this paper proposes a novel framework of shared protection, namely Group Shared Protection (GSP), in mesh Wavelength Division Multiplexing (WDM) networks with dynamically arrived connection requests. Based on the (M:N...
详细信息
ISBN:
(纸本)0780383435
this paper proposes a novel framework of shared protection, namely Group Shared Protection (GSP), in mesh Wavelength Division Multiplexing (WDM) networks with dynamically arrived connection requests. Based on the (M:N)^ control architecture, GSP has n mutually independent protection groups, each of which containing N link-disjoint working paths protected by M protection paths. Based on this framework, an Integer Linear programming (ILP) formulation that can optimally reconfigure the spare capacity for a specific protection group whenever a working-protection path-pair joins is proposed. Two heuristics namely link-shared (LSP) and ring-shared protection (RSP) are introduced for further compromising the performance and the computation complexity. the proposed schemes are compared with a reported one, namely Successive Survivable Routing (SSR). We conclude that GSP provides a scalable and efficient solution for dynamic spare capacity reconfiguration following the (M:N)n control architecture.
the increasing ubiquity of communicating mobile devices and vastly different mobile application needs have led to middleware models for ad hoc networks that simplify application programming. One such system, EgoSpaces...
详细信息
the paper proposes a novel framework of shared protection, namely group shared protection (GSP), in mesh wavelength division multiplexing (WDM) networks with dynamically arriving connection requests. Based on the (M:N...
详细信息
the paper proposes a novel framework of shared protection, namely group shared protection (GSP), in mesh wavelength division multiplexing (WDM) networks with dynamically arriving connection requests. Based on the (M:N)/sup n/ control architecture, GSP has n mutually independent protection groups, each of which contain N link-disjoint working paths protected by M protection paths. Based on this framework, an integer linear programming (ILP) formulation is proposed; it can optimally reconfigure the spare capacity for a specific protection group whenever a working-protection path-pair joins. Two heuristics, namely link-shared protection (LSP) and ring-shared protection (RSP), are introduced for further compromising the performance and the computational complexity. the proposed schemes are compared with a reported one, namely successive survivable routing (SSR). We conclude that GSP provides a scalable and efficient solution for dynamic spare capacity reconfiguration following the (M:N)/sup n/ control architecture.
the proceedings contain 27 papers. the special focus in this conference is on Software components, Mobile computing, Aspect and object-oriented programming, Distributed and web applications, Software measurements, For...
ISBN:
(纸本)3540008993
the proceedings contain 27 papers. the special focus in this conference is on Software components, Mobile computing, Aspect and object-oriented programming, Distributed and web applications, Software measurements, Formal verification, Analysis and testing and Model integrations and extensions. the topics include: An ontology for software component matching;a description language for composable components;a logical basis for the specification of reconfigurable component-based systems;an overall system design approach doing object-oriented modeling to code-generation for embedded electronic systems;composing specifications of event based applications;a Spatio-Temporal logic for the specification and refinement of mobile systems;spatial security policies for mobile agents in a sentient computing environment;towards UML-based formal specifications of component-based real-time software;modelling recursive calls with UML state diagrams;model-based development of web applications using graphical reaction rules;modular analysis of dataflow process networks;foundations of a weak measurement-theoretic approach to software measurement;an information-based view of representational coupling in object-oriented systems;a temporal approach to specification and verification of pointer data-structures;a program logic for handling java card’s transaction mechanism;automatic model driven animation of SCR specifications;probe mechanism for object-oriented software testing;integration of formal datatypes within state diagrams;towards a natural interoperability between XML and ER diagrams;detecting implied scenarios analyzing non-local branching choices and capturing overlapping, triggered, and preemptive collaborations using MSCs.
the proceedings contain 19 papers. the special focus in this conference is on Models, Logic and Verification. the topics include: Towards object-oriented graphs and grammars;rewriting based model for probabilistic dis...
ISBN:
(纸本)3540204911
the proceedings contain 19 papers. the special focus in this conference is on Models, Logic and Verification. the topics include: Towards object-oriented graphs and grammars;rewriting based model for probabilistic distributed object systems;engineeringthe sdl formal language definition;a syntax-directed hoare logic for object-oriented programming concepts;inheritance of temporal logic properties;temporal logic based static analysis for non-uniform behaviours;operational semantics and type system;a calculus for long-running transactions;formal analysis of some timed security properties in wireless protocols;inductive proof outlines for monitors in java;managing the evolution of .NET programs;on mobility extensions of UML statecharts;new operators for the turtle real-time UML profile;checking consistency in UML diagrams;compositional verification using CADP of the scalagent deployment protocol for software components;verification of distributed object-based systems and design and verification of distributed multi-media systems.
the proceedings contain 27 papers. the special focus in this conference is on Distributed applications and interoperable systems. the topics include: Towards a framework for self-adaptive component-based applications;...
ISBN:
(纸本)3540205292
the proceedings contain 27 papers. the special focus in this conference is on Distributed applications and interoperable systems. the topics include: Towards a framework for self-adaptive component-based applications;a scheme for the introduction of 3rd party, application-specific adaptation features in mobile service provision;towards a composition framework for non-orthogonal non-functional properties;meta-programming middleware for distributed object computing;middleware support for resource-constrained software deployment;rational server selection for mobile agents;facilitating the portability of user applications in grid environments;negotiation as a generic component coordination primitive;a flexible framework for making components transactional;a security architectural approach for risk assessment using multi-agent systems engineering;middleware support for non-repudiable transactional information sharing between enterprises;adaptable access control policies for medical information systems;a flexible mechanism for optimized component attribute caching;a variable cache consistency protocol for mobile systems using time locks;building applications which make progress in an inconsistent world;hand-over video cache policy for mobile users;planning for network-aware paths;integrating the unreliable multicast Inter-ORB protocol in mjaco;a system of relay and translation gateways for communication among heterogeneous agents in ad hoc wireless environments;scalable location management for context-aware systems and a context ontology language to enable contextual interoperability.
A Sentient Computing environment is one in which the system is able to perceive the state of the physical world and use this information to customise its behaviour. Mobile agents are a promising new programming method...
详细信息
A super-resolution frequency estimator for the sinusoidal signals with unknown lowpass envelope is proposed, based on the eigenanalysis and quadratic programming. Here only a single snapshot is required to achieve the...
详细信息
In real-time programming a timeout mechanism allows exceptional behaviour, such as a lack of response, to be handled effectively, while not overly affecting the programming for the normal case. For example, in a pump ...
详细信息
this report summarizes the contributions and debates of the 6thinternational ECOOP Workshop on Quantitative Approaches in Object-Oriented Software engineering (QAOOSE 2002), which was held in Malaga on 11 June, 2002....
详细信息
暂无评论