Computer graphics has be successfully applied to architecture design. There is more demand to new applications. One of them, to be addressed in this work, is the code checking and visualization of the checking results.
ISBN:
(纸本)9780780387881
Computer graphics has be successfully applied to architecture design. There is more demand to new applications. One of them, to be addressed in this work, is the code checking and visualization of the checking results.
A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category, however, use single route and do not utilize multi...
详细信息
ISBN:
(纸本)088986411X
A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category, however, use single route and do not utilize multiple alternate paths. This paper proposes a scheme to improve existing on-demand routing protocols by introducing the power aware virtual node scheme in whole scenario. The scheme establishes the multi paths without transmitting any extra control message. It offers quick adaptation to distributed processing, dynamic linking, low processing and memory overhead and loop freedom at all times. It also uses the concept of Power awareness among route selection nodes and concept of Virtual Nodes which insures fast selection of routes with minimal efforts and faster recovery. The scheme is applied to the Ad-hoc On-Demand Distance Vector (AODV) protocol and the performance has been studied through simulation.
Contents distribution network technologies have been regarded to solution for coverage of exponentially increasing web clients. We addressed placement algorithm of replicas, in which web contents are replicated, in th...
详细信息
ISBN:
(纸本)1932415262
Contents distribution network technologies have been regarded to solution for coverage of exponentially increasing web clients. We addressed placement algorithm of replicas, in which web contents are replicated, in these technologies. We determined upper bound cost of delay and traffic to locate web replicas at proper position. With the value, we proposed a placement algorithm through dynamic programming scheme. As a result of analysis, our algorithm has O((n-dh)·/chvi/) time complexity that is less than O(n2). Besides, we verified our algorithm to guarantee the reliable services to clients even in situations in which delay and traffic change dynamically as showing numerical example applied to value similar to real one.
This paper presents an enhanced cell visiting probability (CVP) estimation technique by integrating both mobility parameters such as position, direction, and speed together with exponential call duration probability o...
详细信息
This paper presents an enhanced cell visiting probability (CVP) estimation technique by integrating both mobility parameters such as position, direction, and speed together with exponential call duration probability of mobile units. These improved CVP estimates can be used in both adaptive and nonadaptive mobile networks to enhance QoS parameters. This paper also presents a new shadow-clustering scheme based on these enhanced CVPs, which is then applied to the call admission control scheme similar to the one, called predictive mobility support QoS provisioning scheme, proposed by Aljadhai and Znati (2001). Simulation results confirm that this new shadow-clustering scheme outperforms predictive mobility support QoS provisioning scheme in terms of different QoS parameters under various different traffic conditions.
This investigation proposed a workflow framework for composing pervasive learning objects. The grid services flow language was adopted to describe the workflow for composing pervasive learning objects distributed in h...
详细信息
This investigation proposed a workflow framework for composing pervasive learning objects. The grid services flow language was adopted to describe the workflow for composing pervasive learning objects distributed in heterogeneous environments. The framework was applied to the pervasive learning grid to enable effective collaboration and reuse of the learning objects. Experimental results showed that different LO services not only interacted themselves, but the service lifecycle was also good.
Register files are becoming a power-hungry component in future embedded microprocessors, as a lot of power reduction techniques are applied, especially on caches, which are currently the most power-hungry component. A...
详细信息
Register files are becoming a power-hungry component in future embedded microprocessors, as a lot of power reduction techniques are applied, especially on caches, which are currently the most power-hungry component. As higher performance is required for coming smart embedded systems, out-of-order execution, which requires a large number of registers, are adopted in embedded processors. In addition, deep submicron semiconductor technology leads to larger leakage current. All these situations combine to increase leakage energy consumed by registers in embedded processors. We propose a solution for this problem. By exploiting the characteristics of register renaming and the benefit from CMOS circuit techniques with sleep mode, we achieve leakage energy reduction of up to 53.6%.
A combined molecular beam epitaxy (MBE) / chemical vapor deposition (CVD) processing sequence for the fabrication of vertical fully-depleted and partially-depleted "silicon-on-nothing" metal-oxide-semiconduc...
详细信息
A combined molecular beam epitaxy (MBE) / chemical vapor deposition (CVD) processing sequence for the fabrication of vertical fully-depleted and partially-depleted "silicon-on-nothing" metal-oxide-semiconductor (MOS) devices is introduced. The key idea is that the transistor channel length as well as depletion width are determined by means of well defined epitaxial deposition in the sub-30nm regime. To obtain the "silicon-on-nothing" (SON) transistor channel a sacrificial layer made from Si1-xGe x and the selective wet-chemical removal of this layer is used. In a first step, this sacrificial layer, grown under biaxial compression by means of MBE, is used for physical channel length definition and to introduce uniaxial strain to the intrinsic silicon channel, grown afterwards by means of CVD. The thickness of the intrinsic Si layer defines the channel depletion width. In a final step the sacrificial Si1-xGex is selectively removed, and the uniaxial strained silicon channel, connecting source and drain, remains free standing.
Summary form only given. Cellular automata (CA) are an abstract model of fine-grain parallelism: the individual node update operations are rather simple, and therefore comparable to the basic operations of the compute...
详细信息
Summary form only given. Cellular automata (CA) are an abstract model of fine-grain parallelism: the individual node update operations are rather simple, and therefore comparable to the basic operations of the computer hardware, yet the power of the model stems from the interaction and synergy of these simple local node computations that can often generate highly complex global behavior. In classical CA, all the nodes execute their operations in parallel, that is, (logically) simultaneously. We consider herein the sequential version of CA, or SCA, and compare and contrast SCA with the classical, parallel CA. We show that there are 1D CA with simple nonlinear node state update rules that cannot be simulated by any comparable SCA, irrespective of the node update ordering. While the result is trivial if one considers a single automaton's computations, we find this property quite interesting and having important implications when applied to all possible computations of entire nontrivial classes of CA (SCA). We also share some thoughts on how to extend the results herein, and, in particular, we try to motivate the study of genuinely asynchronous cellular automata.
Recently, content distribution services over a network have been expanded to a mobile environment. However, as the volume of data increases and higher quality of services is demanded, a throughput restriction over wir...
详细信息
ISBN:
(纸本)0889864500
Recently, content distribution services over a network have been expanded to a mobile environment. However, as the volume of data increases and higher quality of services is demanded, a throughput restriction over wireless communications has become a bottleneck. In order to compensate the low bit-rate cellular line, a peer-to-peer (P2P) connection over a mobile ad hoc network is applied. High throughput communications are available on the ad hoc network using broadband wireless LAN. In order to realize a content distribution service on the mobile ad hoc network, a user authentication mechanism is;indispensable. Because a server for user authentication is not always available on the ad hoc network, an idea of multistage classified groups based on a temporary identification is proposed. Moreover, since the ad hoc network is, not always connected, a high-functional client that redistributes content is introduced for realization of the content distribution service. The proposed ideas are implemented on an experimental system using JXTA, an all-purpose P2P platform. According to the result of experiments, the user authentication cation and content distribution mechanisms work well on the P2P connection over the mobile ad hoc network.
暂无评论