DAP (distributed algorithms platform) is a generic and homogeneous simulation environment aiming at the implementation, simulation, and testing of distributed algorithms for wired and wireless networks. In this work, ...
详细信息
DAP (distributed algorithms platform) is a generic and homogeneous simulation environment aiming at the implementation, simulation, and testing of distributed algorithms for wired and wireless networks. In this work, we present its architecture, the most important design decisions, and discuss its distinct features and functionalities. DAP allows the algorithm designer to implement a distributed protocol by creating his own customized environment, and programming in a standard programming language in a style very similar to that of a real-world application. DAP provides a graphical user interface that allows the designer to monitor and control the execution of simulations, visualize algorithms, as well as gather statistics and other information for their experimental analysis and testing.
In today's life we are surrounded by numerous embedded devices that serve our daily needs, without being continuously in use. This fact, in conjunction with the tremendous growth of these devices, results in consi...
详细信息
In today's life we are surrounded by numerous embedded devices that serve our daily needs, without being continuously in use. This fact, in conjunction with the tremendous growth of these devices, results in considerable idle time in a home environment. In other words, we are in the middle of a significant amount of underutilized processing power. Here we investigate the idea of exploiting the unused embedded processing power to execute intensive global computing applications, and the hardware and software issues that arise from such an approach. We present a framework enabling the participation of home embedded devices to the global computing grid, which we call e-grid (embedded grid), along with a theoretical analysis of its performance gain. We also develop an experimental setup based on Jini technology, and measure its actual performance, trying to explore the feasibility of the e-grid approach.
In this paper we introduce the Weighted Suffix Tree, an efficient data structure for computing string regularities in weighted sequences of molecular data. Molecular Weighted Sequences can model important biological p...
详细信息
We present SeAl, a novel data/resource and data-access management infrastructure designed for the purpose of addressing a key problem in P2P data sharing networks, namely the problem of wide-scale selfish peer behavio...
详细信息
We present SeAl, a novel data/resource and data-access management infrastructure designed for the purpose of addressing a key problem in P2P data sharing networks, namely the problem of wide-scale selfish peer behavior. Selfish behavior has been manifested and well documented and it is widely accepted that unless this is dealt with, the scalability, efficiency, and the usefulness of P2P sharing networks will be diminished. SeAl essentially consists of a monitoring/accounting subsystem, an auditing/verification subsystem, and incentive mechanisms. The monitoring subsystem facilitates the classification of peers into selfish/altruistic. The auditing/verification layer provides a shield against perjurer/slandering and colluding peers that may try to cheat the monitoring subsystem. The incentives mechanisms effectively utilize these layers so to increase the computational/networking and data resources that are available to the community. Our extensive performance results show that SeAl performs its tasks swiftly, while the overhead introduced by our accounting and auditing mechanisms in terms of response time, network, and storage overheads are very small.
We present a virtual laboratory, which is designed and implemented in the framework of the VirRAD European project. This laboratory represents a 3D simulation of a radio-pharmacy laboratory, where learners, represente...
详细信息
We present a virtual laboratory, which is designed and implemented in the framework of the VirRAD European project. This laboratory represents a 3D simulation of a radio-pharmacy laboratory, where learners, represented by 3D avatars, can experiment on radio-pharmacy equipment by carrying out specific learning scenarios. We describe the functionality provided by this laboratory, the motivation factors which led to its formation, the technological decisions that were made for the optimization of the system as well as the envisioned steps to be carried out.
Understanding and modeling user online behavior, as well as predicting future requests remain an open challenge for researchers, analysts and marketers. In this paper, we propose an efficient prediction schema based o...
详细信息
ISBN:
(纸本)9780769521008
Understanding and modeling user online behavior, as well as predicting future requests remain an open challenge for researchers, analysts and marketers. In this paper, we propose an efficient prediction schema based on the extraction of sequential navigation patterns from server log files, combined with web site topology. Traversed paths are monitored, internally recorded and cleaned before being completed with cashed page views. After session and episode identification follows the construction of n-grams. Prediction is based upon a 5 + n-gram schema with all lower level n-grams participating, a procedure that resembles the construction of an All 5th-order Markov Model. The schema achieves full coverage while maintaining competitive prediction precision.
We perform a statistical analysis of failure data of equipment obtained from a real automated pizza production line. Based on this data, we develop and solve a simple model of a quality inspector who visits several su...
We perform a statistical analysis of failure data of equipment obtained from a real automated pizza production line. Based on this data, we develop and solve a simple model of a quality inspector who visits several such lines to detect possible quality problems in the production process. His objective is to allocate the number of his visits to the different workstations of the lines so as minimize the total production time of undetected, defective products.
Web portals offer many services and wealth of content to Web users. However, most users do not find interest in all the content present in these sites. Most of them visit some specific sites and browse in specific the...
详细信息
Web portals offer many services and wealth of content to Web users. However, most users do not find interest in all the content present in these sites. Most of them visit some specific sites and browse in specific thematic areas of them. In this paper, a software technique is presented that allows the viewers of Web sites to build their own personalized portals, using specific thematic areas of their preferred sites. This transcoding technique is based on an algorithm, which fragments a Web page in discrete fragments using the page's internal structure. A training and update procedure is used for identifying the different instances of thematic areas in different time points.
Wireless sensor networks are comprised of a vast number of ultra-small, autonomous computing and communication devices, with restricted energy, that cooperate to accomplish a large sensing task. In this work: a) we pr...
详细信息
Wireless sensor networks are comprised of a vast number of ultra-small, autonomous computing and communication devices, with restricted energy, that cooperate to accomplish a large sensing task. In this work: a) we propose extended versions of two data propagation protocols for such networks: the sleep-awake probabilistic forwarding protocol (SW-PFR) and the hierarchical threshold sensitive energy efficient network protocol (H-TEEN). These non-trivial extensions improve the performance of the original protocols, by introducing sleep-awake periods in the PFR protocol to save energy, and introducing a hierarchy of clustering in the TEEN protocol to better cope with large networks; b) we implemented the two protocols and performed an extensive simulation comparison of various important measures of their performance with a focus on energy consumption; c) we investigate in detail the relative advantages and disadvantages of each protocol; and d) we discuss a possible hybrid combination of the two protocols towards optimizing certain goals.
Squarers modulo M are useful design blocks for digital signal processors that internally use a residue number system and for implementing the exponentiators required in cryptographic algorithms. In these applications,...
详细信息
Squarers modulo M are useful design blocks for digital signal processors that internally use a residue number system and for implementing the exponentiators required in cryptographic algorithms. In these applications, some of the most commonly used moduli are those of the form 2/sup n/ + 1. To avoid using (n + 1)-bit circuits, the diminished-1 number system can be effectively used in modulo 2/sup n/ + 1 arithmetic applications. In this paper, for the first time in the open literature, we formally derive modulo 2/sup n/ + 1 squarers that adopt the diminished-1 number system. The resulting implementations are built using only full- or half-adders and a final diminished-1 adder and can therefore be pipelined straightforwardly.
暂无评论