Security and privacy threats in technological environment are great hindrances to use latest technologies for our benefits. Such threats also exist in RFID systems which are currently utilized to a great extent in ubi...
详细信息
In order to realise complex service-based applications on system platforms for context-aware ubiquitous computing environments, mobile processes have been introduced to support cooperation among (mobile) devices by ex...
详细信息
In ubiquitous computing, dynamic adaptation and the evolvability of software become increasingly important. This paper proposes AOCI, an aspect-oriented component infrastructure that combines the core ideas of aspect-...
详细信息
ISBN:
(纸本)9781605583693
In ubiquitous computing, dynamic adaptation and the evolvability of software become increasingly important. This paper proposes AOCI, an aspect-oriented component infrastructure that combines the core ideas of aspect-oriented programming (AOP) and component based systems. Components are usually considered as black boxes that can be combined to form complex systems. In the context of our infrastructure, components export possible points of adaptation, which are tagged with ontological information. This information enables the use of AOP techniques without detailed knowledge about the component's internals, enabling distributed and dynamic adaptation. Copyright 2008 ACM.
In the context of cognitive agent programming frameworks, a main research effort accounts for exploiting goalorientation for specifying and enacting agent interaction. Existing research work focuses almost totally on ...
详细信息
ISBN:
(纸本)9780769534961
In the context of cognitive agent programming frameworks, a main research effort accounts for exploiting goalorientation for specifying and enacting agent interaction. Existing research work focuses almost totally on direct communication models, typically based on speech-acts and FIPA ACL. In this paper we focus instead on mediated interactions, and in particular on interaction taking place in artifactbased environments, where artifacts are first-class mediating tools that are used by cognitive agents in goal-directed way. The investigation is concretely supported by integrating the Jadex platform (enrolling the Belief-Desire-Intention model of agency) with the CARTAGO technology (enabling the design of artifact based environments).
Determine the appropriate loop transformations is an essential process in the automatic parallelization field. The sequence of loop transformation to be applied also must be considered. Selection of loop transformatio...
详细信息
ISBN:
(纸本)1601320841
Determine the appropriate loop transformations is an essential process in the automatic parallelization field. The sequence of loop transformation to be applied also must be considered. Selection of loop transformations faces many challenges, it is needed an experienced. In this paper, An Intelligent Loop Transformation Selector (ILTS);as a part of parallelizing tool project, was developed to overcome on these challenges and imitate an experienced. A Kohonen's Self-Organizing Map (SOM) neural network is used to select the appropriate loop transformation or sequence of them. Neural Networks offer intelligent transformations selection to reduce or eliminate the dependencies and maximize the parallelization in the sequential code. The experimental results show that ILTS chooses loop transformations successfully in most cases. This tool can be integrated with any parallelizing compiler to enhance loop transformation selection process.
This report summarizes the presentations and discussions of the Third Workshop on Models and Aspects Handling Crosscutting Concerns in MDSD, held in conjunction with the 21st European Conference on Object-Oriented Pro...
详细信息
Wireless mesh networks are a special kind of ad hoc networks in which most nodes are static. The application purpose of wireless mesh networks is also different than that of ad hoc networks and is focused on broadband...
详细信息
Wireless mesh networks are a special kind of ad hoc networks in which most nodes are static. The application purpose of wireless mesh networks is also different than that of ad hoc networks and is focused on broadband access services to the Internet. Recent studies have shown that nodes in a wireless mesh network have to be equipped with several radio interfaces for high performance. However, one of the challenges that still faces high performance wireless mesh networks is the capacity reduction due to interference of wireless links. In this paper, we address the problem of assigning channels to nodes in wireless mesh networks. For this, we propose and study the cluster channel assignment (CCA) approach with the goal of reducing the network interference to increase the overall network performance.
Wireless mesh networks (WMNs) are an emerging technology which provides broadband wireless access services. One of the challenges that still faces high performance WMNs is the capacity reduction due to interference of...
详细信息
Wireless mesh networks (WMNs) are an emerging technology which provides broadband wireless access services. One of the challenges that still faces high performance WMNs is the capacity reduction due to interference of wireless links. In this paper, we address the problem of assigning channels to nodes in WMNs. For this, we introduce the cluster channel assignment (CCA) approach with the objective of reducing network interference to increase the overall network performance. A clustering approach is employed in order to reduce the complexity of channel assignment into local problems within clusters and taking the advantage of the possibility to reuse the channels in different clusters.
Pedestrian safety is a major concern in road transportation as pedestrian/vehicle accidents account for the second largest cause of traffic-related injuries and fatalities worldwide. Considerable work has examined the...
详细信息
Pedestrian safety is a major concern in road transportation as pedestrian/vehicle accidents account for the second largest cause of traffic-related injuries and fatalities worldwide. Considerable work has examined the use of lidar, radar and computer vision for pedestrian detection but existing solutions are costly and work only if pedestrians are in the vehicle's line-of-sight. In this paper, we present a novel technique based on wireless sensor networks that is cheap and enables pedestrian detection beyond the driver's horizon. The detection system is based on the use of "cat's eyes" augmented with embedded processing and communication capabilities that are able to detect pedestrians and forward this information along the road. We describe how such a system was successfully built with SOL, a high-level programming language for wireless sensor networks. Initial results show that the system obtains detection rates of 100%, false positive rates of 0%, and that the precision of the estimated position of pedestrians depends on their heading and relative position to sensor nodes.
The cost function for the capacity of optical links follows a step function. That means, the support of one more lightpath might require a costly upgrade of an optical cross connect (OXC), but then additional lightpat...
详细信息
The cost function for the capacity of optical links follows a step function. That means, the support of one more lightpath might require a costly upgrade of an optical cross connect (OXC), but then additional lightpaths can be supported at almost no further cost. This should be considered when lightpaths are routed through an optical network. In this paper we optimize the routing of the lightpaths to minimize the costs for the required optical equipment. We consider this problem for the failure-free case only and for survivable networks using dedicated path protection. We formulate the problems by integer linear programs (ILPs). In addition, we propose heuristics to solve the problem since solving ILPs is computationally expensive and not feasible for large problem instances. We show that our heuristics lead to good results within a fraction of time compared to ILP solvers.
暂无评论