SlideShare a Scribd company logo
A Distributed Simulation of P-Systems
A Syropoulos, EG Mamatas, PC Allilomes and KT Sotiriades
Research Division
Araneous Internet Services
Xanthi, Greece
E-mail: research@araneous.com
– p. 1/14
The core of our work
A simulation of P-systems.
– p. 2/14
The core of our work
A simulation of P-systems.
Simulation: Representation of the operation or features
of one process or system through the use of another.
– p. 2/14
The core of our work
A simulation of P-systems.
Simulation: Representation of the operation or features
of one process or system through the use of another.
We represent only P-systems that are members of the
family NOP2(coo, tar).
– p. 2/14
The core of our work
A simulation of P-systems.
Simulation: Representation of the operation or features
of one process or system through the use of another.
We represent only P-systems that are members of the
family NOP2(coo, tar).
And we used Java’s Remote Method Invocation for the
representation.
– p. 2/14
What are P-Systems?
An abstract model of computation that is inherently
parallel.
– p. 3/14
What are P-Systems?
An abstract model of computation that is inherently
parallel.
A foundation for distributed computing.
– p. 3/14
Tools for Distributed Programming
Two basic ways to implement a distributed algorithms:
A purely distributed platform or
Some network protocol to connect a number of
nodes that interchange data.
– p. 4/14
Tools for Distributed Programming
Two basic ways to implement a distributed algorithms:
A purely distributed platform or
Some network protocol to connect a number of
nodes that interchange data.
But. . . distributed operating systems (e.g., Plan-9) are
not widely available, in general.
– p. 4/14
Tools for Distributed Programming
Two basic ways to implement a distributed algorithms:
A purely distributed platform or
Some network protocol to connect a number of
nodes that interchange data.
But. . . distributed operating systems (e.g., Plan-9) are
not widely available, in general.
Fortunately, all modern general purpose operating
systems provide the necessary network capabilities
that can be utilized to create distributed applications.
– p. 4/14
Tools for Distributed Programming
Two basic ways to implement a distributed algorithms:
A purely distributed platform or
Some network protocol to connect a number of
nodes that interchange data.
But. . . distributed operating systems (e.g., Plan-9) are
not widely available, in general.
Fortunately, all modern general purpose operating
systems provide the necessary network capabilities
that can be utilized to create distributed applications.
– p. 4/14
Tools for Distributed Programming
Two basic ways to implement a distributed algorithms:
A purely distributed platform or
Some network protocol to connect a number of
nodes that interchange data.
But. . . distributed operating systems (e.g., Plan-9) are
not widely available, in general.
Fortunately, all modern general purpose operating
systems provide the necessary network capabilities
that can be utilized to create distributed applications.
– p. 4/14
Network Protocols
Distributed algorithms are implemented:
As a peer-to-peer or
A client-server architecture.
– p. 5/14
Network Protocols
Distributed algorithms are implemented:
As a peer-to-peer or
A client-server architecture.
Sockets: pros and cons
The fundamental tool for the implementation of
TCP/IP networking applications.
Peer-to-peer applications require a (new) network
protocol for data exchange.
– p. 5/14
Network Protocols
Distributed algorithms are implemented:
As a peer-to-peer or
A client-server architecture.
Sockets: pros and cons
The fundamental tool for the implementation of
TCP/IP networking applications.
Peer-to-peer applications require a (new) network
protocol for data exchange.
Java’s Remote Method Invocation: A solution to our
problem!
– p. 5/14
Network Protocols
Distributed algorithms are implemented:
As a peer-to-peer or
A client-server architecture.
Sockets: pros and cons
The fundamental tool for the implementation of
TCP/IP networking applications.
Peer-to-peer applications require a (new) network
protocol for data exchange.
Java’s Remote Method Invocation: A solution to our
problem!
– p. 5/14
Network Protocols
Distributed algorithms are implemented:
As a peer-to-peer or
A client-server architecture.
Sockets: pros and cons
The fundamental tool for the implementation of
TCP/IP networking applications.
Peer-to-peer applications require a (new) network
protocol for data exchange.
Java’s Remote Method Invocation: A solution to our
problem!
– p. 5/14
Network Protocols
Distributed algorithms are implemented:
As a peer-to-peer or
A client-server architecture.
Sockets: pros and cons
The fundamental tool for the implementation of
TCP/IP networking applications.
Peer-to-peer applications require a (new) network
protocol for data exchange.
Java’s Remote Method Invocation: A solution to our
problem!
– p. 5/14
Network Protocols
Distributed algorithms are implemented:
As a peer-to-peer or
A client-server architecture.
Sockets: pros and cons
The fundamental tool for the implementation of
TCP/IP networking applications.
Peer-to-peer applications require a (new) network
protocol for data exchange.
Java’s Remote Method Invocation: A solution to our
problem!
– p. 5/14
Java’s RMI in. . . detail
An object on one JVM can invoke methods on an
object in another JVM.
– p. 6/14
Java’s RMI in. . . detail
An object on one JVM can invoke methods on an
object in another JVM.
The arguments of the remote method are “marshalled”
and sent from the local JVM to the remote one, where
they are are “unmarshalled.”
– p. 6/14
Java’s RMI in. . . detail
An object on one JVM can invoke methods on an
object in another JVM.
The arguments of the remote method are “marshalled”
and sent from the local JVM to the remote one, where
they are are “unmarshalled.”
When the method terminates, the results are
marshalled from the remote machine and sent to the
caller’s JVM.
– p. 6/14
Java’s RMI in. . . detail
An object on one JVM can invoke methods on an
object in another JVM.
The arguments of the remote method are “marshalled”
and sent from the local JVM to the remote one, where
they are are “unmarshalled.”
When the method terminates, the results are
marshalled from the remote machine and sent to the
caller’s JVM.
If for some reasons an exception is raised, the
exception is indicated to the caller.
– p. 6/14
The simulation
It is implemented in Java and makes heavy use of the
Java’s RMI.
– p. 7/14
The simulation
It is implemented in Java and makes heavy use of the
Java’s RMI.
The system accepts an input file that describes a
P-system.
– p. 7/14
The simulation
It is implemented in Java and makes heavy use of the
Java’s RMI.
The system accepts an input file that describes a
P-system.
The simulation is distributed in the sense that a
number of objects execute code on different machines
while they communicate.
– p. 7/14
The simulation
It is implemented in Java and makes heavy use of the
Java’s RMI.
The system accepts an input file that describes a
P-system.
The simulation is distributed in the sense that a
number of objects execute code on different machines
while they communicate.
One object pretends to be the basic compartment,
while the others play the rôle of the internal
compartments.
– p. 7/14
The syntax of the language
system = “system” “is”
alphabet “and”
structure “and”
rules “and”
data “and”
output “and”
maximum “and”
“end”
alphabet = “[” letter { “,” letter } “]”
structure = “[” { “[” “]” } “]”
rules = “{” setOfRules { “,” setOfRules } “}”
– p. 8/14
The syntax of the language, cont.
setOfRules = “[” singleRule { “,” singleRule } “]”
singleRule = left “->” right
left = letter { letter }
right = replacement { replacement }
replacement = “(” letter [ “,” destination ] “)”
destination = “here” | “out” | in
in = “in” possitive-integer
data = “{” Mset { “,” Mset } “}”
– p. 9/14
The syntax of the language, cont.
Mset = “(” { occurance } “)”
occurance = “[” letter “,” possitive-integer “]”
output = “output” possitive-integer
maximum = “maximum” possitive-integer
– p. 10/14
Upon startup, all objects start sending multicast UDP
packets to a well-known multicast address.
– p. 11/14
Details of the simulation
Upon startup, all objects start sending multicast UDP
packets to a well-known multicast address.
Each packet contains the IP address of each sender.
– p. 11/14
Details of the simulation
Upon startup, all objects start sending multicast UDP
packets to a well-known multicast address.
Each packet contains the IP address of each sender.
Multicast packets are received by every object
participating in the “network.”
– p. 11/14
Details of the simulation
Upon startup, all objects start sending multicast UDP
packets to a well-known multicast address.
Each packet contains the IP address of each sender.
Multicast packets are received by every object
participating in the “network.”
The main object knows which objects are alive, so it
can decide whether the computation can start.
– p. 11/14
Details of the simulation, cont.
A universal clock is owned by the object that has the
rôle of the basic compartment.
– p. 12/14
Details of the simulation, cont.
A universal clock is owned by the object that has the
rôle of the basic compartment.
Communication breakdowns are considered as
exceptional situations and are treated accordingly.
– p. 12/14
Details of the simulation, cont.
A universal clock is owned by the object that has the
rôle of the basic compartment.
Communication breakdowns are considered as
exceptional situations and are treated accordingly.
Objects operate in parallel implementing the maximal
parallelism requirement for this “simple” case.
– p. 12/14
Gaining maximal parallelism
Initially, the simulator checks which rules are applicable
and selects them.
– p. 13/14
Gaining maximal parallelism
Initially, the simulator checks which rules are applicable
and selects them.
Applicable rules with common elements on their
left-hand side, are checked for the changes they cause
to the system.
The “weight” of each side of a rule is
equal to the number of elements, or 1 if
there are no elements. The total “weight”
of a rule is equal to the product of its two
“weights.”
Only one rule is selected!
– p. 13/14
Gaining maximal parallelism
Initially, the simulator checks which rules are applicable
and selects them.
Applicable rules with common elements on their
left-hand side, are checked for the changes they cause
to the system.
The “weight” of each side of a rule is
equal to the number of elements, or 1 if
there are no elements. The total “weight”
of a rule is equal to the product of its two
“weights.”
Only one rule is selected!
The remaining rules are used in the actual
computation.
– p. 13/14
Future work
Reimplement the system using the SOAP protocol.
– p. 14/14
Future work
Reimplement the system using the SOAP protocol.
Explore the foundational part of P-system.
– p. 14/14
Future work
Reimplement the system using the SOAP protocol.
Explore the foundational part of P-system.
Design and implementation of a distributed
programming language. . .
– p. 14/14

More Related Content

What's hot

Standard measurements
Standard measurementsStandard measurements
Standard measurements
netvis
 
MPI message passing interface
MPI message passing interfaceMPI message passing interface
MPI message passing interface
Mohit Raghuvanshi
 
Erlang
ErlangErlang
Erlang
ESUG
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
Tushar B Kute
 
Introduction to MPI
Introduction to MPIIntroduction to MPI
Introduction to MPI
Akhila Prabhakaran
 
Algoritmi e Calcolo Parallelo 2012/2013 - OpenMP
Algoritmi e Calcolo Parallelo 2012/2013 - OpenMPAlgoritmi e Calcolo Parallelo 2012/2013 - OpenMP
Algoritmi e Calcolo Parallelo 2012/2013 - OpenMP
Pier Luca Lanzi
 
More mpi4py
More mpi4pyMore mpi4py
More mpi4py
A Jorge Garcia
 
CSP as a Domain-Specific Language Embedded in Python and Jython
CSP as a Domain-Specific Language Embedded in Python and JythonCSP as a Domain-Specific Language Embedded in Python and Jython
CSP as a Domain-Specific Language Embedded in Python and Jython
M H
 
Move Message Passing Interface Applications to the Next Level
Move Message Passing Interface Applications to the Next LevelMove Message Passing Interface Applications to the Next Level
Move Message Passing Interface Applications to the Next Level
Intel® Software
 
mpi4py.pdf
mpi4py.pdfmpi4py.pdf
mpi4py.pdf
A Jorge Garcia
 
Nsby examples
Nsby examplesNsby examples
Nsby examples
yogiinmood
 
Report_Ines_Swayam
Report_Ines_SwayamReport_Ines_Swayam
Report_Ines_Swayam
Swayam Tibrewal
 
Peyton jones-2011-parallel haskell-the_future
Peyton jones-2011-parallel haskell-the_futurePeyton jones-2011-parallel haskell-the_future
Peyton jones-2011-parallel haskell-the_future
Takayuki Muranushi
 
Simon Peyton Jones: Managing parallelism
Simon Peyton Jones: Managing parallelismSimon Peyton Jones: Managing parallelism
Simon Peyton Jones: Managing parallelism
Skills Matter
 
MPI Introduction
MPI IntroductionMPI Introduction
MPI Introduction
Rohit Banga
 
DIY Deep Learning with Caffe Workshop
DIY Deep Learning with Caffe WorkshopDIY Deep Learning with Caffe Workshop
DIY Deep Learning with Caffe Workshop
odsc
 
instruction of install Caffe on ubuntu
instruction of install Caffe on ubuntu instruction of install Caffe on ubuntu
instruction of install Caffe on ubuntu
Pouya Ahv
 
Hetergeneous Compute with Standards Based OFI/MPI/OpenMP Programming
Hetergeneous Compute with Standards Based OFI/MPI/OpenMP ProgrammingHetergeneous Compute with Standards Based OFI/MPI/OpenMP Programming
Hetergeneous Compute with Standards Based OFI/MPI/OpenMP Programming
Intel® Software
 
Caffe - A deep learning framework (Ramin Fahimi)
Caffe - A deep learning framework (Ramin Fahimi)Caffe - A deep learning framework (Ramin Fahimi)
Caffe - A deep learning framework (Ramin Fahimi)
irpycon
 
Messaging With Erlang And Jabber
Messaging With  Erlang And  JabberMessaging With  Erlang And  Jabber
Messaging With Erlang And Jabber
l xf
 

What's hot (20)

Standard measurements
Standard measurementsStandard measurements
Standard measurements
 
MPI message passing interface
MPI message passing interfaceMPI message passing interface
MPI message passing interface
 
Erlang
ErlangErlang
Erlang
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
Introduction to MPI
Introduction to MPIIntroduction to MPI
Introduction to MPI
 
Algoritmi e Calcolo Parallelo 2012/2013 - OpenMP
Algoritmi e Calcolo Parallelo 2012/2013 - OpenMPAlgoritmi e Calcolo Parallelo 2012/2013 - OpenMP
Algoritmi e Calcolo Parallelo 2012/2013 - OpenMP
 
More mpi4py
More mpi4pyMore mpi4py
More mpi4py
 
CSP as a Domain-Specific Language Embedded in Python and Jython
CSP as a Domain-Specific Language Embedded in Python and JythonCSP as a Domain-Specific Language Embedded in Python and Jython
CSP as a Domain-Specific Language Embedded in Python and Jython
 
Move Message Passing Interface Applications to the Next Level
Move Message Passing Interface Applications to the Next LevelMove Message Passing Interface Applications to the Next Level
Move Message Passing Interface Applications to the Next Level
 
mpi4py.pdf
mpi4py.pdfmpi4py.pdf
mpi4py.pdf
 
Nsby examples
Nsby examplesNsby examples
Nsby examples
 
Report_Ines_Swayam
Report_Ines_SwayamReport_Ines_Swayam
Report_Ines_Swayam
 
Peyton jones-2011-parallel haskell-the_future
Peyton jones-2011-parallel haskell-the_futurePeyton jones-2011-parallel haskell-the_future
Peyton jones-2011-parallel haskell-the_future
 
Simon Peyton Jones: Managing parallelism
Simon Peyton Jones: Managing parallelismSimon Peyton Jones: Managing parallelism
Simon Peyton Jones: Managing parallelism
 
MPI Introduction
MPI IntroductionMPI Introduction
MPI Introduction
 
DIY Deep Learning with Caffe Workshop
DIY Deep Learning with Caffe WorkshopDIY Deep Learning with Caffe Workshop
DIY Deep Learning with Caffe Workshop
 
instruction of install Caffe on ubuntu
instruction of install Caffe on ubuntu instruction of install Caffe on ubuntu
instruction of install Caffe on ubuntu
 
Hetergeneous Compute with Standards Based OFI/MPI/OpenMP Programming
Hetergeneous Compute with Standards Based OFI/MPI/OpenMP ProgrammingHetergeneous Compute with Standards Based OFI/MPI/OpenMP Programming
Hetergeneous Compute with Standards Based OFI/MPI/OpenMP Programming
 
Caffe - A deep learning framework (Ramin Fahimi)
Caffe - A deep learning framework (Ramin Fahimi)Caffe - A deep learning framework (Ramin Fahimi)
Caffe - A deep learning framework (Ramin Fahimi)
 
Messaging With Erlang And Jabber
Messaging With  Erlang And  JabberMessaging With  Erlang And  Jabber
Messaging With Erlang And Jabber
 

Viewers also liked

Electronic defamation
Electronic defamationElectronic defamation
Electronic defamation
Apostolos Syropoulos
 
TR Internet Safety
TR Internet SafetyTR Internet Safety
TR Internet Safety
Apostolos Syropoulos
 
GR Internet Addiction
GR Internet AddictionGR Internet Addiction
GR Internet Addiction
Apostolos Syropoulos
 
RO Internet Addiction
RO Internet AddictionRO Internet Addiction
RO Internet Addiction
Apostolos Syropoulos
 
Models of Non-standard Computation
Models of Non-standard ComputationModels of Non-standard Computation
Models of Non-standard Computation
Apostolos Syropoulos
 
RO Negative Effects of Computer Games
RO Negative Effects of Computer GamesRO Negative Effects of Computer Games
RO Negative Effects of Computer Games
Apostolos Syropoulos
 
How do we get better at being artists
How do we get better at being artistsHow do we get better at being artists
How do we get better at being artists
laurasanderson
 
Digital Typography
Digital TypographyDigital Typography
Digital Typography
Apostolos Syropoulos
 
Electronic defamation
Electronic defamationElectronic defamation
Electronic defamation
Apostolos Syropoulos
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
Apostolos Syropoulos
 
Study of Internet Addiction in 5 Europena Schools
Study of Internet Addiction in 5 Europena SchoolsStudy of Internet Addiction in 5 Europena Schools
Study of Internet Addiction in 5 Europena Schools
Apostolos Syropoulos
 
RO Sleep Deprivation in Teens
RO Sleep Deprivation in TeensRO Sleep Deprivation in Teens
RO Sleep Deprivation in Teens
Apostolos Syropoulos
 
AT_School_Activities
AT_School_ActivitiesAT_School_Activities
AT_School_Activities
Apostolos Syropoulos
 
RO impact of excessive computer use on global health state
RO impact of excessive computer use on global health stateRO impact of excessive computer use on global health state
RO impact of excessive computer use on global health state
Apostolos Syropoulos
 
PT_Internet_Addiction
PT_Internet_AddictionPT_Internet_Addiction
PT_Internet_Addiction
Apostolos Syropoulos
 
History of the_internet
History of the_internetHistory of the_internet
History of the_internet
Apostolos Syropoulos
 
RO The Effects of Video Games
RO The Effects of Video GamesRO The Effects of Video Games
RO The Effects of Video Games
Apostolos Syropoulos
 
Fuzzy Topological Systems
Fuzzy Topological SystemsFuzzy Topological Systems
Fuzzy Topological Systems
Apostolos Syropoulos
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
Apostolos Syropoulos
 

Viewers also liked (19)

Electronic defamation
Electronic defamationElectronic defamation
Electronic defamation
 
TR Internet Safety
TR Internet SafetyTR Internet Safety
TR Internet Safety
 
GR Internet Addiction
GR Internet AddictionGR Internet Addiction
GR Internet Addiction
 
RO Internet Addiction
RO Internet AddictionRO Internet Addiction
RO Internet Addiction
 
Models of Non-standard Computation
Models of Non-standard ComputationModels of Non-standard Computation
Models of Non-standard Computation
 
RO Negative Effects of Computer Games
RO Negative Effects of Computer GamesRO Negative Effects of Computer Games
RO Negative Effects of Computer Games
 
How do we get better at being artists
How do we get better at being artistsHow do we get better at being artists
How do we get better at being artists
 
Digital Typography
Digital TypographyDigital Typography
Digital Typography
 
Electronic defamation
Electronic defamationElectronic defamation
Electronic defamation
 
Cyber Bullying
Cyber BullyingCyber Bullying
Cyber Bullying
 
Study of Internet Addiction in 5 Europena Schools
Study of Internet Addiction in 5 Europena SchoolsStudy of Internet Addiction in 5 Europena Schools
Study of Internet Addiction in 5 Europena Schools
 
RO Sleep Deprivation in Teens
RO Sleep Deprivation in TeensRO Sleep Deprivation in Teens
RO Sleep Deprivation in Teens
 
AT_School_Activities
AT_School_ActivitiesAT_School_Activities
AT_School_Activities
 
RO impact of excessive computer use on global health state
RO impact of excessive computer use on global health stateRO impact of excessive computer use on global health state
RO impact of excessive computer use on global health state
 
PT_Internet_Addiction
PT_Internet_AddictionPT_Internet_Addiction
PT_Internet_Addiction
 
History of the_internet
History of the_internetHistory of the_internet
History of the_internet
 
RO The Effects of Video Games
RO The Effects of Video GamesRO The Effects of Video Games
RO The Effects of Video Games
 
Fuzzy Topological Systems
Fuzzy Topological SystemsFuzzy Topological Systems
Fuzzy Topological Systems
 
Cyber bullying by National Republican Guard
Cyber bullying by National Republican GuardCyber bullying by National Republican Guard
Cyber bullying by National Republican Guard
 

Similar to A Distributed Simulation of P-Systems

P Systems and Distributed Computing
P Systems and Distributed ComputingP Systems and Distributed Computing
P Systems and Distributed Computing
Apostolos Syropoulos
 
Lecture 5: Software platforms and services
Lecture 5: Software platforms and services Lecture 5: Software platforms and services
Lecture 5: Software platforms and services
PayamBarnaghi
 
G04844450
G04844450G04844450
G04844450
IOSR-JEN
 
Iygapyisi cause10-slideshare
Iygapyisi cause10-slideshareIygapyisi cause10-slideshare
Iygapyisi cause10-slideshare
dwengincsu
 
Cn lab manual 150702
Cn lab manual 150702Cn lab manual 150702
Cn lab manual 150702
Hardiksinh Solanki
 
Features & benifits of ipv6 firewall
Features & benifits of ipv6 firewallFeatures & benifits of ipv6 firewall
Features & benifits of ipv6 firewall
Anthony Daniel
 
Intro to exploits in metasploitand payloads in msfvenom
Intro to exploits in metasploitand payloads in msfvenomIntro to exploits in metasploitand payloads in msfvenom
Intro to exploits in metasploitand payloads in msfvenom
Siddharth Krishna Kumar
 
IPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationIPv4 to IPv6 network transformation
IPv4 to IPv6 network transformation
Nikolay Milovanov
 
Paper9250 implementation of an i pv6 stack for ns-3
Paper9250 implementation of an i pv6 stack for ns-3Paper9250 implementation of an i pv6 stack for ns-3
Paper9250 implementation of an i pv6 stack for ns-3
Suhail Ahmed Chandio
 
opnet lab report
opnet lab reportopnet lab report
opnet lab report
Sadia Shachi
 
Scc2012 Scala
Scc2012 ScalaScc2012 Scala
Scc2012 Scala
steccami
 
Java seminar.pptx
Java seminar.pptxJava seminar.pptx
Java seminar.pptx
shirindigitel
 
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
Stefano Salsano
 
Who pulls the strings?
Who pulls the strings?Who pulls the strings?
Who pulls the strings?
Ronny
 
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
Mullaiselvan Mohan
 
Network simulator
Network simulatorNetwork simulator
Network simulator
jausmin kj
 
Cytoscape and External Data Analysis Tools
Cytoscape and External Data Analysis ToolsCytoscape and External Data Analysis Tools
Cytoscape and External Data Analysis Tools
Keiichiro Ono
 
Virtual lab - Routing in Mobile Adhoc Networks
Virtual lab - Routing in Mobile Adhoc NetworksVirtual lab - Routing in Mobile Adhoc Networks
Virtual lab - Routing in Mobile Adhoc Networks
Ramco Institute of Technology, Rajapalayam, Tamilnadu, India
 
Jubatus talk at HadoopSummit 2013
Jubatus talk at HadoopSummit 2013Jubatus talk at HadoopSummit 2013
Jubatus talk at HadoopSummit 2013
Preferred Networks
 
IRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE WorkshopIRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE Workshop
Eleni Trouva
 

Similar to A Distributed Simulation of P-Systems (20)

P Systems and Distributed Computing
P Systems and Distributed ComputingP Systems and Distributed Computing
P Systems and Distributed Computing
 
Lecture 5: Software platforms and services
Lecture 5: Software platforms and services Lecture 5: Software platforms and services
Lecture 5: Software platforms and services
 
G04844450
G04844450G04844450
G04844450
 
Iygapyisi cause10-slideshare
Iygapyisi cause10-slideshareIygapyisi cause10-slideshare
Iygapyisi cause10-slideshare
 
Cn lab manual 150702
Cn lab manual 150702Cn lab manual 150702
Cn lab manual 150702
 
Features & benifits of ipv6 firewall
Features & benifits of ipv6 firewallFeatures & benifits of ipv6 firewall
Features & benifits of ipv6 firewall
 
Intro to exploits in metasploitand payloads in msfvenom
Intro to exploits in metasploitand payloads in msfvenomIntro to exploits in metasploitand payloads in msfvenom
Intro to exploits in metasploitand payloads in msfvenom
 
IPv4 to IPv6 network transformation
IPv4 to IPv6 network transformationIPv4 to IPv6 network transformation
IPv4 to IPv6 network transformation
 
Paper9250 implementation of an i pv6 stack for ns-3
Paper9250 implementation of an i pv6 stack for ns-3Paper9250 implementation of an i pv6 stack for ns-3
Paper9250 implementation of an i pv6 stack for ns-3
 
opnet lab report
opnet lab reportopnet lab report
opnet lab report
 
Scc2012 Scala
Scc2012 ScalaScc2012 Scala
Scc2012 Scala
 
Java seminar.pptx
Java seminar.pptxJava seminar.pptx
Java seminar.pptx
 
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
OSHI - Open Source Hybrid IP/SDN networking @EWSDN14
 
Who pulls the strings?
Who pulls the strings?Who pulls the strings?
Who pulls the strings?
 
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
10 years in Network Protocol testing L2 L3 L4-L7 Tcl Python Manual and Automa...
 
Network simulator
Network simulatorNetwork simulator
Network simulator
 
Cytoscape and External Data Analysis Tools
Cytoscape and External Data Analysis ToolsCytoscape and External Data Analysis Tools
Cytoscape and External Data Analysis Tools
 
Virtual lab - Routing in Mobile Adhoc Networks
Virtual lab - Routing in Mobile Adhoc NetworksVirtual lab - Routing in Mobile Adhoc Networks
Virtual lab - Routing in Mobile Adhoc Networks
 
Jubatus talk at HadoopSummit 2013
Jubatus talk at HadoopSummit 2013Jubatus talk at HadoopSummit 2013
Jubatus talk at HadoopSummit 2013
 
IRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE WorkshopIRATI Experimentation, US-EU FIRE Workshop
IRATI Experimentation, US-EU FIRE Workshop
 

More from Apostolos Syropoulos

A Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolA Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of school
Apostolos Syropoulos
 
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
Apostolos Syropoulos
 
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectSocial Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Apostolos Syropoulos
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial Intelligence
Apostolos Syropoulos
 
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
Apostolos Syropoulos
 
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςΤο Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων Ξάνθης
Apostolos Syropoulos
 
Το Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνΤο Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο Αβδήρων
Apostolos Syropoulos
 
Ταφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραΤαφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία Άβδηρα
Apostolos Syropoulos
 
Το ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςΤο ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της Ξάνθης
Apostolos Syropoulos
 
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3
Apostolos Syropoulos
 
Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2
Apostolos Syropoulos
 
Αφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαΑφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά Ασία
Apostolos Syropoulos
 
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
Apostolos Syropoulos
 
How to Convert Units of Measure
How to Convert Units of MeasureHow to Convert Units of Measure
How to Convert Units of Measure
Apostolos Syropoulos
 
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Apostolos Syropoulos
 
Inflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesInflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and Adjectives
Apostolos Syropoulos
 
Learning Simple Phrases in Greek
Learning Simple Phrases in GreekLearning Simple Phrases in Greek
Learning Simple Phrases in Greek
Apostolos Syropoulos
 
Computational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetComputational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek Alphabet
Apostolos Syropoulos
 
Το Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουΤο Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μου
Apostolos Syropoulos
 
Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...
Apostolos Syropoulos
 

More from Apostolos Syropoulos (20)

A Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of schoolA Presentation of Braga. It was made by students of school
A Presentation of Braga. It was made by students of school
 
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...A short presentation of Italy made by students of a school in Cosimo, Sicily,...
A short presentation of Italy made by students of a school in Cosimo, Sicily,...
 
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ ProjectSocial Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
Social Media Algorithms - Part of the "Computers in out Life" Erasmus+ Project
 
A gentle introduction to Artificial Intelligence
A gentle introduction to Artificial IntelligenceA gentle introduction to Artificial Intelligence
A gentle introduction to Artificial Intelligence
 
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu MansionΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
ΑΡΧΟΝΤΙΚΟ ΠΑΜΟΥΚΤΣΟΓΛΟΥ - Pamouktsoglu Mansion
 
Το Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων ΞάνθηςΤο Ορφανοτροφείο Θηλέων Ξάνθης
Το Ορφανοτροφείο Θηλέων Ξάνθης
 
Το Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο ΑβδήρωνΤο Αρχαιολογικό Μουσείο Αβδήρων
Το Αρχαιολογικό Μουσείο Αβδήρων
 
Ταφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία ΆβδηραΤαφικά έθιμα στα αρχαία Άβδηρα
Ταφικά έθιμα στα αρχαία Άβδηρα
 
Το ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της ΞάνθηςΤο ορφανοτροφείο της Ξάνθης
Το ορφανοτροφείο της Ξάνθης
 
Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3Μικρασιατική κατατστροφή - Μέρος 3
Μικρασιατική κατατστροφή - Μέρος 3
 
Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2Μικρασιατική κατατστροφή - Μέρος 2
Μικρασιατική κατατστροφή - Μέρος 2
 
Αφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά ΑσίαΑφιέρωμα στη Μικρά Ασία
Αφιέρωμα στη Μικρά Ασία
 
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptxΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
ΕΚΠΑΙΔΕΥΤΙΚΗ ΔΡΑΣΗ «ΙΧΝΙΛΑΤΩΝΤΑΣ ΤΟ ΠΑΡΕΛΘΟΝ ΤΟΥ ΤΟΠΟΥ ΜΑΣ».pptx
 
How to Convert Units of Measure
How to Convert Units of MeasureHow to Convert Units of Measure
How to Convert Units of Measure
 
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing  mathematical tex...
Συγγραφή μαθηματικού κειμένου με χρήση του XeLaTeX (Writing mathematical tex...
 
Inflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and AdjectivesInflected Forms of Nouns and Adjectives
Inflected Forms of Nouns and Adjectives
 
Learning Simple Phrases in Greek
Learning Simple Phrases in GreekLearning Simple Phrases in Greek
Learning Simple Phrases in Greek
 
Computational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek AlphabetComputational Thinking and...the Greek Alphabet
Computational Thinking and...the Greek Alphabet
 
Το Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μουΤο Αποτύπωμα του 1821 στον Τόπο μου
Το Αποτύπωμα του 1821 στον Τόπο μου
 
Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...Παγκόσμια ημέρα της σταθεράς π=3,14...
Παγκόσμια ημέρα της σταθεράς π=3,14...
 

Recently uploaded

Alternate Wetting and Drying - Climate Smart Agriculture
Alternate Wetting and Drying - Climate Smart AgricultureAlternate Wetting and Drying - Climate Smart Agriculture
Alternate Wetting and Drying - Climate Smart Agriculture
International Food Policy Research Institute- South Asia Office
 
Farming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptxFarming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptx
Frédéric Baudron
 
2001_Book_HumanChromosomes - Genéticapdf
2001_Book_HumanChromosomes - Genéticapdf2001_Book_HumanChromosomes - Genéticapdf
2001_Book_HumanChromosomes - Genéticapdf
lucianamillenium
 
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
Sérgio Sacani
 
AJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdfAJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR
 
Lattice Defects in ionic solid compound.pptx
Lattice Defects in ionic solid compound.pptxLattice Defects in ionic solid compound.pptx
Lattice Defects in ionic solid compound.pptx
DrRajeshDas
 
The cost of acquiring information by natural selection
The cost of acquiring information by natural selectionThe cost of acquiring information by natural selection
The cost of acquiring information by natural selection
Carl Bergstrom
 
TOPIC OF DISCUSSION: CENTRIFUGATION SLIDESHARE.pptx
TOPIC OF DISCUSSION: CENTRIFUGATION SLIDESHARE.pptxTOPIC OF DISCUSSION: CENTRIFUGATION SLIDESHARE.pptx
TOPIC OF DISCUSSION: CENTRIFUGATION SLIDESHARE.pptx
shubhijain836
 
gastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptxgastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptx
Shekar Boddu
 
Holsinger, Bruce W. - Music, body and desire in medieval culture [2001].pdf
Holsinger, Bruce W. - Music, body and desire in medieval culture [2001].pdfHolsinger, Bruce W. - Music, body and desire in medieval culture [2001].pdf
Holsinger, Bruce W. - Music, body and desire in medieval culture [2001].pdf
frank0071
 
Physiology of Nervous System presentation.pptx
Physiology of Nervous System presentation.pptxPhysiology of Nervous System presentation.pptx
Physiology of Nervous System presentation.pptx
fatima132662
 
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfMending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Selcen Ozturkcan
 
Gadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdfGadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdf
PirithiRaju
 
Embracing Deep Variability For Reproducibility and Replicability
Embracing Deep Variability For Reproducibility and ReplicabilityEmbracing Deep Variability For Reproducibility and Replicability
Embracing Deep Variability For Reproducibility and Replicability
University of Rennes, INSA Rennes, Inria/IRISA, CNRS
 
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDSJAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
Sérgio Sacani
 
Male reproduction physiology by Suyash Garg .pptx
Male reproduction physiology by Suyash Garg .pptxMale reproduction physiology by Suyash Garg .pptx
Male reproduction physiology by Suyash Garg .pptx
suyashempire
 
Introduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptxIntroduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptx
QusayMaghayerh
 
Direct Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart AgricultureDirect Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart Agriculture
International Food Policy Research Institute- South Asia Office
 
Summary Of transcription and Translation.pdf
Summary Of transcription and Translation.pdfSummary Of transcription and Translation.pdf
Summary Of transcription and Translation.pdf
vadgavevedant86
 
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
hozt8xgk
 

Recently uploaded (20)

Alternate Wetting and Drying - Climate Smart Agriculture
Alternate Wetting and Drying - Climate Smart AgricultureAlternate Wetting and Drying - Climate Smart Agriculture
Alternate Wetting and Drying - Climate Smart Agriculture
 
Farming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptxFarming systems analysis: what have we learnt?.pptx
Farming systems analysis: what have we learnt?.pptx
 
2001_Book_HumanChromosomes - Genéticapdf
2001_Book_HumanChromosomes - Genéticapdf2001_Book_HumanChromosomes - Genéticapdf
2001_Book_HumanChromosomes - Genéticapdf
 
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
SDSS1335+0728: The awakening of a ∼ 106M⊙ black hole⋆
 
AJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdfAJAY KUMAR NIET GreNo Guava Project File.pdf
AJAY KUMAR NIET GreNo Guava Project File.pdf
 
Lattice Defects in ionic solid compound.pptx
Lattice Defects in ionic solid compound.pptxLattice Defects in ionic solid compound.pptx
Lattice Defects in ionic solid compound.pptx
 
The cost of acquiring information by natural selection
The cost of acquiring information by natural selectionThe cost of acquiring information by natural selection
The cost of acquiring information by natural selection
 
TOPIC OF DISCUSSION: CENTRIFUGATION SLIDESHARE.pptx
TOPIC OF DISCUSSION: CENTRIFUGATION SLIDESHARE.pptxTOPIC OF DISCUSSION: CENTRIFUGATION SLIDESHARE.pptx
TOPIC OF DISCUSSION: CENTRIFUGATION SLIDESHARE.pptx
 
gastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptxgastroretentive drug delivery system-PPT.pptx
gastroretentive drug delivery system-PPT.pptx
 
Holsinger, Bruce W. - Music, body and desire in medieval culture [2001].pdf
Holsinger, Bruce W. - Music, body and desire in medieval culture [2001].pdfHolsinger, Bruce W. - Music, body and desire in medieval culture [2001].pdf
Holsinger, Bruce W. - Music, body and desire in medieval culture [2001].pdf
 
Physiology of Nervous System presentation.pptx
Physiology of Nervous System presentation.pptxPhysiology of Nervous System presentation.pptx
Physiology of Nervous System presentation.pptx
 
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdfMending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
Mending Clothing to Support Sustainable Fashion_CIMaR 2024.pdf
 
Gadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdfGadgets for management of stored product pests_Dr.UPR.pdf
Gadgets for management of stored product pests_Dr.UPR.pdf
 
Embracing Deep Variability For Reproducibility and Replicability
Embracing Deep Variability For Reproducibility and ReplicabilityEmbracing Deep Variability For Reproducibility and Replicability
Embracing Deep Variability For Reproducibility and Replicability
 
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDSJAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
JAMES WEBB STUDY THE MASSIVE BLACK HOLE SEEDS
 
Male reproduction physiology by Suyash Garg .pptx
Male reproduction physiology by Suyash Garg .pptxMale reproduction physiology by Suyash Garg .pptx
Male reproduction physiology by Suyash Garg .pptx
 
Introduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptxIntroduction_Ch_01_Biotech Biotechnology course .pptx
Introduction_Ch_01_Biotech Biotechnology course .pptx
 
Direct Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart AgricultureDirect Seeded Rice - Climate Smart Agriculture
Direct Seeded Rice - Climate Smart Agriculture
 
Summary Of transcription and Translation.pdf
Summary Of transcription and Translation.pdfSummary Of transcription and Translation.pdf
Summary Of transcription and Translation.pdf
 
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
快速办理(UAM毕业证书)马德里自治大学毕业证学位证一模一样
 

A Distributed Simulation of P-Systems

  • 1. A Distributed Simulation of P-Systems A Syropoulos, EG Mamatas, PC Allilomes and KT Sotiriades Research Division Araneous Internet Services Xanthi, Greece E-mail: research@araneous.com – p. 1/14
  • 2. The core of our work A simulation of P-systems. – p. 2/14
  • 3. The core of our work A simulation of P-systems. Simulation: Representation of the operation or features of one process or system through the use of another. – p. 2/14
  • 4. The core of our work A simulation of P-systems. Simulation: Representation of the operation or features of one process or system through the use of another. We represent only P-systems that are members of the family NOP2(coo, tar). – p. 2/14
  • 5. The core of our work A simulation of P-systems. Simulation: Representation of the operation or features of one process or system through the use of another. We represent only P-systems that are members of the family NOP2(coo, tar). And we used Java’s Remote Method Invocation for the representation. – p. 2/14
  • 6. What are P-Systems? An abstract model of computation that is inherently parallel. – p. 3/14
  • 7. What are P-Systems? An abstract model of computation that is inherently parallel. A foundation for distributed computing. – p. 3/14
  • 8. Tools for Distributed Programming Two basic ways to implement a distributed algorithms: A purely distributed platform or Some network protocol to connect a number of nodes that interchange data. – p. 4/14
  • 9. Tools for Distributed Programming Two basic ways to implement a distributed algorithms: A purely distributed platform or Some network protocol to connect a number of nodes that interchange data. But. . . distributed operating systems (e.g., Plan-9) are not widely available, in general. – p. 4/14
  • 10. Tools for Distributed Programming Two basic ways to implement a distributed algorithms: A purely distributed platform or Some network protocol to connect a number of nodes that interchange data. But. . . distributed operating systems (e.g., Plan-9) are not widely available, in general. Fortunately, all modern general purpose operating systems provide the necessary network capabilities that can be utilized to create distributed applications. – p. 4/14
  • 11. Tools for Distributed Programming Two basic ways to implement a distributed algorithms: A purely distributed platform or Some network protocol to connect a number of nodes that interchange data. But. . . distributed operating systems (e.g., Plan-9) are not widely available, in general. Fortunately, all modern general purpose operating systems provide the necessary network capabilities that can be utilized to create distributed applications. – p. 4/14
  • 12. Tools for Distributed Programming Two basic ways to implement a distributed algorithms: A purely distributed platform or Some network protocol to connect a number of nodes that interchange data. But. . . distributed operating systems (e.g., Plan-9) are not widely available, in general. Fortunately, all modern general purpose operating systems provide the necessary network capabilities that can be utilized to create distributed applications. – p. 4/14
  • 13. Network Protocols Distributed algorithms are implemented: As a peer-to-peer or A client-server architecture. – p. 5/14
  • 14. Network Protocols Distributed algorithms are implemented: As a peer-to-peer or A client-server architecture. Sockets: pros and cons The fundamental tool for the implementation of TCP/IP networking applications. Peer-to-peer applications require a (new) network protocol for data exchange. – p. 5/14
  • 15. Network Protocols Distributed algorithms are implemented: As a peer-to-peer or A client-server architecture. Sockets: pros and cons The fundamental tool for the implementation of TCP/IP networking applications. Peer-to-peer applications require a (new) network protocol for data exchange. Java’s Remote Method Invocation: A solution to our problem! – p. 5/14
  • 16. Network Protocols Distributed algorithms are implemented: As a peer-to-peer or A client-server architecture. Sockets: pros and cons The fundamental tool for the implementation of TCP/IP networking applications. Peer-to-peer applications require a (new) network protocol for data exchange. Java’s Remote Method Invocation: A solution to our problem! – p. 5/14
  • 17. Network Protocols Distributed algorithms are implemented: As a peer-to-peer or A client-server architecture. Sockets: pros and cons The fundamental tool for the implementation of TCP/IP networking applications. Peer-to-peer applications require a (new) network protocol for data exchange. Java’s Remote Method Invocation: A solution to our problem! – p. 5/14
  • 18. Network Protocols Distributed algorithms are implemented: As a peer-to-peer or A client-server architecture. Sockets: pros and cons The fundamental tool for the implementation of TCP/IP networking applications. Peer-to-peer applications require a (new) network protocol for data exchange. Java’s Remote Method Invocation: A solution to our problem! – p. 5/14
  • 19. Network Protocols Distributed algorithms are implemented: As a peer-to-peer or A client-server architecture. Sockets: pros and cons The fundamental tool for the implementation of TCP/IP networking applications. Peer-to-peer applications require a (new) network protocol for data exchange. Java’s Remote Method Invocation: A solution to our problem! – p. 5/14
  • 20. Java’s RMI in. . . detail An object on one JVM can invoke methods on an object in another JVM. – p. 6/14
  • 21. Java’s RMI in. . . detail An object on one JVM can invoke methods on an object in another JVM. The arguments of the remote method are “marshalled” and sent from the local JVM to the remote one, where they are are “unmarshalled.” – p. 6/14
  • 22. Java’s RMI in. . . detail An object on one JVM can invoke methods on an object in another JVM. The arguments of the remote method are “marshalled” and sent from the local JVM to the remote one, where they are are “unmarshalled.” When the method terminates, the results are marshalled from the remote machine and sent to the caller’s JVM. – p. 6/14
  • 23. Java’s RMI in. . . detail An object on one JVM can invoke methods on an object in another JVM. The arguments of the remote method are “marshalled” and sent from the local JVM to the remote one, where they are are “unmarshalled.” When the method terminates, the results are marshalled from the remote machine and sent to the caller’s JVM. If for some reasons an exception is raised, the exception is indicated to the caller. – p. 6/14
  • 24. The simulation It is implemented in Java and makes heavy use of the Java’s RMI. – p. 7/14
  • 25. The simulation It is implemented in Java and makes heavy use of the Java’s RMI. The system accepts an input file that describes a P-system. – p. 7/14
  • 26. The simulation It is implemented in Java and makes heavy use of the Java’s RMI. The system accepts an input file that describes a P-system. The simulation is distributed in the sense that a number of objects execute code on different machines while they communicate. – p. 7/14
  • 27. The simulation It is implemented in Java and makes heavy use of the Java’s RMI. The system accepts an input file that describes a P-system. The simulation is distributed in the sense that a number of objects execute code on different machines while they communicate. One object pretends to be the basic compartment, while the others play the rôle of the internal compartments. – p. 7/14
  • 28. The syntax of the language system = “system” “is” alphabet “and” structure “and” rules “and” data “and” output “and” maximum “and” “end” alphabet = “[” letter { “,” letter } “]” structure = “[” { “[” “]” } “]” rules = “{” setOfRules { “,” setOfRules } “}” – p. 8/14
  • 29. The syntax of the language, cont. setOfRules = “[” singleRule { “,” singleRule } “]” singleRule = left “->” right left = letter { letter } right = replacement { replacement } replacement = “(” letter [ “,” destination ] “)” destination = “here” | “out” | in in = “in” possitive-integer data = “{” Mset { “,” Mset } “}” – p. 9/14
  • 30. The syntax of the language, cont. Mset = “(” { occurance } “)” occurance = “[” letter “,” possitive-integer “]” output = “output” possitive-integer maximum = “maximum” possitive-integer – p. 10/14
  • 31. Upon startup, all objects start sending multicast UDP packets to a well-known multicast address. – p. 11/14
  • 32. Details of the simulation Upon startup, all objects start sending multicast UDP packets to a well-known multicast address. Each packet contains the IP address of each sender. – p. 11/14
  • 33. Details of the simulation Upon startup, all objects start sending multicast UDP packets to a well-known multicast address. Each packet contains the IP address of each sender. Multicast packets are received by every object participating in the “network.” – p. 11/14
  • 34. Details of the simulation Upon startup, all objects start sending multicast UDP packets to a well-known multicast address. Each packet contains the IP address of each sender. Multicast packets are received by every object participating in the “network.” The main object knows which objects are alive, so it can decide whether the computation can start. – p. 11/14
  • 35. Details of the simulation, cont. A universal clock is owned by the object that has the rôle of the basic compartment. – p. 12/14
  • 36. Details of the simulation, cont. A universal clock is owned by the object that has the rôle of the basic compartment. Communication breakdowns are considered as exceptional situations and are treated accordingly. – p. 12/14
  • 37. Details of the simulation, cont. A universal clock is owned by the object that has the rôle of the basic compartment. Communication breakdowns are considered as exceptional situations and are treated accordingly. Objects operate in parallel implementing the maximal parallelism requirement for this “simple” case. – p. 12/14
  • 38. Gaining maximal parallelism Initially, the simulator checks which rules are applicable and selects them. – p. 13/14
  • 39. Gaining maximal parallelism Initially, the simulator checks which rules are applicable and selects them. Applicable rules with common elements on their left-hand side, are checked for the changes they cause to the system. The “weight” of each side of a rule is equal to the number of elements, or 1 if there are no elements. The total “weight” of a rule is equal to the product of its two “weights.” Only one rule is selected! – p. 13/14
  • 40. Gaining maximal parallelism Initially, the simulator checks which rules are applicable and selects them. Applicable rules with common elements on their left-hand side, are checked for the changes they cause to the system. The “weight” of each side of a rule is equal to the number of elements, or 1 if there are no elements. The total “weight” of a rule is equal to the product of its two “weights.” Only one rule is selected! The remaining rules are used in the actual computation. – p. 13/14
  • 41. Future work Reimplement the system using the SOAP protocol. – p. 14/14
  • 42. Future work Reimplement the system using the SOAP protocol. Explore the foundational part of P-system. – p. 14/14
  • 43. Future work Reimplement the system using the SOAP protocol. Explore the foundational part of P-system. Design and implementation of a distributed programming language. . . – p. 14/14