This paper presents the design and realisation of a hybrid, high-accuracy, automated measurement framework. A hybrid measurement system is introduced that has been successfully used to carry out high-accuracy measurem...
详细信息
This paper presents the design and realisation of a hybrid, high-accuracy, automated measurement framework. A hybrid measurement system is introduced that has been successfully used to carry out high-accuracy measurements in distributed automation environments. The application of the hybrid measurement system is not limited to such environments, though. It is characterised by monitoring distributed events with low interference and by the usage of global timestamps based on the high-resolution clock of a logic analyser. Furthermore, it exhibits an extensively automated experiment control and data analysis framework. Measurement results gained with the approach are presented as well.
Discovering and assembling individual Web services into more complex yet new and more useful Web processes receive significant attention from the academia recently. In this paper, we explore using pre and post-conditi...
详细信息
Discovering and assembling individual Web services into more complex yet new and more useful Web processes receive significant attention from the academia recently. In this paper, we explore using pre and post-conditions of Web services to enable their automatic composition. Also, we present a novel technique for discovering semantic relations between pre and post-conditions of different services using their ontological descriptions. This enables determining services with complimentary functions and generating a semantic Web of services. Our technique takes semantic similarity of pre and post-conditions into account and builds on our earlier work on discovering semantic relationships between interfaces (input and output) of Web services.
The paper proposes an energy-aware contention-based protocol for the medium access control (MAC) sub-layer for wireless sensor networks. The innovative approach with frequent sleeps proactively and aggressively reduce...
详细信息
The paper proposes an energy-aware contention-based protocol for the medium access control (MAC) sub-layer for wireless sensor networks. The innovative approach with frequent sleeps proactively and aggressively reduces the wasted energy while increasing the throughput and decreasing the latency. The proposed MAC protocol solves the energy inefficiency caused by idle listening, control-packet overhead, and overhearing. Simulation experiments have been performed to demonstrate the effectiveness of the proposed approach, especially compared to the S-MAC and T-MAC protocols.
Mobile networks differ from their wireline counterparts mainly by the high costs for air transmissions and by the mobility of the users. A new entity, denoted as the crawling peer, is suggested in order to optimize th...
详细信息
Mobile networks differ from their wireline counterparts mainly by the high costs for air transmissions and by the mobility of the users. A new entity, denoted as the crawling peer, is suggested in order to optimize the resource mediation mechanism for a mobile P2P file sharing application. The crawling peer locates content on behalf of mobile peers. It is placed in the wireline part of the mobile network and thus, does not suffer from the above mentioned restrictions. The crawling peer is part of a comprehensive mobile P2P file sharing architecture [1] which is based on the popular eDonkey file sharing application. The performance of three querying strategies of the crawling peer is investigated with respect to banning at the index servers and the response time of requests, i.e. the time to find a file. The results show that the selection of an appropriate request strategy for the crawling peer maximizes the probabihty of locating a file while the probability to be banned by an eDonkey index server is minimized.
Grid and peer-to-peer (P2P) network technologies enable aggregation of distributed resources for solving large-scale and computationally-intensive applications. These technologies are well-suited for bag-of-tasks (BoT...
详细信息
Grid and peer-to-peer (P2P) network technologies enable aggregation of distributed resources for solving large-scale and computationally-intensive applications. These technologies are well-suited for bag-of-tasks (BoT) applications, because each application consists of many parallel and independent tasks. With multiple users competing for the same resources, the key challenge is to finish a user application within a specified deadline. In this paper, we propose a time optimization algorithm that schedules a user application on auction-based resource allocation systems. These allocation systems, which are based on proportional share, allow users to bid higher in order to gain more resource shares. Therefore, this algorithm adjusts a user bid periodically on these systems in order to finish the application on time.
Over the last few years, grid technologies have progressed towards a service-oriented paradigm that enables a new way of service provisioning based on utility computing models. Users consume these services based on th...
详细信息
Over the last few years, grid technologies have progressed towards a service-oriented paradigm that enables a new way of service provisioning based on utility computing models. Users consume these services based on their QoS (quality of service) requirements. In such "pay-per-use" grids, workflow execution cost must be considered during scheduling based on users' QoS constraints. In this paper, we propose a cost-based workflow scheduling algorithm that minimizes execution cost while meeting the deadline for delivering results. It can also adapt to the delays of service executions by rescheduling unexecuted tasks. We also attempt to optimally solve the task scheduling problem in branches with several sequential tasks by modeling the branch as a Markov decision process and using the value iteration method
Most middleware platforms lack sufficient support to provide reliable references for accessing distributed mobile objects in the context of dynamic environments, or they heavily depend on infrastructure mechanisms lik...
详细信息
Most middleware platforms lack sufficient support to provide reliable references for accessing distributed mobile objects in the context of dynamic environments, or they heavily depend on infrastructure mechanisms like a globally available location service. Based on the fragmented-object model and on our own middleware implementation AspectIX, this paper presents concepts and mechanisms that avoid outdated references for dynamically distributed objects without additional infrastructure services. Our approach is based on time-bound guarantees. Even in the context of malicious nodes and a partial invalidation of references a safe binding of the distributed object is guaranteed if ever possible.
Despite the efforts to leverage the network performance through the use of Directional communications, most protocols still rely on the basic mechanisms employed by the IEEE802.11 standards. While this might be desira...
详细信息
Network intrusion prevention systems provide proactive defense against security threats by detecting and blocking attack-related traffic. This task can be highly complex, and therefore, software-based network intrusio...
详细信息
暂无评论