Pervasive applications and in particular Wireless Sensors Networks have very strict requirements in terms of power consumption. It is well known that radio activity is very expensive in terms of energy; we show here t...
详细信息
Pervasive applications and in particular Wireless Sensors Networks have very strict requirements in terms of power consumption. It is well known that radio activity is very expensive in terms of energy; we show here that intensive processing activities (as security) represent a major contribution to power budget. In this paper we extend our methodology for analyzing the impact of security related operations on power consumption and optimizing it. The analysis is based on experimental data and was validated with measurements on a real platform.
Significant efforts and studies were recently reported for enabling active safety, traffic management, and commercial applications in Vehicular Ad Hoc Networks (VANET), since these applications are the drivers of the ...
详细信息
Significant efforts and studies were recently reported for enabling active safety, traffic management, and commercial applications in Vehicular Ad Hoc Networks (VANET), since these applications are the drivers of the recent surge in VANET research and development. However, very few research efforts considered analyzing the Quality of Service (QoS) metrics that will be available to these applications in VANET. Furthermore, although there are many proposed solutions for routing in VANET, it is still unclear as to what specific characteristics VANET routing protocols should possess, since none of the proposed solutions achieves optimum performance in both urban and highway, as well as sparse and dense environment. To shed light on these issues, in this paper we analyze some of the most important QoS metrics in VANET. Namely, we determine the upper performance bound for connection duration, packet delivery ratio, end-to-end delay, and jitter for unicast communication in typical highway and urban VANET environments. According to our results, delay and jitter in VANET would be adequate for most of the envisioned unicast-based applications, whereas the packet delivery ratio and connection duration might not meet the requirements for most unicast-based applications.
Automatic generation of code starting from lightweight modeling languages such as UML is by now a widely adopted approach. In particular generation of executable SystemC models starting from StateCharts and other UML ...
详细信息
Automatic generation of code starting from lightweight modeling languages such as UML is by now a widely adopted approach. In particular generation of executable SystemC models starting from StateCharts and other UML diagrams represents a promising research field. While RTL SystemC appears better suited for matching the StateCharts formalism (being intrinsically clocked), performances of the generated code suffer from the heavy overhead induced by time management, specially when the number of concurrent processes is high. In this paper we present a methodology that allows applying a solution mixing event based and clock-driven approach. More specifically, clock-driven simulation is activated only when the configuration of the system is identified to be evolving. When no events are present this fact is also detected (together with the interval of absence of events) so that no simulation is performed although the clock runs on. This solution is particularly suited for low duty cycle systems, as, e.g. when simulating Wireless Sensor Networks (WSN); in such instances, speedup of the generated code has been found to be well over two orders of magnitude. Application of the technique to the generation of a power simulator for the IEEE 802.15.4 networking protocol is used as a test case.
In this paper, we proposed an efficient algorithm, TOPK_CLOSED, for mining top-k closed itemsets. This algorithm mines top-k closed itemsets using best-first search. The closed itemsets with the highest supports are f...
详细信息
In this paper, we proposed an efficient algorithm, TOPK_CLOSED, for mining top-k closed itemsets. This algorithm mines top-k closed itemsets using best-first search. The closed itemsets with the highest supports are firstly found from this algorithm. Consequently, the method quickly finds top-k closed itemsets, which leads to an efficient pruning unnecessary itemsets and stop mining rapidly. In addition, this algorithm can generate closed itemsets without keeping candidates in main memory.
E-learning systems are powerful way for bringing the education to people, which wants to be skilled in some area. However, important term in education is quality of this education. Student must have effort to study, a...
详细信息
E-learning systems are powerful way for bringing the education to people, which wants to be skilled in some area. However, important term in education is quality of this education. Student must have effort to study, and e-learning system must also have tools for bringing educational informations in simplest way, or support learners study as much as it's possible. In present, main problem of e-learning systems is generalisation of learners, it means that all students can take only the same teaching material. In the related way, these informations are served a little bit chaotic and cold". Solving for this problem could be intelligent e-learning systems (IELS) that are e-learning systems, which have build-in intelligence support (algorithms) for learner's study. Next reason for building IELS is attempt for substitution of the teacher. It's not possible to make absolute substitution for the teacher, but scientific conferences all over the world still brings important conclusions in this area, which can help build interesting systems.
One way to see the semantic Web is to think of it as a set of all-knowing technologies that respond to whatever the user asks. The other view is that it is a set of standards and tools that help build better Web appli...
详细信息
One way to see the semantic Web is to think of it as a set of all-knowing technologies that respond to whatever the user asks. The other view is that it is a set of standards and tools that help build better Web applications. Since the latter is probably more realistic at the moment, it means that a lot of software has to be developed before we start actually seeing the semantic Web in widespread *** developers would be needed for the task and unless we "win their hearts and minds", they are likely to obstruct rather than support the semantic Web idea. And from the average developer's point of view, there is not much to like on today's RDF query languages, especially when compared with relational algebra and SQL. Besides the fact that they are built on different principles, none of the languages we are aware of has a property that has served SQL so well - they are not closed.
This paper presents a case study that describes TSPi teaching (introduction to the team software process) to 4th year students, grouped by teams, at the computer Science School, Polytechnic University of Madrid (UPM)....
详细信息
This paper presents a case study that describes TSPi teaching (introduction to the team software process) to 4th year students, grouped by teams, at the computer Science School, Polytechnic University of Madrid (UPM). The achievements of the teams, due to training and the use of TSPi, were analyzed and discussed. This paper briefly discusses the approach to the teaching and some of the issues that were identified. The teams collected data on the projects developed. They reviewed the schedule and quality status weekly. The metrics selected to analyze the impact on the students were: size, effort, productivity, costs and defects density. These metrics were chosen to analyze teams 'performance evolution through project development. This paper also presents a study related to the evolution of estimation, quality and productivity improvements these teams obtained. This study will prove that training in TSPi has a positive impact on getting better estimations, reducing costs, improving productivity, and decreasing defect density. Finally, the teams 'performance are analyzed.
The abundance of information and communication technology and especially internet services demands changes in lecturerspsila head-on teaching methods towards new directives. This article presents some examples of huma...
详细信息
ISBN:
(纸本)9789537138127
The abundance of information and communication technology and especially internet services demands changes in lecturerspsila head-on teaching methods towards new directives. This article presents some examples of human-centred use of information technology, applied in the subject of human-computer interaction. Examples include the open source learning management system moodle, video based lecturing, remote laboratory of intelligent house and an age simulator - AgeSim. This article presents the planning and execution of teaching processes with use of Moodle Web tools and exposes organizational structure as well as characteristics, which appeared during the learning process. Finally we show some benefits and weaknesses that arose during the use of the Moodle environment.
One of the most important bits of every search engine is the query interface. Complex interfaces may cause users to struggle in learning the handling. An example is the query language SQL. It is really powerful, but u...
详细信息
One of the most important bits of every search engine is the query interface. Complex interfaces may cause users to struggle in learning the handling. An example is the query language SQL. It is really powerful, but usually remains hidden to the common user. On the other hand the usage of current languages for Internet search engines is very simple and straightforward. Even beginners are able to find relevant documents. This paper presents a hybrid query language suitable for both image and text retrieval. It is very similar to those of a full text search engine but also includes some extensions required for content based image retrieval. The language is extensible to cover arbitrary feature vectors and handle fuzzy queries.
A new nonlinear protocol is proposed for state consensus of multi-agent systems in this paper. It is shown that this protocol can provide faster convergence rate than the typical linear protocol, presented by Olfati-S...
详细信息
A new nonlinear protocol is proposed for state consensus of multi-agent systems in this paper. It is shown that this protocol can provide faster convergence rate than the typical linear protocol, presented by Olfati-Saber and Murray, and furthermore guarantees the states of agents reach a consensus in finite time, provided that the interaction topology, represented by a directed graph, has a spanning tree.
暂无评论