Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Stephen Paul Morgan is active.

Publication


Featured researches published by Stephen Paul Morgan.


Ibm Systems Journal | 2003

Clockwork: A new movement in autonomic systems

Lance Warren Russell; Stephen Paul Morgan; Edward Gustav Chron

Statically tuned computing systems may perform poorly when running time-varying workloads. Current work on autonomic tuning largely involves reactive autonomicity, based on feedback control. This paper identifies a new way of thinking about autonomic tuning, that is, predictive autonomicity, based on feedforward control. A general method, called Clockwork, for constructing predictive autonomic systems is proposed. The method is based on statistical modeling, tracking, and forecasting techniques borrowed from econometrics. Systems employing the method detect and subsequently forecast cyclic variations in load, estimate the impact on future performance, and use these data to self-tune, dynamically, in anticipation of need. The paper describes a prototype network-attached storage system that was built using Clockwork, demonstrating the feasibility of the method, and presents key performance measurements of the prototype, demonstrating the practicality of the methods.


Lecture Notes in Computer Science | 2000

Sherlock: Commercial High Assurance Network Computing Extended Abstract

Stephen Paul Morgan; Stephen W. Neal; Melissa A. Hartman; Matthew R. Laue

IBM Research and the U.S. Department of Defense teamed to determine if governmental high assurance practices could be applied to commercially available network computers. The focus of the project was on using the thin client computing architecture to connect to trusted information domains of different classification levels at different times. Importantly, the information from a given classified domain must not migrate from its domain. Achieving this goal requires state clearing, and encrypting and authenticating all transferred data between the thin client and the trusted domain.


Archive | 1989

Maintenance of file attributes in a distributed data processing system

Donavon William Johnson; Stephen Paul Morgan; Todd Allen Smith


Archive | 2001

Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same

Stephen Paul Morgan; Lance Warren Russell; Benjamin Reed


Archive | 1990

Data processing method to create virtual disks from non-contiguous groups of logically contiguous addressable blocks of direct access storage device

Marc A. Auslander; Albert Chang; Stephen Paul Morgan; T. O'Quin Ii John; John C. O'Quin


Archive | 1989

System and method for implementing operating system message queues with recoverable shared virtual storage

Marion Lee Blount; Stephen Paul Morgan; Katalin Anna Rader; Robert Kent Rader; Shaheen-Gouda


Archive | 1992

File lock management in a distributed data processing system

Larry William Henson; Donavon William Johnson; Stephen Paul Morgan; Todd Allen Smith


Archive | 1992

File extension by clients in a distributed data processing system

Stephen Paul Morgan; Todd Allen Smith


Archive | 1992

Intermachine communication services

Marion Lee Blount; Stephen Paul Morgan; Katalin Anna Rader; Robert Kent Rader; Amal Ahmed Shaheen-Gouda


Archive | 1989

SYSTEM AND METHOD FOR CONTROLLING CLIENT MACHINE ACCESS TO A PORTION OF A FILE WITH A VARIABLE LENGTH

Donavon William Johnson; Stephen Paul Morgan; Todd Allen Smith

Researchain Logo
Decentralizing Knowledge