Pub Date : 2001-04-16DOI: 10.1109/CDCS.2001.918739
Shih-Lin Wu, Y. Tseng, Chih-Yu Lin, J. Sheu
In a mobile ad-hoc networks (MANET), one essential issue is medium access control (MAC) which addresses how to utilize the radio spectrum efficiently and to resolve potential contention and collision among mobile hosts on using the medium. Existing work is dedicated to using multiple channels and power control to improve the performance of MANET. We investigate the possibility of bringing the concepts of power control and multi-channel medium access together in the MAC design problem in a MANET. Existing protocols only address one of these issues independently. The proposed protocol is characterized by the following features: it follows an "on-demand" style to assign channels to mobile hosts; the number of channels required is independent of the network topology and degree; it flexibly adapts to host mobility; no form of clock synchronization is required; and power control is used to exploit frequency reuse. Power control may also extend battery life and reduce signal interference, both of which are important in wireless communication. Through simulations, we demonstrate the advantage of our new protocol.
{"title":"A multi-channel MAC protocol with power control for multi-hop mobile ad hoc networks","authors":"Shih-Lin Wu, Y. Tseng, Chih-Yu Lin, J. Sheu","doi":"10.1109/CDCS.2001.918739","DOIUrl":"https://doi.org/10.1109/CDCS.2001.918739","url":null,"abstract":"In a mobile ad-hoc networks (MANET), one essential issue is medium access control (MAC) which addresses how to utilize the radio spectrum efficiently and to resolve potential contention and collision among mobile hosts on using the medium. Existing work is dedicated to using multiple channels and power control to improve the performance of MANET. We investigate the possibility of bringing the concepts of power control and multi-channel medium access together in the MAC design problem in a MANET. Existing protocols only address one of these issues independently. The proposed protocol is characterized by the following features: it follows an \"on-demand\" style to assign channels to mobile hosts; the number of channels required is independent of the network topology and degree; it flexibly adapts to host mobility; no form of clock synchronization is required; and power control is used to exploit frequency reuse. Power control may also extend battery life and reduce signal interference, both of which are important in wireless communication. Through simulations, we demonstrate the advantage of our new protocol.","PeriodicalId":273489,"journal":{"name":"Proceedings 21st International Conference on Distributed Computing Systems Workshops","volume":"529 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115733142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-16DOI: 10.1109/CDCS.2001.918737
Jiung-yao Huang, Hua-hseng Bai, Chi-fu Tai, C. Gau
The paper presents the technique and experience of building a high-fidelity visual interactive simulator on a cluster of desktop computers (COD). The COD is a fully distributed computation environment that is constructed by clustering several desktop computers to form a high-performance computation environment. The contributions of the paper include proposing a method to build a high-fidelity interactive visual simulator on a cluster of desktop computers. A distribution socket, called Communication Backbone (CB), is designed and implemented to achieve this goal. In addition, the proposed architecture is used to construct a mobile crane simulator for training. The result of the implemented simulator is also presented and discussed.
{"title":"Experience of building a high-fidelity mobile crane simulator with cluster of desktop computers","authors":"Jiung-yao Huang, Hua-hseng Bai, Chi-fu Tai, C. Gau","doi":"10.1109/CDCS.2001.918737","DOIUrl":"https://doi.org/10.1109/CDCS.2001.918737","url":null,"abstract":"The paper presents the technique and experience of building a high-fidelity visual interactive simulator on a cluster of desktop computers (COD). The COD is a fully distributed computation environment that is constructed by clustering several desktop computers to form a high-performance computation environment. The contributions of the paper include proposing a method to build a high-fidelity interactive visual simulator on a cluster of desktop computers. A distribution socket, called Communication Backbone (CB), is designed and implemented to achieve this goal. In addition, the proposed architecture is used to construct a mobile crane simulator for training. The result of the implemented simulator is also presented and discussed.","PeriodicalId":273489,"journal":{"name":"Proceedings 21st International Conference on Distributed Computing Systems Workshops","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129685464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-16DOI: 10.1109/CDCS.2001.918706
K. Takashio, G. Soeda, H. Tokuda
The paper presents a new mobile agent framework, f-Desktop, which is designed for describing follow-me applications in a ubiquitous computing environment. It provides the migration mechanisms for agent software which are secure against illegal call-up transaction requests from computers which masquerade as the owner of the agent software. Moreover, a follow-me application built with the f-Desktop framework possesses a high adaptability to computing environment and a high connection continuity against changes of location. In the f-Deskrop framework, a user can define his desktop computing environment, desktop or desktop environment in short, as a set of follow-me applications. Then, the user can take the desktop computing environment along to other computers.
{"title":"A mobile agent framework for follow-me applications in ubiquitous computing environment","authors":"K. Takashio, G. Soeda, H. Tokuda","doi":"10.1109/CDCS.2001.918706","DOIUrl":"https://doi.org/10.1109/CDCS.2001.918706","url":null,"abstract":"The paper presents a new mobile agent framework, f-Desktop, which is designed for describing follow-me applications in a ubiquitous computing environment. It provides the migration mechanisms for agent software which are secure against illegal call-up transaction requests from computers which masquerade as the owner of the agent software. Moreover, a follow-me application built with the f-Desktop framework possesses a high adaptability to computing environment and a high connection continuity against changes of location. In the f-Deskrop framework, a user can define his desktop computing environment, desktop or desktop environment in short, as a set of follow-me applications. Then, the user can take the desktop computing environment along to other computers.","PeriodicalId":273489,"journal":{"name":"Proceedings 21st International Conference on Distributed Computing Systems Workshops","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-16DOI: 10.1109/CDCS.2001.918702
Takeshi Saito, I. Tomoda, Y. Takabatake, K. Teramoto, Kensaku Fujimoto
We propose two gateway architectures. The first one is the home gateway, which interconnects home networks and the public (access) network. We show its requirements and software design. We implemented an experimental home gateway based on a Web server enhanced with Java facilities. It interconnects the Internet and the home networks (IEEE1394 AV network and the ECHONET home automation network). It also has a real time MP1394 transcoding function which transcodes AV data on IEEE1394 into MPEG4 video. It provides the capability of remote control of the home, and AV data transmission/translation capabilities. The second one is the wireless gateway. We show the background with respect to the wireless gateway and its design. The key issue is to develop interconnectivity between wired and wireless networks, and then we show our implementation of it. It interconnects IEEE1394 and 802.11b 2.4 GHz band high-speed wireless network, and transmits AV control commands and high-quality AV data.
{"title":"Gateway technologies for home network and their implementations","authors":"Takeshi Saito, I. Tomoda, Y. Takabatake, K. Teramoto, Kensaku Fujimoto","doi":"10.1109/CDCS.2001.918702","DOIUrl":"https://doi.org/10.1109/CDCS.2001.918702","url":null,"abstract":"We propose two gateway architectures. The first one is the home gateway, which interconnects home networks and the public (access) network. We show its requirements and software design. We implemented an experimental home gateway based on a Web server enhanced with Java facilities. It interconnects the Internet and the home networks (IEEE1394 AV network and the ECHONET home automation network). It also has a real time MP1394 transcoding function which transcodes AV data on IEEE1394 into MPEG4 video. It provides the capability of remote control of the home, and AV data transmission/translation capabilities. The second one is the wireless gateway. We show the background with respect to the wireless gateway and its design. The key issue is to develop interconnectivity between wired and wireless networks, and then we show our implementation of it. It interconnects IEEE1394 and 802.11b 2.4 GHz band high-speed wireless network, and transmits AV control commands and high-quality AV data.","PeriodicalId":273489,"journal":{"name":"Proceedings 21st International Conference on Distributed Computing Systems Workshops","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124173362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-16DOI: 10.1109/CDCS.2001.918724
I. Tsai, J.H.S. Yang
The popularity of distance learning systems has signalled the coming of a new era of learning technology. From the simple use of Web page-based lecture notes to multimedia course contents, there is a wide array of course contents that are transmitted over the Internet. Learning technology has become a heated research issue in both the educational research community and the infrastructure-building community. The main goal is to create effective learning tools and to explore new learning paradigms that are available through networked computers, no matter which pedagogical approach is adopted by the learning tools. One consensus is that learning effectiveness depends largely on the response time of replies when learners have questions. In this paper, the author proposes an approach that was used in the development of an coursework assignment system that has been used over many years to promote learning effectiveness. The basic idea is to provide interactive, individualized questions and answers that are facilitated by the use of computers and networks. Learners receive highly sophisticated questions that are constructed by the instructor, aimed at accessing a certain concept. The instant feedback stimulates the learner to think and respond to the question on his/her own behalf. This approach has the advantage that the questions asked by the instructor can be coordinated in a more individualized fashion and at the same time can be part of the use of more versatile student assessments in a distance education system.
{"title":"Toward better assessments in distance education","authors":"I. Tsai, J.H.S. Yang","doi":"10.1109/CDCS.2001.918724","DOIUrl":"https://doi.org/10.1109/CDCS.2001.918724","url":null,"abstract":"The popularity of distance learning systems has signalled the coming of a new era of learning technology. From the simple use of Web page-based lecture notes to multimedia course contents, there is a wide array of course contents that are transmitted over the Internet. Learning technology has become a heated research issue in both the educational research community and the infrastructure-building community. The main goal is to create effective learning tools and to explore new learning paradigms that are available through networked computers, no matter which pedagogical approach is adopted by the learning tools. One consensus is that learning effectiveness depends largely on the response time of replies when learners have questions. In this paper, the author proposes an approach that was used in the development of an coursework assignment system that has been used over many years to promote learning effectiveness. The basic idea is to provide interactive, individualized questions and answers that are facilitated by the use of computers and networks. Learners receive highly sophisticated questions that are constructed by the instructor, aimed at accessing a certain concept. The instant feedback stimulates the learner to think and respond to the question on his/her own behalf. This approach has the advantage that the questions asked by the instructor can be coordinated in a more individualized fashion and at the same time can be part of the use of more versatile student assessments in a distance education system.","PeriodicalId":273489,"journal":{"name":"Proceedings 21st International Conference on Distributed Computing Systems Workshops","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-16DOI: 10.1109/CDCS.2001.918683
Zhen Xiao, K. Birman
An efficient error recovery algorithm is essential for reliable multicast in large groups. This paper presents RRMP, a randomized reliable multicast protocol which improves the robustness of traditional tree-based protocols by diffusing the responsibility of error recovery among all members in a group. Both simulation and experimental results show that the protocol achieves good performance.
{"title":"Providing efficient, robust error recovery through randomization","authors":"Zhen Xiao, K. Birman","doi":"10.1109/CDCS.2001.918683","DOIUrl":"https://doi.org/10.1109/CDCS.2001.918683","url":null,"abstract":"An efficient error recovery algorithm is essential for reliable multicast in large groups. This paper presents RRMP, a randomized reliable multicast protocol which improves the robustness of traditional tree-based protocols by diffusing the responsibility of error recovery among all members in a group. Both simulation and experimental results show that the protocol achieves good performance.","PeriodicalId":273489,"journal":{"name":"Proceedings 21st International Conference on Distributed Computing Systems Workshops","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121935889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-16DOI: 10.1109/CDCS.2001.918681
M. Correia, P. Veríssimo, N. Neves
This paper presents the architecture of a secure group communication system with the fortress model of trust, where the participants of the group equally trust one another. It considers that only a small part of the system, a component called the Trusted Timely Computing Base, has to be entirely trusted. All other components can be corrupted. The overall system will tolerate a certain number of faults of its components and remain behaving correctly.
{"title":"The architecture of a secure group communication system based on intrusion tolerance","authors":"M. Correia, P. Veríssimo, N. Neves","doi":"10.1109/CDCS.2001.918681","DOIUrl":"https://doi.org/10.1109/CDCS.2001.918681","url":null,"abstract":"This paper presents the architecture of a secure group communication system with the fortress model of trust, where the participants of the group equally trust one another. It considers that only a small part of the system, a component called the Trusted Timely Computing Base, has to be entirely trusted. All other components can be corrupted. The overall system will tolerate a certain number of faults of its components and remain behaving correctly.","PeriodicalId":273489,"journal":{"name":"Proceedings 21st International Conference on Distributed Computing Systems Workshops","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115808464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-16DOI: 10.1109/CDCS.2001.918726
Sylvain Descamps, M. Ishizuka
Interface agents are more and more often leaving laboratories to be used as commercial products. We can see them presenting news on the Internet or as tour guides in 3D worlds. These agents present a new opportunity for authors to create a new kind of presentation which is more attractive and interactive. However, as many interface agent systems are now available, controlling them needs advanced knowledge of programming languages such as JavaScript or Visual Basic Script. Our motivation is to provide classical authors with a powerful but easy-to-use language to control interface agents: the Multimodal Presentation Markup Language (MPML). Our main focus is to provide emotional control of the agents to make the communication with the user even more natural.
{"title":"Bringing affective behaviour to presentation agents","authors":"Sylvain Descamps, M. Ishizuka","doi":"10.1109/CDCS.2001.918726","DOIUrl":"https://doi.org/10.1109/CDCS.2001.918726","url":null,"abstract":"Interface agents are more and more often leaving laboratories to be used as commercial products. We can see them presenting news on the Internet or as tour guides in 3D worlds. These agents present a new opportunity for authors to create a new kind of presentation which is more attractive and interactive. However, as many interface agent systems are now available, controlling them needs advanced knowledge of programming languages such as JavaScript or Visual Basic Script. Our motivation is to provide classical authors with a powerful but easy-to-use language to control interface agents: the Multimodal Presentation Markup Language (MPML). Our main focus is to provide emotional control of the agents to make the communication with the user even more natural.","PeriodicalId":273489,"journal":{"name":"Proceedings 21st International Conference on Distributed Computing Systems Workshops","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132373058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-16DOI: 10.1109/CDCS.2001.918743
Michael Mahan
Given the mobile phone's high market penetration and strong upgrade rate, it suggests itself as a natural candidate to support, and eventually host a user's digital representative. Coupled with artificial intelligence techniques, a phone-borne digital representative takes the form of a mobile assistant. Mobile assistants can circumvent hardware constraints (CPU cycles, narrow or expensive bandwidth, small memory, and limited user interface). They can also enable a set of new services that draw on the user's personal preferences, the user's location, available services, and the mobile phone's support of short-range connectivity. Although mutually independent, both capabilities, taken together, yield a powerful, digital representation of the mobile user. This digital representation can provide an optimal user experience, i.e., maximal connection to relevant services, without information overload or expensive wireless service charges. The article addresses three topics: the emergent mobile computing environment; the characteristics of mobile assistants that enable them to operate in this environment; and proposed mobile assistant architectures which target both current and future mobile phones.
{"title":"Agents and mobile handsets","authors":"Michael Mahan","doi":"10.1109/CDCS.2001.918743","DOIUrl":"https://doi.org/10.1109/CDCS.2001.918743","url":null,"abstract":"Given the mobile phone's high market penetration and strong upgrade rate, it suggests itself as a natural candidate to support, and eventually host a user's digital representative. Coupled with artificial intelligence techniques, a phone-borne digital representative takes the form of a mobile assistant. Mobile assistants can circumvent hardware constraints (CPU cycles, narrow or expensive bandwidth, small memory, and limited user interface). They can also enable a set of new services that draw on the user's personal preferences, the user's location, available services, and the mobile phone's support of short-range connectivity. Although mutually independent, both capabilities, taken together, yield a powerful, digital representation of the mobile user. This digital representation can provide an optimal user experience, i.e., maximal connection to relevant services, without information overload or expensive wireless service charges. The article addresses three topics: the emergent mobile computing environment; the characteristics of mobile assistants that enable them to operate in this environment; and proposed mobile assistant architectures which target both current and future mobile phones.","PeriodicalId":273489,"journal":{"name":"Proceedings 21st International Conference on Distributed Computing Systems Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130727938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2001-04-16DOI: 10.1109/CDCS.2001.918731
T. Yang, Z. Chen, D. Makrakis, A. Hafid
There are many research papers concerning the performance of Assured Forwarding (AF) service in a single Differentiated Services domain network. However, few works have dealt with the performance evaluation of architectures that are based on interconnected AF service domains. The paper presents a simulation based performance study of the AF service in a multi-DS domain network architecture. This was motivated by the fact that in the real world, communication systems are often composed of many interconnected domains. We also give a comparison of the performance of AF service in single- versus multi-DS domain networks.
{"title":"The performance of AF service in multi-DS domain networks","authors":"T. Yang, Z. Chen, D. Makrakis, A. Hafid","doi":"10.1109/CDCS.2001.918731","DOIUrl":"https://doi.org/10.1109/CDCS.2001.918731","url":null,"abstract":"There are many research papers concerning the performance of Assured Forwarding (AF) service in a single Differentiated Services domain network. However, few works have dealt with the performance evaluation of architectures that are based on interconnected AF service domains. The paper presents a simulation based performance study of the AF service in a multi-DS domain network architecture. This was motivated by the fact that in the real world, communication systems are often composed of many interconnected domains. We also give a comparison of the performance of AF service in single- versus multi-DS domain networks.","PeriodicalId":273489,"journal":{"name":"Proceedings 21st International Conference on Distributed Computing Systems Workshops","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2001-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131441316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}