Opportunistic grids are a class of computational grids that can leverage the idle processing and storage capacity of shared workstations in laboratories, companies, and universities to perform useful computation. OppS...
详细信息
ISBN:
(纸本)9781605581668
Opportunistic grids are a class of computational grids that can leverage the idle processing and storage capacity of shared workstations in laboratories, companies, and universities to perform useful computation. OppStore is a middleware that allows using the free disk space of machines from an opportunistic grid for the distributed storage of application data. But when machines depart from the grid, it is necessary to reconstruct the fragments that were stored in that machines. Depending on the amount of stored data and the rate of machine departures, the generated traffic may make the distributed storage of data infeasible. In this work we present and evaluate a fragment recovery mechanism that makes viable to achieve redundancy and large data scale in a dynamic environment. Copyright 2009 acm.
This paper presents the MoMPt project, an open source project developed to allow access to multimedia content and to control multiple HTPCs remotely using mobile devices. The main contribution in the context of this p...
详细信息
ISBN:
(纸本)9781605581668
This paper presents the MoMPt project, an open source project developed to allow access to multimedia content and to control multiple HTPCs remotely using mobile devices. The main contribution in the context of this project is its reference design, which allows the access of HTPC functionalities using different technologies, such as UPnP and XML-RPC. In this paper the reference design as well as its main components are detailed. Also, we describe one developed solution for the MediaPortal HTPC. It is discussed how it was developed, and the evaluation scenario with mobile devices, more specifically an Internet Tablet. Copyright 2009 acm.
Computer science educators are uniquely positioned to promote greater awareness of Green computing, using the academic setting to encourage environmentally conscious use of technology. This paper reports on practical ...
详细信息
Semantic technologies promise to solve challenging problems of current enterprise information systems, e.g., the integration of heterogeneous information clients and the evaluation of complex data dependencies. As man...
详细信息
ISBN:
(纸本)9781605581668
Semantic technologies promise to solve challenging problems of current enterprise information systems, e.g., the integration of heterogeneous information clients and the evaluation of complex data dependencies. As many of these problems also apply to coordination applications, recent research initiatives have proposed to integrate coordination models with semantic technology. In this paper, we present such an integrated coordination model which combines logic-based reasoning with a reliable semantic subscription mechanism. We present a formal definition of the model's behavioral semantics and investigate the added value of using semantic technologies. Finally, we draw first conclusions about the practical applicability of the proposed approach based on performance benchmarks of a prototype implementation. Copyright 2009 acm.
This paper describes the agentTool Process Editor (APE), an Eclipse plug-in based on the Eclipse Process Framework. The aim of APE is to facilitate the design, verification, and management of custom agent-oriented sof...
详细信息
ISBN:
(纸本)9781605581668
This paper describes the agentTool Process Editor (APE), an Eclipse plug-in based on the Eclipse Process Framework. The aim of APE is to facilitate the design, verification, and management of custom agent-oriented software development processes. APE provides five basic structures. The Library is a repository of agent-oriented method fragments. A Process Editor allows the management of tailored processes. Task Constraints help process engineers specify guidelines to constrain how tasks can be assembled, while a Process Consistency mechanism verifies the consistency of tailored processes against those constraints. Finally, the Process Management integrates APE with the agentTool III development environment and provides a way to measure project progress using Earned Value Analysis. Copyright 2009 acm.
During functional verification, complex interactions between multiple modules that compose a digital circuit design can reveal hard-to-find bugs. Functional coverage specifications must be precise to assure these inte...
详细信息
ISBN:
(纸本)9781605581668
During functional verification, complex interactions between multiple modules that compose a digital circuit design can reveal hard-to-find bugs. Functional coverage specifications must be precise to assure these interactions occur during the simulation. We are proposing a technique for improving the functional verification specification of individual modules, preserving the occurrence of these interactions scenarios in the composition phase. We obtain these new specifications in a deductive way, by means of set theory. Using experimental results, we show how our work can contribute to error detection and save functional verification time. Copyright 2009 acm.
Graphical User Interfaces (GUIs) of document viewers have gained attention with the increase on the number of mobile applications that uses it. However, mobile devices are still limited in relation to the available fu...
详细信息
ISBN:
(纸本)9781605581668
Graphical User Interfaces (GUIs) of document viewers have gained attention with the increase on the number of mobile applications that uses it. However, mobile devices are still limited in relation to the available functionalities for text exhibition. Other limitations of these devices are the memory size, processing capacity and battery. This paper describes a framework for text visualization that safely manages memory traffic for mobile applications that intensively use bitmap font files, such as a document viewer. The main goal is to diversify the functionalities concerning to text exhibition in mobile devices, but also minimizing memory traffic. Copyright 2009 acm.
Component-Based Development (CBD) is an emerging discipline for promoting practical reuse of software. In CBD, by building new software with independently developed components, we can gain the benefits promised by the...
详细信息
ISBN:
(纸本)9781605581668
Component-Based Development (CBD) is an emerging discipline for promoting practical reuse of software. In CBD, by building new software with independently developed components, we can gain the benefits promised by the software reuse such as quality improvement and rapid development. Accordingly, to improve quality of components, we propose the component-based metrics applying the strength of dependency between classes to measure precisely. In addition, we prove the theoretical soundness of the proposed metrics by the axioms of Briand et al. and suggest the accuracy and practicality of the proposed metrics through a comparison with the conventional metrics in component development phase. Copyright 2009 acm.
Ubiquitous Learning (UbiLearning) environments heavily employ mobile devices to empower users with mobility and tooling support to learn anytime, anywhere. Introducing mobile devices in educational settings imposes co...
详细信息
ISBN:
(纸本)9781605581668
Ubiquitous Learning (UbiLearning) environments heavily employ mobile devices to empower users with mobility and tooling support to learn anytime, anywhere. Introducing mobile devices in educational settings imposes constraints on search behavior due to limited resources on these devices such as small screens and restricted input functionalities. Targeting this scenario, this paper proposes an architecture for implicit relevance feedback which considers users' work context to expand search queries in order to satisfy information needs with greater precision. Evaluation results conducted over a local test collection enriched with contextual features reveal improvements on average precision when compared to a pseudo relevance feedback baseline. Copyright 2009 acm.
While providing services to stakeholders, service software can be exploited by potentially untrustworthy users. Given that, it is necessary to monitor the trust relationships between service providers and requestors f...
详细信息
ISBN:
(纸本)9781605581668
While providing services to stakeholders, service software can be exploited by potentially untrustworthy users. Given that, it is necessary to monitor the trust relationships between service providers and requestors for potential vulnerabilities they may invite to the total system. In this paper, we propose an Automatic Trust Monitoring algorithm called ATM based on the specification of trust relationships in trust scenarios and the quantification of the relationships through trust calculation schemes. Trust rules are generated from the trust scenarios ready to be deployed at run-time. A service requestor is penalized for the violation of a trust rule and rewarded for no such violation. This analysis facilitates the quantification of the trustworthiness of service requestors and the accuracy of the recommendations from other service providers that can be used to make dynamic decisions on the corresponding requestors. The monitor is implemented in a prototype file sharing grid and evaluated using file sharing applications. Copyright 2009 acm.
暂无评论