This work presents an approach for dynamic software reconfiguration in sensor networks. Our approach utilizes explicit models of the design space of the embedded application. The design space is captured by formally m...
详细信息
This work presents an approach for dynamic software reconfiguration in sensor networks. Our approach utilizes explicit models of the design space of the embedded application. The design space is captured by formally modeling all the software components, their interfaces, and their composition. System requirements are expressed as formal constraints on QoS parameters that are measured at runtime. Reconfiguration is performed by transitioning from one point of the operation space to another based on the constraints. We demonstrate our approach using simulation results for a simple sensor network that performs one-dimensional tracking.
The emergence of pervasive wide-area distributed computing environments, such as pervasive information systems and computational grids, has enabled new generations of applications that are based on seamless access, ag...
详细信息
The emergence of pervasive wide-area distributed computing environments, such as pervasive information systems and computational grids, has enabled new generations of applications that are based on seamless access, aggregation and interaction. However, the inherent complexity, heterogeneity and dynamism of these systems require a change in how the applications are developed and managed. In this paper we present a component-based programming framework to support the development of autonomic self-managed applications. The framework enables the development of autonomic components and the formulation of autonomic applications as the dynamic composition and management of autonomic components. The operation of the proposed framework is illustrated using a forest fire application.
The problem of locating a semi-desirable facility on a plane is considered. A bi-criteria model is used. One of the criteria is well known minimum criterion. The second criterion is a weighted sum of Euclidean distanc...
详细信息
The problem of locating a semi-desirable facility on a plane is considered. A bi-criteria model is used. One of the criteria is well known minimum criterion. The second criterion is a weighted sum of Euclidean distances raised to the power of negative one. This function represents the aggregate undesirable effects of the facility and it is also a minimization problem. The bi-criteria model consists of a linear combination of these two criteria. The proposed model solved by particle swarm optimization provides better results than a previously proposed heuristic.
The emerging of wireless computing motivates radical changes of how information is derived. Our paper concerns with developing push and pull based application in wireless environment. We use a simplified e-health (hos...
详细信息
The emerging of wireless computing motivates radical changes of how information is derived. Our paper concerns with developing push and pull based application in wireless environment. We use a simplified e-health (hospital) context to demonstrate some effective uses of pull-based and push-based mechanisms. The pull mechanism involves information retrieval from a database, and update information in the database. The push mechanism is classified into three scenarios, (i) aperiodic push, (ii) periodic push - global recipients and (iii) periodic push - selective recipients.
software inspection is an effective method to detect faults in software artefacts. Several empirical studies have been performed on reading techniques, which are used in the individual preparation phase of software in...
详细信息
software inspection is an effective method to detect faults in software artefacts. Several empirical studies have been performed on reading techniques, which are used in the individual preparation phase of software inspections. Besides new experiments, replications are needed to increase the body of knowledge in software inspections. We present a replication of an experiment, which compares usage-based and checklist-based reading. The results of the original experiment show that reviewers applying usage-based reading are more efficient and effective in detecting the most critical faults from a user's point of view than reviewers using checklist-based reading. We present the data of the replication together with the original experiment and compares the experiments. The main result of the replication is that it confirms the result of the original experiment. This replication strengthens the evidence that usage-based reading is an efficient reading technique.
In this paper we present a generalized authorization model for multimedia digital libraries. Our aim is to support the enforcement of access control requirements of the original data sources without the need to create...
详细信息
In this paper we introduce a new algorithm for planar orthogonal drawing of complete binary trees on the surface of a given simple rectilinear polygon. Our algorithm aims to uniformly distribute the vertices of the gi...
详细信息
In this paper we introduce a new algorithm for planar orthogonal drawing of complete binary trees on the surface of a given simple rectilinear polygon. Our algorithm aims to uniformly distribute the vertices of the given tree on the given surface and to reduce the total number of edge bends as much as possible. We also introduce a new linear time algorithm for bisecting simple (rectilinear) polygons, assuming the straight skeletons of the polygons are given. To our knowledge, this paper and the previous works of the authors are the first attempts for developing algorithms that draw trees on 2D surfaces which are bounded by simple (rectilinear) polygons.
This paper describes basic elements of the Web-based platform for multimedia programming which is designed in the framework of the WWW-oriented workplace of applied programmer (W4AP). The proposed platform hides the i...
详细信息
This paper describes basic elements of the Web-based platform for multimedia programming which is designed in the framework of the WWW-oriented workplace of applied programmer (W4AP). The proposed platform hides the insignificant features of software and hardware from the applied programmers and provides a unified style for different programming development tools; a comfortable environment combining visual and multimedia programming technologies. The architecture of the W4AP server is shown supporting a programming process and manipulations with multimedia data. Examples are demonstrated of the practical use of the proposed platform as well as user interface features
Many network devices such as routers and firewalls employ caches to take advantage of temporal locality of packet headers in order to speed up packet processing decisions. Traditionally, cache designs trade off time a...
详细信息
Many network devices such as routers and firewalls employ caches to take advantage of temporal locality of packet headers in order to speed up packet processing decisions. Traditionally, cache designs trade off time and space with the goal of balancing the overall cost and performance of the device. We examine another axis of the design space that has not been previously considered: accuracy. In particular, we quantify the benefits of relaxing the accuracy of the cache on the cost and performance of packet classification caches. Our cache design is based on the popular Bloom filter data structure. This paper provides a model for optimizing Bloom filters for this purpose, as well as extensions to the data structure to support graceful aging, bounded misclassification rates, and multiple binary predicates. Given this, we show that such caches can provide nearly an order of magnitude cost savings at the expense of misclassifying one billionth of packets for IPv6-based caches.
Regression testing is an important part of software quality assurance. We work to extend regression testing to include regression benchmarking, which applies benchmarking to detect regressions in performance. Given th...
详细信息
暂无评论