In this paper the authors present an overview of techniques and tools that enable the effective evaluation and refactoring of a Web application's conceptual schema. Moreover, based on the introduction of the notio...
详细信息
ISBN:
(纸本)0889865744
In this paper the authors present an overview of techniques and tools that enable the effective evaluation and refactoring of a Web application's conceptual schema. Moreover, based on the introduction of the notion of model clones (in a previous work), as partial conceptual schemas that are repeated within a broader application model and the notion of model smells, as certain blocks in the Web applications model that imply the possibility of refactoring, this paper illustrates a methodology and a tool for detecting and evaluating the existence of potential model clones, in order to identify problems in an application's conceptual schema by means of efficiency, consistency, usability and overall quality. The methodology can be deployed either in the process of designing an application or in the process of reengineering it. Evaluation is performed according to a number of inspection steps. At first level the compositions used in the hypertext design are evaluated, followed by a second level evaluation concerning data manipulation and presentation to the user.
In this work, we propose an obstacle model to be used while simulating wireless sensor networks. To the best of our knowledge, this is the first time such an integrated and systematic obstacle model appears. We define...
详细信息
In this work, we propose an obstacle model to be used while simulating wireless sensor networks. To the best of our knowledge, this is the first time such an integrated and systematic obstacle model appears. We define several types of obstacles that can be found inside the deployment area of a wireless sensor network and provide a categorization of these obstacles, based on their nature (physical and communication obstacles), their shape, as well as their nature to change over time. In light of this obstacle model, we conduct extensive simulations in order to study the effects of obstacles on the performance of representative data propagation protocols for wireless sensor networks. Our findings show that obstacle presence has a significant impact on protocol performance. Also, we demonstrate the effect of each obstacle type on different protocols, thus providing the network designer with advice on which protocol is best to use.
In this paper the impact of user's hand holding a Multiple-Input-Multiple- Output (MIMO) terminal on the system performance is investigated. A 4×4 MIMO system is considered with a Personal Digital Assistant (...
详细信息
ISBN:
(纸本)9290929375
In this paper the impact of user's hand holding a Multiple-Input-Multiple- Output (MIMO) terminal on the system performance is investigated. A 4×4 MIMO system is considered with a Personal Digital Assistant (PDA) terminal equipped with a compact array of 4 patch elements. The radiation patterns of the antenna elements are simulated in the presence of the other elements and in the presence of a user's hand. The obtained patterns are used to evaluate the covariance matrix of the receive antenna which is incorporated in a correlation-based MIMO channel model. MIMO channel capacity is calculated to demonstrate the capacity degradation caused by the user's hand.
Carefully designed and managed services are essential for quality-demanding traffic, especially in large-scale IP networks where the aggregation of flows and the variety of traffic types are extensive. Although indivi...
详细信息
Carefully designed and managed services are essential for quality-demanding traffic, especially in large-scale IP networks where the aggregation of flows and the variety of traffic types are extensive. Although individual mechanisms have been widely investigated, not much related work exists on integrated approaches to QoS provisioning that are also feasible to implement. This work presents a thorough approach to the design, dimensioning and provisioning of a high priority service for high-quality demanding traffic over an IP network. Our approach employs efficient scheduling and a dynamic admission control scheme while demonstrating novel characteristics in terms of the quality offered to IP flows.
The scheme of real time streaming video is one of the newcomers in wireless data communication, raising a number of new requirements in both telecommunication and data communication systems. This scheme is applied whe...
详细信息
The scheme of real time streaming video is one of the newcomers in wireless data communication, raising a number of new requirements in both telecommunication and data communication systems. This scheme is applied when the user experiences real time multimedia content. rate control is an important issue in video streaming applications for both wired and wireless networks. A widely accepted rate control method in wired networks is equation based rate control. In this work, we focus on a mechanism for equation based congestion control for video transmission over WCDMA networks. With our mechanism, the sender explicitly adjusts its sending rate as a function of the measured rate of loss events, the round trip time and the packet size. Furthermore, we examine the performance of UMTS air interface for real time video transmission using real time protocols, through a number of experiments.
It is known that multicasting is an efficient method of supporting group communication as it allows the transmission of packets to multiple destinations using fewer network resources. Thus, service providers are incre...
详细信息
It is known that multicasting is an efficient method of supporting group communication as it allows the transmission of packets to multiple destinations using fewer network resources. Thus, service providers are increasingly interested in supporting multicast communications over wireless networks and in particular over UMTS. Multicasting is a more efficient method of supporting group communication than unicasting or broadcasting, as it allows transmission and routing of packets to multiple destinations using fewer network resources. In this paper the three above mentioned methods of supporting group communication are analyzed in terms of their performance
In this paper, we present an adaptive and intelligent Web-based educational system that uses AI techniques for personalized assessment of the learners. More specifically, we focus on a mechanism for on-line creation o...
详细信息
In this paper, we present an adaptive and intelligent Web-based educational system that uses AI techniques for personalized assessment of the learners. More specifically, we focus on a mechanism for on-line creation of a user-adapted test, which can be used alongside the predetermined test. The user can ask for such a test any time he/she is willing to do so, even if he/she has not studied all predetermined concepts of a learning goal. A small rule base is used by an expert system inference engine for making decisions on the difficulty level of the exercises to be included in the test. This is based on the evaluation of the learner during concept studying. Adaptive assessment of the learner can be repeatedly used until there is no further need. Another small rule-base is used for deciding on whether a new test is suggested or not. This is based on the learner's previous test assessment results. Preliminary experimental results show that the users need less time to study a learning goal when using the adaptive assessment capability of the system
Computational methods on molecular sequence data are at the heart of computational molecular biology. Identification of known or unknown DNA and RNA motifs or regions involved in various biological processes such as i...
Computational methods on molecular sequence data are at the heart of computational molecular biology. Identification of known or unknown DNA and RNA motifs or regions involved in various biological processes such as initiation of transcription, gene expression and translation, or the discovery of various types of repeats are some of the applications of major concern. An accurate identification and localization of such elements will allow biologists to perform deeper studies of the structure, function and evolution of genomes. This requires the development of faster and more complex mathematical models and computer algorithms. In this work we discuss current techniques to cope with string problems in molecular sequence data. We focus on Weighted Sequences and Sequences with “don't care characters”, explaining the open problems and their relevance to biological applications.
The purpose of this paper is to examine the issues related to the efficiency and adaptability of the admission control module of a Bandwidth Broker. The proposed architecture is able to handle situations such as the r...
详细信息
The purpose of this paper is to examine the issues related to the efficiency and adaptability of the admission control module of a Bandwidth Broker. The proposed architecture is able to handle situations such as the resubmission of previously rejected requests and offer a fair treatment for requests in an environment where a subset of these requests do not specify their ending time. We describe the proposed mechanisms for such cases which aim at solving the additional problems of fairly prioritizing resubmitted requests and efficiently handle requests which do not specify ending times. We also provide experimental evaluations of the proposed algorithms and the conclusions they lead us to.
In this study, we designed and simulated MOS devices having alternative gate dielectrics and examined their electrical behaviour as well as their effectiveness on the performance of a DraM cell containing them. The de...
详细信息
In this study, we designed and simulated MOS devices having alternative gate dielectrics and examined their electrical behaviour as well as their effectiveness on the performance of a DraM cell containing them. The devices under test had gate dielectrics of SrTiO 3 , (Ba 1-x Sr x )TiO 3 , TiO 2 , Ta 2 O 5 , Y 2 O 3 and (Pb 1 La x )TiO 3 . Equivalent oxide thicknesses were derived between 0.95 and 4 nm. Among the candidate materials, SrTiO 3 was the most promising when data retention is required, while Y 2 O 3 depicted the best I-V behavior. An increased cell capacitance resulted to higher memory refreshing times, improving substantially the device reliability
暂无评论