This paper reflects one aspect of an overall research initiative to better understand and articulate the "cause and effect" relationship between design causes and operational effects. Here the specific focus...
详细信息
systems and software engineering are converging disciplines with increasing evolution of modern complex systems towards increased information and knowledge content. Further, with the capital investment associated with...
详细信息
Nowadays mobile devices enable users to have various ways to surf on the Internet and broadband communication channels facilitate applications of online multimedia. Most network real-time multimedia applications run o...
详细信息
ISBN:
(纸本)0769520332
Nowadays mobile devices enable users to have various ways to surf on the Internet and broadband communication channels facilitate applications of online multimedia. Most network real-time multimedia applications run on TCP/IP protocol stack. Although several protocols are proposed to handle mobility management on the network layer, real-time stream transmission still suffers from severe roaming interruption and hence playback performance is worsened. The paper analyzes the roaming delay and transmission throughput in detail and evaluates the effect of multiple elements constituting the whole roaming delay. A service codenamed Swift Roaming system (SROAM) is proposed to reduce the roaming delay and increase the average transmission throughput. Some initial experiment results are provided to support the effectiveness of the methods proposed in the system.
In this paper, we propose a framework for wireless/mobile pervasive computing to augment capabilities and to save scanty resources of mobile host by making full use of available resources in the surrounding. Firstly, ...
详细信息
ISBN:
(纸本)7563506861
In this paper, we propose a framework for wireless/mobile pervasive computing to augment capabilities and to save scanty resources of mobile host by making full use of available resources in the surrounding. Firstly, a mobile device finds and utilizes the cheap computer as a surrogate to forward the service requests. Secondly, after the surrogate discovers the services, it will filter, synthesize or handoff them according to the context information. We also take consideration of robustness, scalability, and load balancing by utilizing multi surrogates. Service descriptions are encoded by the extensible markup language (XML) technology to provide flexibility. The analytical results on the performance of our framework show that it has significant advantages in terms of reducing wireless bandwidth consumption, ant etc.
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called smar...
详细信息
ISBN:
(纸本)0780378652
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called smart classroom (SCR) and intelligent meeting room (IMR) respectively. When a teacher gives his lesson in the SCR, different services will automatically be provisioned to him according to captured context information. When the users with various kinds of portable devices, such as PDA, mobile phone or laptop, attend a meeting in IMR, they can easily organize a meeting and unobtrusively access the services provided by IMR, for example, they could give presentation by "projector service". The paper also describes the software infrastructure of SCR and IMR - smart platform, a multi agents (MAs) system.
In most of the modern information retrieval (IR) systems, such as Okapi system, there are a variety of parameters to be turned which are data-dependent and sensitive. Manual parameter setting with fixed experimental v...
详细信息
ISBN:
(纸本)0780379527
In most of the modern information retrieval (IR) systems, such as Okapi system, there are a variety of parameters to be turned which are data-dependent and sensitive. Manual parameter setting with fixed experimental values is not always feasible and reliable in practical cases. Furthermore, the supervised learning approaches are not applicable for lacking of relevant information while retrieving. Therefore, an automatic unsupervised parameter learning mechanism is necessary and important. In this paper, a genetic algorithm (GA) based parameter optimization approach is proposed and experimented on Okapi system using large scale data sets of TREC11, TREC10 and TREC9 web track collections. It indicates that our algorithm is effective to adjust system parameters and improve the retrieval performance significantly.
The bandpass sampling (BPS) technique enables one to have an interface between IF stage and ADC in a radio receiver. Nonuniform BPS has the potential to suppress aliasing without care about the information band positi...
详细信息
The bandpass sampling (BPS) technique enables one to have an interface between IF stage and ADC in a radio receiver. Nonuniform BPS has the potential to suppress aliasing without care about the information band position of a modulated signal. However, a signal cannot be reconstructed from its nonuniform samples by using only an ideal lowpass filter. In this paper, a filter is generalized to a reconstruction algorithm (RA). Six different algorithms for reconstructing a signal from its nonuniform samples are summarized. A general reconstruction formula in terms of a basis-kernel (BK) function is used to describe the algorithms. Finally, with regard to the application to radio communications, accuracy of reconstruction, computational complexity and hardware implementation are shown and compared for these algorithms.
Simultaneous multithreading (SMT) attempts to attain higher processor utilization by allowing instructions from multiple independent threads to coexist in a processor and compete for shared resources. Previous studies...
详细信息
This paper presents a secure agent server named J-SAS. J-SAS is a secure and distributed execution environment for mobile agents. The core of the J-SAS is an agent virtual machine fulfilling the same functions as a tr...
详细信息
This paper presents a secure agent server named J-SAS. J-SAS is a secure and distributed execution environment for mobile agents. The core of the J-SAS is an agent virtual machine fulfilling the same functions as a traditional host machine. J-SAS considers the agent as an autonomous entity with execution code, state, specification and certification parts. J-SAS provides mobility, state dependency, run time code altering, and communications facilities. J-SAS consists of two main parts: agent gateway (AgG) and agent server (AgS). AgG is responsible for receiving agent through HTTP, authentication and delivering it with a passport to AgS. On the other side, AgS gets the agent, checks its passport, translates its code to safe code, initializes its state and runs it in a secure environment. Using resource allocation algorithms, ACL and authentication, J-SAS shows a good defensive mood against unauthorized read/write, denial of service and masquerading attacks.
暂无评论