GDL (Gesture Description Language) is a pattern recognition method that enables syntactic description and real time recognition of static body poses and movement sequences. The syntax of context free GDL script (GDLs) language is intuitive and easy to learn for new user, however so far GDLs rules had to be implemented without feedback of machine learning methods. In this paper we present proposition and initial evaluation of unsupervised method of GDL classifier learning that enables automatic generation of GDLs descriptions using specified features and sample movements recordings. New automatically generated GDLs are well understandable the same as manually defined descriptions. This property enables easy interpretation of obtained training results in contrast to the results from others popular pattern recognition methods.
{"title":"Unsupervised Learning of GDL Classifier","authors":"T. Hachaj, M. Ogiela","doi":"10.1109/IMIS.2014.22","DOIUrl":"https://doi.org/10.1109/IMIS.2014.22","url":null,"abstract":"GDL (Gesture Description Language) is a pattern recognition method that enables syntactic description and real time recognition of static body poses and movement sequences. The syntax of context free GDL script (GDLs) language is intuitive and easy to learn for new user, however so far GDLs rules had to be implemented without feedback of machine learning methods. In this paper we present proposition and initial evaluation of unsupervised method of GDL classifier learning that enables automatic generation of GDLs descriptions using specified features and sample movements recordings. New automatically generated GDLs are well understandable the same as manually defined descriptions. This property enables easy interpretation of obtained training results in contrast to the results from others popular pattern recognition methods.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129802174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cristian González García, Jordán Pascual Espada, Edward Rolando Núñez-Valdéz, Vicente García Díaz
A great number of people have Smart Objects in their daily life: Smartphones, cars, tablets, computers, Smart TVs or micro-controllers. Furthermore, these objects have Internet connection. A great number of these objects have various sensors: accelerometers, GPS, pressure, light, temperature, gravity or proximity. The essence of the concept of Internet of Things is to interconnect all these heterogeneous and ubiquitous objects among them. Some Smart Cities or Smart Homes allow a part of this concept. But this has a problem, the software that an object needs to be interconnected with the IoT platform. To create this software users need to develop the application and need developer skills. In this paper we propose a solution to this problem. We propose a graphical Domain-Specific Language for creating the necessary software for interconnecting any object with an IoT platform. For this proposal we will use the IoT Midgar platform.
{"title":"Midgar: Domain-Specific Language to Generate Smart Objects for an Internet of Things Platform","authors":"Cristian González García, Jordán Pascual Espada, Edward Rolando Núñez-Valdéz, Vicente García Díaz","doi":"10.1109/IMIS.2014.48","DOIUrl":"https://doi.org/10.1109/IMIS.2014.48","url":null,"abstract":"A great number of people have Smart Objects in their daily life: Smartphones, cars, tablets, computers, Smart TVs or micro-controllers. Furthermore, these objects have Internet connection. A great number of these objects have various sensors: accelerometers, GPS, pressure, light, temperature, gravity or proximity. The essence of the concept of Internet of Things is to interconnect all these heterogeneous and ubiquitous objects among them. Some Smart Cities or Smart Homes allow a part of this concept. But this has a problem, the software that an object needs to be interconnected with the IoT platform. To create this software users need to develop the application and need developer skills. In this paper we propose a solution to this problem. We propose a graphical Domain-Specific Language for creating the necessary software for interconnecting any object with an IoT platform. For this proposal we will use the IoT Midgar platform.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132849952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lately enhancing the capability of network services automatically and dynamically through SDN and CDN/CDNi networks has become a recent topic of research. While, in one hand, these systems can be very beneficial to control and optimize the overall network services that studies the topology, traffic paths, packet handling and such others, on the other hand, the servers in such architectures can also be a potential target for DoS and/or DDoS attacks. We, therefore, propose a mechanism for the SDN based CDNi networks to securely deliver services with a multi-defense strategy against DDoS attacks. Addition of ALTO like servers in such architectures enables mapping a very big network to provide a bird's eye view. We propose an additional marking path map in the ALTO server to trace the request packets. The next defense is a protection switch to protect the main servers. A Management Information Base (MIB) is also proposed in the SDN controller to compare and assess the request traffic coming to the protection switches.
近年来,通过SDN和CDN/CDNi网络自动、动态地增强网络业务能力已成为一个新的研究课题。一方面,这些系统可以非常有利于控制和优化研究拓扑、流量路径、数据包处理等的整体网络服务,另一方面,这种体系结构中的服务器也可能成为DoS和/或DDoS攻击的潜在目标。因此,我们提出了一种基于SDN的CDNi网络安全提供服务的机制,该机制具有针对DDoS攻击的多重防御策略。在这样的架构中添加像服务器这样的ALTO,可以映射一个非常大的网络,以提供鸟瞰视图。我们建议在ALTO服务器中添加一个标记路径映射来跟踪请求数据包。下一道防线是保护开关,用来保护主服务器。在SDN控制器中还提出了一个管理信息库(Management Information Base, MIB),用于比较和评估到达保护交换机的请求流量。
{"title":"Multi-defense Mechanism against DDoS in SDN Based CDNi","authors":"Nishat I. Mowla, Inshil Doh, K. Chae","doi":"10.1109/IMIS.2014.64","DOIUrl":"https://doi.org/10.1109/IMIS.2014.64","url":null,"abstract":"Lately enhancing the capability of network services automatically and dynamically through SDN and CDN/CDNi networks has become a recent topic of research. While, in one hand, these systems can be very beneficial to control and optimize the overall network services that studies the topology, traffic paths, packet handling and such others, on the other hand, the servers in such architectures can also be a potential target for DoS and/or DDoS attacks. We, therefore, propose a mechanism for the SDN based CDNi networks to securely deliver services with a multi-defense strategy against DDoS attacks. Addition of ALTO like servers in such architectures enables mapping a very big network to provide a bird's eye view. We propose an additional marking path map in the ALTO server to trace the request packets. The next defense is a protection switch to protect the main servers. A Management Information Base (MIB) is also proposed in the SDN controller to compare and assess the request traffic coming to the protection switches.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114039572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Casado Mansilla, Juan Lopez-de-Armentia, P. Garaizar, D. López-de-Ipiña
The lack of energy consumption awareness in public spaces is a fact. There, people do not receive energy consumption feedback nor do they pay a monthly invoice to electricity providers. Thus, there is practically a non-existent perception of energy waste, and hence, there is low motivation to reduce it. To tackle this problem we transform everyday shared electrical appliances which are placed in common spaces into collaborative eco-aware everyday things. These eco-appliances make people aware that they are not alone to save energy, but the everyday things can team up with them to achieve this task. Qualitative and quantitative results were gathered in three case studies performed with shared coffee machines at workplace. The objective was to assess the effectiveness of the proposed eco-aware design in terms of energy saving and the degree of affiliation between workers and the smart appliance to create a green-team relationship.
{"title":"Team Up with Eco-aware Everyday Things to Green Your Workplace!","authors":"Diego Casado Mansilla, Juan Lopez-de-Armentia, P. Garaizar, D. López-de-Ipiña","doi":"10.1109/IMIS.2014.55","DOIUrl":"https://doi.org/10.1109/IMIS.2014.55","url":null,"abstract":"The lack of energy consumption awareness in public spaces is a fact. There, people do not receive energy consumption feedback nor do they pay a monthly invoice to electricity providers. Thus, there is practically a non-existent perception of energy waste, and hence, there is low motivation to reduce it. To tackle this problem we transform everyday shared electrical appliances which are placed in common spaces into collaborative eco-aware everyday things. These eco-appliances make people aware that they are not alone to save energy, but the everyday things can team up with them to achieve this task. Qualitative and quantitative results were gathered in three case studies performed with shared coffee machines at workplace. The objective was to assess the effectiveness of the proposed eco-aware design in terms of energy saving and the degree of affiliation between workers and the smart appliance to create a green-team relationship.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongjin Choi, Jeongin Kim, Eunji Lee, Chang Choi, Jiman Hong, Pankoo Kim
The number of global SNS users is rapidly increasing because SNS is executed by the device called Smartphone and enables the users to overcome time and space barrier with low cost. This would be a proof that the SNS is deeply involved in the communication between many people and related data is continuously increasing. Like this, data volume for SNS continues to increase due to the increasing users and the experts are doing the research considering data reusability. In particular, even though there are many researches to provide the individually customized information using the comments which exist in the SNS, there is a limitation to get the personal information due to the number of characters (approximately 150 words) which is a characteristic of SNS. However, most data which are written by the users still exist because of the characteristic of SNS and continuously stored data are considered to be the data which could sufficiently identify the characteristics of the individual users. Therefore in this paper, interested areas of the individuals are to be identified using the comments of individual users and their friends, and the patterns are to be analyzed in each interested area and finally, the analyzed data will be used for future research.
{"title":"Research for the Pattern Analysis of Individual Interest Using SNS Data: Focusing on Facebook","authors":"Dongjin Choi, Jeongin Kim, Eunji Lee, Chang Choi, Jiman Hong, Pankoo Kim","doi":"10.1109/IMIS.2014.94","DOIUrl":"https://doi.org/10.1109/IMIS.2014.94","url":null,"abstract":"The number of global SNS users is rapidly increasing because SNS is executed by the device called Smartphone and enables the users to overcome time and space barrier with low cost. This would be a proof that the SNS is deeply involved in the communication between many people and related data is continuously increasing. Like this, data volume for SNS continues to increase due to the increasing users and the experts are doing the research considering data reusability. In particular, even though there are many researches to provide the individually customized information using the comments which exist in the SNS, there is a limitation to get the personal information due to the number of characters (approximately 150 words) which is a characteristic of SNS. However, most data which are written by the users still exist because of the characteristic of SNS and continuously stored data are considered to be the data which could sufficiently identify the characteristics of the individual users. Therefore in this paper, interested areas of the individuals are to be identified using the comments of individual users and their friends, and the patterns are to be analyzed in each interested area and finally, the analyzed data will be used for future research.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125226726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Papafili, K. Wajda, Roman Lapacz, Alessandro Predieri, T. Bocek, Michael Seufert
The Internet has seen a strong move to support overlay applications and services, which demand a coherent and integrated control in underlying heterogeneous networks in a scalable, resilient, and energy-efficient manner. To do so, a tighter integration of network management and overlay service functionality can lead to cross-layer optimization of operations and management, which is a promising approach and may offer a large business potential in operational perspectives for all players involved. Therefore, the objective of this paper is to present and discuss the impact of new paradigms such as cloud computing and software-defined networking which will play central role in the Future Internet, discuss major traffic trends and identify key challenges due to the adoption and operation of the new applications. Translating the key challenges to requirements for Future Internet traffic management mechanisms, the paper provides an overview of existing mechanisms in literature, assesses them w.r.t. the aforementioned requirements, and qualitatively estimates the expected optimization potential and gain, as well as provides hint for their potential extension and exploitation within the challenging environment of the Future Internet.
{"title":"An Overview of Application Traffic Management Approaches: Challenges and Potential Extensions","authors":"I. Papafili, K. Wajda, Roman Lapacz, Alessandro Predieri, T. Bocek, Michael Seufert","doi":"10.1109/IMIS.2014.7","DOIUrl":"https://doi.org/10.1109/IMIS.2014.7","url":null,"abstract":"The Internet has seen a strong move to support overlay applications and services, which demand a coherent and integrated control in underlying heterogeneous networks in a scalable, resilient, and energy-efficient manner. To do so, a tighter integration of network management and overlay service functionality can lead to cross-layer optimization of operations and management, which is a promising approach and may offer a large business potential in operational perspectives for all players involved. Therefore, the objective of this paper is to present and discuss the impact of new paradigms such as cloud computing and software-defined networking which will play central role in the Future Internet, discuss major traffic trends and identify key challenges due to the adoption and operation of the new applications. Translating the key challenges to requirements for Future Internet traffic management mechanisms, the paper provides an overview of existing mechanisms in literature, assesses them w.r.t. the aforementioned requirements, and qualitatively estimates the expected optimization potential and gain, as well as provides hint for their potential extension and exploitation within the challenging environment of the Future Internet.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132404315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the app market expands, new challenges arise for developers. Creating useful applications is important in achieving extensive and cohesive use. This paper presents a mobile application called "The Time Machine", offering location-dependent information about the environment in a town. The app is evaluated through expert evaluation, as well as user evaluation conducted as a field observation with 15 participating users, measuring the level of usability in the application. Results are used to discuss guidelines on how to develop useful mobile applications. Knowledge about user behavior, a clear application purpose, an understandable interface, and cross-platform functionality are all important aspects for developers to consider.
{"title":"Developing Useful Mobile Applications in Cross-Media Platforms","authors":"C. Hermansson, Mikael Söderström, Dan Johansson","doi":"10.1109/IMIS.2014.59","DOIUrl":"https://doi.org/10.1109/IMIS.2014.59","url":null,"abstract":"As the app market expands, new challenges arise for developers. Creating useful applications is important in achieving extensive and cohesive use. This paper presents a mobile application called \"The Time Machine\", offering location-dependent information about the environment in a town. The app is evaluated through expert evaluation, as well as user evaluation conducted as a field observation with 15 participating users, measuring the level of usability in the application. Results are used to discuss guidelines on how to develop useful mobile applications. Knowledge about user behavior, a clear application purpose, an understandable interface, and cross-platform functionality are all important aspects for developers to consider.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134153696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jose Pablo Gomez Barron, Miguel-Ángel Manso-Callejo, R. Alcarria, R. P. Gomez
Geospatial mobile applications interact with local and remote hardware to connect various data sources. These applications are currently evolving to include crowd sourcing functionalities, for citizen participation. In this paper we propose the identification, collection and information exchange of smart objects their geographic information, facilitating connectivity and communication between citizens and local organizations, and building interoperable services with data from sensors, smart physical objects and social media. We propose to identify spatial patterns, report object locations to identify problems and improve maintenance strategies of a city. As a validation of this approach, we develop a mobile mapping and data hub platform to visualize, monitor, and assist urban maintenance planning that enables better interaction between citizens of Smart Cities.
{"title":"A Mobile Crowdsourcing Platform for Urban Infrastructure Maintenance","authors":"Jose Pablo Gomez Barron, Miguel-Ángel Manso-Callejo, R. Alcarria, R. P. Gomez","doi":"10.1109/IMIS.2014.49","DOIUrl":"https://doi.org/10.1109/IMIS.2014.49","url":null,"abstract":"Geospatial mobile applications interact with local and remote hardware to connect various data sources. These applications are currently evolving to include crowd sourcing functionalities, for citizen participation. In this paper we propose the identification, collection and information exchange of smart objects their geographic information, facilitating connectivity and communication between citizens and local organizations, and building interoperable services with data from sensors, smart physical objects and social media. We propose to identify spatial patterns, report object locations to identify problems and improve maintenance strategies of a city. As a validation of this approach, we develop a mobile mapping and data hub platform to visualize, monitor, and assist urban maintenance planning that enables better interaction between citizens of Smart Cities.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125296581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the information and network age, e-commerce is an important system for business transaction behavior. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve e-commerce security has become a topic worthy of further exploration. Combining security requirement, routine security testing and security event detection procedure, this paper proposes the Multi-Layer Secure Prevention Scheme (MLSPS). First layer of MLSPS is the well-defined security requirement. Second layer of MLSPS is the routine security testing procedure. Third layer of MLSPS is the security event detection procedure. Applying data recording and event detection technologies timely discovers the abnormal security event. MLSPS can enhance the e-commerce security and effectively reduce e-commerce personal data security risk.
{"title":"A Multi-layer Secure Prevention Scheme for Improving e-Commerce Security","authors":"Sen-Tarng Lai, Fang-Yie Leu, W. Chu","doi":"10.1109/IMIS.2014.73","DOIUrl":"https://doi.org/10.1109/IMIS.2014.73","url":null,"abstract":"In the information and network age, e-commerce is an important system for business transaction behavior. However, the network intrusion, malicious users, virus attack and system security vulnerabilities have continued to threaten the operation of the e-commerce, making e-commerce security encounter serious test. How to improve e-commerce security has become a topic worthy of further exploration. Combining security requirement, routine security testing and security event detection procedure, this paper proposes the Multi-Layer Secure Prevention Scheme (MLSPS). First layer of MLSPS is the well-defined security requirement. Second layer of MLSPS is the routine security testing procedure. Third layer of MLSPS is the security event detection procedure. Applying data recording and event detection technologies timely discovers the abnormal security event. MLSPS can enhance the e-commerce security and effectively reduce e-commerce personal data security risk.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128773838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shih-Hao Hung, Jen-hao Chen, Chia-Heng Tu, Jeng-Peng Shieh, Roger Chien
Designing a smartphone system can be a challenging task since it contains complex hardware and software components. The design space of an Android smartphone is very large as it spans over many hardware parameters such as the processor pipeline, cache configurations, memory capacity, as well as software configurations and tunables in the operating system, middleware, and applications. It is desirable to have a set of design space exploration (DSE) tools which can be used to find good design points in such a large space. However, traditional architectural simulation tools are too slow to explore the design space in a timely fashion. To facilitate DSE for Android smartphones, we proposed a framework, called ADSET, which adopt a fast full-system modeling technique and a parallel DSE method to concurrently evaluate multiple design points. In this paper, we explain the framework in details and evaluate the effectiveness of ADSET in finding good designs in a large design space.
设计智能手机系统可能是一项具有挑战性的任务,因为它包含复杂的硬件和软件组件。Android智能手机的设计空间非常大,因为它跨越了许多硬件参数,如处理器管道、缓存配置、内存容量,以及操作系统、中间件和应用程序中的软件配置和可调项。希望有一套设计空间探索(design space exploration, DSE)工具,可以用来在如此大的空间中找到好的设计点。然而,传统的建筑模拟工具太慢,无法及时探索设计空间。为了促进Android智能手机的DSE,我们提出了一个名为ADSET的框架,该框架采用快速全系统建模技术和并行DSE方法来并发评估多个设计点。在本文中,我们详细解释了该框架,并评估了ADSET在大型设计空间中寻找优秀设计的有效性。
{"title":"Exploring the Design Space for Android Smartphones","authors":"Shih-Hao Hung, Jen-hao Chen, Chia-Heng Tu, Jeng-Peng Shieh, Roger Chien","doi":"10.1109/IMIS.2014.27","DOIUrl":"https://doi.org/10.1109/IMIS.2014.27","url":null,"abstract":"Designing a smartphone system can be a challenging task since it contains complex hardware and software components. The design space of an Android smartphone is very large as it spans over many hardware parameters such as the processor pipeline, cache configurations, memory capacity, as well as software configurations and tunables in the operating system, middleware, and applications. It is desirable to have a set of design space exploration (DSE) tools which can be used to find good design points in such a large space. However, traditional architectural simulation tools are too slow to explore the design space in a timely fashion. To facilitate DSE for Android smartphones, we proposed a framework, called ADSET, which adopt a fast full-system modeling technique and a parallel DSE method to concurrently evaluate multiple design points. In this paper, we explain the framework in details and evaluate the effectiveness of ADSET in finding good designs in a large design space.","PeriodicalId":345694,"journal":{"name":"2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128508032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}