Scalable Join Patterns

Total Page:16

File Type:pdf, Size:1020Kb

Scalable Join Patterns Scalable Join Patterns Aaron Turon Claudio V. Russo Northeastern University Microsoft Research [email protected] [email protected] Abstract var j = Join.Create(); § ¤ Coordination can destroy scalability in parallel program- Synchronous.Channel[] hungry; ming. A comprehensive library of scalable synchroniza- Asynchronous.Channel[] chopstick; tion primitives is therefore an essential tool for exploiting j.Init(out hungry, n); j.Init(out chopstick, n); parallelism. Unfortunately, such primitives do not easily for(int i = 0; i < n; i++) { var left = chopstick[i]; combine to yield solutions to more complex problems. We var right = chopstick[(i+1) % n]; demonstrate that a concurrency library based on Fournet and j.When(hungry[i]).And(left).And(right).Do(() => { Gonthier’s join calculus can provide declarative and scalable eat(); left(); right();// replace chopsticks coordination. By declarative, we mean that the programmer }); needs only to write down the constraints of a coordination } problem, and the library will automatically derive a correct solution. By scalable, we mean that the derived solutions ¦ Figure 1. Dining Philosophers, declaratively ¥ deliver robust performance both as the number of proces- sors increases, and as the complexity of the coordination problem grows. We validate our claims empirically on seven The proliferation of specialized synchronization primi- coordination problems, comparing our generic solution to tives is therefore no surprise. For example, java.util.con- specialized algorithms from the literature. current [13] contains a rich collection of carefully engi- Categories and Subject Descriptors D.3.3 [Programming neered classes, including various kinds of locks, barriers, Languages]: Language Constructs and Features—Concurrent semaphores, count-down latches, condition variables, ex- programming structures changers and futures, together with nonblocking collections. Several of these classes led to research publications [14, 15, General Terms Algorithms, Languages, Performance 26, 28]. A JAVA programmer faced with a coordination prob- Keywords message passing, concurrency, parallelism lem covered by the library is therefore in great shape. Inevitably, though, programmers are faced with new 1. Introduction problems not directly addressed by the primitives. The prim- Parallel programming is the art of keeping many processors itives must be composed into a solution. Doing so correctly busy with real work. But except for embarrassingly-parallel and scalably can be as difficult as designing a new primitive. cases, solving a problem in parallel requires coordination be- Take the classic Dining Philosophers problem [3], in tween threads, which entails waiting. When coordination is which philosophers sitting around a table must coordinate unavoidable, it must be carried out in a way that minimizes their use of the chopstick sitting between each one; such both waiting time and interprocessor communication. Effec- competition over limited resources appears in many guises tive implementation strategies vary widely, depending on the in real systems. The problem has been thoroughly studied, coordination problem. Asking an application programmer to and there are solutions using primitives like semaphores that grapple with these concerns—without succumbing to con- perform reasonably well. There are also many natural “so- currency bugs—is a tall order. lutions” that do not perform well—or do not perform at all. Naive solutions may suffer from deadlock, if for example each philosopher picks up the chopstick to their left, and then finds the one to their right taken. Correct solutions may Permission to make digital or hard copies of all or part of this work for personal or scale poorly with the number of philosophers (threads). For classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation example, using a single global lock to coordinate philoso- on the first page. To copy otherwise, to republish, to post on servers or to redistribute phers is correct, but will force non-adjacent philosophers to to lists, requires prior specific permission and/or a fee. OOPSLA’11, October 22–27, 2011, Portland, Oregon, USA. take turns through the lock, adding unnecessarily sequential- Copyright © 2011 ACM 978-1-4503-0940-0/11/10. $10.00 ization. Avoiding these pitfalls takes experience and care. In this paper, we demonstrate that Fournet and Gonthier’s We present our algorithm incrementally, both through join calculus [4, 5] provides the basis for a declarative and diagrams and through working C] code (§3). scalable coordination library. By declarative, we mean that • We validate our scalability claims experimentally on the programmer needs only to write down the constraints for seven different coordination problems (§4). For each co- a coordination problem, and the library will automatically ordination problem we evaluate a joins-based implemen- derive a correct solution. By scalable, we mean that the tation running in both Russo’s lock-based library and our derived solutions deliver robust, competitive performance new fine-grained library. We compare these results to the both as the number of processors or cores increase, and as performance of direct, custom-built solutions. the complexity of the coordination problem grows. In all cases, our new library scales significantly better Figure 1 shows a solution to Dining Philosophers using than Russo’s. We scale competitively with—sometimes our library, which is a drop-in replacement for Russo’s C] better than—the custom-built solutions, though we suffer JOINS library [24]. The library uses the message-passing paradigmn of the join calculus. For Dining Philosophers, we from higher constant-time overheads in some cases. use two arrays of channels (hungry and chopstick) to carry • We state and sketch proofs for the key safety and liveness value-less messages; being empty, these messages represent properties characterizing our algorithm (§5). unadorned events. The declarative aspect of this example is Our goal is not to replace libraries like java.util.con- the join pattern starting with j.When. The declaration says current, but rather to complement them, by exposing some that when events are available on the channels hungry[i], of their insights in a way easily and safely useable by ap- left, and right, they may be simultaneously and atomically plication programmers. We discuss this point further, along consumed. When the pattern fires, the philosopher, having with related work in general, in the final section. obtained exclusive access to two chopsticks, eats and then returns the chopsticks. In neither the join pattern nor its 2. The JOINS library body is the order of the chopsticks important. The remaining details are explained in §2.1 Russo’s Joins [24] is a concurrency library derived from Most implementations of join patterns, including Russo’s, Fournet and Gonthier’s join calculus [4, 5], a process algebra use coarse-grained locks to achieve atomicity, resulting in similar to Milner’s π-calculus but conceived for efficient poor scalability (as we show experimentally in §4). Our con- implementation. In this section, we give an overview of the tribution is a new implementation of the join calculus that library API and illustrate it using examples drawn from the uses ideas from fine-grained concurrency to achieve scala- join calculus literature [2, 4, 5]. bility on par with custom-built synchronization primitives: The join calculus takes a message-passing approach to concurrency where messages are sent over channels and • We first recall how join patterns can be used to solve channels are themselves first-class values that can be sent as a wide range of coordination problems (§2), as is well- messages. What makes the calculus interesting is the way established in the literature [2, 4, 5]. The examples pro- messages are received. Programs do not actively request vide basic implementations of some of the java.util. to receive messages from a channel. Instead, they employ concurrent classes mentioned above.2 In each case, the join patterns (also called chords [2]) to declaratively specify JOINS-based solution is as straightforward to write as the reactions to message arrivals. The power of join patterns lies one for dining philosophers. in their ability to respond atomically to messages arriving simultaneously on several different channels. • To maximize scalability, we must allow concurrent, in- Suppose, for example, that we have two channels Put and dependent processing of messages, avoid centralized Get, used by producers and consumers of data. When a pro- contention, and spin or block intelligently. This must ducer and a consumer message are available, we would like be done, of course, while guaranteeing atomicity and to receive both simultaneously, and transfer the produced progress for join patterns. value to the consumer. Using Russo’s Joins API, we write: We meet these challenges by (1) using lock-free [9] data structures to store messages, (2) treating messages as class Buffer<T> { § public readonly Asynchronous.Channel<T> Put; ¤ resources that threads can race to take possession of, public readonly Synchronous<T>.Channel Get; (3) avoiding enqueuing messages when possible (“lazy” public Buffer() { queuing and specialized channel representations), and (4) Join j = Join.Create();// allocatea Join object allowing barging (“message stealing”). j.Init(out Put);// bind its
Recommended publications
  • Palmetto Tatters Guild Glossary of Tatting Terms (Not All Inclusive!)
    Palmetto Tatters Guild Glossary of Tatting Terms (not all inclusive!) Tat Days Written * or or To denote repeating lines of a pattern. Example: Rep directions or # or § from * 7 times & ( ) Eg. R: 5 + 5 – 5 – 5 (last P of prev R). Modern B Bead (Also see other bead notation below) notation BTS Bare Thread Space B or +B Put bead on picot before joining BBB B or BBB|B Three beads on knotting thread, and one bead on core thread Ch Chain ^ Construction picot or very small picot CTM Continuous Thread Method D Dimple: i.e. 1st Half Double Stitch X4, 2nd Half Double Stitch X4 dds or { } daisy double stitch DNRW DO NOT Reverse Work DS Double Stitch DP Down Picot: 2 of 1st HS, P, 2 of 2nd HS DPB Down Picot with a Bead: 2 of 1st HS, B, 2 of 2nd HS HMSR Half Moon Split Ring: Fold the second half of the Split Ring inward before closing so that the second side and first side arch in the same direction HR Half Ring: A ring which is only partially closed, so it looks like half of a ring 1st HS First Half of Double Stitch 2nd HS Second Half of Double Stitch JK Josephine Knot (Ring made of only the 1st Half of Double Stitch OR only the 2nd Half of Double Stitch) LJ or Sh+ or SLJ Lock Join or Shuttle join or Shuttle Lock Join LPPCh Last Picot of Previous Chain LPPR Last Picot of Previous Ring LS Lock Stitch: First Half of DS is NOT flipped, Second Half is flipped, as usual LCh Make a series of Lock Stitches to form a Lock Chain MP or FP Mock Picot or False Picot MR Maltese Ring Pearl Ch Chain made with pearl tatting technique (picots on both sides of the chain, made using three threads) P or - Picot Page 1 of 4 PLJ or ‘PULLED LOOP’ join or ‘PULLED LOCK’ join since it is actually a lock join made after placing thread under a finished ring and pulling this thread through a picot.
    [Show full text]
  • Functional Languages
    Functional Programming Languages (FPL) 1. Definitions................................................................... 2 2. Applications ................................................................ 2 3. Examples..................................................................... 3 4. FPL Characteristics:.................................................... 3 5. Lambda calculus (LC)................................................. 4 6. Functions in FPLs ....................................................... 7 7. Modern functional languages...................................... 9 8. Scheme overview...................................................... 11 8.1. Get your own Scheme from MIT...................... 11 8.2. General overview.............................................. 11 8.3. Data Typing ...................................................... 12 8.4. Comments ......................................................... 12 8.5. Recursion Instead of Iteration........................... 13 8.6. Evaluation ......................................................... 14 8.7. Storing and using Scheme code ........................ 14 8.8. Variables ........................................................... 15 8.9. Data types.......................................................... 16 8.10. Arithmetic functions ......................................... 17 8.11. Selection functions............................................ 18 8.12. Iteration............................................................. 23 8.13. Defining functions ...........................................
    [Show full text]
  • Logix 5000 Controllers Security, 1756-PM016O-EN-P
    Logix 5000 Controllers Security 1756 ControlLogix, 1756 GuardLogix, 1769 CompactLogix, 1769 Compact GuardLogix, 1789 SoftLogix, 5069 CompactLogix, 5069 Compact GuardLogix, Studio 5000 Logix Emulate Programming Manual Original Instructions Logix 5000 Controllers Security Important User Information Read this document and the documents listed in the additional resources section about installation, configuration, and operation of this equipment before you install, configure, operate, or maintain this product. Users are required to familiarize themselves with installation and wiring instructions in addition to requirements of all applicable codes, laws, and standards. Activities including installation, adjustments, putting into service, use, assembly, disassembly, and maintenance are required to be carried out by suitably trained personnel in accordance with applicable code of practice. If this equipment is used in a manner not specified by the manufacturer, the protection provided by the equipment may be impaired. In no event will Rockwell Automation, Inc. be responsible or liable for indirect or consequential damages resulting from the use or application of this equipment. The examples and diagrams in this manual are included solely for illustrative purposes. Because of the many variables and requirements associated with any particular installation, Rockwell Automation, Inc. cannot assume responsibility or liability for actual use based on the examples and diagrams. No patent liability is assumed by Rockwell Automation, Inc. with respect to use of information, circuits, equipment, or software described in this manual. Reproduction of the contents of this manual, in whole or in part, without written permission of Rockwell Automation, Inc., is prohibited. Throughout this manual, when necessary, we use notes to make you aware of safety considerations.
    [Show full text]
  • The Machine That Builds Itself: How the Strengths of Lisp Family
    Khomtchouk et al. OPINION NOTE The Machine that Builds Itself: How the Strengths of Lisp Family Languages Facilitate Building Complex and Flexible Bioinformatic Models Bohdan B. Khomtchouk1*, Edmund Weitz2 and Claes Wahlestedt1 *Correspondence: [email protected] Abstract 1Center for Therapeutic Innovation and Department of We address the need for expanding the presence of the Lisp family of Psychiatry and Behavioral programming languages in bioinformatics and computational biology research. Sciences, University of Miami Languages of this family, like Common Lisp, Scheme, or Clojure, facilitate the Miller School of Medicine, 1120 NW 14th ST, Miami, FL, USA creation of powerful and flexible software models that are required for complex 33136 and rapidly evolving domains like biology. We will point out several important key Full list of author information is features that distinguish languages of the Lisp family from other programming available at the end of the article languages and we will explain how these features can aid researchers in becoming more productive and creating better code. We will also show how these features make these languages ideal tools for artificial intelligence and machine learning applications. We will specifically stress the advantages of domain-specific languages (DSL): languages which are specialized to a particular area and thus not only facilitate easier research problem formulation, but also aid in the establishment of standards and best programming practices as applied to the specific research field at hand. DSLs are particularly easy to build in Common Lisp, the most comprehensive Lisp dialect, which is commonly referred to as the “programmable programming language.” We are convinced that Lisp grants programmers unprecedented power to build increasingly sophisticated artificial intelligence systems that may ultimately transform machine learning and AI research in bioinformatics and computational biology.
    [Show full text]
  • Functional Programming Laboratory 1 Programming Paradigms
    Intro 1 Functional Programming Laboratory C. Beeri 1 Programming Paradigms A programming paradigm is an approach to programming: what is a program, how are programs designed and written, and how are the goals of programs achieved by their execution. A paradigm is an idea in pure form; it is realized in a language by a set of constructs and by methodologies for using them. Languages sometimes combine several paradigms. The notion of paradigm provides a useful guide to understanding programming languages. The imperative paradigm underlies languages such as Pascal and C. The object-oriented paradigm is embodied in Smalltalk, C++ and Java. These are probably the paradigms known to the students taking this lab. We introduce functional programming by comparing it to them. 1.1 Imperative and object-oriented programming Imperative programming is based on a simple construct: A cell is a container of data, whose contents can be changed. A cell is an abstraction of a memory location. It can store data, such as integers or real numbers, or addresses of other cells. The abstraction hides the size bounds that apply to real memory, as well as the physical address space details. The variables of Pascal and C denote cells. The programming construct that allows to change the contents of a cell is assignment. In the imperative paradigm a program has, at each point of its execution, a state represented by a collection of cells and their contents. This state changes as the program executes; assignment statements change the contents of cells, other statements create and destroy cells. Yet others, such as conditional and loop statements allow the programmer to direct the control flow of the program.
    [Show full text]
  • Stclang: State Thread Composition As a Foundation for Monadic Dataflow Parallelism Sebastian Ertel∗ Justus Adam Norman A
    STCLang: State Thread Composition as a Foundation for Monadic Dataflow Parallelism Sebastian Ertel∗ Justus Adam Norman A. Rink Dresden Research Lab Chair for Compiler Construction Chair for Compiler Construction Huawei Technologies Technische Universität Dresden Technische Universität Dresden Dresden, Germany Dresden, Germany Dresden, Germany [email protected] [email protected] [email protected] Andrés Goens Jeronimo Castrillon Chair for Compiler Construction Chair for Compiler Construction Technische Universität Dresden Technische Universität Dresden Dresden, Germany Dresden, Germany [email protected] [email protected] Abstract using monad-par and LVars to expose parallelism explicitly Dataflow execution models are used to build highly scalable and reach the same level of performance, showing that our parallel systems. A programming model that targets parallel programming model successfully extracts parallelism that dataflow execution must answer the following question: How is present in an algorithm. Further evaluation shows that can parallelism between two dependent nodes in a dataflow smap is expressive enough to implement parallel reductions graph be exploited? This is difficult when the dataflow lan- and our programming model resolves short-comings of the guage or programming model is implemented by a monad, stream-based programming model for current state-of-the- as is common in the functional community, since express- art big data processing systems. ing dependence between nodes by a monadic bind suggests CCS Concepts • Software and its engineering → Func- sequential execution. Even in monadic constructs that explic- tional languages. itly separate state from computation, problems arise due to the need to reason about opaquely defined state.
    [Show full text]
  • Functional and Imperative Object-Oriented Programming in Theory and Practice
    Uppsala universitet Inst. för informatik och media Functional and Imperative Object-Oriented Programming in Theory and Practice A Study of Online Discussions in the Programming Community Per Jernlund & Martin Stenberg Kurs: Examensarbete Nivå: C Termin: VT-19 Datum: 14-06-2019 Abstract Functional programming (FP) has progressively become more prevalent and techniques from the FP paradigm has been implemented in many different Imperative object-oriented programming (OOP) languages. However, there is no indication that OOP is going out of style. Nevertheless the increased popularity in FP has sparked new discussions across the Internet between the FP and OOP communities regarding a multitude of related aspects. These discussions could provide insights into the questions and challenges faced by programmers today. This thesis investigates these online discussions in a small and contemporary scale in order to identify the most discussed aspect of FP and OOP. Once identified the statements and claims made by various discussion participants were selected and compared to literature relating to the aspects and the theory behind the paradigms in order to determine whether there was any discrepancies between practitioners and theory. It was done in order to investigate whether the practitioners had different ideas in the form of best practices that could influence theories. The most discussed aspect within FP and OOP was immutability and state relating primarily to the aspects of concurrency and performance. ​ ​ ​ ​ ​ ​ This thesis presents a selection of representative quotes that illustrate the different points of view held by groups in the community and then addresses those claims by investigating what is said in literature.
    [Show full text]
  • Multithreading Design Patterns and Thread-Safe Data Structures
    Lecture 12: Multithreading Design Patterns and Thread-Safe Data Structures Principles of Computer Systems Autumn 2019 Stanford University Computer Science Department Lecturer: Chris Gregg Philip Levis PDF of this presentation 1 Review from Last Week We now have three distinct ways to coordinate between threads: mutex: mutual exclusion (lock), used to enforce critical sections and atomicity condition_variable: way for threads to coordinate and signal when a variable has changed (integrates a lock for the variable) semaphore: a generalization of a lock, where there can be n threads operating in parallel (a lock is a semaphore with n=1) 2 Mutual Exclusion (mutex) A mutex is a simple lock that is shared between threads, used to protect critical regions of code or shared data structures. mutex m; mutex.lock() mutex.unlock() A mutex is often called a lock: the terms are mostly interchangeable When a thread attempts to lock a mutex: Currently unlocked: the thread takes the lock, and continues executing Currently locked: the thread blocks until the lock is released by the current lock- holder, at which point it attempts to take the lock again (and could compete with other waiting threads). Only the current lock-holder is allowed to unlock a mutex Deadlock can occur when threads form a circular wait on mutexes (e.g. dining philosophers) Places we've seen an operating system use mutexes for us: All file system operation (what if two programs try to write at the same time? create the same file?) Process table (what if two programs call fork() at the same time?) 3 lock_guard<mutex> The lock_guard<mutex> is very simple: it obtains the lock in its constructor, and releases the lock in its destructor.
    [Show full text]
  • Functional Javascript
    www.it-ebooks.info www.it-ebooks.info Functional JavaScript Michael Fogus www.it-ebooks.info Functional JavaScript by Michael Fogus Copyright © 2013 Michael Fogus. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://my.safaribooksonline.com). For more information, contact our corporate/ institutional sales department: 800-998-9938 or [email protected]. Editor: Mary Treseler Indexer: Judith McConville Production Editor: Melanie Yarbrough Cover Designer: Karen Montgomery Copyeditor: Jasmine Kwityn Interior Designer: David Futato Proofreader: Jilly Gagnon Illustrator: Robert Romano May 2013: First Edition Revision History for the First Edition: 2013-05-24: First release See http://oreilly.com/catalog/errata.csp?isbn=9781449360726 for release details. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. Functional JavaScript, the image of an eider duck, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc., was aware of a trade‐ mark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]
  • Deadlock: Why Does It Happen? CS 537 Andrea C
    UNIVERSITY of WISCONSIN-MADISON Computer Sciences Department Deadlock: Why does it happen? CS 537 Andrea C. Arpaci-Dusseau Introduction to Operating Systems Remzi H. Arpaci-Dusseau Informal: Every entity is waiting for resource held by another entity; none release until it gets what it is Deadlock waiting for Questions answered in this lecture: What are the four necessary conditions for deadlock? How can deadlock be prevented? How can deadlock be avoided? How can deadlock be detected and recovered from? Deadlock Example Deadlock Example Two threads access two shared variables, A and B int A, B; Variable A is protected by lock x, variable B by lock y lock_t x, y; How to add lock and unlock statements? Thread 1 Thread 2 int A, B; lock(x); lock(y); A += 10; B += 10; lock(y); lock(x); Thread 1 Thread 2 B += 20; A += 20; A += 10; B += 10; A += B; A += B; B += 20; A += 20; unlock(y); unlock(x); A += B; A += B; A += 30; B += 30; A += 30; B += 30; unlock(x); unlock(y); What can go wrong?? 1 Representing Deadlock Conditions for Deadlock Two common ways of representing deadlock Mutual exclusion • Vertices: • Resource can not be shared – Threads (or processes) in system – Resources (anything of value, including locks and semaphores) • Requests are delayed until resource is released • Edges: Indicate thread is waiting for the other Hold-and-wait Wait-For Graph Resource-Allocation Graph • Thread holds one resource while waits for another No preemption “waiting for” wants y held by • Resources are released voluntarily after completion T1 T2 T1 T2 Circular
    [Show full text]
  • The Dining Philosophers Problem Cache Memory
    The Dining Philosophers Problem Cache Memory 254 The dining philosophers problem: definition It is an artificial problem widely used to illustrate the problems linked to resource sharing in concurrent programming. The problem is usually described as follows. • A given number of philosopher are seated at a round table. • Each of the philosophers shares his time between two activities: thinking and eating. • To think, a philosopher does not need any resources; to eat he needs two pieces of silverware. 255 • However, the table is set in a very peculiar way: between every pair of adjacent plates, there is only one fork. • A philosopher being clumsy, he needs two forks to eat: the one on his right and the one on his left. • It is thus impossible for a philosopher to eat at the same time as one of his neighbors: the forks are a shared resource for which the philosophers are competing. • The problem is to organize access to these shared resources in such a way that everything proceeds smoothly. 256 The dining philosophers problem: illustration f4 P4 f0 P3 f3 P0 P2 P1 f1 f2 257 The dining philosophers problem: a first solution • This first solution uses a semaphore to model each fork. • Taking a fork is then done by executing a operation wait on the semaphore, which suspends the process if the fork is not available. • Freeing a fork is naturally done with a signal operation. 258 /* Definitions and global initializations */ #define N = ? /* number of philosophers */ semaphore fork[N]; /* semaphores modeling the forks */ int j; for (j=0, j < N, j++) fork[j]=1; Each philosopher (0 to N-1) corresponds to a process executing the following procedure, where i is the number of the philosopher.
    [Show full text]
  • APPLYING MODEL-VIEW-CONTROLLER (MVC) in DESIGN and DEVELOPMENT of INFORMATION SYSTEMS an Example of Smart Assistive Script Breakdown in an E-Business Application
    APPLYING MODEL-VIEW-CONTROLLER (MVC) IN DESIGN AND DEVELOPMENT OF INFORMATION SYSTEMS An Example of Smart Assistive Script Breakdown in an e-Business Application Andreas Holzinger, Karl Heinz Struggl Institute of Information Systems and Computer Media (IICM), TU Graz, Graz, Austria Matjaž Debevc Faculty of Electrical Engineering and Computer Science, University of Maribor, Maribor, Slovenia Keywords: Information Systems, Software Design Patterns, Model-view-controller (MVC), Script Breakdown, Film Production. Abstract: Information systems are supporting professionals in all areas of e-Business. In this paper we concentrate on our experiences in the design and development of information systems for the use in film production processes. Professionals working in this area are neither computer experts, nor interested in spending much time for information systems. Consequently, to provide a useful, useable and enjoyable application the system must be extremely suited to the requirements and demands of those professionals. One of the most important tasks at the beginning of a film production is to break down the movie script into its elements and aspects, and create a solid estimate of production costs based on the resulting breakdown data. Several film production software applications provide interfaces to support this task. However, most attempts suffer from numerous usability deficiencies. As a result, many film producers still use script printouts and textmarkers to highlight script elements, and transfer the data manually into their film management software. This paper presents a novel approach for unobtrusive and efficient script breakdown using a new way of breaking down text into its relevant elements. We demonstrate how the implementation of this interface benefits from employing the Model-View-Controller (MVC) as underlying software design paradigm in terms of both software development confidence and user satisfaction.
    [Show full text]