首页 > 最新文献

International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II最新文献

英文 中文
An applying aspect-oriented concept to sequential logic design 将面向方面的概念应用于顺序逻辑设计
Petcharat Burapathana, Proadpran Pitsatorn, Boonchai Sowanwanichkul
Because of rapid hardware design's evolution, hardware circuits are more complex. Hardware designer would not spend too much time to produce the circuits. One of hardware designers' problems is redesigning of circuit occurring when specifications were changed. The existing research proves that object-oriented concept can be applied efficiently in hardware design covering both combinational and sequential logic circuits. Aspect-oriented is a new paradigm in software development. It can solve some problems such as crosscutting concerns where object oriented concept cannot. This paper proposes the idea that aspect-oriented concept can be implemented to the sequential logic circuit resulting in reducing time in hardware design process.
由于硬件设计的快速发展,硬件电路变得更加复杂。硬件设计者不会花太多时间来制作电路。硬件设计人员面临的问题之一是在规格改变时重新设计电路。已有的研究表明,面向对象的概念可以有效地应用于组合逻辑电路和顺序逻辑电路的硬件设计中。面向方面是软件开发中的一种新范式。它可以解决一些面向对象概念无法解决的问题,比如横切关注点。本文提出了将面向方面的思想应用到顺序逻辑电路中,从而减少了硬件设计过程中的时间。
{"title":"An applying aspect-oriented concept to sequential logic design","authors":"Petcharat Burapathana, Proadpran Pitsatorn, Boonchai Sowanwanichkul","doi":"10.1109/ITCC.2005.69","DOIUrl":"https://doi.org/10.1109/ITCC.2005.69","url":null,"abstract":"Because of rapid hardware design's evolution, hardware circuits are more complex. Hardware designer would not spend too much time to produce the circuits. One of hardware designers' problems is redesigning of circuit occurring when specifications were changed. The existing research proves that object-oriented concept can be applied efficiently in hardware design covering both combinational and sequential logic circuits. Aspect-oriented is a new paradigm in software development. It can solve some problems such as crosscutting concerns where object oriented concept cannot. This paper proposes the idea that aspect-oriented concept can be implemented to the sequential logic circuit resulting in reducing time in hardware design process.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115599785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An introduction to TUG: a language for writing reusable formal program specifications TUG的介绍:一种用于编写可重用的正式程序规范的语言
C. Chiang
TUG (Tree Unified with Grammar) was developed to support a system to be developed through an integration of conventional software development, operational specification, rapid prototyping via software transformations, software reuse, and analysis of specifications and programs via testing and proofs. The language integrates various software development paradigms into a coherent whole to fit specific needs of developing organizations. This paper shows how to write reusable specifications in TUG. Compared to other existing specification languages, the advantages, disadvantages, limitations, and strengths of the language is discussed. The language improves the reusability of formal specifications in the following ways: (i) a developer can run a TUG specification as a prototype to study its behavior due to its executability at the front-end of the software life cycle, (ii) a developer can easily write a parametric program corresponding to its parametric specification due to the similar semantics.
开发TUG(统一语法树)是为了支持通过集成传统软件开发、操作规范、通过软件转换的快速原型、软件重用以及通过测试和证明对规范和程序进行分析来开发系统。该语言将各种软件开发范例集成为一个连贯的整体,以适应开发组织的特定需求。本文展示了如何在TUG中编写可重用的规范。与其他现有的规范语言相比,讨论了该语言的优点、缺点、限制和优点。该语言通过以下方式提高了正式规范的可重用性:(i)由于其在软件生命周期前端的可执行性,开发人员可以将TUG规范作为原型运行以研究其行为;(ii)由于语义相似,开发人员可以轻松编写与其参数规范对应的参数程序。
{"title":"An introduction to TUG: a language for writing reusable formal program specifications","authors":"C. Chiang","doi":"10.1109/ITCC.2005.83","DOIUrl":"https://doi.org/10.1109/ITCC.2005.83","url":null,"abstract":"TUG (Tree Unified with Grammar) was developed to support a system to be developed through an integration of conventional software development, operational specification, rapid prototyping via software transformations, software reuse, and analysis of specifications and programs via testing and proofs. The language integrates various software development paradigms into a coherent whole to fit specific needs of developing organizations. This paper shows how to write reusable specifications in TUG. Compared to other existing specification languages, the advantages, disadvantages, limitations, and strengths of the language is discussed. The language improves the reusability of formal specifications in the following ways: (i) a developer can run a TUG specification as a prototype to study its behavior due to its executability at the front-end of the software life cycle, (ii) a developer can easily write a parametric program corresponding to its parametric specification due to the similar semantics.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116885698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
n-state quantum coin flipping protocol n态量子抛硬币协议
A. Waseda, Masakazu Soshi, A. Miyaji
We propose the n-state quantum coin flipping protocol by generalizing the three states protocol. Furthermore, we conduct security analysis on our protocol and show that in our protocol we can reduce the bias of one player arbitrarily, but at the cost of increase of the bias of the other.
通过对三态协议的推广,提出了n态量子抛币协议。此外,我们对我们的协议进行了安全性分析,并表明在我们的协议中,我们可以任意减少一方的偏见,但代价是增加另一方的偏见。
{"title":"n-state quantum coin flipping protocol","authors":"A. Waseda, Masakazu Soshi, A. Miyaji","doi":"10.1109/ITCC.2005.208","DOIUrl":"https://doi.org/10.1109/ITCC.2005.208","url":null,"abstract":"We propose the n-state quantum coin flipping protocol by generalizing the three states protocol. Furthermore, we conduct security analysis on our protocol and show that in our protocol we can reduce the bias of one player arbitrarily, but at the cost of increase of the bias of the other.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116978179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new phylogenetic tree model for fuzzy characters 一种新的模糊性状系统发育树模型
A. Auyeung
Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be lost during the discretization of the experimental data. Indeed, fuzzy boundaries between species and degrees of character development are commonly found in nature. Therefore, we proposed the fuzzy perfect phylogeny model that extends the perfect phylogeny model to allow for a fuzzy membership of the characters. The properties of this model, such as uniqueness and backward compatibility, were then shown. We also showed how the fuzzy perfect phylogeny problem can be transformed to the perfect phylogeny problem in O(mv) time where m is the number of objects and v is the number of distinct value of characters. As a result, valuable information from the experimental data can be used without substantially increasing the problem complex.
完美系统发育是最流行的基于字符的模型之一。该模型假定角色的状态是离散的。虽然它提供了一个简单的字符抽象,但在实验数据的离散化过程中可能会丢失有价值的信息。事实上,物种和性格发展程度之间的模糊界限在自然界中很常见。因此,我们提出了模糊完美系统发育模型,扩展了完美系统发育模型,以允许字符的模糊隶属度。该模型具有唯一性和向后兼容性等特性。我们还展示了如何将模糊完美系统发育问题转化为O(mv)时间内的完美系统发育问题,其中m为对象的数量,v为字符的不同值的数量。因此,从实验数据中获得的有价值的信息可以在不大幅增加问题复杂性的情况下使用。
{"title":"A new phylogenetic tree model for fuzzy characters","authors":"A. Auyeung","doi":"10.1109/ITCC.2005.22","DOIUrl":"https://doi.org/10.1109/ITCC.2005.22","url":null,"abstract":"Perfect phylogeny is one of the most popular character-based models. This model assumes the states of the characters are discrete. Although it provides a simple abstraction of characters, valuable information could be lost during the discretization of the experimental data. Indeed, fuzzy boundaries between species and degrees of character development are commonly found in nature. Therefore, we proposed the fuzzy perfect phylogeny model that extends the perfect phylogeny model to allow for a fuzzy membership of the characters. The properties of this model, such as uniqueness and backward compatibility, were then shown. We also showed how the fuzzy perfect phylogeny problem can be transformed to the perfect phylogeny problem in O(mv) time where m is the number of objects and v is the number of distinct value of characters. As a result, valuable information from the experimental data can be used without substantially increasing the problem complex.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116332782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Local language support for handheld devices 手持设备的本地语言支持
Yaswanth Narvaneni, M. B. Srinivas
Handheld devices or personal digital assistants (PDAs) are increasingly being used for purposes other than storing personal information. A wide variety of applications are being developed to take advantage of computing power available on PDAs. Also a need is being felt in non-English speaking countries like India to develop applications in local languages. Such applications are expected to be useful in field like education, health and census etc., for data collection and dissemination. It is the purpose of this paper to show how support for local language can be built on low cost PDAs.
手持设备或个人数字助理(pda)越来越多地用于存储个人信息以外的目的。正在开发各种各样的应用程序,以利用pda上可用的计算能力。印度等非英语国家也需要开发当地语言的应用程序。这些应用可望在教育、保健和人口普查等领域有助于数据的收集和传播。本文的目的是展示如何在低成本pda上构建对本地语言的支持。
{"title":"Local language support for handheld devices","authors":"Yaswanth Narvaneni, M. B. Srinivas","doi":"10.1109/ITCC.2005.185","DOIUrl":"https://doi.org/10.1109/ITCC.2005.185","url":null,"abstract":"Handheld devices or personal digital assistants (PDAs) are increasingly being used for purposes other than storing personal information. A wide variety of applications are being developed to take advantage of computing power available on PDAs. Also a need is being felt in non-English speaking countries like India to develop applications in local languages. Such applications are expected to be useful in field like education, health and census etc., for data collection and dissemination. It is the purpose of this paper to show how support for local language can be built on low cost PDAs.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116388841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mitigating denial of service attacks with password puzzles 通过密码谜题减少拒绝服务攻击
M. Ma
The client puzzles have been proposed as an important mechanism in defending against distributed denial-of-service (DDoS) attacks. In this paper we propose a new IP layer client puzzles scheme, password puzzles (PP). In this scheme a puzzle issuer; on the behalf of a receiver, responds to requests with puzzles that a sender must solve before sending in any packet to a receiver. We design two new puzzle types, hash-chain-reversal puzzles and multiple-hash-chains-reversal puzzles, with which a sender is expected to reverse one (multiple) hash chain(s) and send in packets with valid passwords (i.e., solutions of puzzles) to the receiver. Our design achieves three main properties. First, the PP scheme is able to generate puzzles with different difficulties flexibly for various clients. Second, a puzzle issuer is able to generate puzzles at a per-flow and per-packet basis. Third, the PP scheme is able to converge to be a "non-puzzle " protocol.
客户端谜题被认为是防御分布式拒绝服务(DDoS)攻击的重要机制。本文提出了一种新的IP层客户端谜题方案——密码谜题(PP)。在这个方案中,一个谜题发行者;代表接收方,响应发送方在向接收方发送任何数据包之前必须解决的谜题请求。我们设计了两种新的谜题类型,哈希链反转谜题和多哈希链反转谜题,其中发送方期望反转一个(多个)哈希链,并将具有有效密码(即谜题的解)的数据包发送给接收方。我们的设计实现了三个主要特性。首先,PP方案能够灵活地为不同的客户生成不同难度的谜题。其次,谜题发布器能够以每个流和每个包为基础生成谜题。第三,PP方案能够收敛成为一个“非谜题”协议。
{"title":"Mitigating denial of service attacks with password puzzles","authors":"M. Ma","doi":"10.1109/ITCC.2005.200","DOIUrl":"https://doi.org/10.1109/ITCC.2005.200","url":null,"abstract":"The client puzzles have been proposed as an important mechanism in defending against distributed denial-of-service (DDoS) attacks. In this paper we propose a new IP layer client puzzles scheme, password puzzles (PP). In this scheme a puzzle issuer; on the behalf of a receiver, responds to requests with puzzles that a sender must solve before sending in any packet to a receiver. We design two new puzzle types, hash-chain-reversal puzzles and multiple-hash-chains-reversal puzzles, with which a sender is expected to reverse one (multiple) hash chain(s) and send in packets with valid passwords (i.e., solutions of puzzles) to the receiver. Our design achieves three main properties. First, the PP scheme is able to generate puzzles with different difficulties flexibly for various clients. Second, a puzzle issuer is able to generate puzzles at a per-flow and per-packet basis. Third, the PP scheme is able to converge to be a \"non-puzzle \" protocol.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123641685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Mining p53 binding sites using profile hidden Markov model 利用隐马尔可夫模型挖掘p53结合位点
Jeffrey Huang, Shijun Li
Hidden Markov model has been successfully applied to bacterial gene finders and mRNA splicing modeling. Using a set of observing DNA sequences, HMM is derived for homologous search. In this paper we develop profile HMM in detecting p53, a tumor suppressor, binding sites along genes. Without assuming the constant number of nucleotides in p53 binding site, profile HMM and viterbi algorithms are designed to detect the embedded p53 binding sites from the promoter genes chosen from GenBank. The p53 regulated genes containing either single or multiple p53 binding sites distributed as clusters can be identified and classified into 7 functional groups including cell cycle regulation, DNA damage repair, signaling transduction, transcriptional factor, stress response, tumor suppressor, and oncogen.
隐马尔可夫模型已成功地应用于细菌基因发现和mRNA剪接建模。利用一组观察到的DNA序列,推导出用于同源搜索的HMM。在本文中,我们建立了沿基因检测肿瘤抑制因子p53结合位点的谱HMM。在不假设p53结合位点核苷酸数目不变的情况下,设计了profile HMM和viterbi算法来检测从GenBank中选择的启动子基因中嵌入的p53结合位点。含有单个或多个p53结合位点的p53调控基因呈簇状分布,可将其分为细胞周期调控、DNA损伤修复、信号转导、转录因子、应激反应、肿瘤抑制因子、癌原等7个功能群。
{"title":"Mining p53 binding sites using profile hidden Markov model","authors":"Jeffrey Huang, Shijun Li","doi":"10.1109/ITCC.2005.197","DOIUrl":"https://doi.org/10.1109/ITCC.2005.197","url":null,"abstract":"Hidden Markov model has been successfully applied to bacterial gene finders and mRNA splicing modeling. Using a set of observing DNA sequences, HMM is derived for homologous search. In this paper we develop profile HMM in detecting p53, a tumor suppressor, binding sites along genes. Without assuming the constant number of nucleotides in p53 binding site, profile HMM and viterbi algorithms are designed to detect the embedded p53 binding sites from the promoter genes chosen from GenBank. The p53 regulated genes containing either single or multiple p53 binding sites distributed as clusters can be identified and classified into 7 functional groups including cell cycle regulation, DNA damage repair, signaling transduction, transcriptional factor, stress response, tumor suppressor, and oncogen.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"23 3 Suppl 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123957696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A framework for key management in mobile ad hoc networks 移动自组织网络中的密钥管理框架
G. Hadjichristofi, W. J. Adams, IV NathanielJ.Davis
Recently proposed key management systems (KMSs) provide limited functionality in highly partitioned mobile ad hoc networks. In this paper we present a framework for key management that provides redundancy and robustness for security association (SA) establishment between pairs of nodes in mobile ad hoc networks. Our KMS uses a modified hierarchical trust public key infrastructure (PKI) model in which nodes can dynamically assume management roles. The system ensures high service availability for the network members through a number of schemes. A novel behavior grading mechanism provides security criteria for the network nodes and aids the management functions of the KMS to revoke or reissue certificates for nodes. This mechanism is based on the notion of trust, and more specifically on SAs among nodes in the entire network. In this paper we give an overview of the framework of the system and present a performance analysis of the system based on certificate issuance and acquisition. Finally, we compare our KMS with threshold cryptography schemes.
最近提出的密钥管理系统(KMSs)在高度分区的移动自组织网络中提供有限的功能。在本文中,我们提出了一个密钥管理框架,该框架为移动自组织网络中节点对之间的安全关联(SA)建立提供了冗余和鲁棒性。我们的KMS使用改进的分层信任公钥基础设施(PKI)模型,其中节点可以动态地承担管理角色。系统通过多种方案保证网络成员的高服务可用性。一种新的行为分级机制为网络节点提供了安全标准,并帮助KMS的管理功能撤销或重新颁发节点证书。这种机制基于信任的概念,更具体地说,是基于整个网络中节点之间的sa。在本文中,我们概述了系统的框架,并给出了基于证书颁发和获取的系统性能分析。最后,我们将KMS与阈值加密方案进行了比较。
{"title":"A framework for key management in mobile ad hoc networks","authors":"G. Hadjichristofi, W. J. Adams, IV NathanielJ.Davis","doi":"10.1109/ITCC.2005.10","DOIUrl":"https://doi.org/10.1109/ITCC.2005.10","url":null,"abstract":"Recently proposed key management systems (KMSs) provide limited functionality in highly partitioned mobile ad hoc networks. In this paper we present a framework for key management that provides redundancy and robustness for security association (SA) establishment between pairs of nodes in mobile ad hoc networks. Our KMS uses a modified hierarchical trust public key infrastructure (PKI) model in which nodes can dynamically assume management roles. The system ensures high service availability for the network members through a number of schemes. A novel behavior grading mechanism provides security criteria for the network nodes and aids the management functions of the KMS to revoke or reissue certificates for nodes. This mechanism is based on the notion of trust, and more specifically on SAs among nodes in the entire network. In this paper we give an overview of the framework of the system and present a performance analysis of the system based on certificate issuance and acquisition. Finally, we compare our KMS with threshold cryptography schemes.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124040979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
A TDMA based scheduling scheme in 802.11b WLANs with access point 带接入点的802.11b无线局域网中基于TDMA的调度方案
O. Abu-Sharkh, A. Tewfik
This paper introduces a new scheduling scheme that provides fair access to all stations in 802.11b WLANs. The scheme divides the transmission opportunities between wireless stations according to their operating conditions. Stations that face errors and can't communicate with the access point are given more transmission time at the moment these errors reduce to compensate for their loss of service. In 802.11b wireless stations can operate at different data rates 11, 5.5, 2 and 1 Mbps. From the literature and our simulation we found that operating at lower data rates would degrade the overall performance of the system. Still, it is impractical in developing a schedule scheme to assume that a wireless station can only operate at full data rate as similar previous work. Our scheduling scheme takes in consideration that some stations may operate at data rates lower than 11 Mbps. Simulation results show that fairness between mobile stations is almost achieved.
本文介绍了一种新的802.11b无线局域网中为所有站点提供公平访问的调度方案。该方案根据无线站的运行条件划分无线站之间的传输机会。面对错误并且不能与接入点通信的站点在这些错误减少以补偿其服务损失的时刻被给予更多的传输时间。在802.11b中,无线站可以以不同的数据速率运行,速率为11,5.5,2和1mbps。从文献和我们的模拟中,我们发现以较低的数据速率运行会降低系统的整体性能。然而,在开发调度方案时,假设无线站只能像以前的工作那样以全数据速率运行是不切实际的。我们的调度方案考虑到一些站点可能以低于11mbps的数据速率运行。仿真结果表明,移动站间的公平性基本实现。
{"title":"A TDMA based scheduling scheme in 802.11b WLANs with access point","authors":"O. Abu-Sharkh, A. Tewfik","doi":"10.1109/ITCC.2005.44","DOIUrl":"https://doi.org/10.1109/ITCC.2005.44","url":null,"abstract":"This paper introduces a new scheduling scheme that provides fair access to all stations in 802.11b WLANs. The scheme divides the transmission opportunities between wireless stations according to their operating conditions. Stations that face errors and can't communicate with the access point are given more transmission time at the moment these errors reduce to compensate for their loss of service. In 802.11b wireless stations can operate at different data rates 11, 5.5, 2 and 1 Mbps. From the literature and our simulation we found that operating at lower data rates would degrade the overall performance of the system. Still, it is impractical in developing a schedule scheme to assume that a wireless station can only operate at full data rate as similar previous work. Our scheduling scheme takes in consideration that some stations may operate at data rates lower than 11 Mbps. Simulation results show that fairness between mobile stations is almost achieved.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124073114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using principles of pervasive computing to design m-commerce applications 使用普适计算原理设计移动商务应用程序
S. Kurkovsky
Distinct features of handheld devices, such as their mobility, personalization and location-awareness, engender a new class of consumer-oriented software applications. While simple shopping assistant programs were one of the first to emerge for this class of devices, many modern m-commerce applications become more complex and utilize a wide range of features of pervasive computing. In this paper, we discuss a number of design issues pertinent to the development of these applications including context-awareness, personalization, ubiquitous access, and intelligent interfaces. We applied these and other principles in the design and development of SMMART, an intelligent context-aware framework for delivery of personalized and targeted promotions to the users of mobile devices, which is used as a case study throughout this paper.
手持设备的独特特性,如移动性、个性化和位置感知,催生了一类新的面向消费者的软件应用程序。虽然简单的购物助理程序是这类设备中最早出现的程序之一,但许多现代移动商务应用程序变得更加复杂,并利用了普惠计算的广泛功能。在本文中,我们讨论了一些与这些应用开发相关的设计问题,包括上下文感知、个性化、无处不在的访问和智能接口。我们将这些和其他原则应用于SMMART的设计和开发,这是一个智能的上下文感知框架,用于向移动设备用户提供个性化和有针对性的促销,这是本文的一个案例研究。
{"title":"Using principles of pervasive computing to design m-commerce applications","authors":"S. Kurkovsky","doi":"10.1109/ITCC.2005.287","DOIUrl":"https://doi.org/10.1109/ITCC.2005.287","url":null,"abstract":"Distinct features of handheld devices, such as their mobility, personalization and location-awareness, engender a new class of consumer-oriented software applications. While simple shopping assistant programs were one of the first to emerge for this class of devices, many modern m-commerce applications become more complex and utilize a wide range of features of pervasive computing. In this paper, we discuss a number of design issues pertinent to the development of these applications including context-awareness, personalization, ubiquitous access, and intelligent interfaces. We applied these and other principles in the design and development of SMMART, an intelligent context-aware framework for delivery of personalized and targeted promotions to the users of mobile devices, which is used as a case study throughout this paper.","PeriodicalId":326887,"journal":{"name":"International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129758075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
期刊
International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1