Every activity has some Risk involved in it. Analyzing the Risk involved in a transaction is important to decide whether to proceed with the transaction or not. Similarly in Peer-to-Peer communication analyzing the Ri...
详细信息
sensor-based services propose to gather, manage, analyze, access and react to sensor data. These services are distributed over heterogeneous platforms. The complexity of the implementation of such services requires so...
详细信息
ISBN:
(纸本)1595932682
sensor-based services propose to gather, manage, analyze, access and react to sensor data. These services are distributed over heterogeneous platforms. The complexity of the implementation of such services requires software engineering tools to relieve the architect and the developer who are often business experts and not technologies experts. Our proposal relates to the definition of a component model dedicated to the development of SBS, called sensor Bean. sensor Bean differs from the usual components models by its service orientation and dynamic architecture and the introduction of data-centric connectors well adapted to measurement flows. This proposal is validated by a prototype coupling OSGi and J2EE and by a first component container for OSGi gateways. Copyright 2005 ACM.
The use of middleware eases the development of distributed applications by abstracting the intricacies (communication and coordination among software components) of the distributed network environment. In wireless sen...
详细信息
In this paper, a novel hierarchical packet scheduling model for ieee 802.16 uplink is proposed based on J. Bennett & H. Zhang scheduling model [1]. The soft-QoS traffics introduced in this new model together with ...
详细信息
ISBN:
(纸本)3540281029
In this paper, a novel hierarchical packet scheduling model for ieee 802.16 uplink is proposed based on J. Bennett & H. Zhang scheduling model [1]. The soft-QoS traffics introduced in this new model together with hard-QoS and best-effort traffics are scheduled by the Base Station (BS). The model can distribute bandwidth reasonably between the QoS and the best-effort traffics. It also guarantees-the validness and fairness among the QoS traffics. We give the analytical delay comparison between two models and evaluate the performance by simulations.
There is a critical need for new thinking regarding over- load traffic management in sensor networks. It has now become clear that experimental sensor networks (e.g., mote networks) and their applications commonly exp...
详细信息
ISBN:
(纸本)159593054X
There is a critical need for new thinking regarding over- load traffic management in sensor networks. It has now become clear that experimental sensor networks (e.g., mote networks) and their applications commonly experience periods of persistent congestion and high packet loss, and in some cases even congestion collapse. This significantly impacts application fidelity measured at the physical sinks, even under light to moderate traffic loads, and is a direct product of the funneling effect;that is, the many-to-one multi-hop traffic pattern that characterizes sensor network communications. Existing congestion control schemes are effective at mitigating congestion through rate control and packet drop mechanisms, but do so at the cost of significantly reducing application fidelity measured at the sinks. To address this problem we propose to exploit the avail- Ability of a small number of all wireless, multi-radio virtual sinks that can be randomly distributed or selectively placed across the sensor field. Virtual sinks are capable of siphoning off data events from regions of the sensor field that are beginning to show signs of high traffic load. In this paper, we present the design, implementation, and evaluation of Siphon, a set of fully distributed algorithms that support virtual sink discovery and selection, congestion detection, and traffic redirection in sensor networks. Siphon is based on a Stargate implementation of virtual sinks that uses a separate longer-range radio network (based on ieee 802.11) to siphon events to one or more physical sinks, and a short- range mote radio to interact with the sensor field at siphon points. Results from analysis, simulation and an experimental 48 Mica2 mote testbed show that virtual sinks can scale mote networks by effectively managing growing traffic de- mands while minimizing the impact on application fidelity. Categories and Subject Descriptors: C.2.1 [Computer- Communications Networks]: Network Protocols, Wireless Commun
A scalable wallet-size cluster computing system has been proposed to obtain low cost, low power consumption and small sized digital home processing center. In this paper, we apply the wallet-size cluster for H.264 enc...
详细信息
Peer-to-Peer (P2P) file-sharing has become the killer application in the Internet with respect to traffic volume which is even surpassing web usage. This characteristic makes P2P commercially attractive to network ope...
详细信息
ISBN:
(纸本)0769523005
Peer-to-Peer (P2P) file-sharing has become the killer application in the Internet with respect to traffic volume which is even surpassing web usage. This characteristic makes P2P commercially attractive to network operators interested in increased traffic. In parallel, the demand for wireless services has caused wireless networks to grow enormously. We assume that P2P file-sharing will be mapped onto mobile environments by its users. This results in a mobile P2P file-sharing service. In this paper, we examine the feasibility of the eDonkey file-sharing service in GPRS and UMTS mobile networks, detect problems of the interaction between P2P and the mobile network, and outline first solutions to overcome them. The goal is the analysis of feasibility for an Internet-based file-sharing application in mobile networks and to provide real-world measurements. The measurements have been carried out in networks of two German GPRS network operators and, for the first time, for a UMTS network.
The proceedings contain 44 papers. The topics discussed include: specifying urgency in timed I/O automata;putting detectors in their place;precise analysis of memory consumption using program logics;timed automata wit...
ISBN:
(纸本)0769524354
The proceedings contain 44 papers. The topics discussed include: specifying urgency in timed I/O automata;putting detectors in their place;precise analysis of memory consumption using program logics;timed automata with data structures for distributedsystems design and analysis;operational semantics for real-time processes with action refinement;using dominators to extract observable protocol contexts;experimental evaluation of FSM-based testing methods;counting interface automata and their application in static analysis of actor models;workflow enactment based on a chemical metaphor;generating relational database transactions from recursive functions defined on EB 3 traces;safe concurrency for aggregate objects with invariants;omnibus verification policies: a flexible, configurable approach to assertion-based software verification;customised induction rules for proving correctness of imperative programs;and object oriented verification kernels for secure Java applications.
This paper describes the design, implementation and evaluation of a search and rescue system called CenWits. CenWits uses several small, commonly-available RF-based sensors, and a small number of storage and processin...
详细信息
Globalization has led to increase in outsourcing of production activities, which in turn creates a new organization paradigm so called networked or virtual enterprises. This trend has created challenging opportunities...
详细信息
暂无评论