首页 > 最新文献

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
TRAcME: Temporal Activity Recognition Using Mobile Phone Data TRAcME:利用移动电话数据进行时间活动识别
Driss Choujaa, Naranker Dulay
The aim of human activity recognition is to identify what a user or a group of users are doing at a given point in time, for example travelling or working. Activity recognition plays an important role in mobile and ubiquitous computing both as a goal in itself and as an intermediate task in the design of advanced applications. Virtually all existing activity recognition systems for mobile phones base their predictions on location cues. This approach forces the user to disclose personal information such as her home or work area. In this paper, we present a novel activity recognition system called TRAcME (temporal recognition of activities for mobile environments) which recognises generic human activities from large windows of context, Allenpsilas temporal relations and anonymous landmarks. Unlike existing systems, TRAcME handles simultaneous activities and outputs activities which are consistent with each other at the scale of a userpsilas day.
人类活动识别的目的是识别一个用户或一组用户在给定的时间点上正在做什么,例如旅行或工作。活动识别在移动计算和普适计算中扮演着重要的角色,无论是作为目标本身还是作为高级应用程序设计的中间任务。实际上,所有现有的手机活动识别系统都是基于位置线索进行预测的。这种方法迫使用户公开个人信息,例如她的家庭或工作区域。在本文中,我们提出了一种新的活动识别系统,称为TRAcME(移动环境活动的时间识别),它从大的上下文窗口、Allenpsilas时间关系和匿名地标识别一般的人类活动。与现有系统不同,TRAcME处理同时进行的活动,并以用户日为单位输出彼此一致的活动。
{"title":"TRAcME: Temporal Activity Recognition Using Mobile Phone Data","authors":"Driss Choujaa, Naranker Dulay","doi":"10.1109/EUC.2008.33","DOIUrl":"https://doi.org/10.1109/EUC.2008.33","url":null,"abstract":"The aim of human activity recognition is to identify what a user or a group of users are doing at a given point in time, for example travelling or working. Activity recognition plays an important role in mobile and ubiquitous computing both as a goal in itself and as an intermediate task in the design of advanced applications. Virtually all existing activity recognition systems for mobile phones base their predictions on location cues. This approach forces the user to disclose personal information such as her home or work area. In this paper, we present a novel activity recognition system called TRAcME (temporal recognition of activities for mobile environments) which recognises generic human activities from large windows of context, Allenpsilas temporal relations and anonymous landmarks. Unlike existing systems, TRAcME handles simultaneous activities and outputs activities which are consistent with each other at the scale of a userpsilas day.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131968589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
The Effect of Routing-Load Dispersion on Congestion Control in Structured P2P Networks 结构化P2P网络中路由负载分散对拥塞控制的影响
Guowei Huang, Zhi Chen, Ying Wu, G. Wu
In structured P2P networks, the heterogeneity of node capacity, the skewness in query pattern and the greedy routing strategy could result in the load imbalance problem. However, existing load balancing algorithms for structured P2P networks mainly focused on handling the heterogeneity among nodes and the skewed workload. To deal with the load imbalance issue caused by the greedy routing strategy, we propose a routing load dispersion (RLD) mechanism for structured P2P networks in this paper. The mechanism manages to disperse the routing load of queries among nodes so that more nodes have a chance to dedicate their capacities for routing. By dispersing the routing load, the RLD mechanism is able to make use of the free capacity in the network and avoid the congestion effectively. We also evaluate the RLD mechanism by extensive simulations and the simulation results demonstrate the effectiveness of RLD mechanism on congestion control under different workload and churn levels.
在结构化P2P网络中,节点容量的异构性、查询模式的偏性和贪心路由策略会导致负载不均衡问题。然而,现有的结构化P2P网络负载均衡算法主要侧重于处理节点间的异构性和负载的倾斜。为了解决贪心路由策略导致的负载不均衡问题,提出了一种结构化P2P网络的路由负载分散机制。该机制设法在节点之间分散查询的路由负载,以便更多节点有机会将它们的容量用于路由。RLD机制通过分散路由负载,有效地利用了网络的空闲容量,避免了网络拥塞。我们还通过大量的仿真对RLD机制进行了评估,仿真结果证明了RLD机制在不同工作负载和用户流失水平下对拥塞控制的有效性。
{"title":"The Effect of Routing-Load Dispersion on Congestion Control in Structured P2P Networks","authors":"Guowei Huang, Zhi Chen, Ying Wu, G. Wu","doi":"10.1109/EUC.2008.131","DOIUrl":"https://doi.org/10.1109/EUC.2008.131","url":null,"abstract":"In structured P2P networks, the heterogeneity of node capacity, the skewness in query pattern and the greedy routing strategy could result in the load imbalance problem. However, existing load balancing algorithms for structured P2P networks mainly focused on handling the heterogeneity among nodes and the skewed workload. To deal with the load imbalance issue caused by the greedy routing strategy, we propose a routing load dispersion (RLD) mechanism for structured P2P networks in this paper. The mechanism manages to disperse the routing load of queries among nodes so that more nodes have a chance to dedicate their capacities for routing. By dispersing the routing load, the RLD mechanism is able to make use of the free capacity in the network and avoid the congestion effectively. We also evaluate the RLD mechanism by extensive simulations and the simulation results demonstrate the effectiveness of RLD mechanism on congestion control under different workload and churn levels.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114803816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Key Management Scheme for Cluster Based Wireless Sensor Networks 一种基于集群的无线传感器网络密钥管理方案
R. Azarderakhsh, A. Reyhani-Masoleh, Zine-Eddine Abid
Key management is a major challenge to achieve security in wireless sensor networks. In most of the schemes presented for key management in wireless sensor networks, it is assumed that the sensor nodes have the same capability. The recent research has shown that the survivability of the network can be improved if sensor nodes are grouped in clusters in which a powerful cluster head assigned. However, to gain advantages of clustering in order to find an efficient key management scheme needs more research. In this paper, we investigate the key management in cluster-based wireless sensor networks using both private and public key cryptography. Our goal is to introduce a platform in which public key cryptography is used to establish a secure link between sensor nodes and gateways. Instead of pre-loading a large number of keys into the sensor nodes, each node requests a session key from the gateway to establish a secure link with its neighbors after clustering phase. The security analysis and performance evaluation show that the proposed scheme has significant saving in storage space, transmission overhead, and perfect resilience against node capture.
密钥管理是实现无线传感器网络安全的主要挑战。在现有的无线传感器网络密钥管理方案中,大多数都假设传感器节点具有相同的能力。最近的研究表明,如果将传感器节点分组到集群中,并在集群中分配一个强大的簇头,则可以提高网络的生存能力。然而,为了充分利用集群的优势,找到一种有效的密钥管理方案还需要进一步的研究。本文研究了基于簇的无线传感器网络中使用私钥和公钥加密的密钥管理问题。我们的目标是引入一个平台,其中使用公钥加密技术在传感器节点和网关之间建立安全链接。在集群阶段结束后,每个节点向网关请求一个会话密钥,从而与其邻居建立安全链路,而不是将大量密钥预加载到传感器节点中。安全性分析和性能评估表明,该方案在存储空间和传输开销方面具有显著的节省,并且具有良好的抗节点捕获能力。
{"title":"A Key Management Scheme for Cluster Based Wireless Sensor Networks","authors":"R. Azarderakhsh, A. Reyhani-Masoleh, Zine-Eddine Abid","doi":"10.1109/EUC.2008.176","DOIUrl":"https://doi.org/10.1109/EUC.2008.176","url":null,"abstract":"Key management is a major challenge to achieve security in wireless sensor networks. In most of the schemes presented for key management in wireless sensor networks, it is assumed that the sensor nodes have the same capability. The recent research has shown that the survivability of the network can be improved if sensor nodes are grouped in clusters in which a powerful cluster head assigned. However, to gain advantages of clustering in order to find an efficient key management scheme needs more research. In this paper, we investigate the key management in cluster-based wireless sensor networks using both private and public key cryptography. Our goal is to introduce a platform in which public key cryptography is used to establish a secure link between sensor nodes and gateways. Instead of pre-loading a large number of keys into the sensor nodes, each node requests a session key from the gateway to establish a secure link with its neighbors after clustering phase. The security analysis and performance evaluation show that the proposed scheme has significant saving in storage space, transmission overhead, and perfect resilience against node capture.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116092049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Discovery Architecture for the Tracing of Products in the EPCglobal Network EPCglobal网络中产品追踪的发现体系结构
Gyeongtaek Lee, J. Shin, Dae-Won Park, H. Kwon
The EPCglobal Network is a network providing a shared view of the disposition of EPC-bearing objects between EPCglobal subscribers, within a relevant business context. In the EPCglobal Network, product data is distributed to several EPCISes(EPC Information Services) via movement of the product. The ONS (Object Naming Service) and the EPCISDS (EPCIS Discovery Service) are used to identify the distributed data for tracing the product. However, there is neither a standard scenario for access to the services when tracing the product nor a defined standard for EPCISDS. This paper suggests a novel architecture for tracing product data with EPCISDS and ONS. Our architecture provides a concrete substructure for product tracing services.
EPCglobal Network是一个网络,在相关的业务环境中,EPCglobal订户之间提供epc承载对象配置的共享视图。在EPC全球网络中,产品数据通过产品的移动分发到几个EPC信息服务(EPC Information Services)。使用ONS(对象命名服务)和EPCISDS (EPCIS发现服务)来识别分布式数据,以便跟踪产品。但是,在跟踪产品时既没有访问服务的标准场景,也没有为EPCISDS定义的标准。本文提出了一种利用EPCISDS和ONS跟踪产品数据的新体系结构。我们的体系结构为产品跟踪服务提供了具体的子结构。
{"title":"Discovery Architecture for the Tracing of Products in the EPCglobal Network","authors":"Gyeongtaek Lee, J. Shin, Dae-Won Park, H. Kwon","doi":"10.1109/EUC.2008.69","DOIUrl":"https://doi.org/10.1109/EUC.2008.69","url":null,"abstract":"The EPCglobal Network is a network providing a shared view of the disposition of EPC-bearing objects between EPCglobal subscribers, within a relevant business context. In the EPCglobal Network, product data is distributed to several EPCISes(EPC Information Services) via movement of the product. The ONS (Object Naming Service) and the EPCISDS (EPCIS Discovery Service) are used to identify the distributed data for tracing the product. However, there is neither a standard scenario for access to the services when tracing the product nor a defined standard for EPCISDS. This paper suggests a novel architecture for tracing product data with EPCISDS and ONS. Our architecture provides a concrete substructure for product tracing services.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"11 Suppl 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116693800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Attacks on Improved Key Distribution Protocols with Perfect Reparability 具有完全可修复性的改进密钥分发协议的攻击
R. Phan, B. Goi
In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all.
本文介绍了针对ICON 2000会议上提出的两个具有完全可修复性的改进密钥分发协议的攻击。首先,我们证明了他们论文中描述的两种ldquoattacksrdquo是微不足道的,根本不能算作攻击,因为它们是适用于任何安全系统的众所周知的攻击。此外,我们描述了针对这两种改进协议的几种攻击,并表明非法攻击者可以很容易地冒充合法方,并使其他方认为他们正在与被冒充方共享密钥,而实际上该方根本不存在。
{"title":"Attacks on Improved Key Distribution Protocols with Perfect Reparability","authors":"R. Phan, B. Goi","doi":"10.1109/EUC.2008.161","DOIUrl":"https://doi.org/10.1109/EUC.2008.161","url":null,"abstract":"In this paper, we present attacks on two improved key distribution protocol with perfect reparability that were presented at ICON 2000. First, we show that the two ldquoattacksrdquo described in their paper are trivial and do not count as attacks at all since they are well-known attacks that apply to any security system. Further, we describe several attacks on both improved protocols, and show that an illegitimate attacker could easily impersonate legitimate parties and have other parties think they are sharing keys with the impersonated party when in fact that party is not present at all.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"17 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123625772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Impact of DoS Attacks on Secure Service Discovery DoS攻击对安全服务发现的影响研究
S. Trabelsi, G. Urvoy-Keller, Y. Roudier
Service discovery, an essential building block of nomadic and ubiquitous computing applications, needs to be secured to be effectively deployed. Centralized and decentralized approaches have been proposed to this end. This paper analyzes the application layer secure matching function using a Markovian performance model in order to analyze the effects of DoS attacks in centralized and decentralized service discovery systems and to assess anti-clogging mechanisms as a protection against such attacks. This study highlights the determinant parameters that should be evaluated for ensuring a scalable and secure service discovery deployment.
服务发现是移动和无处不在的计算应用程序的基本构建块,需要对其进行保护才能有效地部署。为此目的提出了集中和分散的方法。本文利用马尔可夫性能模型分析了应用层安全匹配功能,分析了集中式和分散式服务发现系统中DoS攻击的影响,并评估了防范此类攻击的抗阻塞机制。本研究强调了应该评估的决定性参数,以确保可扩展和安全的服务发现部署。
{"title":"On the Impact of DoS Attacks on Secure Service Discovery","authors":"S. Trabelsi, G. Urvoy-Keller, Y. Roudier","doi":"10.1109/EUC.2008.182","DOIUrl":"https://doi.org/10.1109/EUC.2008.182","url":null,"abstract":"Service discovery, an essential building block of nomadic and ubiquitous computing applications, needs to be secured to be effectively deployed. Centralized and decentralized approaches have been proposed to this end. This paper analyzes the application layer secure matching function using a Markovian performance model in order to analyze the effects of DoS attacks in centralized and decentralized service discovery systems and to assess anti-clogging mechanisms as a protection against such attacks. This study highlights the determinant parameters that should be evaluated for ensuring a scalable and secure service discovery deployment.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130890964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Probabilistic Approach to Consistency Checking for Pervasive Context 普适上下文一致性检验的概率方法
Yu Huang, X. Ma, Xianping Tao, Jiannong Cao, Jian Lu
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to adapt themselves. In pervasive computing environments, users are often willing to accept certain degree of context inconsistency, as long as it can reduce the consistency maintenance cost, e.g., query delay and battery power. However, existing consistency maintenance schemes do not enable the users to make such tradeoffs. To this end, we propose the probabilistic consistency checking for pervasive context (PCCPC) algorithm. Detailed performance analysis shows that PCCPC enables the users to check consistency over arbitrarily specified ratio of context. We also conduct experiments to study the cost reduced by probabilistic checking. The analytical and the experimental results show that PCCPC enables the users to efficiently make tradeoffs between context consistency and the associated checking cost.
上下文感知是普适计算中的一个关键问题。上下文感知的应用程序容易出现上下文一致性问题,其中应用程序面临冲突的上下文,并且无法决定如何适应自己。在普适性计算环境中,用户通常愿意接受一定程度的上下文不一致,只要它可以降低一致性维护成本,例如查询延迟和电池电量。然而,现有的一致性维护方案不允许用户做出这样的权衡。为此,我们提出了普适上下文(PCCPC)算法的概率一致性检查。详细的性能分析表明,PCCPC使用户能够在任意指定的上下文比例上检查一致性。我们还通过实验研究了概率检查所降低的成本。分析和实验结果表明,PCCPC使用户能够有效地在上下文一致性和相关检查成本之间进行权衡。
{"title":"A Probabilistic Approach to Consistency Checking for Pervasive Context","authors":"Yu Huang, X. Ma, Xianping Tao, Jiannong Cao, Jian Lu","doi":"10.1109/EUC.2008.129","DOIUrl":"https://doi.org/10.1109/EUC.2008.129","url":null,"abstract":"Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to adapt themselves. In pervasive computing environments, users are often willing to accept certain degree of context inconsistency, as long as it can reduce the consistency maintenance cost, e.g., query delay and battery power. However, existing consistency maintenance schemes do not enable the users to make such tradeoffs. To this end, we propose the probabilistic consistency checking for pervasive context (PCCPC) algorithm. Detailed performance analysis shows that PCCPC enables the users to check consistency over arbitrarily specified ratio of context. We also conduct experiments to study the cost reduced by probabilistic checking. The analytical and the experimental results show that PCCPC enables the users to efficiently make tradeoffs between context consistency and the associated checking cost.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Hardware Support for Efficient Sparse Matrix Vector Multiplication 高效稀疏矩阵向量乘法的硬件支持
A. Ku, J.Y. Kuo, Jingling Xue
Sparse matrix vector multiplication (SpMxV) is a core operation in many engineering, scientific and financial applications. Due to the sparse nature of the underlying matrices, irregular memory access patterns and short row lengths often slow down the performance significantly. Past implementations of SpMxV have been reported to be run at 10% or less of the machine's peak capability. In this paper we present a novel hardware support called distTree for efficient SpMxV. It is shown that replacing the column indices of sparse matrices with extra hardware is achievable and yields an average speedup by a factor of two for the suite of benchmarks used. The matrix data set for the distTree is approximately 30% less than that for conventional CSR algorithms so that distTree is beneficial in terms of not only performance but also memory usage. Thorough analysis is done by looking at the correlation between the performance speedups and various matrices properties.
稀疏矩阵向量乘法(SpMxV)是许多工程、科学和金融应用中的核心运算。由于底层矩阵的稀疏特性,不规则的内存访问模式和较短的行长度通常会显著降低性能。据报道,过去的SpMxV实现在机器峰值能力的10%或更少的情况下运行。本文提出了一种新的硬件支持,称为distTree,用于高效的SpMxV。结果表明,用额外的硬件替换稀疏矩阵的列索引是可以实现的,并且对于所使用的基准测试套件,平均速度提高了两倍。distTree的矩阵数据集比传统CSR算法的矩阵数据集大约少30%,因此distTree不仅在性能方面,而且在内存使用方面都是有益的。通过查看性能加速与各种矩阵属性之间的相关性,可以进行彻底的分析。
{"title":"Hardware Support for Efficient Sparse Matrix Vector Multiplication","authors":"A. Ku, J.Y. Kuo, Jingling Xue","doi":"10.1109/EUC.2008.154","DOIUrl":"https://doi.org/10.1109/EUC.2008.154","url":null,"abstract":"Sparse matrix vector multiplication (SpMxV) is a core operation in many engineering, scientific and financial applications. Due to the sparse nature of the underlying matrices, irregular memory access patterns and short row lengths often slow down the performance significantly. Past implementations of SpMxV have been reported to be run at 10% or less of the machine's peak capability. In this paper we present a novel hardware support called distTree for efficient SpMxV. It is shown that replacing the column indices of sparse matrices with extra hardware is achievable and yields an average speedup by a factor of two for the suite of benchmarks used. The matrix data set for the distTree is approximately 30% less than that for conventional CSR algorithms so that distTree is beneficial in terms of not only performance but also memory usage. Thorough analysis is done by looking at the correlation between the performance speedups and various matrices properties.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130464458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Design of the Ubiquitous Learning System Based on Sensor Networks 基于传感器网络的泛在学习系统改进设计
M. Dong, Gongwei Zhang, K. Ota, Song Guo, M. Guo
With the great progress of information technologies, computers are embedded into everywhere to make our daily life convenient, efficient and invisible. In order to utilize this progress for learning, a scheduler system, a Ubiquitous Learning System (ULS) was proposed. ULS contributes a lot to improve studentpsilas learning efficiency. Yet improvement can still be made to the system by using sensor networks. In our new design, we embed various kinds of sensors, like temperature sensor, oxygen sensor, light sensor, into the environment. Based on the information collected by such sensors, decisions can be made by the control center to adjust the environment automatically for learner. Our research result reveals that the improved ULS not only benefited learners to acquire their learning habits but also improve their learning efficiency.
随着信息技术的巨大进步,计算机无处不在,使我们的日常生活方便,高效和无形。为了利用这一进程进行学习,提出了一种调度系统,即泛在学习系统(ULS)。ULS为提高学生的学习效率做出了巨大贡献。然而,仍然可以通过使用传感器网络对系统进行改进。在我们的新设计中,我们将各种传感器,如温度传感器,氧气传感器,光传感器,嵌入到环境中。根据这些传感器收集到的信息,控制中心可以做出决策,为学习者自动调整环境。我们的研究结果表明,改进后的语言学习量表不仅有利于学习者习得学习习惯,而且提高了学习者的学习效率。
{"title":"An Improved Design of the Ubiquitous Learning System Based on Sensor Networks","authors":"M. Dong, Gongwei Zhang, K. Ota, Song Guo, M. Guo","doi":"10.1109/EUC.2008.169","DOIUrl":"https://doi.org/10.1109/EUC.2008.169","url":null,"abstract":"With the great progress of information technologies, computers are embedded into everywhere to make our daily life convenient, efficient and invisible. In order to utilize this progress for learning, a scheduler system, a Ubiquitous Learning System (ULS) was proposed. ULS contributes a lot to improve studentpsilas learning efficiency. Yet improvement can still be made to the system by using sensor networks. In our new design, we embed various kinds of sensors, like temperature sensor, oxygen sensor, light sensor, into the environment. Based on the information collected by such sensors, decisions can be made by the control center to adjust the environment automatically for learner. Our research result reveals that the improved ULS not only benefited learners to acquire their learning habits but also improve their learning efficiency.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125121968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research Issues and Challenges to Advance System Software  for Multicore Processors and Data-Intensive Applications 多核处理器和数据密集型应用的先进系统软件的研究问题和挑战
Xiaodong Zhang
Compared with rapid technology advancements in multicore processors and rapid changes from computing-intensive to highly data-intensive applications, operating systems have been evolved very slowly for several decades. Application users are facing to two major challenges in today's computing environment. On the top level of the system hierarchy, private and shared caches are equipped for many cores to access concurrently, inevitably causing access conflicts to degrade execution performance. On the bottom level, the performance bottleneck of "memory wall" has been shifted to "disk wall" that is a serious bottleneck for many data- intensive applications. Since processor caches and disk storage are not in the major scope of operating system management, and their increasingly complex operations are not transparent to application users, the above mentioned performance issues have not been effectively addressed at any level of computer systems. We have made a continuous effort to enhance operating systems with two objectives: (1) to well utilize rich but complex resources of multicore processors and (2) to access disk data as fast as possible. At the multicore processor level, we are developing new resource allocation management to improve the effective caching capacity per core and/or per thread, and to minimize congestion in off-chip memory accesses by coordinating memory bandwidth sharing. At the storage level, we enable operating systems to effectively exploit "sequential locality" - for the same amount of data, sequential accesses are several orders of magnitude faster than random accesses in disks. In this talk, related research issues and challenges will be overviewed, and preliminary results will be presented.
与多核处理器的快速技术进步和从计算密集型到高度数据密集型应用程序的快速变化相比,操作系统的发展已经非常缓慢了几十年。在当今的计算环境中,应用程序用户面临着两大挑战。在系统层次结构的顶层,为多个内核并发访问配备了私有和共享缓存,这不可避免地会导致访问冲突,从而降低执行性能。在底层,“内存墙”的性能瓶颈已经转移到“磁盘墙”,这是许多数据密集型应用程序的严重瓶颈。由于处理器缓存和磁盘存储不在操作系统管理的主要范围内,并且它们日益复杂的操作对应用程序用户并不透明,因此上述性能问题在任何级别的计算机系统中都没有得到有效解决。我们一直致力提升操作系统,目的有二:(1)善用多核处理器丰富而复杂的资源,以及(2)尽快存取磁碟资料。在多核处理器级别,我们正在开发新的资源分配管理,以提高每个核心和/或每个线程的有效缓存容量,并通过协调内存带宽共享来最小化片外内存访问中的拥塞。在存储级别,我们使操作系统能够有效地利用“顺序局部性”——对于相同数量的数据,顺序访问要比磁盘中的随机访问快几个数量级。在这次演讲中,将概述相关的研究问题和挑战,并介绍初步结果。
{"title":"Research Issues and Challenges to Advance System Software  for Multicore Processors and Data-Intensive Applications","authors":"Xiaodong Zhang","doi":"10.1109/EUC.2008.189","DOIUrl":"https://doi.org/10.1109/EUC.2008.189","url":null,"abstract":"Compared with rapid technology advancements in multicore processors and rapid changes from computing-intensive to highly data-intensive applications, operating systems have been evolved very slowly for several decades. Application users are facing to two major challenges in today's computing environment. On the top level of the system hierarchy, private and shared caches are equipped for many cores to access concurrently, inevitably causing access conflicts to degrade execution performance. On the bottom level, the performance bottleneck of \"memory wall\" has been shifted to \"disk wall\" that is a serious bottleneck for many data- intensive applications. Since processor caches and disk storage are not in the major scope of operating system management, and their increasingly complex operations are not transparent to application users, the above mentioned performance issues have not been effectively addressed at any level of computer systems. We have made a continuous effort to enhance operating systems with two objectives: (1) to well utilize rich but complex resources of multicore processors and (2) to access disk data as fast as possible. At the multicore processor level, we are developing new resource allocation management to improve the effective caching capacity per core and/or per thread, and to minimize congestion in off-chip memory accesses by coordinating memory bandwidth sharing. At the storage level, we enable operating systems to effectively exploit \"sequential locality\" - for the same amount of data, sequential accesses are several orders of magnitude faster than random accesses in disks. In this talk, related research issues and challenges will be overviewed, and preliminary results will be presented.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128421449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1