the proceedings contain 65 papers. the topics discussed include: ADIAN: a distributedintelligent ad-hoc network;a mobility tolerant cluster management protocol with dynamic surrogate cluster-heads for a large ad hoc ...
ISBN:
(纸本)9783540681397
the proceedings contain 65 papers. the topics discussed include: ADIAN: a distributedintelligent ad-hoc network;a mobility tolerant cluster management protocol with dynamic surrogate cluster-heads for a large ad hoc network;prediction based QoS routing in MANETs;MCDS based multicasting in mobile adhoc networks;an efficient non-intrusive checkpointing algorithm for distributed database systems;adaptive connected dominating set - an exercise in distributed output switching;an efficient and scalable checkpointing and recovery algorithm for distributed systems;the price of defense and fractional matchings;proving optimality of DWS (distance-weighted sampling) probability function for FMS IP trace-back technique;a mechanism for detection and prevention of distributed denial of service attacks;and auction based resource allocation in grids;and MLBLM: a multi-level load balancing mechanism in agent-based grid.
the proceeding contains 138 papers. the topics discussed include: future trends of software technology and applications;accomplishments and challenges of protein ontology;granular computing, computer security and Web ...
详细信息
ISBN:
(纸本)0769526551
the proceeding contains 138 papers. the topics discussed include: future trends of software technology and applications;accomplishments and challenges of protein ontology;granular computing, computer security and Web intelligence;data structure and algorithm in data mining: granular computing view;COMPSAC panel session on trustworthy computing;reliability and fault tolerance in trust;just enough requirements traceability;software engineering education in the new millennium;an academic perspective on globalization in the software industry;location updates in cellular networks using bloom filters;distributed processes on tree hash;trading integrity for availability by means of explicit runtime constraints;performance analysis of an asynchronous Web server;choosing the right time to compose aspectual scenarios;intelligent classification and retrieval of software components;and traceability between architecture models.
the proceeding contains 138 papers. the topics discussed include: future trends of software technology and applications;accomplishments and challenges of protein ontology;granular computing, computer security and Web ...
详细信息
ISBN:
(纸本)0769526551
the proceeding contains 138 papers. the topics discussed include: future trends of software technology and applications;accomplishments and challenges of protein ontology;granular computing, computer security and Web intelligence;data structure and algorithm in data mining: granular computing view;COMPSAC panel session on trustworthy computing;reliability and fault tolerance in trust;just enough requirements traceability;software engineering education in the new millennium;an academic perspective on globalization in the software industry;location updates in cellular networks using bloom filters;distributed processes on tree hash;trading integrity for availability by means of explicit runtime constraints;performance analysis of an asynchronous Web server;choosing the right time to compose aspectual scenarios;intelligent classification and retrieval of software components;and traceability between architecture models.
this paper applies a well-developed algorithm in real-time computing to a networked real-time system, and model the system as a periodic real-time computing one. In this model, each process is named as a task and impl...
详细信息
ISBN:
(纸本)9781586036157
this paper applies a well-developed algorithm in real-time computing to a networked real-time system, and model the system as a periodic real-time computing one. In this model, each process is named as a task and implemented in two versions: the primary and the alternate. the primaries might fail but the alternates are guaranteed. A scheduling algorithm manages to execute all primaries if possible. Otherwise it guarantees the executing of each task either the primary or the alternate before their deadlines. the algorithm is verified in simulation. the result shows that in cases with high failure probability, the low priority tasks have a lower completion rates. In cases with low failure probability, both high priority and low priority tasks can be completed very well.
Now these days, much research has been carried out on context-aware computingthat is an important field in the area of ubiquitous computing, which offers a pervasive vision to implement a smart system by connecting c...
详细信息
Mobile Ad-hoc Networks are networks that have a dynamic topology without any fixed infrastructure. To transmit information in ad-hoc networks, we need robust protocols that can cope with constant changes in the networ...
详细信息
ISBN:
(纸本)9783540681397
Mobile Ad-hoc Networks are networks that have a dynamic topology without any fixed infrastructure. To transmit information in ad-hoc networks, we need robust protocols that can cope with constant changes in the network topology. the known routing protocols for mobile ad-hoc networks can be classified in two major categories: proactive routing protocols and reactive routing protocols. Proactive routing protocols keep the routes up-to-date to reduce delay in real-time applications but they have high control overhead. the control overhead in reactive routing protocols is much less than proactive routing protocols;however, the routes are discovered on demand, which is not suitable for real-time applications. In this paper, we have introduced a new routing system for mobile ad-hoc networks called ADIAN, which is based on the concepts of distributed Artificial Intelligence (DAI). In ADIAN, every node acts as an independent and autonomous agent that collaborates with other agents in the system. Our experimental results have verified the efficiency and robustness of ADIAN under dynamic conditions of adhoc networks.
distributed content-based publish/subscribe systems are usually implemented by a set of brokers forming an overlay network. Most existing publish/subscribe middleware assumes that the overlay topology is static. those...
详细信息
Pervasive human-centric computing, the emerging next-generation computing, focuses on humans rather than machines. Pervasive computing's goal of "all the time, everywhere" access replaces today's mob...
详细信息
the following topics are dealt with: database and expert systems applications; network-based information systems; self-adaptable and autonomic computing systems; knowledge management; biological data management; biolo...
the following topics are dealt with: database and expert systems applications; network-based information systems; self-adaptable and autonomic computing systems; knowledge management; biological data management; biological data management; grid and peer-to-peer computing impacts on large scale heterogeneous distributed database systems; Web based collaboration; Web semantics; high availability of distributed systems; flexible database and information system technology; XML data management tools and techniques; logical aspects and applications of integrity constraints; philosophies and methodologies for knowledge discovery, deployment, and development of decision support systems; data management in global data repositories; and P2P data management, security and trust
In this paper, we present the Gesture Cube, a digitally augmented cube for human-computer interaction. the Gesture Cube is designed to be an unobtrusive and playful interaction device for controlling media appliances....
详细信息
暂无评论