Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource management and critical path analysis. In th...
详细信息
ISBN:
(纸本)9781450301831
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource management and critical path analysis. In this paper, we introduce a quality of monitoring (QoM) metric defined by the expected number of active users monitored, and investigate the problem of maximizing QoM by judiciously assigning sniffers to channels based on knowledge of user activities in a multi-channel wireless network. Two capture models are considered. The first one, called the user-centric model assumes frame-level capturing capability of sniffers such that the activities of different users can be distinguished. The second one, called the sniffer-centric model only utilizes binary channel information (active or not) at a sniffer. For the user-centric model, we show that the implied optimization problem is NP-hard, but a constant approximation ratio can be attained via polynomial complexity algorithms. For the sniffer-centric model, we devise a stochastic inference scheme that transforms the problem into the user-centric domain, where we are able to apply our polynomial approximation algorithms. The effectiveness of our proposed scheme and algorithms is further evaluated using both synthetic data as well as real-world traces from an operational WLAN. Copyright 2010 ACM.
MPI is the traditional paradigm to parallelize applications for High Performance Computing environments. AzequiaMPI is an implementation of the MPI-1.3 standard. Its thread-based architecture enables it to run on high...
详细信息
The ability to read documents and notes is a crucial part of the education system, but for over 1200 visually impaired students in New Zealand and many more worldwide, large and clearly printed documents remain elusiv...
详细信息
ISBN:
(纸本)9781450305020
The ability to read documents and notes is a crucial part of the education system, but for over 1200 visually impaired students in New Zealand and many more worldwide, large and clearly printed documents remain elusive. Resizing documents for visually impaired readers currently requires a mixture of time, patience and experience with word processors such as Microsoft Word. This paper describes the design and construction of an add-in to simplify the process of resizing documents so that they become more readable to the visually impaired. This paper discusses common problems with the resizing of documents, and the tools produced to help reduce or eliminate these problems. The tools were evaluated in the resizing of workbooks by staff at a visual resource centre with promising results. Copyright the author(s) and CHISIG.
The International Workshop on the Web and Requirements engineering (WeRE) was held in conjunction with the 18 th International IEEE Requirements engineering Conference (RE'10) in Sydney (Australia) on September 2...
The International Workshop on the Web and Requirements engineering (WeRE) was held in conjunction with the 18 th International IEEE Requirements engineering Conference (RE'10) in Sydney (Australia) on September 28 2010. WeRE intends to be an international forum for exchanging ideas on both using Web technologies as a platform in the requirements engineering field, and applying requirements engineering in the development and use of websites. Papers focused on new domains and new experiences with the connection between requirements engineering and the Web were presented in WeRE.
In an attempt to increase the area utilization of multi-chip packages, manufacturers have started looking at 3D packaging. The 3D structures have either dies or chips stacked one above the other. These 3D structures h...
详细信息
Packet-combining schemes are an attractive improvement to ARQ schemes, since they allow receivers to keep the good parts of an otherwise erroneous packet and use these with good parts from subsequent packets to allow ...
详细信息
software testing techniques based on formal methods can reduce the uncertainty, improve accuracy, validity and degree of automation. In this paper, formal methods were introduced into the real-time embedded software t...
详细信息
In the traditional visual cryptography scheme, a secret pixel will be encoded into a block, causing the size of recovered image is larger than the original one. Thus, later studies attempt to improve these shortcoming...
详细信息
ISBN:
(纸本)9781849192088
In the traditional visual cryptography scheme, a secret pixel will be encoded into a block, causing the size of recovered image is larger than the original one. Thus, later studies attempt to improve these shortcomings, distortion of the recover image and a higher transmission cost. This paper proposes a visual secret sharing (VSS) scheme without expansion, and gets a better recovered result than other schemes due to the consideration of black pixels' distribution.
Designing to support motivation is an increasingly important issue, especially as pervasive technologies are used to facilitate various healthy behaviour changes. There are many motivation theories but these do not ma...
详细信息
暂无评论