $(t,r)$ broadcast domination of certain grid graphs
Authors:
Natasha Crepeau,
Pamela E. Harris,
Sean Hays,
Marissa Loving,
Joseph Rennie,
Gordon Rojas Kirby,
Alexandro Vasquez
Abstract:
Let $G=( V(G), E(G) )$ be a connected graph with vertex set $V(G)$ and edge set $E(G)$. We say a subset $D$ of $V(G)$ dominates $G$ if every vertex in $V \setminus D$ is adjacent to a vertex in $D$. A generalization of this concept is $(t,r)$ broadcast domination. We designate certain vertices to be towers of signal strength $t$, which send out signal to neighboring vertices with signal strength d…
▽ More
Let $G=( V(G), E(G) )$ be a connected graph with vertex set $V(G)$ and edge set $E(G)$. We say a subset $D$ of $V(G)$ dominates $G$ if every vertex in $V \setminus D$ is adjacent to a vertex in $D$. A generalization of this concept is $(t,r)$ broadcast domination. We designate certain vertices to be towers of signal strength $t$, which send out signal to neighboring vertices with signal strength decaying linearly as the signal traverses the edges of the graph. We let $\mathbb{T}$ be the set of all towers, and we define the signal received by a vertex $v\in V(G)$ from a tower $w \in \mathbb T$ to be $f(v)=\sum_{w\in \mathbb{T}}max(0,t-d(v,w))$. Blessing, Insko, Johnson, Mauretour (2014) defined a $(t,r)$ broadcast dominating set, or a $(t,r) $ broadcast, on $G$ as a set $\mathbb{T} \subseteq V(G) $ such that $f(v)\geq r$ for all $v\in V(G)$. The minimal cardinality of a $(t, r)$ broadcast on $G$ is called the $(t, r)$ broadcast domination number of $G$. In this paper, we present our research on the $(t,r)$ broadcast domination number for certain graphs including paths, grid graphs, the slant lattice, and the king's lattice.
△ Less
Submitted 22 June, 2023; v1 submitted 16 August, 2019;
originally announced August 2019.
-
A Method for Greatly Reduced Edge Effects and Crosstalk in CCT Magnets
Authors:
M. Koratzinos,
G. Kirby,
J. Van Nugteren,
E. R. Bielert
Abstract:
Iron-free CCT magnet design offers many advantages, one being the excellent field quality and the absence of multipole components. However, edge effects are present, although they tend to integrate out over the length of the magnet. Many modern accelerator applications, however, require that these magnets are placed in an area of rapidly varying optics parameters, so magnets with greatly reduced e…
▽ More
Iron-free CCT magnet design offers many advantages, one being the excellent field quality and the absence of multipole components. However, edge effects are present, although they tend to integrate out over the length of the magnet. Many modern accelerator applications, however, require that these magnets are placed in an area of rapidly varying optics parameters, so magnets with greatly reduced edge effects have an advantage. We have designed such a magnet (a quadrupole) by adding multipole components of the opposite sign to the edge distortions of the magnet. A possible application could be the final focus magnets of the FCC-ee, where beam sizes at the entry and exit point of the magnets vary by large factors. We have then used this technique to effectively eliminate cross talk between adjacent final focus quadrupoles for the incoming and outgoing beams.
△ Less
Submitted 25 September, 2017;
originally announced September 2017.
-
Models and experimental results from the wide aperture Nb-Ti magnets for the LHC upgrade
Authors:
G. Kirby,
B. Auchmann,
M. Bajko,
M. Charrondiere,
N. Bourcey,
V. I. Datskov,
P. Fessia,
J. Feuvrier,
P. Galbraith,
A. Garcia Tabares,
J. Garcia-Perez,
P. Granieri,
P. Hagen,
C. Lorin,
J. C. Perez,
S. Russenschuck,
T. Sahner,
M. Segreti,
E. Todesco,
G. Willering
Abstract:
MQXC is a Nb-Ti quadrupole designed to meet the accelerator quality requirements needed for the phase-1 LHC upgrade, now superseded by the high luminosity upgrade foreseen in 2021. The 2-m-long model magnet was tested at room temperature and 1.9 K. The technology developed for this magnet is relevant for other magnets currently under development for the high-luminosity upgrade, namely D1 (at KEK)…
▽ More
MQXC is a Nb-Ti quadrupole designed to meet the accelerator quality requirements needed for the phase-1 LHC upgrade, now superseded by the high luminosity upgrade foreseen in 2021. The 2-m-long model magnet was tested at room temperature and 1.9 K. The technology developed for this magnet is relevant for other magnets currently under development for the high-luminosity upgrade, namely D1 (at KEK) and the large aperture twin quadrupole Q4 (at CEA). In this paper we present MQXC test results, some of the specialized heat extraction features, spot heaters, temperature sensor mounting and voltage tap development for the special open cable insulation. We look at some problem solving with noisy signals, give an overview of electrical testing, look at how we calculate the coil resistance during at quench and show that the heaters are not working We describe the quench signals and its timing, the development of the quench heaters and give an explanation of an Excel quench calculation and its comparison including the good agreement with the MQXC test results. We propose an improvement to the magnet circuit design to reduce voltage to ground values by factor 2. The program is then used to predict quench Hot-Spot and Voltages values for the D1 dipole and the Q4 quadrupole.
△ Less
Submitted 16 January, 2014;
originally announced January 2014.
-
Nowhere-Zero $\vec k$-Flows on Graphs
Authors:
Matthias Beck,
Alyssa Cuyjet,
Gordon Rojas Kirby,
Molly Stubblefield,
Michael Young
Abstract:
We introduce and study a multivariate function that counts nowhere-zero flows on a graph G, in which each edge of G has an individual capacity. We prove that the associated counting function is a piecewise-defined polynomial in these capacities, which satisfy a combinatorial reciprocity law that incorporates totally cyclic orientations of G.
We introduce and study a multivariate function that counts nowhere-zero flows on a graph G, in which each edge of G has an individual capacity. We prove that the associated counting function is a piecewise-defined polynomial in these capacities, which satisfy a combinatorial reciprocity law that incorporates totally cyclic orientations of G.
△ Less
Submitted 10 May, 2013;
originally announced May 2013.
-
First Smart Spaces
Authors:
Graham Kirby,
Alan Dearle,
Andrew McCarthy,
Ron Morrison,
Kevin Mullen,
Yanyan Yang,
Richard Connor,
Paula Welen,
Andy Wilson
Abstract:
This document describes the Gloss software currently implemented. The description of the Gloss demonstrator for multi-surface interaction can be found in D17. The ongoing integration activity for the work described in D17 and D8 constitutes our development of infrastructure for a first smart space. In this report, the focus is on infrastructure to support the implementation of location aware servi…
▽ More
This document describes the Gloss software currently implemented. The description of the Gloss demonstrator for multi-surface interaction can be found in D17. The ongoing integration activity for the work described in D17 and D8 constitutes our development of infrastructure for a first smart space. In this report, the focus is on infrastructure to support the implementation of location aware services. A local architecture provides a framework for constructing Gloss applications, termed assemblies, that run on individual physical nodes. A global architecture defines an overlay network for linking individual assemblies. Both local and global architectures are under active development.
△ Less
Submitted 1 July, 2010;
originally announced July 2010.
-
Second Set of Spaces
Authors:
Evangelos Zirintsis,
Graham Kirby,
Alan Dearle,
Ben Allen,
Rob MacInnis,
Andrew McCarthy,
Ron Morrison,
Paddy Nixon,
Andrew Jamieson,
Chris Nicholson,
Steven Harris
Abstract:
This document describes the Gloss infrastructure supporting implementation of location-aware services. The document is in two parts. The first part describes software architecture for the smart space. As described in D8, a local architecture provides a framework for constructing Gloss applications, termed assemblies, that run on individual physical nodes, whereas a global architecture defines an o…
▽ More
This document describes the Gloss infrastructure supporting implementation of location-aware services. The document is in two parts. The first part describes software architecture for the smart space. As described in D8, a local architecture provides a framework for constructing Gloss applications, termed assemblies, that run on individual physical nodes, whereas a global architecture defines an overlay network for linking individual assemblies. The second part outlines the hardware installation for local sensing. This describes the first phase of the installation in Strathclyde University.
△ Less
Submitted 29 June, 2010;
originally announced June 2010.
-
An Information Flow Architecture for Global Smart Spaces
Authors:
Alan Dearle,
Graham Kirby,
Andrew McCarthy,
Juan-Carlos Diaz y Carballo
Abstract:
In this paper we describe an architecture which: Permits the deployment and execution of components in appropriate geographical locations. Provides security mechanisms that prevent misuse of the architecture. Supports a programming model that is familiar to application programmers. Permits installed components to share data. Permits the deployed components to communicate via communication channels…
▽ More
In this paper we describe an architecture which: Permits the deployment and execution of components in appropriate geographical locations. Provides security mechanisms that prevent misuse of the architecture. Supports a programming model that is familiar to application programmers. Permits installed components to share data. Permits the deployed components to communicate via communication channels. Provides evolution mechanisms permitting the dynamic rearrangement of inter-connection topologies the components that they connect. Supports the specification and deployment of distributed component deployments.
△ Less
Submitted 29 June, 2010;
originally announced June 2010.
-
Report on the XBase Project
Authors:
Evangelos Zirintsis,
Graham Kirby,
Alan Dearle,
Ron Morrison
Abstract:
This project addressed the conceptual fundamentals of data storage, investigating techniques for provision of highly generic storage facilities that can be tailored to produce various individually customised storage infrastructures, compliant to the needs of particular applications. This requires the separation of mechanism and policy wherever possible. Aspirations include: actors, whether users o…
▽ More
This project addressed the conceptual fundamentals of data storage, investigating techniques for provision of highly generic storage facilities that can be tailored to produce various individually customised storage infrastructures, compliant to the needs of particular applications. This requires the separation of mechanism and policy wherever possible. Aspirations include: actors, whether users or individual processes, should be able to bind to, update and manipulate data and programs transparently with respect to their respective locations; programs should be expressed independently of the storage and network technology involved in their execution; storage facilities should be structure-neutral so that actors can impose multiple interpretations over information, simultaneously and safely; information should not be discarded so that arbitrary historical views are supported; raw stored information should be open to all; where security restrictions on its use are required this should be achieved using cryptographic techniques. The key advances of the research were: 1) the identification of a candidate set of minimal storage system building blocks, which are sufficiently simple to avoid encapsulating policy where it cannot be customised by applications, and composable to build highly flexible storage architectures 2) insight into the nature of append-only storage components, and the issues arising from their application to common storage use-cases.
△ Less
Submitted 30 June, 2010;
originally announced June 2010.
-
Working Document on Gloss Ontology
Authors:
Joelle Coutaz,
Alan Dearle,
Sophie Dupuy-Chessa,
Graham Kirby,
Christophe Lachenal,
Ron Morrison,
Gaetan Rey,
Evangelos Zirintsis
Abstract:
This document describes the Gloss Ontology. The ontology and associated class model are organised into several packages. Section 2 describes each package in detail, while Section 3 contains a summary of the whole ontology.
This document describes the Gloss Ontology. The ontology and associated class model are organised into several packages. Section 2 describes each package in detail, while Section 3 contains a summary of the whole ontology.
△ Less
Submitted 29 June, 2010;
originally announced June 2010.
-
A Reflective Approach to Providing Flexibility in Application Distribution
Authors:
Álvaro Rebón Portillo,
Scott Walker,
Graham Kirby,
Alan Dearle
Abstract:
Current middleware systems suffer from drawbacks. Often one is forced to make decisions early in the design process about which classes may participate in inter-machine communication. Further, application level and middleware specific semantics cannot be separated forcing an unnatural design. The RAFDA project proposes to adress these deficiencies by creating an adaptive, reflective framework that…
▽ More
Current middleware systems suffer from drawbacks. Often one is forced to make decisions early in the design process about which classes may participate in inter-machine communication. Further, application level and middleware specific semantics cannot be separated forcing an unnatural design. The RAFDA project proposes to adress these deficiencies by creating an adaptive, reflective framework that enables the transformation of non-distributed applications into isomorphic applications whose distribution architecture is flexible. This paper describes the code transformation techniques that have been developed as part of the project. The system enables the distribution of a program according to a flexible configuration without user intervention. Proxy objects can then be substituted, permitting cross-address space communication. The distributed program can adapt to its environment by dynamically altering its distribution boundaries.
△ Less
Submitted 29 June, 2010;
originally announced June 2010.
-
A Generic Storage API
Authors:
Graham Kirby,
Evangelos Zirintsis,
Alan Dearle,
Ron Morrison
Abstract:
We present a generic API suitable for provision of highly generic storage facilities that can be tailored to produce various individually customised storage infrastructures. The paper identifies a candidate set of minimal storage system building blocks, which are sufficiently simple to avoid encapsulating policy where it cannot be customised by applications, and composable to build highly flexible…
▽ More
We present a generic API suitable for provision of highly generic storage facilities that can be tailored to produce various individually customised storage infrastructures. The paper identifies a candidate set of minimal storage system building blocks, which are sufficiently simple to avoid encapsulating policy where it cannot be customised by applications, and composable to build highly flexible storage architectures. Four main generic components are defined: the store, the namer, the caster and the interpreter. It is hypothesised that these are sufficiently general that they could act as building blocks for any information storage and retrieval system. The essential characteristics of each are defined by an interface, which may be implemented by multiple implementing classes.
△ Less
Submitted 24 June, 2010;
originally announced June 2010.
-
Constructing Active Architectures in the ArchWare ADL
Authors:
Ron Morrison,
Graham Kirby,
Dharini Balasubramaniam,
Kath Mickan,
Flavio Oquendo,
Sorana Cîmpan,
Brian Warboys,
Bob Snowdon,
Mark Greenwood
Abstract:
Software that cannot change is condemned to atrophy: it cannot accommodate the constant revision and re-negotiation of its business goals nor intercept the potential of new technology. To accommodate change in such systems we have defined an active software architecture to be: dynamic in that the structure and cardinality of the components and interactions are not statically known; updatable in th…
▽ More
Software that cannot change is condemned to atrophy: it cannot accommodate the constant revision and re-negotiation of its business goals nor intercept the potential of new technology. To accommodate change in such systems we have defined an active software architecture to be: dynamic in that the structure and cardinality of the components and interactions are not statically known; updatable in that components can be replaced dynamically; and evolvable in that it permits its executing specification to be changed. Here we describe the facilities of the ArchWare architecture description language (ADL) for specifying active architectures. The contribution of the work is the unique combination of concepts including: a π-calculus based communication and expression language for specifying executable architectures; hyper-code as an underlying representation of system execution; a decomposition operator to break up and introspect on executing systems; and structural reflection for creating new components and binding them into running systems.
△ Less
Submitted 24 June, 2010;
originally announced June 2010.
-
Architectural Support for Global Smart Spaces
Authors:
Alan Dearle,
Graham Kirby,
Ron Morrison,
Andrew McCarthy,
Kevin Mullen,
Yanyan Yang,
Richard Connor,
Paula Welen,
Andy Wilson
Abstract:
A GLObal Smart Space (GLOSS) provides support for interaction amongst people, artefacts and places while taking account of both context and movement on a global scale. Crucial to the definition of a GLOSS is the provision of a set of location-aware services that detect, convey, store and exploit location information. We use one of these services, hearsay, to illustrate the implementation dimension…
▽ More
A GLObal Smart Space (GLOSS) provides support for interaction amongst people, artefacts and places while taking account of both context and movement on a global scale. Crucial to the definition of a GLOSS is the provision of a set of location-aware services that detect, convey, store and exploit location information. We use one of these services, hearsay, to illustrate the implementation dimensions of a GLOSS. The focus of the paper is on both local and global software architecture to support the implementation of such services. The local architecture is based on XML pipe-lines and is used to construct location-aware components. The global architecture is based on a hybrid peer-to-peer routing scheme and provides the local architectures with the means to communicate in the global context.
△ Less
Submitted 24 June, 2010;
originally announced June 2010.
-
Active Architecture for Pervasive Contextual Services
Authors:
Graham Kirby,
Alan Dearle,
Ron Morrison,
Mark Dunlop,
Richard Connor,
Paddy Nixon
Abstract:
Pervasive services may be defined as services that are available "to any client (anytime, anywhere)". Here we focus on the software and network infrastructure required to support pervasive contextual services operating over a wide area. One of the key requirements is a matching service capable of as-similating and filtering information from various sources and determining matches relevant to those…
▽ More
Pervasive services may be defined as services that are available "to any client (anytime, anywhere)". Here we focus on the software and network infrastructure required to support pervasive contextual services operating over a wide area. One of the key requirements is a matching service capable of as-similating and filtering information from various sources and determining matches relevant to those services. We consider some of the challenges in engineering a globally distributed matching service that is scalable, manageable, and able to evolve incrementally as usage patterns, data formats, services, network topologies and deployment technologies change. We outline an approach based on the use of a peer-to-peer architecture to distribute user events and data, and to support the deployment and evolution of the infrastructure itself.
△ Less
Submitted 24 June, 2010;
originally announced June 2010.
-
Support for Evolving Software Architectures in the ArchWare ADL
Authors:
Ron Morrison,
Graham Kirby,
Dharini Balasubramaniam,
Kath Mickan,
Flavio Oquendo,
Sorana Cîmpan,
Brian Warboys,
Bob Snowdon,
Mark Greenwood
Abstract:
Software that cannot evolve is condemned to atrophy: it cannot accommodate the constant revision and re-negotiation of its business goals nor intercept the potential of new technology. To accommodate change in software systems we have defined an active software architecture to be: dynamic in that the structure and cardinality of the components and interactions are changeable during execution; upda…
▽ More
Software that cannot evolve is condemned to atrophy: it cannot accommodate the constant revision and re-negotiation of its business goals nor intercept the potential of new technology. To accommodate change in software systems we have defined an active software architecture to be: dynamic in that the structure and cardinality of the components and interactions are changeable during execution; updatable in that components can be replaced; decomposable in that an executing system may be (partially) stopped and split up into its components and interactions; and reflective in that the specification of components and interactions may be evolved during execution. Here we describe the facilities of the ArchWare architecture description language (ADL) for specifying active architectures. The contribution of the work is the unique combination of concepts including: a π-calculus based communication and expression language for specifying executable architectures; hyper-code as an underlying representation of system execution that can be used for introspection; a decomposition operator to incrementally break up executing systems; and structural reflection for creating new components and binding them into running systems.
△ Less
Submitted 24 June, 2010;
originally announced June 2010.
-
A Middleware Framework for Constraint-Based Deployment and Autonomic Management of Distributed Applications
Authors:
Alan Dearle,
Graham Kirby,
Andrew McCarthy
Abstract:
We propose a middleware framework for deployment and subsequent autonomic management of component-based distributed applications. An initial deployment goal is specified using a declarative constraint language, expressing constraints over aspects such as component-host map**s and component interconnection topology. A constraint solver is used to find a configuration that satisfies the goal, and…
▽ More
We propose a middleware framework for deployment and subsequent autonomic management of component-based distributed applications. An initial deployment goal is specified using a declarative constraint language, expressing constraints over aspects such as component-host map**s and component interconnection topology. A constraint solver is used to find a configuration that satisfies the goal, and the configuration is deployed automatically. The deployed application is instrumented to allow subsequent autonomic management. If, during execution, the manager detects that the original goal is no longer being met, the satisfy/deploy process can be repeated automatically in order to generate a revised deployment that does meet the goal.
△ Less
Submitted 24 June, 2010;
originally announced June 2010.
-
A Framework for Constraint-Based Deployment and Autonomic Management of Distributed Applications (Extended Abstract)
Authors:
Alan Dearle,
Graham Kirby,
Andrew McCarthy
Abstract:
We propose a framework for the deployment and subsequent autonomic management of component-based distributed applications. An initial deployment goal is specified using a declarative constraint language, expressing constraints over aspects such as component-host map**s and component interconnection topology. A constraint solver is used to find a configuration that satisfies the goal, and the con…
▽ More
We propose a framework for the deployment and subsequent autonomic management of component-based distributed applications. An initial deployment goal is specified using a declarative constraint language, expressing constraints over aspects such as component-host map**s and component interconnection topology. A constraint solver is used to find a configuration that satisfies the goal, and the configuration is deployed automatically. The deployed application is instrumented to allow subsequent autonomic management. If, during execution, the manager detects that the original goal is no longer being met, the satisfy/deploy process can be repeated automatically in order to generate a revised deployment that does meet the goal.
△ Less
Submitted 24 June, 2010;
originally announced June 2010.
-
A Framework for Constraint-Based Deployment and Autonomic Management of Distributed Applications
Authors:
Alan Dearle,
Graham Kirby,
Andrew McCarthy
Abstract:
We propose a framework for deployment and subsequent autonomic management of component-based distributed applications. An initial deployment goal is specified using a declarative constraint language, expressing constraints over aspects such as component-host map**s and component interconnection topology. A constraint solver is used to find a configuration that satisfies the goal, and the configu…
▽ More
We propose a framework for deployment and subsequent autonomic management of component-based distributed applications. An initial deployment goal is specified using a declarative constraint language, expressing constraints over aspects such as component-host map**s and component interconnection topology. A constraint solver is used to find a configuration that satisfies the goal, and the configuration is deployed automatically. The deployed application is instrumented to allow subsequent autonomic management. If, during execution, the manager detects that the original goal is no longer being met, the satisfy/deploy process can be repeated automatically in order to generate a revised deployment that does meet the goal.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.
-
A Flexible and Secure Deployment Framework for Distributed Applications
Authors:
Alan Dearle,
Graham Kirby,
Andrew McCarthy,
Juan-Carlos Diaz y Carballo
Abstract:
This paper describes an implemented system which is designed to support the deployment of applications offering distributed services, comprising a number of distributed components. This is achieved by creating high level placement and topology descriptions which drive tools that deploy applications consisting of components running on multiple hosts. The system addresses issues of heterogeneity by…
▽ More
This paper describes an implemented system which is designed to support the deployment of applications offering distributed services, comprising a number of distributed components. This is achieved by creating high level placement and topology descriptions which drive tools that deploy applications consisting of components running on multiple hosts. The system addresses issues of heterogeneity by providing abstractions over host-specific attributes yielding a homogeneous run-time environment into which components may be deployed. The run-time environments provide secure binding mechanisms that permit deployed components to bind to stored data and services on the hosts on which they are running.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.
-
Exposing Application Components as Web Services
Authors:
Scott Walker,
Alan Dearle,
Graham Kirby,
Stuart Norcross
Abstract:
This paper explores technology permitting arbitrary application components to be exposed for remote access from other software. Using this, the application and its constituent components can be written without concern for its distribution. Software running in different address spaces, on different machines, can perform operations on the remotely accessible components. This is of utility in the cre…
▽ More
This paper explores technology permitting arbitrary application components to be exposed for remote access from other software. Using this, the application and its constituent components can be written without concern for its distribution. Software running in different address spaces, on different machines, can perform operations on the remotely accessible components. This is of utility in the creation of distributed applications and in permitting tools such as debuggers, component browsers, observers or remote probes access to application components. Current middleware systems do not allow arbitrary exposure of application components: instead, the programmer is forced to decide statically which classes of component will support remote accessibility. In the work described here, arbitrary components of any class can be dynamically exposed via Web Services. Traditional Web Services are extended with a remote reference scheme. This extension permits application components to be invoked using either the traditional pass-by-value semantics supported by Web Services or pass-by-reference semantics. The latter permits the preservation of local call semantics across address space boundaries.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.
-
RAFDA: Middleware Supporting the Separation of Application Logic from Distribution Policy
Authors:
Alan Dearle,
Scott Walker,
Stuart Norcross,
Graham Kirby,
Andrew McCarthy
Abstract:
Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies imposed by the Middleware system. These policies permeate the applications developed using them and force an unnatural encoding of application level semantics. For example, the application programmer has no direct control over inter-address-space parame…
▽ More
Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies imposed by the Middleware system. These policies permeate the applications developed using them and force an unnatural encoding of application level semantics. For example, the application programmer has no direct control over inter-address-space parameter passing semantics since it is fixed by the application's distribution topology which is dictated early in the design cycle by the Middleware. This creates applications that are brittle with respect to changes in the way in which the applications are distributed. This paper explores technology permitting arbitrary objects in an application to be dynamically exposed for remote access. Using this, the application can be written without concern for its distribution with object placement and distribution boundaries decided late in the design cycle and even dynamically. Inter-address-space parameter passing semantics may also be decided independently of object implementation and at varying times in the design cycle, again, possibly as late as run-time. Furthermore, transmission policy may be defined on a per-class, per-method or per-parameter basis maximizing plasticity. This flexibility is of utility in the development of new distributed applications and the creation of management and monitoring infrastructures for existing applications.
△ Less
Submitted 18 June, 2010;
originally announced June 2010.
-
Promoting Component Reuse by Separating Transmission Policy from Implementation
Authors:
Scott Walker,
Alan Dearle,
Graham Kirby,
Stuart Norcross
Abstract:
In this paper we present a methodology and set of tools which assist the construction of applications from components, by separating the issues of transmission policy from component definition and implementation. This promotes a greater degree of software reuse than is possible using traditional middleware environments. Whilst component technologies are usually presented as a mechanism for promoti…
▽ More
In this paper we present a methodology and set of tools which assist the construction of applications from components, by separating the issues of transmission policy from component definition and implementation. This promotes a greater degree of software reuse than is possible using traditional middleware environments. Whilst component technologies are usually presented as a mechanism for promoting reuse, reuse is often limited due to design choices that permeate component implementation. The programmer has no direct control over inter-address-space parameter passing semantics: it is fixed by the distributed application's structure, based on the remote accessibility of the components. Using traditional middleware tools and environments, the application designer may be forced to use an unnatural encoding of application level semantics since application parameter passing semantics are tightly coupled with the component deployment topology. This paper describes how inter-address-space parameter passing semantics may be decided independently of component implementation. Transmission policy may be dynamically defined on a per-class, per-method or per-parameter basis.
△ Less
Submitted 18 June, 2010;
originally announced June 2010.
-
Towards Adaptable and Adaptive Policy-Free Middleware
Authors:
Alan Dearle,
Graham Kirby,
Stuart Norcross,
Angus Macdonald,
Greg Bigwood
Abstract:
We believe that to fully support adaptive distributed applications, middleware must itself be adaptable, adaptive and policy-free. In this paper we present a new language-independent adaptable and adaptive policy framework suitable for integration in a wide variety of middleware systems. This framework facilitates the construction of adaptive distributed applications. The framework addresses adapt…
▽ More
We believe that to fully support adaptive distributed applications, middleware must itself be adaptable, adaptive and policy-free. In this paper we present a new language-independent adaptable and adaptive policy framework suitable for integration in a wide variety of middleware systems. This framework facilitates the construction of adaptive distributed applications. The framework addresses adaptability through its ability to represent a wide range of specific middleware policies. Adaptiveness is supported by a rich contextual model, through which an application programmer may control precisely how policies should be selected for any particular interaction with the middleware. A contextual pattern mechanism facilitates the succinct expression of both coarse- and fine-grain policy contexts. Policies may be specified and altered dynamically, and may themselves take account of dynamic conditions. The framework contains no hard-wired policies; instead, all policies can be configured.
△ Less
Submitted 18 June, 2010;
originally announced June 2010.
-
RAFDA: A Policy-Aware Middleware Supporting the Flexible Separation of Application Logic from Distribution
Authors:
Scott Walker,
Alan Dearle,
Stuart Norcross,
Graham Kirby,
Andrew McCarthy
Abstract:
Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies that they impose. These policies permeate applications developed using existing middleware systems and force an unnatural encoding of application level semantics. For example, the application programmer has no direct control over inter-address-space par…
▽ More
Middleware technologies often limit the way in which object classes may be used in distributed applications due to the fixed distribution policies that they impose. These policies permeate applications developed using existing middleware systems and force an unnatural encoding of application level semantics. For example, the application programmer has no direct control over inter-address-space parameter passing semantics. Semantics are fixed by the distribution topology of the application, which is dictated early in the design cycle. This creates applications that are brittle with respect to changes in distribution. This paper explores technology that provides control over the extent to which inter-address-space communication is exposed to programmers, in order to aid the creation, maintenance and evolution of distributed applications. The described system permits arbitrary objects in an application to be dynamically exposed for remote access, allowing applications to be written without concern for distribution. Programmers can conceal or expose the distributed nature of applications as required, permitting object placement and distribution boundaries to be decided late in the design cycle and even dynamically. Inter-address-space parameter passing semantics may also be decided independently of object implementation and at varying times in the design cycle, again possibly as late as run-time. Furthermore, transmission policy may be defined on a per-class, per-method or per-parameter basis, maximizing plasticity. This flexibility is of utility in the development of new distributed applications, and the creation of management and monitoring infrastructures for existing applications.
△ Less
Submitted 18 June, 2010;
originally announced June 2010.
-
A Peer-to-Peer Middleware Framework for Resilient Persistent Programming
Authors:
Alan Dearle,
Graham Kirby,
Stuart Norcross,
Andrew McCarthy
Abstract:
The persistent programming systems of the 1980s offered a programming model that integrated computation and long-term storage. In these systems, reliable applications could be engineered without requiring the programmer to write translation code to manage the transfer of data to and from non-volatile storage. More importantly, it simplified the programmer's conceptual model of an application, and…
▽ More
The persistent programming systems of the 1980s offered a programming model that integrated computation and long-term storage. In these systems, reliable applications could be engineered without requiring the programmer to write translation code to manage the transfer of data to and from non-volatile storage. More importantly, it simplified the programmer's conceptual model of an application, and avoided the many coherency problems that result from multiple cached copies of the same information. Although technically innovative, persistent languages were not widely adopted, perhaps due in part to their closed-world model. Each persistent store was located on a single host, and there were no flexible mechanisms for communication or transfer of data between separate stores. Here we re-open the work on persistence and combine it with modern peer-to-peer techniques in order to provide support for orthogonal persistence in resilient and potentially long-running distributed applications. Our vision is of an infrastructure within which an application can be developed and distributed with minimal modification, whereupon the application becomes resilient to certain failure modes. If a node, or the connection to it, fails during execution of the application, the objects are re-instantiated from distributed replicas, without their reference holders being aware of the failure. Furthermore, we believe that this can be achieved within a spectrum of application programmer intervention, ranging from minimal to totally prescriptive, as desired. The same mechanisms encompass an orthogonally persistent programming model. We outline our approach to implementing this vision, and describe current progress.
△ Less
Submitted 18 June, 2010;
originally announced June 2010.
-
Reflection and Hyper-Programming in Persistent Programming Systems
Authors:
Graham Kirby
Abstract:
The work presented in this thesis seeks to improve programmer productivity in the following ways:
- by reducing the amount of code that has to be written to construct an application;
- by increasing the reliability of the code written; and
- by improving the programmer's understanding of the persistent environment in which applications are constructed.
Two programming techniques that may be…
▽ More
The work presented in this thesis seeks to improve programmer productivity in the following ways:
- by reducing the amount of code that has to be written to construct an application;
- by increasing the reliability of the code written; and
- by improving the programmer's understanding of the persistent environment in which applications are constructed.
Two programming techniques that may be used to pursue these goals in a persistent environment are type-safe linguistic reflection and hyper-programming. The first provides a mechanism by which the programmer can write generators that, when executed, produce new program representations. This allows the specification of programs that are highly generic yet depend in non-trivial ways on the types of the data on which they operate. Genericity promotes software reuse which in turn reduces the amount of new code that has to be written. Hyper-programming allows a source program to contain links to data items in the persistent store. This improves program reliability by allowing certain program checking to be performed earlier than is otherwise possible. It also reduces the amount of code written by permitting direct links to data in the place of textual descriptions. Both techniques contribute to the understanding of the persistent environment through supporting the implementation of store browsing tools and allowing source representations to be associated with all executable programs in the persistent store. This thesis describes in detail the structure of type-safe linguistic reflection and hyper-programming, their benefits in the persistent context, and a suite of programming tools that support reflective programming and hyper-programming. These tools may be used in conjunction to allow reflection over hyper-program representations. The implementation of the tools is described.
△ Less
Submitted 17 June, 2010;
originally announced June 2010.
-
Hosting Byzantine Fault Tolerant Services on a Chord Ring
Authors:
Alan Dearle,
Graham Kirby,
Stuart Norcross
Abstract:
In this paper we demonstrate how stateful Byzantine Fault Tolerant services may be hosted on a Chord ring. The strategy presented is fourfold: firstly a replication scheme that dissociates the maintenance of replicated service state from ring recovery is developed. Secondly, clients of the ring based services are made replication aware. Thirdly, a consensus protocol is introduced that supports the…
▽ More
In this paper we demonstrate how stateful Byzantine Fault Tolerant services may be hosted on a Chord ring. The strategy presented is fourfold: firstly a replication scheme that dissociates the maintenance of replicated service state from ring recovery is developed. Secondly, clients of the ring based services are made replication aware. Thirdly, a consensus protocol is introduced that supports the serialization of updates. Finally Byzantine fault tolerant replication protocols are developed that ensure the integrity of service data hosted on the ring.
△ Less
Submitted 17 June, 2010;
originally announced June 2010.
-
Applying Constraint Solving to the Management of Distributed Applications
Authors:
Andrew McCarthy,
Alan Dearle,
Graham Kirby
Abstract:
We present our approach for deploying and managing distributed component-based applications. A Desired State Description (DSD), written in a high-level declarative language, specifies requirements for a distributed application. Our infrastructure accepts a DSD as input, and from it automatically configures and deploys the distributed application. Subsequent violations of the original requirements…
▽ More
We present our approach for deploying and managing distributed component-based applications. A Desired State Description (DSD), written in a high-level declarative language, specifies requirements for a distributed application. Our infrastructure accepts a DSD as input, and from it automatically configures and deploys the distributed application. Subsequent violations of the original requirements are detected and, where possible, automatically rectified by reconfiguration and redeployment of the necessary application components. A constraint solving tool is used to plan deployments that meet the application requirements.
△ Less
Submitted 17 June, 2010;
originally announced June 2010.
-
Generating a Family of Byzantine Tolerant Protocol Implementations Using a Meta-Model Architecture
Authors:
Graham Kirby,
Alan Dearle,
Stuart Norcross
Abstract:
We describe an approach to modelling a Byzantine tolerant distributed algorithm as a family of related finite state machines, generated from a single meta-model. Various artefacts are generated from each state machine, including diagrams and source-level protocol implementations. The approach allows a state machine formulation to be applied to problems for which it would not otherwise be suitable,…
▽ More
We describe an approach to modelling a Byzantine tolerant distributed algorithm as a family of related finite state machines, generated from a single meta-model. Various artefacts are generated from each state machine, including diagrams and source-level protocol implementations. The approach allows a state machine formulation to be applied to problems for which it would not otherwise be suitable, increasing confidence in correctness.
△ Less
Submitted 17 June, 2010;
originally announced June 2010.
-
Orthogonal Persistence Revisited
Authors:
Alan Dearle,
Graham Kirby,
Ron Morrison
Abstract:
The social and economic importance of large bodies of programs and data that are potentially long-lived has attracted much attention in the commercial and research communities. Here we concentrate on a set of methodologies and technologies called persistent programming. In particular we review programming language support for the concept of orthogonal persistence, a technique for the uniform treat…
▽ More
The social and economic importance of large bodies of programs and data that are potentially long-lived has attracted much attention in the commercial and research communities. Here we concentrate on a set of methodologies and technologies called persistent programming. In particular we review programming language support for the concept of orthogonal persistence, a technique for the uniform treatment of objects irrespective of their types or longevity. While research in persistent programming has become unfashionable, we show how the concept is beginning to appear as a major component of modern systems. We relate these attempts to the original principles of orthogonal persistence and give a few hints about how the concept may be utilised in the future.
△ Less
Submitted 17 June, 2010;
originally announced June 2010.
-
H2O: An Autonomic, Resource-Aware Distributed Database System
Authors:
Angus Macdonald,
Alan Dearle,
Graham Kirby
Abstract:
This paper presents the design of an autonomic, resource-aware distributed database which enables data to be backed up and shared without complex manual administration. The database, H2O, is designed to make use of unused resources on workstation machines. Creating and maintaining highly-available, replicated database systems can be difficult for untrained users, and costly for IT departments. H2O…
▽ More
This paper presents the design of an autonomic, resource-aware distributed database which enables data to be backed up and shared without complex manual administration. The database, H2O, is designed to make use of unused resources on workstation machines. Creating and maintaining highly-available, replicated database systems can be difficult for untrained users, and costly for IT departments. H2O reduces the need for manual administration by autonomically replicating data and load-balancing across machines in an enterprise. Provisioning hardware to run a database system can be unnecessarily costly as most organizations already possess large quantities of idle resources in workstation machines. H2O is designed to utilize this unused capacity by using resource availability information to place data and plan queries over workstation machines that are already being used for other tasks. This paper discusses the requirements for such a system and presents the design and implementation of H2O.
△ Less
Submitted 16 June, 2010;
originally announced June 2010.
-
Autonomic Management of Maintenance Scheduling in Chord
Authors:
Markus Tauber,
Graham Kirby,
Alan Dearle
Abstract:
This paper experimentally evaluates the effects of applying autonomic management to the scheduling of maintenance operations in a deployed Chord network, for various membership churn and workload patterns. Two versions of an autonomic management policy were compared with a static configuration. The autonomic policies varied with respect to the aggressiveness with which they responded to peer acces…
▽ More
This paper experimentally evaluates the effects of applying autonomic management to the scheduling of maintenance operations in a deployed Chord network, for various membership churn and workload patterns. Two versions of an autonomic management policy were compared with a static configuration. The autonomic policies varied with respect to the aggressiveness with which they responded to peer access error rates and to wasted maintenance operations. In most experiments, significant improvements due to autonomic management were observed in the performance of routing operations and the quantity of data transmitted between network members. Of the autonomic policies, the more aggressive version gave slightly better results.
△ Less
Submitted 8 June, 2010;
originally announced June 2010.
-
An Approach to Ad hoc Cloud Computing
Authors:
Graham Kirby,
Alan Dearle,
Angus Macdonald,
Alvaro Fernandes
Abstract:
We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provision involves a data center model, in which clusters of machines are dedicated to running cloud infrastructure software. We propose an additional model, the ad hoc cloud, in which infrastructure software is distributed…
▽ More
We consider how underused computing resources within an enterprise may be harnessed to improve utilization and create an elastic computing infrastructure. Most current cloud provision involves a data center model, in which clusters of machines are dedicated to running cloud infrastructure software. We propose an additional model, the ad hoc cloud, in which infrastructure software is distributed over resources harvested from machines already in existence within an enterprise. In contrast to the data center cloud model, resource levels are not established a priori, nor are resources dedicated exclusively to the cloud while in use. A participating machine is not dedicated to the cloud, but has some other primary purpose such as running interactive processes for a particular user. We outline the major implementation challenges and one approach to tackling them.
△ Less
Submitted 25 February, 2010;
originally announced February 2010.
-
Linguistic Reflection in Java
Authors:
G. N. C. Kirby,
R. Morrison,
D. W. Stemple
Abstract:
Reflective systems allow their own structures to be altered from within. Here we are concerned with a style of reflection, called linguistic reflection, which is the ability of a running program to generate new program fragments and to integrate these into its own execution. In particular we describe how this kind of reflection may be provided in the compiler-based, strongly typed object-oriente…
▽ More
Reflective systems allow their own structures to be altered from within. Here we are concerned with a style of reflection, called linguistic reflection, which is the ability of a running program to generate new program fragments and to integrate these into its own execution. In particular we describe how this kind of reflection may be provided in the compiler-based, strongly typed object-oriented programming language Java. The advantages of the programming technique include attaining high levels of genericity and accommodating system evolution. These advantages are illustrated by an example taken from persistent programming which shows how linguistic reflection allows functionality (program code) to be generated on demand (Just-In-Time) from a generic specification and integrated into the evolving running program. The technique is evaluated against alternative implementation approaches with respect to efficiency, safety and ease of use.
△ Less
Submitted 29 October, 1998;
originally announced October 1998.