首页 > 最新文献

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
A Self-configuring Personal Agent Platform for Pervasive Computing 面向普适计算的自配置个人代理平台
Yuhong Feng, Jiannong Cao, Ivan Lau, Xuan Liu
Mobile agent technologies have been widely used in distributed computing to take care of the task execution for the user. However, pervasive computing presents new challenges to existing mobile agent systems, especially the need for the context-aware self-configuring collaboration with the services provided by the physical objects. In order to address the problem, this paper presents a self-configuring personal agent platform to enable a mobile agent to adapt to the on-demand collaboration with the services. The platform consists of a Ubiquitous Intelligent Object (UIO) model the pervasive computing environment modeling, a code repository to provide executable codes which can be downloaded and instantiated as a mobile agent's capability at runtime, a service registry server for UIOs to publish and subscribe services, and personal agents, one for each individual user. A prototype of platform has been implemented as proof-of-concept and a preliminary performance study has also been carried out on it using a case study.
移动代理技术在分布式计算中得到了广泛的应用,为用户处理任务的执行。然而,普适计算对现有的移动代理系统提出了新的挑战,特别是需要与物理对象提供的服务进行上下文感知的自配置协作。为了解决这一问题,本文提出了一个自配置的个人代理平台,使移动代理能够适应与服务的按需协作。该平台由泛在智能对象(UIO)模型(普适计算环境建模)、提供可执行代码的代码存储库(可在运行时下载并实例化为移动代理的功能)、用于UIO发布和订阅服务的服务注册服务器以及用于每个用户的个人代理组成。平台的原型已经实现作为概念验证,并通过案例研究对其进行了初步的性能研究。
{"title":"A Self-configuring Personal Agent Platform for Pervasive Computing","authors":"Yuhong Feng, Jiannong Cao, Ivan Lau, Xuan Liu","doi":"10.1109/EUC.2008.163","DOIUrl":"https://doi.org/10.1109/EUC.2008.163","url":null,"abstract":"Mobile agent technologies have been widely used in distributed computing to take care of the task execution for the user. However, pervasive computing presents new challenges to existing mobile agent systems, especially the need for the context-aware self-configuring collaboration with the services provided by the physical objects. In order to address the problem, this paper presents a self-configuring personal agent platform to enable a mobile agent to adapt to the on-demand collaboration with the services. The platform consists of a Ubiquitous Intelligent Object (UIO) model the pervasive computing environment modeling, a code repository to provide executable codes which can be downloaded and instantiated as a mobile agent's capability at runtime, a service registry server for UIOs to publish and subscribe services, and personal agents, one for each individual user. A prototype of platform has been implemented as proof-of-concept and a preliminary performance study has also been carried out on it using a case study.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123287485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Omnet++ Based Simulation for Underwater Environment 基于omnet++的水下环境仿真
S. Shin, Soo-Hyun Park
This paper describes about underwater data transmission simulator. Analysis procedures for various underwater environments and other factors were analyzed. A new simulator based on the analysis results was implemented and performance evaluations were conducted using the developed simulator considering various ack techniques into account.
本文介绍了一种水下数据传输模拟器。分析了各种水下环境和其他因素的分析程序。在分析结果的基础上,设计了一种新的仿真器,并对该仿真器进行了性能评估。
{"title":"Omnet++ Based Simulation for Underwater Environment","authors":"S. Shin, Soo-Hyun Park","doi":"10.1109/EUC.2008.34","DOIUrl":"https://doi.org/10.1109/EUC.2008.34","url":null,"abstract":"This paper describes about underwater data transmission simulator. Analysis procedures for various underwater environments and other factors were analyzed. A new simulator based on the analysis results was implemented and performance evaluations were conducted using the developed simulator considering various ack techniques into account.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129448819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition 基于池的APROB信道在概率实时条件下抵抗全局活跃对手
Minh Tran, Trung-Thanh Nguyen, I. Echizen
We present Pool-Based APROB Channel, based on pool mix model, to provide anonymity against global active adversary. The adversary has capability to monitor all external activities of system, to delay and to create messages in the system. Our proposal is to solve the limitation of APROB Channel which concerns only global delaying adversary. Pool-Based APROB Channel provides flexibility for users to justify their level of anonymity (and speed) and satisfies probabilistic real-time condition which ensures to deliver any message within a predefined duration with high probability. Experimental evaluation shows that our system provides lower source-hiding property than APROB Channel with the same environment and users' behaviors (rate and number of sent messages).
我们提出了基于池混合模型的基于池的APROB通道,以提供对全局活跃对手的匿名性。攻击者有能力监视系统的所有外部活动,在系统中延迟和创建消息。我们的建议是解决APROB信道只关注全局延迟对手的局限性。基于池的APROB通道为用户提供了灵活性,以证明他们的匿名级别(和速度),并满足概率实时条件,确保在预定义的持续时间内以高概率传递任何消息。实验评估表明,在相同的环境和用户行为(发送消息的速率和数量)下,我们的系统提供了比APROB信道更低的信源隐藏性能。
{"title":"Pool-Based APROB Channel to Provide Resistance against Global Active Adversary under Probabilistic Real-Time Condition","authors":"Minh Tran, Trung-Thanh Nguyen, I. Echizen","doi":"10.1109/EUC.2008.110","DOIUrl":"https://doi.org/10.1109/EUC.2008.110","url":null,"abstract":"We present Pool-Based APROB Channel, based on pool mix model, to provide anonymity against global active adversary. The adversary has capability to monitor all external activities of system, to delay and to create messages in the system. Our proposal is to solve the limitation of APROB Channel which concerns only global delaying adversary. Pool-Based APROB Channel provides flexibility for users to justify their level of anonymity (and speed) and satisfies probabilistic real-time condition which ensures to deliver any message within a predefined duration with high probability. Experimental evaluation shows that our system provides lower source-hiding property than APROB Channel with the same environment and users' behaviors (rate and number of sent messages).","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125550505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous Computing 持久计算系统的测试与调试:普适计算的新挑战
Jingde Cheng
This paper raises and discusses a completely new challenge in the age of ubiquitous computing: how to test and debug a computing system running continuously and persistently? The ultimate goal of ubiquitous computing is to provide users with the way of computing anytime and anywhere. A necessary condition and/or fundamental assumption to underlie ubiquitous computing are that there certainly are computing systems working anytime available anywhere throughout the physical world. Therefore, ubiquitous computing must lead to requiring that computing systems can run continuously and persistently without stopping. However, all the existing testing and debugging techniques take programs of a system rather than the running system itself as the objects and/or targets, and assume that any program can be executed repeatedly with various input data only for testing and debugging without regard to stopping the task that program has to perform. In order to develop, use, and maintain persistent computing systems, we have to find a completely new methodology and its related techniques to test and debug a persistent computing system at run-time without stopping it. This is a completely new challenge in ubiquitous computing.
本文提出并讨论了普适计算时代一个全新的挑战:如何对连续、持久运行的计算系统进行测试和调试?普适计算的最终目标是为用户提供随时随地的计算方式。普适计算的一个必要条件和/或基本假设是,在物理世界的任何地方都有随时可用的计算系统。因此,普适计算必然要求计算系统能够持续不断地运行。然而,现有的所有测试和调试技术都将系统的程序而不是运行的系统本身作为对象和/或目标,并且假设任何程序都可以用各种输入数据重复执行,只是为了测试和调试,而不必考虑停止程序必须执行的任务。为了开发、使用和维护持久计算系统,我们必须找到一种全新的方法及其相关技术,以便在运行时不停止地测试和调试持久计算系统。这对普适计算来说是一个全新的挑战。
{"title":"Testing and Debugging Persistent Computing Systems: A New Challenge in Ubiquitous Computing","authors":"Jingde Cheng","doi":"10.1109/EUC.2008.173","DOIUrl":"https://doi.org/10.1109/EUC.2008.173","url":null,"abstract":"This paper raises and discusses a completely new challenge in the age of ubiquitous computing: how to test and debug a computing system running continuously and persistently? The ultimate goal of ubiquitous computing is to provide users with the way of computing anytime and anywhere. A necessary condition and/or fundamental assumption to underlie ubiquitous computing are that there certainly are computing systems working anytime available anywhere throughout the physical world. Therefore, ubiquitous computing must lead to requiring that computing systems can run continuously and persistently without stopping. However, all the existing testing and debugging techniques take programs of a system rather than the running system itself as the objects and/or targets, and assume that any program can be executed repeatedly with various input data only for testing and debugging without regard to stopping the task that program has to perform. In order to develop, use, and maintain persistent computing systems, we have to find a completely new methodology and its related techniques to test and debug a persistent computing system at run-time without stopping it. This is a completely new challenge in ubiquitous computing.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117204043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Accelerating Montgomery Modulo Multiplication for Redundant Radix-64k Number System on the FPGA Using Dual-Port Block RAMs 基于双端口块ram的冗余基数-64k数字系统的FPGA加速Montgomery模乘法
K. Shigemoto, K. Kawakami, K. Nakano
The main contribution of this paper is to present hardware algorithms for redundant radix-2r number system in the FPGA to accelerate Montgomery modulo multiplication with many bits, which have applications in security systems such as RSA encryption and decryption. Quite surprisingly, our hardware algorithm for Montgomery modulo multiplication of two dr-bit numbers can be completed in only d+1 clock cycles. Since most FPGAs have 18-bit multipliers and 18 k-bit block RAMs, it makes sense to let r=16. Our hardware algorithm for Montgomery modulo multiplication for 256-bit numbers runs only 17 clock cycles using redundant radix-64 k (i.e.radix-216) number system. The experimental results for Xilinx Virtex-II Pro Family FPGA XC2VP100-6 show that the clock frequency of our circuit is independent of d. Further, the hardware algorithm for 1024-bit Montgomery modulo multiplication using the redundant number system is 3 times faster than that using the conventional number system. Also, for 256-bit Montgomery modulo multiplication, our hardware algorithm runs in 0.322 mus, while a previously known implementation runs in 1.22 mus although our implementation uses less than a half slices.
本文的主要贡献是在FPGA中提出冗余基数-2r数系统的硬件算法,以加速多比特的Montgomery模乘法,该算法在RSA加解密等安全系统中具有应用价值。令人惊讶的是,我们的两个dr位的Montgomery模乘法的硬件算法可以在d+1时钟周期内完成。由于大多数fpga具有18位乘法器和18 k位块ram,因此让r=16是有意义的。我们的256位数字的Montgomery模乘法硬件算法使用冗余基数- 64k(即基数-216)数字系统仅运行17个时钟周期。在Xilinx Virtex-II Pro系列FPGA XC2VP100-6上的实验结果表明,该电路的时钟频率与d无关。此外,使用冗余数字系统进行1024位Montgomery模乘法的硬件算法比使用传统数字系统快3倍。此外,对于256位Montgomery模乘法,我们的硬件算法运行时间为0.322 mus,而以前已知的实现运行时间为1.22 mus,尽管我们的实现使用的切片不到一半。
{"title":"Accelerating Montgomery Modulo Multiplication for Redundant Radix-64k Number System on the FPGA Using Dual-Port Block RAMs","authors":"K. Shigemoto, K. Kawakami, K. Nakano","doi":"10.1109/EUC.2008.30","DOIUrl":"https://doi.org/10.1109/EUC.2008.30","url":null,"abstract":"The main contribution of this paper is to present hardware algorithms for redundant radix-2r number system in the FPGA to accelerate Montgomery modulo multiplication with many bits, which have applications in security systems such as RSA encryption and decryption. Quite surprisingly, our hardware algorithm for Montgomery modulo multiplication of two dr-bit numbers can be completed in only d+1 clock cycles. Since most FPGAs have 18-bit multipliers and 18 k-bit block RAMs, it makes sense to let r=16. Our hardware algorithm for Montgomery modulo multiplication for 256-bit numbers runs only 17 clock cycles using redundant radix-64 k (i.e.radix-216) number system. The experimental results for Xilinx Virtex-II Pro Family FPGA XC2VP100-6 show that the clock frequency of our circuit is independent of d. Further, the hardware algorithm for 1024-bit Montgomery modulo multiplication using the redundant number system is 3 times faster than that using the conventional number system. Also, for 256-bit Montgomery modulo multiplication, our hardware algorithm runs in 0.322 mus, while a previously known implementation runs in 1.22 mus although our implementation uses less than a half slices.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122476904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Rule-Based WiFi Localization Methods 基于规则的WiFi定位方法
Qiuxia Chen, Lee, Wang-Chien Lee
The rule-based localization methods proposed in this paper are based on two important observations. First, although the absolute RSS values change with time, the relative RSS (RRSS) values between several Access Points (APs) are more stable than the absolute RSSs. Thus, we can use RRSSs as rules for inferring a client's location. Second, when a unique location cannot be obtained based on RRSS rules, the localization process can backtrack to the previous observed client location. By analyzing the accessible paths on the floor plan, locations that are not reacheable from the previous location can be disqualified. Based on these two key observations, we propose several localization methods, implement them in a life environment and conduct extensive experiments to measure the localization accuracy of the proposed methods. We found that our methods achieve much higher accuracy than the state-of-the-art localization methods, namely, RADAR, LOCADIO and WHAM!.
本文提出的基于规则的定位方法基于两个重要的观察结果。首先,虽然绝对RSS值随时间变化,但多个接入点(ap)之间的相对RSS (RRSS)值比绝对RSS更稳定。因此,我们可以使用rss作为推断客户机位置的规则。其次,当基于RRSS规则无法获得唯一位置时,定位过程可以回溯到之前观察到的客户端位置。通过分析平面图上的可达路径,从之前的位置无法到达的位置可以被取消资格。基于这两个关键观察,我们提出了几种定位方法,并在生活环境中实施,并进行了广泛的实验来衡量所提出方法的定位精度。我们发现,我们的方法比最先进的定位方法(即RADAR, LOCADIO和WHAM!)具有更高的精度。
{"title":"Rule-Based WiFi Localization Methods","authors":"Qiuxia Chen, Lee, Wang-Chien Lee","doi":"10.1109/EUC.2008.51","DOIUrl":"https://doi.org/10.1109/EUC.2008.51","url":null,"abstract":"The rule-based localization methods proposed in this paper are based on two important observations. First, although the absolute RSS values change with time, the relative RSS (RRSS) values between several Access Points (APs) are more stable than the absolute RSSs. Thus, we can use RRSSs as rules for inferring a client's location. Second, when a unique location cannot be obtained based on RRSS rules, the localization process can backtrack to the previous observed client location. By analyzing the accessible paths on the floor plan, locations that are not reacheable from the previous location can be disqualified. Based on these two key observations, we propose several localization methods, implement them in a life environment and conduct extensive experiments to measure the localization accuracy of the proposed methods. We found that our methods achieve much higher accuracy than the state-of-the-art localization methods, namely, RADAR, LOCADIO and WHAM!.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116112595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A Signature-based Grid Index Design for RFID Main-Memory Databases 基于签名的RFID主存数据库网格索引设计
Rong-Jhang Liao, Pei-Lun Suei, Yung-Feng Lu, Tei-Wei Kuo, Chun-Sho Lee
A large-scaled RFID application often needs a highly efficient database system in data processing. This research is motivated by the strong demand of an efficient index structure design for main-memory database systems of RFID applications. In this paper, a signature-based grid index structure is proposed for efficient data queries and storage. An efficient methodology is proposed to locate duplicates and to execute batch deletions and range queries based on application domain knowhow. The capability of the design is implemented in an open source main-memory database system H2 and evaluated by realistic workloads of RFID applications.
大规模的RFID应用往往需要一个高效的数据库系统来处理数据。本研究的动机是RFID应用的主存数据库系统对高效索引结构设计的强烈需求。本文提出了一种基于签名的网格索引结构,以实现高效的数据查询和存储。提出了一种有效的基于应用领域知识的重复定位、批量删除和范围查询方法。设计的能力在一个开源的主存数据库系统H2中实现,并通过RFID应用的实际工作负载进行评估。
{"title":"A Signature-based Grid Index Design for RFID Main-Memory Databases","authors":"Rong-Jhang Liao, Pei-Lun Suei, Yung-Feng Lu, Tei-Wei Kuo, Chun-Sho Lee","doi":"10.1109/EUC.2008.105","DOIUrl":"https://doi.org/10.1109/EUC.2008.105","url":null,"abstract":"A large-scaled RFID application often needs a highly efficient database system in data processing. This research is motivated by the strong demand of an efficient index structure design for main-memory database systems of RFID applications. In this paper, a signature-based grid index structure is proposed for efficient data queries and storage. An efficient methodology is proposed to locate duplicates and to execute batch deletions and range queries based on application domain knowhow. The capability of the design is implemented in an open source main-memory database system H2 and evaluated by realistic workloads of RFID applications.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127456930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Measuring and Comparing of Virtual Machine Monitors 虚拟机监视器的性能测量与比较
Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang
With its growth and wide applications, virtualization has come through a revival in computer system community. Virtualization offers a lot of benefits including flexibility, security, ease to configuration and management, reduction of cost and so forth, but at the same time it also brings a certain degree of performance overhead. Furthermore, virtual machine monitor (VMM) is the core component of virtual machine (VM) system and its effectiveness greatly impacts the performance of whole system. In this paper, we measure and analyze the performance of two open source virtual machine monitors-Xen and KVM using LINPACK, LMbench and IOzone, and provide a quantitative and qualitative comparison of both virtual machine monitors.
随着虚拟化技术的发展和广泛应用,虚拟化技术在计算机系统界重新兴起。虚拟化提供了很多好处,包括灵活性、安全性、易于配置和管理、降低成本等等,但同时它也带来了一定程度的性能开销。而虚拟机监视器(VMM)是虚拟机系统的核心部件,其有效性直接影响到整个系统的性能。在本文中,我们使用LINPACK、LMbench和IOzone对两个开源虚拟机监视器xen和KVM的性能进行了测量和分析,并对这两个虚拟机监视器进行了定量和定性比较。
{"title":"Performance Measuring and Comparing of Virtual Machine Monitors","authors":"Jianhua Che, Qinming He, Qinghua Gao, Dawei Huang","doi":"10.1109/EUC.2008.127","DOIUrl":"https://doi.org/10.1109/EUC.2008.127","url":null,"abstract":"With its growth and wide applications, virtualization has come through a revival in computer system community. Virtualization offers a lot of benefits including flexibility, security, ease to configuration and management, reduction of cost and so forth, but at the same time it also brings a certain degree of performance overhead. Furthermore, virtual machine monitor (VMM) is the core component of virtual machine (VM) system and its effectiveness greatly impacts the performance of whole system. In this paper, we measure and analyze the performance of two open source virtual machine monitors-Xen and KVM using LINPACK, LMbench and IOzone, and provide a quantitative and qualitative comparison of both virtual machine monitors.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125184037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
Cooperative Problem Solving Process Based on MAS_NP Model 基于MAS_NP模型的协同问题求解过程
Yanbin Peng, B. Liao, Ji Gao, Jun Hu, CunHao Wang, Jie-Qing Ai, Hang Guo
In order to enable the individual agents to be aware of the both macro constraints from agent social and instructions from agent's owner, a norm and policy extended agent BDI model (called NPCD-Agent) has been proposed, by integrating norms and policies into traditional agent BDI model. On the basis of NPCD-Agent model, this paper proposes a semantic model of multi-agent system (called MASNP), where cooperative problem solving (CPS) process is formally described. On the one hand, at the social level, the social constraint of agents can be specified by means of norms defined by the social administrators. And on the other hand, agents are instructed by polices presented by their owners. A case study shows that macro social constraint and instruction from agent's owner are both considered in CPS process, which makes the CPS process more reasonable.
为了使个体智能体能够同时感知来自智能体社会的宏观约束和来自智能体所有者的指令,将规范和策略集成到传统的智能体BDI模型中,提出了一种规范和策略扩展的智能体BDI模型(NPCD-Agent)。在NPCD-Agent模型的基础上,提出了一种多智能体系统的语义模型(MASNP),并形式化地描述了协作问题解决(CPS)过程。一方面,在社会层面上,可以通过社会管理者定义的规范来规定行为人的社会约束。而另一方面,特工们则受其主人提出的政策的指导。实例研究表明,CPS过程中同时考虑了宏观社会约束和代理所有者的指令,使得CPS过程更加合理。
{"title":"Cooperative Problem Solving Process Based on MAS_NP Model","authors":"Yanbin Peng, B. Liao, Ji Gao, Jun Hu, CunHao Wang, Jie-Qing Ai, Hang Guo","doi":"10.1109/EUC.2008.109","DOIUrl":"https://doi.org/10.1109/EUC.2008.109","url":null,"abstract":"In order to enable the individual agents to be aware of the both macro constraints from agent social and instructions from agent's owner, a norm and policy extended agent BDI model (called NPCD-Agent) has been proposed, by integrating norms and policies into traditional agent BDI model. On the basis of NPCD-Agent model, this paper proposes a semantic model of multi-agent system (called MASNP), where cooperative problem solving (CPS) process is formally described. On the one hand, at the social level, the social constraint of agents can be specified by means of norms defined by the social administrators. And on the other hand, agents are instructed by polices presented by their owners. A case study shows that macro social constraint and instruction from agent's owner are both considered in CPS process, which makes the CPS process more reasonable.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134010319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Large-Scale USN Middleware Based on Context-Aware 基于上下文感知的大规模USN中间件
Won-Hee Han, Sung-Won Kim, Sun-Mi Park, Chang-Wu Lee, J. Park, Y. Jeong
This paper designs LS-ware (Large-Scale USN middleware) in order to collect and save large-scale sensing data and to analyze collected data and run status sensing function. LS-ware not only provides USN middlewarepsilas basic function such as Meta information, quality process, or status management, but also makes large-scale sensing data light-weighted and provides a suitable event processing feature. LS-ware develops and utilizes a four level scheduling algorithm for continuous large-scale sensing data collection. In order to manage sensing data more effectively, it parses data packet structure, extracts information, and looses datapsilas weight. It recognizes an event from light weighted sensing data, and sends the status information to a client.
本文设计了LS-ware (Large-Scale USN middleware),用于采集和保存大规模的感知数据,并对采集到的数据进行分析和运行状态感知功能。LS-ware不仅提供了USN中间件的Meta信息、质量处理或状态管理等基本功能,还使大规模传感数据轻量化,并提供了合适的事件处理功能。LS-ware开发并利用了一种四级调度算法,用于连续大规模的传感数据采集。为了更有效地管理传感数据,该算法对数据包结构进行解析,提取信息,降低数据权重。它从轻量级感知数据中识别事件,并将状态信息发送给客户端。
{"title":"Large-Scale USN Middleware Based on Context-Aware","authors":"Won-Hee Han, Sung-Won Kim, Sun-Mi Park, Chang-Wu Lee, J. Park, Y. Jeong","doi":"10.1109/EUC.2008.211","DOIUrl":"https://doi.org/10.1109/EUC.2008.211","url":null,"abstract":"This paper designs LS-ware (Large-Scale USN middleware) in order to collect and save large-scale sensing data and to analyze collected data and run status sensing function. LS-ware not only provides USN middlewarepsilas basic function such as Meta information, quality process, or status management, but also makes large-scale sensing data light-weighted and provides a suitable event processing feature. LS-ware develops and utilizes a four level scheduling algorithm for continuous large-scale sensing data collection. In order to manage sensing data more effectively, it parses data packet structure, extracts information, and looses datapsilas weight. It recognizes an event from light weighted sensing data, and sends the status information to a client.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131294256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1