Pervasive games are an emerging form of distributed real-time application that extend computer gaming out into the real world. From the city streets to the remote wilderness, players with mobile computing devices move...
详细信息
ISBN:
(纸本)0769526977
Pervasive games are an emerging form of distributed real-time application that extend computer gaming out into the real world. From the city streets to the remote wilderness, players with mobile computing devices move through the world, sensors capture information about their current context, including their location, and this is used to deliver a gaming experience that adapts to where they are, what they are doing, and even how they are feeling. Players becomes unchained from their consoles and experience a game that is interwoven withthereal world and that is potentially available at any place and any time. Pervasive Games raise significant new challenges for the designers of distributed real-time applications, many of which arise from the distinctive characteristics of the underlying fabric of sensing and wireless communications technologies that constitute the ubiquitous computing infrastructure. Drawing on a series of recent collaborations with artists to develop, tour and study pervasive games, I will articulate these distinctive design challenges, exploring issues such as support for location-based play, revealing the nature of the ubiquitous infrastructure to designers, and adapting long-term persistent games with patterns of daily life.
High-performance applications place great demands on computation and communication resources of distributedcomputing platforms. If the availability of resources changes dynamically, the application performance may su...
详细信息
ISBN:
(纸本)3540290672
High-performance applications place great demands on computation and communication resources of distributedcomputing platforms. If the availability of resources changes dynamically, the application performance may suffer., which is especially true for clusters. thus, it is desirable to make an application aware of system run-time changes and to adapt it dynamically to the new conditions. We show how this may be done using a helper tool (middleware NICAN). In our experiments, NICAN implements a packet probing technique to detect contention on cluster nodes while a distributed iterative linear system solver from the pARMS package is executing. Adapting the solver to the discovered network conditions may result in faster iterative convergence.
Multi-core processors can easily provide benefits for multithreaded workloads, but many applications written for uniprocessors cannot automatically benefit from chip multiprocessors (CMP) designs. this paper presents ...
详细信息
ISBN:
(纸本)9780769527369
Multi-core processors can easily provide benefits for multithreaded workloads, but many applications written for uniprocessors cannot automatically benefit from chip multiprocessors (CMP) designs. this paper presents a reverse compilation framework, which translates existing binary code without source code to the Static Single Assignment (SSA) form, and then the internal SSA form is applied by the compilation phase to generate the Speculative parallelthreading (SPT) code. A profiler is applied to optimize the code dynamically during execution. the evaluation results show that these existing binary codes without source codes execute on CMP with performance improved, due to taking advantage of the speculative parallelthreading support provided by the processor.
the secure interaction between two or more administrative domains is a major concern. IRBAC2000 is a model that quickly establishes a flexible policy for dynamic role translation from foreign domains to local. A-IRBAC...
详细信息
ISBN:
(纸本)9780769527369
the secure interaction between two or more administrative domains is a major concern. IRBAC2000 is a model that quickly establishes a flexible policy for dynamic role translation from foreign domains to local. A-IRBAC2000 mode utilizes RBAC to manage dynamic role translation between foreign and local domains. We will see that these mechanisms have significant shortcomings. We propose an improved Administrative Usage Control model named A UCON to overcome the weakness of previous models. A UCONprovides administrates user-role assignment for local and foreign domain with unified method. It provides flexible enough mechanism to distinguish users of foreign and local domain and can enforce more strict control for foreign user. While retaining the advantage of traditional RBAC model, AUCON model is being implemented in experiment system.
We present a translation of a generic stochastic process algebra model into a form suitable for stochastic simulation. By systematically generating rate equations from a process description, we can use tools developed...
详细信息
this paper presents an overview of our ongoing project KAP, which aims to build a message-passing parallelizing compiler for distributed-memory machines. In this paper an improved automatic code generation algorithm i...
详细信息
ISBN:
(纸本)9780769527369
this paper presents an overview of our ongoing project KAP, which aims to build a message-passing parallelizing compiler for distributed-memory machines. In this paper an improved automatic code generation algorithm is discussed Our algorithm uses the data and computation decomposition, and the reading and writing access functions to create the communication code. We can not only solve the problems which the conventional algorithm can do but also can solve another kind of problem. In such cases: there is no data dependence and the read access is not aligned in the loop nest, or the exact data-flow analysis is not given because of the limitation of the algorithm of LWT the conventional algorithm can not create communication code correctly while our improved algorithm can resolve this problem. Experiments prove that the novel algorithm can achieve satisfactory effect.
this paper presented a parallel local search algorithm for the Steiner tree problem. the main contribution of this work is the O(n2 log 2 n + log n log(n/log n)) parallel local search algorithm for computing Steiner t...
详细信息
Withthe scale expanding, node failures become one of the important obstacles when using large-scale cluster systems. the traditional scheduling policies of cluster only took into account the factors such as jobs prio...
详细信息
this Work proposes to extend the Java APIs for Bluetooth (JSR82) in order to provide the Location API (JSR179) with a Source of indoor-location information. the proposed extension relies on a specific indoor positioni...
详细信息
ISBN:
(纸本)3540290672
this Work proposes to extend the Java APIs for Bluetooth (JSR82) in order to provide the Location API (JSR179) with a Source of indoor-location information. the proposed extension relies on a specific indoor positioning technique to track current location. the adopted technique uses the Received Signal Strength Indicator (RSSI) as a good room-fingerprint. We evaluate the effectiveness of the approach by examining preliminary experimental results obtained from our first system prototype.
To achieve data intensive computation, the joining of geographically distributed heterogeneous clusters of workstations through the Internet call be an inexpensive approach. To obtain effective collaboration in such a...
详细信息
ISBN:
(纸本)3540290672
To achieve data intensive computation, the joining of geographically distributed heterogeneous clusters of workstations through the Internet call be an inexpensive approach. To obtain effective collaboration in such a collection of clusters, overcoming processors and networks heterogeneity, a system architecture was defined. this architecture and a model able to predict application performance and to help its design is described. the matrix multiplication algorithm is used as a benchmark and experiments are conducted over two geographically distributed heterogeneous clusters, one in Brazil and the other in Spain. the model obtained over 90% prediction accuracy in the experiments.
暂无评论