Agile processes such as XP (extreme programming) have been recognised for their potential benefits of improving software. During adoption of the XP process, teams can misapply the XP principles by following them verba...
详细信息
Agile processes such as XP (extreme programming) have been recognised for their potential benefits of improving software. During adoption of the XP process, teams can misapply the XP principles by following them verbatim, ignoring the context in which they are applied. In this paper we document our experiences where naive applications of XP principles were altered in recognition of context. We detail our observations of how teams "looked behind" the rules and began fitting XP to the problem rather than attempting to fit the problem to XP. We conclude by reflectively focusing on how this transformation occurred and suggest that it is buying into the XP ethos that drives this change of perspective on the XP process and principles.
UMTS operates with WCDMA over the air interface. Most studies dealing with the capacity of CDMA networks consider the uplink (reverse link) and evaluate the coverage or capacity of a cell or network. This focus on the...
详细信息
UMTS operates with WCDMA over the air interface. Most studies dealing with the capacity of CDMA networks consider the uplink (reverse link) and evaluate the coverage or capacity of a cell or network. This focus on the uplink originates in the fact that the IS-95 network was a single voice network, such that the network performance was limited by the uplink. Furthermore, fast power control was then implemented on the uplink only. The introduction of 3G networks leaves the pure voice networks behind and instead provides a variety of different services which produce asymmetric traffic, with the bulk on the downlink (forward link). This traffic asymmetry shifts the capacity limit from the uplink to the downlink. The 3gpp standard prescribes the use of fast power control for the downlink as well. We propose a model to calculate the first and second moment of the node-B transmit power which allows us to approximate its distribution and to determine the probability that the system becomes unstable when a certain transmit power is exceeded.
The emergence of truly ubiquitous computing, enabled by the availability of mobile, heterogenous devices that supply context information, is currently hampered by the lack of programming support for the design and dev...
详细信息
The emergence of truly ubiquitous computing, enabled by the availability of mobile, heterogenous devices that supply context information, is currently hampered by the lack of programming support for the design and development of context-aware applications. We have developed a framework which significantly eases the development of mobile, context-aware applications. The framework allows developers to fuse data from disparate sensors, represent application context, and reason efficiently about context, without the need to write complex code. An event based communication paradigm designed specifically for ad-hoc wireless environments is incorporated, which supports loose coupling between sensors, actuators and application components.
Pervasive computing environments have proven difficult to develop in a form that supports the integration and organisation of devices and applications in a spontaneous and transparent manner. This is partly due to the...
详细信息
Pervasive computing environments have proven difficult to develop in a form that supports the integration and organisation of devices and applications in a spontaneous and transparent manner. This is partly due to the highly dynamic and unpredictable nature of these types of environments, and is often further hampered by the limited resources found on devices. In this paper, we present a highly decentralized method of organising the components of a pervasive computing environment, supporting spontaneous interaction between entities and providing robust system-wide behavior. Our inspiration for this work stems from nature and the observations made by the French biologist Grasse on how social insects coordinate their actions using indirect communication via the environment, a phenomenon that has become known as stigmergy. In the stigmergic approach there are fewer dependences between entities allowing for the incremental construction and improvement of solutions without adversely effecting the rest of the pervasive computing environment. The approach is encapsulated in Cocoa, a framework that supports the use of stigmergy to build self-organising environments that promotes the autonomy of entities. Experience using Cocoa has shown that entities can be integrated into a pervasive computing environment in a spontaneous manner and that coordinated behavior can emerge.
Recent advances in P2P lookup overlays provide an appealing solution for distributed search without relying on a single database server. In addition to performing resource discovery, these P2P substrates also offer me...
ISBN:
(纸本)9783540241287
Recent advances in P2P lookup overlays provide an appealing solution for distributed search without relying on a single database server. In addition to performing resource discovery, these P2P substrates also offer membership management for dynamic peers. In this paper, we propose a publicly shared architecture called VC2A that takes advantage of a P2P lookup substrate for computational applications. VC2A targets computational master-slave applications. An application running in VC2A dynamically allocates resources from the system on the fly. These allocated resources then self-manage and -heal. We have implemented an architecture based on our previous efforts that include an enhanced P2P lookup overlay and a mobile agent system on top of this overlay. We show that VC2A is not only scalable but robust, and takes advantage of heterogeneity of the resources.
Information retrieval over semantic metadata has recently received a great amount of interest in both industry and academia. In particular, discovering complex and meaningful relationships among this data is becoming ...
ISBN:
(纸本)9780120884698
Information retrieval over semantic metadata has recently received a great amount of interest in both industry and academia. In particular, discovering complex and meaningful relationships among this data is becoming an active research topic. Just as ranking of documents is a critical component of today's search engines, the ranking of relationships will be essential in tomorrow's semantic analytics engines. Building upon our recent work on specifying these semantic relationships, which we refer to as Semantic Associations, we demonstrate a system where these associations are discovered among a large semantic metabase represented in RDF. Additionally we employ ranking techniques to provide users with the most interesting and relevant results.
In this paper, we study how to collect n balls moving with constant velocities in the Euclidean plane by k robots moving on straight track-lines through the origin. Since all the balls might not be caught by robots, d...
详细信息
Recent advances in P2P lookup overlays provide an appealing solution for distributed search without relying on a single database server. In addition to performing resource discovery, these P2P substrates also offer me...
详细信息
It is possible to enjoy the quality of service related informations of a single node or a link between two nodes, which is understandable for the technical people only. Yet, there is no zone-based quality of service i...
详细信息
Anytime, anyplace application of distributed, multimedia services requires flexible configuration of service quality and coordination of relevant management actions both in mobile terminal and network. This paper pres...
详细信息
Anytime, anyplace application of distributed, multimedia services requires flexible configuration of service quality and coordination of relevant management actions both in mobile terminal and network. This paper presents a new approach for coordinating quality of service (QoS) configuration at multimedia-session establishment and during service adaptations, in accordance with user preferences for service presentation, user contracts with providers, and access/utilization management of the access-provider networks. The general features of an end-to-end negotiation protocol (E2ENP) for multimedia-session management are discussed. E2ENP is designed to minimize signaling load and maximize flexibility of system configuration. The application model of the E2ENP is described and interactions between terminals and access provider are discussed. Some initial measurement results detailing E2ENP performance are presented in consideration with various network configurations.
暂无评论