Research activities for combining portable computer technology and wireless communication technology are in progress to realize mobile computing environments. Among the various strategies necessary for mobile computin...
详细信息
Research activities for combining portable computer technology and wireless communication technology are in progress to realize mobile computing environments. Among the various strategies necessary for mobile computin...
详细信息
Research activities for combining portable computer technology and wireless communication technology are in progress to realize mobile computing environments. Among the various strategies necessary for mobile computing environments, the location management strategies are particularly emphasized especially for PCN environments. Location management strategy-for PCN environments, which is mostly based on the IS-41 standards, brings an issue that additional network traffic are generated to deliver update messages to the home location server whenever a mobile host changes its location server. We propose an innovative update strategy and a search strategy that resolves the problem shown in the IS-41 scheme. Also, this paper compares the performance of the proposed scheme with the IS-41-based scheme.
Software inspections are regarded as an important technique to detect faults throughout the software development process. The individual preparation phase of software inspections has enlarged its focus from only compr...
详细信息
Software inspections are regarded as an important technique to detect faults throughout the software development process. The individual preparation phase of software inspections has enlarged its focus from only comprehension to also include fault searching. Hence, reading techniques to support the reviewers on fault detection are needed. Usage-based reading (UBR) is a reading technique, which focuses on the important parts of a software document by using prioritized use cases. This paper presents a series of three UBR experiments on design specifications, with focus on the third. The first experiment evaluates the prioritization of UBR and the second compares UBR against checklist-based reading. The third experiment investigates the amount of information needed in the use cases and whether a more active approach helps the reviewers to detect more faults. The third study was conducted at two different places with a total of 82 subjects. The general result from the experiments is that UBR works as intended and is efficient as well as effective in guiding reviewers during the preparation phase of software inspections. Furthermore, the results indicate that use cases developed in advance are preferable compared to developing them as part of the preparation phase of the inspection.
The access scheme is required to have fast access and reliable transmission in satellite communications because of the long propagation delay and different channel characteristics. In this paper we propose a hybrid ac...
详细信息
The access scheme is required to have fast access and reliable transmission in satellite communications because of the long propagation delay and different channel characteristics. In this paper we propose a hybrid access scheme based on one phase preamble and channel monitoring/allocation for satellite communications. For fast access, we use an access scheme of 3GPP2 using one phase preamble instead of 3GPP using two phase preambles, and for more reliable transmission, the CM/CA scheme of 3GPP is applied. We investigate the performance of these proposed schemes through simulation. According to the simulation results, we could improve the random access scheme and could support smaller delay in satellite environments.
This paper presents a comprehensive study of the effect of job interleaving by preemption on the throughput of a single server where requests arrive with a given processing time and slack. The problem is to decide whi...
详细信息
This paper presents a comprehensive study of the effect of job interleaving by preemption on the throughput of a single server where requests arrive with a given processing time and slack. The problem is to decide which requests to serve so as to maximize the server's utilization. This simple model captures many situations, both at the application (e.g., delivery of video) as well as at the network/transmission levels (e.g., scheduling of packets from input to output interface of a switch). The problem is on-line in nature, and thus we use competitive analysis for measuring the performance of our scheduling algorithms. We consider two modes of operation - with and without commitment - and derive upper and lower bounds for each case. Since competitive analysis is based on the worst-case scenario, the average-case performance of the algorithms is also examined by a simulation study.
This paper presents a novel low-energy memory design technique, considering effective bitwidth of variables for application-specific systems, called VAbM technique. It targets the exploitation of both data locality an...
详细信息
This paper presents a novel low-energy memory design technique, considering effective bitwidth of variables for application-specific systems, called VAbM technique. It targets the exploitation of both data locality and effective bitwidth of variables to reduce energy consumed by redundant bits. Under constraints of the number of memory banks, the VAbM technique uses variable analysis results to perform allocating and assigning on-chip RAM into multiple memory banks, which have different size with different number of word lines and different number of bit lines tailored to each application requirements. Experimental results with several real embedded applications demonstrate significant energy reduction up to 64.8% over monolithic memory, and 18.4% over memory designed by banking technique.
In this paper we prove improved lower and upper bounds for the location of mobile facilities (in L∞ and L2 metrics) under the motion of clients when facility moves faster than clients. This paper continues the resear...
ISBN:
(纸本)9781475752755
In this paper we prove improved lower and upper bounds for the location of mobile facilities (in L∞ and L2 metrics) under the motion of clients when facility moves faster than clients. This paper continues the research started in our joint paper where we present lower bounds and efficient algorithms for exact and approximate maintenance of the 1-center for a set of moving points in the plane. Our algorithms are based on the kinetic framework introduced by Basch, Guibas and Hershberger.
In this paper, we propose a new algorithm that aids the recovery of lost packets by generating additional duplicate ACK. It is shown that by adopting this algorithm the response time and throughput of short term burst...
详细信息
In this paper, we propose a new algorithm that aids the recovery of lost packets by generating additional duplicate ACK. It is shown that by adopting this algorithm the response time and throughput of short term bursty traffic can be improved in a wireless link with high error rate.
In addition to the integration of vehicles into traditional networks (e.g. access to the Internet via cellular) the Ad-hoc connection of vehicles within a limited area is a technology that promises a lot of innovative...
详细信息
In addition to the integration of vehicles into traditional networks (e.g. access to the Internet via cellular) the Ad-hoc connection of vehicles within a limited area is a technology that promises a lot of innovative and exciting services. This paper starts with the description of some services to motivate Ad-hoc networking in the vehicular environment. It then gives an overview of the current challenges (especially routing protocols) in this field. If the geographic position of the network nodes is known, better performance can be achieved with the utilization of so called geocast routing-algorithms. An overview of geocast-routing is given and shortcomings of the existing protocols for the usage in inter-vehicle Ad-hoc networks are explained. Finally we make a proposal for a vehicle-optimized geocast routing, protocol that is based on AODV and present our prototype implementation.
暂无评论