首页 > 最新文献

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
Replay Debugging for Multi-threaded Embedded Software 多线程嵌入式软件的重放调试
Yann-Hang Lee, Y. Song, Rohit Girme, Sagar Zaveri, Yan Chen
The non-deterministic behavior of multi-threaded embedded software makes cyclic debugging difficult. Even with the same input data, consecutive runs may result in different executions and reproducing the same bug is itself a challenge. Despite the fact that several approaches have been proposed for deterministic replay, none of them attends to the capabilities and functionalities that replay can comprise for better debugging. This paper introduces a practical replay mechanism for multi-threaded embedded software. The Replay Debugger, based on Lamport clock, offers a user controlled debugging environment in which the program execution follows the identical partially ordered happened-before dependency among threads and IO events as that of the recorded run. With the order of thread synchronizations assured, users can focus their debugging effort in the program behavior of any threads while having a comprehension of thread-level concurrency. Using a set of benchmark programs, experiment results of a prototyped implementation show that, in average, the software based approach incurs a small probe effect of 3.3% in its record stage.
多线程嵌入式软件的不确定性给循环调试带来了困难。即使使用相同的输入数据,连续运行也可能导致不同的执行,再现相同的错误本身就是一个挑战。尽管已经为确定性重播提出了几种方法,但它们都没有考虑到重播可以包含的性能和功能,从而更好地进行调试。本文介绍了一种实用的多线程嵌入式软件重放机制。基于Lamport时钟的Replay Debugger提供了一个用户控制的调试环境,在这个环境中,程序执行遵循线程和IO事件之间相同的部分排序的happens -before依赖关系,就像记录运行一样。在保证了线程同步顺序之后,用户可以在理解线程级并发性的同时,将调试工作集中在任何线程的程序行为上。使用一组基准程序,原型实现的实验结果表明,平均而言,基于软件的方法在其记录阶段产生的探测效应很小,为3.3%。
{"title":"Replay Debugging for Multi-threaded Embedded Software","authors":"Yann-Hang Lee, Y. Song, Rohit Girme, Sagar Zaveri, Yan Chen","doi":"10.1109/EUC.2010.13","DOIUrl":"https://doi.org/10.1109/EUC.2010.13","url":null,"abstract":"The non-deterministic behavior of multi-threaded embedded software makes cyclic debugging difficult. Even with the same input data, consecutive runs may result in different executions and reproducing the same bug is itself a challenge. Despite the fact that several approaches have been proposed for deterministic replay, none of them attends to the capabilities and functionalities that replay can comprise for better debugging. This paper introduces a practical replay mechanism for multi-threaded embedded software. The Replay Debugger, based on Lamport clock, offers a user controlled debugging environment in which the program execution follows the identical partially ordered happened-before dependency among threads and IO events as that of the recorded run. With the order of thread synchronizations assured, users can focus their debugging effort in the program behavior of any threads while having a comprehension of thread-level concurrency. Using a set of benchmark programs, experiment results of a prototyped implementation show that, in average, the software based approach incurs a small probe effect of 3.3% in its record stage.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Architecture of Surface Gateway for Underwater Acoustic Sensor Networks 水声传感器网络表面网关结构研究
Youngjun Jo, Jungyoungj Bae, Hyunjae Shin, Heungwoo Nam, Sae-Young Ahn, Sunshin An
Recently, the importance of a water resource is highly concerned. Therefore, Underwater Wireless Sensor Networks (UASNs) technologies are vigorously studied for monitoring underwater environment. The UASNs gather various underwater environmental data that should be delivered to a Monitoring Center where nearby or far from UASNs are deployed. To deliver data form underwater to the Monitoring Center or vice versa, a surface gateway should change acoustic signal to RF (Radio Frequency) signal. Depends on the service requirement, the surface gateway can adopt various wireless communication channels such as Cellular network, Zigbee and so on. In this paper, we propose the architecture of surface gateway that has several wireless communication channels and communication protocol.
最近,水资源的重要性引起了人们的高度关注。因此,水下无线传感器网络(uasn)技术被大力研究用于水下环境监测。uasn收集各种水下环境数据,这些数据应该被传送到附近或远离uasn部署的监测中心。为了将水下的数据传输到监测中心或反之,水面网关应该将声信号转换为RF(射频)信号。根据不同的业务需求,地面网关可以采用蜂窝网络、Zigbee等多种无线通信信道。本文提出了一种具有多个无线通信通道和通信协议的表面网关架构。
{"title":"The Architecture of Surface Gateway for Underwater Acoustic Sensor Networks","authors":"Youngjun Jo, Jungyoungj Bae, Hyunjae Shin, Heungwoo Nam, Sae-Young Ahn, Sunshin An","doi":"10.1109/EUC.2010.50","DOIUrl":"https://doi.org/10.1109/EUC.2010.50","url":null,"abstract":"Recently, the importance of a water resource is highly concerned. Therefore, Underwater Wireless Sensor Networks (UASNs) technologies are vigorously studied for monitoring underwater environment. The UASNs gather various underwater environmental data that should be delivered to a Monitoring Center where nearby or far from UASNs are deployed. To deliver data form underwater to the Monitoring Center or vice versa, a surface gateway should change acoustic signal to RF (Radio Frequency) signal. Depends on the service requirement, the surface gateway can adopt various wireless communication channels such as Cellular network, Zigbee and so on. In this paper, we propose the architecture of surface gateway that has several wireless communication channels and communication protocol.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"48 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130911785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Schedule Swapping: A Technique for Temperature Management of Distributed Embedded Systems 调度交换:一种分布式嵌入式系统的温度管理技术
Farzad Samie Ghahfarokhi, A. Ejlali
A distributed embedded system consists of different processing elements (PEs) communicating via communication links. PEs have various power characteristics and in turn, have different thermal profiles. With new technologies, processor power density is dramatically increased which results in high temperature. This alarming trend underscores the importance of temperature management methods in system design. The majority of proposed techniques to address thermal issues, impose severe penalties on performance and reliability. We present Schedule Swapping, a technique for reducing peak temperature in distributed embedded systems while satisfying real-time constraints. Contrary to many other approaches, our proposed technique does not use slack time for reducing power dissipation but leaves it to be used by recovery mechanisms (rollback re-execution). The more slack time, the more the number of possible recoveries and the more reliability. We also introduce a simple yet effective scheme to ensure that all the deadlines will be met if our technique is used. This scheme also determines the order in which tasks should transmit their data in Schedule Swapping. Our experimental results show up to 18.1C reduction in peak temperature. On average, Schedule Swapping achieves the peak temperature reduction of 11.13C.
分布式嵌入式系统由不同的处理单元(pe)通过通信链路进行通信组成。pe具有不同的功率特性,从而具有不同的热分布。随着新技术的发展,处理器的功率密度急剧增加,导致温度升高。这种令人担忧的趋势强调了温度管理方法在系统设计中的重要性。大多数提出的解决热问题的技术都对性能和可靠性造成了严重的影响。我们提出了一种调度交换技术,它可以在满足实时约束的情况下降低分布式嵌入式系统的峰值温度。与许多其他方法相反,我们提出的技术不使用空闲时间来减少功耗,而是将其留给恢复机制(回滚重新执行)使用。松弛时间越长,可能的恢复次数越多,可靠性越高。我们还介绍了一个简单而有效的方案,以确保如果使用我们的技术,所有的截止日期都将被满足。该方案还决定了任务在调度交换中传输数据的顺序。我们的实验结果表明,峰值温度降低了18.1℃。平均而言,调度交换实现了11.13C的峰值温度降低。
{"title":"Schedule Swapping: A Technique for Temperature Management of Distributed Embedded Systems","authors":"Farzad Samie Ghahfarokhi, A. Ejlali","doi":"10.1109/EUC.2010.11","DOIUrl":"https://doi.org/10.1109/EUC.2010.11","url":null,"abstract":"A distributed embedded system consists of different processing elements (PEs) communicating via communication links. PEs have various power characteristics and in turn, have different thermal profiles. With new technologies, processor power density is dramatically increased which results in high temperature. This alarming trend underscores the importance of temperature management methods in system design. The majority of proposed techniques to address thermal issues, impose severe penalties on performance and reliability. We present Schedule Swapping, a technique for reducing peak temperature in distributed embedded systems while satisfying real-time constraints. Contrary to many other approaches, our proposed technique does not use slack time for reducing power dissipation but leaves it to be used by recovery mechanisms (rollback re-execution). The more slack time, the more the number of possible recoveries and the more reliability. We also introduce a simple yet effective scheme to ensure that all the deadlines will be met if our technique is used. This scheme also determines the order in which tasks should transmit their data in Schedule Swapping. Our experimental results show up to 18.1C reduction in peak temperature. On average, Schedule Swapping achieves the peak temperature reduction of 11.13C.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments 面向服务环境下基于优先级的服务选择信任模型
Xing Su, Minjie Zhang, Y. Mu, K. Sim
How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich context format, including attributes of the service, the priority distribution on attributes and a rating value for each attribute from a third party, (2) The concept of `Similarity' is introduced to measure the difference in terms of distributions of priorities on attributes between requested service and a refereed service in order to precisely predict the performance of a potential provider on the requested service, (3) The concept of general performance of a service provider on a service in history is also introduced to improve the success rate on the requested service. The experimental results can prove that PBtrust has a better performance than that of the CR model in a service-oriented environment.
如何在开放和动态的环境中选择服务消费者在服务质量和成功率方面可以信任的最佳服务提供者(代理),是许多面向服务的应用(如基于internet的网格系统、电子交易系统以及面向服务的计算系统)中一个具有挑战性的问题。提出了一种基于优先级的信任(PBTrust)模型,用于一般面向服务环境下的服务选择。从几个角度来看,PBTrust是稳健和新颖的。(1)服务提供商的声誉来源于作为第三方的裁判,这些裁判以丰富的上下文格式与提供商进行交互,包括服务的属性、属性的优先级分布以及第三方对每个属性的评级值;(2)介绍了“相似”的概念来衡量不同的分布属性优先级的请求服务和执法服务之间为了精确地预测潜在供应商的性能所请求的服务,(3)的概念一般性能服务提供者的服务在历史上也介绍了提高所请求的服务的成功率。实验结果表明,在面向服务的环境下,PBtrust模型比CR模型具有更好的性能。
{"title":"PBTrust: A Priority-Based Trust Model for Service Selection in General Service-Oriented Environments","authors":"Xing Su, Minjie Zhang, Y. Mu, K. Sim","doi":"10.1109/EUC.2010.129","DOIUrl":"https://doi.org/10.1109/EUC.2010.129","url":null,"abstract":"How to choose the best service provider (agent), which a service consumer can trust in terms of the quality and success rate of the service in an open and dynamic environment, is a challenging problem in many service-oriented applications such as Internet-based grid systems, e-trading systems, as well as service-oriented computing systems. This paper presents a Priority-Based Trust (PBTrust) model for service selection in general service-oriented environments. The PBTrust is robust and novel from several perspectives. (1) The reputation of a service provider is derived from referees who are third parties and had interactions with the provider in a rich context format, including attributes of the service, the priority distribution on attributes and a rating value for each attribute from a third party, (2) The concept of `Similarity' is introduced to measure the difference in terms of distributions of priorities on attributes between requested service and a refereed service in order to precisely predict the performance of a potential provider on the requested service, (3) The concept of general performance of a service provider on a service in history is also introduced to improve the success rate on the requested service. The experimental results can prove that PBtrust has a better performance than that of the CR model in a service-oriented environment.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"265 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125812380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making 基于多维模糊决策的移动Ad Hoc网络节点信任评估
Zhang Feng, Z. Jia, Li Xin, Xia Hui
Due to the nature of distribution and self-organization, Mobile ad hoc networks rely on cooperation between nodes to transfer information. Therefore, one of the key factors to ensure high communication quality is an efficient assessment scheme for risks and trust of choosing next cooperative potential nodes. Trust model, an abstract psychological cognitive process, is one of the most complex concepts in social relationships, involving factors such as assumptions, expectations and behaviors. All above makes it very difficult to quantify and forecast trust accurately. In this paper, based on the theories of fuzzy recognition, we present a pattern of multi-dimensional fuzzy decision making with feedback. The analysis and experimental computation shows that this scheme is efficient in risk assessment of Ad hoc networks.
由于分布和自组织的特性,移动自组织网络依赖于节点间的合作来传递信息。因此,有效的选择下一个合作潜在节点的风险和信任评估方案是保证高通信质量的关键因素之一。信任模型是一个抽象的心理认知过程,是社会关系中最复杂的概念之一,涉及假设、期望和行为等因素。这些都给准确量化和预测信任带来了很大的困难。本文在模糊识别理论的基础上,提出了一种带有反馈的多维模糊决策模式。分析和实验计算表明,该方案对Ad hoc网络的风险评估是有效的。
{"title":"Node Trust Assessment in Mobile Ad Hoc Networks Based on Multi-dimensional Fuzzy Decision Making","authors":"Zhang Feng, Z. Jia, Li Xin, Xia Hui","doi":"10.1109/EUC.2010.84","DOIUrl":"https://doi.org/10.1109/EUC.2010.84","url":null,"abstract":"Due to the nature of distribution and self-organization, Mobile ad hoc networks rely on cooperation between nodes to transfer information. Therefore, one of the key factors to ensure high communication quality is an efficient assessment scheme for risks and trust of choosing next cooperative potential nodes. Trust model, an abstract psychological cognitive process, is one of the most complex concepts in social relationships, involving factors such as assumptions, expectations and behaviors. All above makes it very difficult to quantify and forecast trust accurately. In this paper, based on the theories of fuzzy recognition, we present a pattern of multi-dimensional fuzzy decision making with feedback. The analysis and experimental computation shows that this scheme is efficient in risk assessment of Ad hoc networks.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114180929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robot Control Using an Underwater Acoustic Modem 基于水声调制解调器的机器人控制
Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, Sangkyung Kim
Underwater sensor network (USN) enables various services implemented over terrestrial wireless sensor network previously and underwater robot control service is one of the applications of USN. For wirelessly controlling an underwater robot, development of an underwater acoustic modem for transmitting robot control frame as well as analysis of the robot control protocol should be carried out properly. In this paper, we have developed an underwater modem suitable for underwater robot control and designed a protocol to handle the robot. We have also verified the robot control system by experimenting in an underwater environment.
水下传感器网络(USN)使以前在地面无线传感器网络上实现的各种服务成为可能,水下机器人控制服务是USN的应用之一。为了实现水下机器人的无线控制,需要开发用于传输机器人控制帧的水声调制解调器,并对机器人控制协议进行分析。本文研制了一种适用于水下机器人控制的水下调制解调器,并设计了一种处理水下机器人的协议。我们还通过水下环境实验验证了机器人控制系统。
{"title":"Robot Control Using an Underwater Acoustic Modem","authors":"Jun-Ho Jeon, Chang-Gi Hong, Sung-Joon Park, Changhwa Kim, Sangkyung Kim","doi":"10.1109/EUC.2010.55","DOIUrl":"https://doi.org/10.1109/EUC.2010.55","url":null,"abstract":"Underwater sensor network (USN) enables various services implemented over terrestrial wireless sensor network previously and underwater robot control service is one of the applications of USN. For wirelessly controlling an underwater robot, development of an underwater acoustic modem for transmitting robot control frame as well as analysis of the robot control protocol should be carried out properly. In this paper, we have developed an underwater modem suitable for underwater robot control and designed a protocol to handle the robot. We have also verified the robot control system by experimenting in an underwater environment.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122738208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams 在时空数据流上连续查询的GPU执行
Jonathan M. Cazalas, R. Guha
Much research exists for the efficient processing of spatio-temporal data streams. However, all methods ultimately rely on an ill-equipped processor [22], namely a CPU, to evaluate concurrent, continuous spatio-temporal queries over these data streams. This paper presents GEDS, a scalable, Graphics Processing Unit (GPU)-based framework for the evaluation of continuous spatio-temporal queries over spatio-temporal data streams. GEDS employs the computation sharing and parallel processing paradigms to deliver scalability in the evaluation of continuous spatio-temporal queries. The GEDS framework utilizes the parallel processing capability of the GPU, a stream processor by trade, to handle the computation required in this application. Experimental evaluation shows promising performance and shows the scalability and efficacy of GEDS in spatio-temporal data streaming environments.
针对时空数据流的高效处理,已有大量的研究。然而,所有的方法最终都依赖于一个装备不良的处理器[22],即CPU,来评估这些数据流上并发的、连续的时空查询。本文介绍了GEDS,一个可扩展的,基于图形处理单元(GPU)的框架,用于评估对时空数据流的连续时空查询。GEDS采用计算共享和并行处理的模式,在连续时空查询的评估中提供可扩展性。GEDS框架利用GPU的并行处理能力来处理该应用程序所需的计算。实验结果表明,该方法具有良好的性能,并显示了该方法在时空数据流环境下的可扩展性和有效性。
{"title":"GEDS: GPU Execution of Continuous Queries on Spatio-Temporal Data Streams","authors":"Jonathan M. Cazalas, R. Guha","doi":"10.1109/EUC.2010.26","DOIUrl":"https://doi.org/10.1109/EUC.2010.26","url":null,"abstract":"Much research exists for the efficient processing of spatio-temporal data streams. However, all methods ultimately rely on an ill-equipped processor [22], namely a CPU, to evaluate concurrent, continuous spatio-temporal queries over these data streams. This paper presents GEDS, a scalable, Graphics Processing Unit (GPU)-based framework for the evaluation of continuous spatio-temporal queries over spatio-temporal data streams. GEDS employs the computation sharing and parallel processing paradigms to deliver scalability in the evaluation of continuous spatio-temporal queries. The GEDS framework utilizes the parallel processing capability of the GPU, a stream processor by trade, to handle the computation required in this application. Experimental evaluation shows promising performance and shows the scalability and efficacy of GEDS in spatio-temporal data streaming environments.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"482 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122746903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS Policies 通过DPM和DVFS策略在线和自适应相互作用的实时嵌入式系统电源管理
Muhammad Khurram Bhatti, C. Belleudy, M. Auguin
This paper considers the problem of power/energy minimization for periodic real-time tasks that are scheduled over multiprocessor platforms that have dynamic power management (DPM) and dynamic voltage & frequency scaling (DVFS) capabilities. Early research reports that while both DPM and DVFS policies perform well individually for a specific set of conditions, they often outperform each other under different workload and/or architecture configuration. Thus, no single policy fits perfectly all operating conditions. Instead of designing new policies for specific operating conditions, this paper proposes a generic power management scheme, called the Hybrid Power Management (HyPowMan) scheme. This scheme takes a set of well-known existing (DPM and DVFS) policies, each of which performs well for a given set of conditions, and adapts at runtime to the best-performing policy for any given workload. We performed experiments with state-of the-art DPM and DVFS techniques and results show that HyPowMan scheme adapts well to the changing workload and always achieves overall energy savings comparable to the best-performing policy at any point in time.
本文研究了在具有动态电源管理(DPM)和动态电压频率缩放(DVFS)功能的多处理器平台上调度的周期性实时任务的功率/能量最小化问题。早期的研究报告称,虽然DPM和DVFS策略在特定条件下各自表现良好,但在不同的工作负载和/或体系结构配置下,它们的表现往往优于对方。因此,没有一种政策能完美地适应所有的操作条件。本文提出了一种通用的电源管理方案,称为混合电源管理(HyPowMan)方案,而不是针对特定的运行条件设计新的策略。该方案采用一组已知的现有(DPM和DVFS)策略,其中每个策略在给定的一组条件下执行良好,并在运行时适应任何给定工作负载的最佳性能策略。我们使用最先进的DPM和DVFS技术进行了实验,结果表明HyPowMan方案能够很好地适应不断变化的工作负载,并且在任何时间点都能达到与最佳策略相当的总体节能效果。
{"title":"Power Management in Real Time Embedded Systems through Online and Adaptive Interplay of DPM and DVFS Policies","authors":"Muhammad Khurram Bhatti, C. Belleudy, M. Auguin","doi":"10.1109/EUC.2010.35","DOIUrl":"https://doi.org/10.1109/EUC.2010.35","url":null,"abstract":"This paper considers the problem of power/energy minimization for periodic real-time tasks that are scheduled over multiprocessor platforms that have dynamic power management (DPM) and dynamic voltage & frequency scaling (DVFS) capabilities. Early research reports that while both DPM and DVFS policies perform well individually for a specific set of conditions, they often outperform each other under different workload and/or architecture configuration. Thus, no single policy fits perfectly all operating conditions. Instead of designing new policies for specific operating conditions, this paper proposes a generic power management scheme, called the Hybrid Power Management (HyPowMan) scheme. This scheme takes a set of well-known existing (DPM and DVFS) policies, each of which performs well for a given set of conditions, and adapts at runtime to the best-performing policy for any given workload. We performed experiments with state-of the-art DPM and DVFS techniques and results show that HyPowMan scheme adapts well to the changing workload and always achieves overall energy savings comparable to the best-performing policy at any point in time.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
A Fast Heuristic for Solving the D1EC Coloring Problem 一种快速求解D1EC染色问题的启发式算法
F. Campoccia, V. Mancuso
In this paper we propose an efficient heuristic for solving the Distance-1 Edge Coloring problem (D1EC) for the on-the-fly assignment of orthogonal wireless channels in wireless as soon as a topology change occurs. The coloring algorithm exploits the simulated annealing paradigm, i.e., a generalization of Monte Carlo methods for solving combinatorial problems. We show that the simulated annealing-based coloring converges fast to a sub optimal coloring scheme even for the case of dynamic channel allocation. However, a stateful implementation of the D1EC scheme is needed in order to speed-up the network coloring upon topology changes. In fact, a stateful D1EC reduces the algorithm’s convergence time by more than 60% in comparison to stateless algorithms.
本文提出了一种有效的启发式算法,用于解决在拓扑发生变化时无线正交信道的即时分配中的距离-1边着色问题。着色算法利用模拟退火模式,即蒙特卡罗方法的推广,以解决组合问题。我们证明,即使在动态信道分配的情况下,基于模拟退火的着色也能快速收敛到次优着色方案。然而,为了加快拓扑变化时的网络着色速度,需要有状态地实现D1EC方案。事实上,与无状态算法相比,有状态D1EC将算法的收敛时间减少了60%以上。
{"title":"A Fast Heuristic for Solving the D1EC Coloring Problem","authors":"F. Campoccia, V. Mancuso","doi":"10.1109/EUC.2010.71","DOIUrl":"https://doi.org/10.1109/EUC.2010.71","url":null,"abstract":"In this paper we propose an efficient heuristic for solving the Distance-1 Edge Coloring problem (D1EC) for the on-the-fly assignment of orthogonal wireless channels in wireless as soon as a topology change occurs. The coloring algorithm exploits the simulated annealing paradigm, i.e., a generalization of Monte Carlo methods for solving combinatorial problems. We show that the simulated annealing-based coloring converges fast to a sub optimal coloring scheme even for the case of dynamic channel allocation. However, a stateful implementation of the D1EC scheme is needed in order to speed-up the network coloring upon topology changes. In fact, a stateful D1EC reduces the algorithm’s convergence time by more than 60% in comparison to stateless algorithms.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131254372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Mobile Business Information Processing 安全移动商务信息处理
N. Kuntze, R. Rieke, Günther Diederich, R. Sethmann, K. Sohr, Tanveer Mustafa, Kai-Oliver Detken
An ever increasing amount of functionality is incorporated into mobile phones—this trend will continue as new mobile phone platforms are more widely used such as the iPhone or Android. Along with this trend, however, new risks arise, especially for enterprises using mobile phones for security-critical applications such as business intelligence (BI). Although platforms like Android have implemented sophisticated security mechanisms, security holes have been reported. In addition, different stakeholders have access to mobile phones such as different enterprises, service providers, operators, or manufacturers. In order to protect security-critical business applications, a trustworthy mobile phone platform is needed. Starting with typical attack scenarios, we describe a security architecture for Android mobile phones based on the concepts of Trusted Computing. In particular, this architecture allows for a dynamic policy change to reflect the current environment the phone is being used in.
越来越多的功能被整合到移动电话中,随着新的移动电话平台(如iPhone或Android)得到更广泛的应用,这一趋势将继续下去。然而,伴随着这一趋势,新的风险也随之出现,特别是对于使用移动电话进行商业智能(BI)等安全关键应用程序的企业而言。尽管像Android这样的平台已经实现了复杂的安全机制,但仍有安全漏洞的报道。此外,不同的利益相关者可以访问手机,如不同的企业、服务提供商、运营商或制造商。为了保护对安全至关重要的业务应用,需要一个值得信赖的移动电话平台。从典型的攻击场景开始,我们描述了一个基于可信计算概念的Android手机安全架构。特别是,这种架构允许动态更改策略,以反映手机正在使用的当前环境。
{"title":"Secure Mobile Business Information Processing","authors":"N. Kuntze, R. Rieke, Günther Diederich, R. Sethmann, K. Sohr, Tanveer Mustafa, Kai-Oliver Detken","doi":"10.1109/EUC.2010.107","DOIUrl":"https://doi.org/10.1109/EUC.2010.107","url":null,"abstract":"An ever increasing amount of functionality is incorporated into mobile phones—this trend will continue as new mobile phone platforms are more widely used such as the iPhone or Android. Along with this trend, however, new risks arise, especially for enterprises using mobile phones for security-critical applications such as business intelligence (BI). Although platforms like Android have implemented sophisticated security mechanisms, security holes have been reported. In addition, different stakeholders have access to mobile phones such as different enterprises, service providers, operators, or manufacturers. In order to protect security-critical business applications, a trustworthy mobile phone platform is needed. Starting with typical attack scenarios, we describe a security architecture for Android mobile phones based on the concepts of Trusted Computing. In particular, this architecture allows for a dynamic policy change to reflect the current environment the phone is being used in.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128685506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1