We present our research findings on the practicality of using RFID for building context-aware homes in India. Our research is the result of an endeavor to bring this global trend of smart homes to India. Rather than s...
详细信息
ISBN:
(纸本)9780889866386
We present our research findings on the practicality of using RFID for building context-aware homes in India. Our research is the result of an endeavor to bring this global trend of smart homes to India. Rather than studying the effects of such an influence in its original form-building smart homes equipped with such high-end sensors as real-time, audio-video sensing, and sophisticated, environmental sensors as are popular in a typical smart home-we studied the viability of realizing ambient-intelligence using simple, low-cost, and robust RFID sensors, which we believe would be suitable to Indian dwellings in the near future. We describe the learning and prediction algorithm used in our study;we modeled time as fuzzy-sets and used Markov model for predicting the future locations of inhabitants wearing RFID bracelets. Our system provides context-aware reactive and proactive services. We modeled the uncertainties-involved in inferring users' activities from their location information-using Bayesian Belief Networks or BBNs. This improved the accuracy of prediction considerably. Our experience showed that it is possible to develop cost-effective, easily deployable, context-aware homes using only RFID in India in the short-term before high-end sensing technologies mature and become commercially affordable in the longer run.
The subject of this paper is the resource management for a grid system that is primarily intended to support computationally expensive tasks like simulations and optimisations on a grid. Applications are represented a...
详细信息
ISBN:
(纸本)0889865701
The subject of this paper is the resource management for a grid system that is primarily intended to support computationally expensive tasks like simulations and optimisations on a grid. Applications are represented as workflows that can be decomposed into single grid jobs. The main task of the resource management is resource brokering to optimise a global schedule for all requesting grid jobs and all requested resources. The present contribution shall illustrate the necessity of planning and optimising resource allocation in a grid. Requirements to be met by a resource management system will be defined. These requirements are comparable with the requirements on planning systems in other fields, e.g. production planning systems. Here, various methods have already been developed for optimised planning. Suitable methods are Evolutionary Algorithms (EA). Consequently, a global optimising resource broker (GORBA) is proposed that deploys EA. The paper focuses on the concept of GORBA and the implementation of GORBA prototype.
We consider a distributed computer system in Wardrop equilibrium, i.e., situations where no user can reduce its own response time by unilaterally choosing another path, if all the other users retain their present path...
详细信息
ISBN:
(纸本)0889865701
We consider a distributed computer system in Wardrop equilibrium, i.e., situations where no user can reduce its own response time by unilaterally choosing another path, if all the other users retain their present paths. The Braess paradox is a famous example of paradoxical cases where adding capacity to a network degrades the performance of all users. This study examines numerically some examples around the Braess-like paradox in a distributed computer system. We found that Braess's paradox can occur, namely in equilibrium the mean job response time in the network after adding a communication line for the sharing of jobs between nodes, for some system parameter setting, can be greater than the mean job response time in the network before adding the communication line. Indeed, two different types of paradox called weak and strong paradox have been characterized. In the range of parameter values examined, the worst case ratio of performance degradation obtained in the examined network model is about 75% and 65% for the cases of weak and strong paradox respectively.
The generic functionality of passive testing is detecting failures (fault manifestations) in a distributed system. We deal with one of the key functions of a passive tester - Trace Analysis (TA). The standard TA algor...
详细信息
ISBN:
(纸本)0889865701
The generic functionality of passive testing is detecting failures (fault manifestations) in a distributed system. We deal with one of the key functions of a passive tester - Trace Analysis (TA). The standard TA algorithms proceed by traversing a Reference Specification (RS), which is usually given in the form of a FSM automaton. The run-time performance of such algorithms is known to be poor for a large, nondeterministic RS (i.e. for real protocols). To improve this aspect of passive testing, instead of considering new TA algorithms, we try to increase the performance of existing algorithms, by changing the form of a RS to an Event Graph (EG). We define an EG and submit a detailed algorithm for its derivation. We then outline the EG-based algorithm for RS traversal. We report on the results of simulation experiments that clearly show considerable improvements in run-time performance of EG-based passive testing over previous approaches, while the functionality of failure detection is strictly retained.
This paper presents a top-down Quality-of-Service (QoS) approach to design realtime Ethernet networks for automation systems based upon tree topologies. Therefore, the parallelism of switched unicast communication is ...
详细信息
ISBN:
(纸本)088986568X
This paper presents a top-down Quality-of-Service (QoS) approach to design realtime Ethernet networks for automation systems based upon tree topologies. Therefore, the parallelism of switched unicast communication is utilized by generating an off-line schedule, which considers each port of a switch as an exclusive networking resource. We point out that the schedule can be generated independently for each switch. Starting from a given network infrastructure and QoS-requests, we present a method consisting of attribution to identify routes, specification of conflicts inside the switches, and building of a conflict-multigraph for each switch. The schedule is realized using greedy edge-coloring of the graph together with optional edge pre-sorting and re-coloring after execution of the greedy-algorithm. The method is shown for a class of special cases with unitary packet-sizes and transmission of every request in each cycle-period. Finally, some first results of this method are presented.
In this paper we present and evaluate the performance of two different strategies for the deployment of parallel multifrontal and multiple frontal sparse linear solvers in the context of a parallel finite element code...
详细信息
ISBN:
(纸本)0889865701
In this paper we present and evaluate the performance of two different strategies for the deployment of parallel multifrontal and multiple frontal sparse linear solvers in the context of a parallel finite element code. Direct sparse linear solvers are based on sophisticated reorganisation of the standard Gaussian elimination algorithm with the aim of exploring matrix sparsity and reducing the amount of fill-in. Such codes can be successfully applied to very large linear systems, and are especially effective when a sparse linear system needs to be solved for multiple right-hand sides. Unfortunately, many important applications, such as finite element solutions of non-linear, transient problems, require repeated factorisation of the coefficient matrix. In such cases the only way of achieving good performance is parallelisation of both the computation of the finite element matrices and the linear system solution phase. We have developed two different designs for deployment of parallel multifrontal and multiple frontal sparse linear solvers in this context, each deploying three different strategies for the assembly of the global data. These designs are suitable for parallel and heterogeneous architectures. Experiments confirm high efficiency, low communication cost, and reduced initial memory requirements of our deployment designs, compared to a standard deployment strategy.
Self-stabilization is a theoretical framework of non-masking fault-tolerant distributed algorithms. A self-stabilizing system tolerates any kind and any finite number of transient faults, such as message loss, memory ...
详细信息
ISBN:
(纸本)0889865906
Self-stabilization is a theoretical framework of non-masking fault-tolerant distributed algorithms. A self-stabilizing system tolerates any kind and any finite number of transient faults, such as message loss, memory corruption, and topology change. Because message loss and topology change occur so frequently in mobile ad hoc networks, distributed algorithms on them should tolerate such events. In this paper, we propose a self-stabilizing distributed algorithm for computing a 5-spanner, which can be used, for example, as a basis for computing virtual backbone or routing in mobile ad hoc networks.
Comprehensive security policies are an integral part of creating a secure network and commonly firewalls are used to accomplish this. Firewalls inspect and filter traffic arriving or departing a network by comparing p...
详细信息
ISBN:
(纸本)0889865701
Comprehensive security policies are an integral part of creating a secure network and commonly firewalls are used to accomplish this. Firewalls inspect and filter traffic arriving or departing a network by comparing packets to a set of rules and performing the matching rule action, which is accept or deny. Unfortunately, traffic inspection of this type can impose significant delays on traffic due to the complexity and size of policies. Therefore, improving firewall performance is important, given the next generation of high-speed networks. This paper investigates the performance of a function parallel firewall architecture that distributes the original policy across an array of firewalls. A packet is processed by all the firewalls simultaneously and a gate then makes a final decision (accept or deny) based on the results of the individual firewalls. Since the individual firewalls have fewer rules to process (only a portion of the original policy), the function parallel system has lower delays (e.g. 74% lower for a four firewall array) and a higher throughput than other data parallel (load-balancing) firewalls. However, the performance increase is dependent on the speed of the gate. The potential speed increase and the impact of the gate will be demonstrated empirically.
A distributed object systems is said to be K-tolerant if every object is available after the simultaneous failure of up to K nodes. The problem is that a K-tolerant system, after failures, is no longer K-tolerant;that...
详细信息
ISBN:
(纸本)088986568X
A distributed object systems is said to be K-tolerant if every object is available after the simultaneous failure of up to K nodes. The problem is that a K-tolerant system, after failures, is no longer K-tolerant;that is, subsequent failures may compromise the availability of the objects. A continuously K-tolerant system is one which starting from a K-tolerant configuration, after the failure of up to K nodes, reconfigures itself so to remain K-tolerant. The existing protocols for maintaining continuous K-tolerance do so without regard to the resulting structure of the available data. For example if the distributed set of objects was sorted, this ordering would be most likely lost after restructuring. Analogously, a balanced distribution of the objects among the nodes might also be not achieved in the new distribution after reorganization. In this paper, we present a mechanism for maintaining continuous K-tolerance while keeping the load balanced and the objects sorted. The proposed solution uses minimum amount of replication and has a cost comparable to the one of the known unstructured solutions.
暂无评论