首页 > 最新文献

2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
An Improved Design of the Ubiquitous Learning System Based on Sensor Networks 基于传感器网络的泛在学习系统改进设计
M. Dong, Gongwei Zhang, K. Ota, Song Guo, M. Guo
With the great progress of information technologies, computers are embedded into everywhere to make our daily life convenient, efficient and invisible. In order to utilize this progress for learning, a scheduler system, a Ubiquitous Learning System (ULS) was proposed. ULS contributes a lot to improve studentpsilas learning efficiency. Yet improvement can still be made to the system by using sensor networks. In our new design, we embed various kinds of sensors, like temperature sensor, oxygen sensor, light sensor, into the environment. Based on the information collected by such sensors, decisions can be made by the control center to adjust the environment automatically for learner. Our research result reveals that the improved ULS not only benefited learners to acquire their learning habits but also improve their learning efficiency.
随着信息技术的巨大进步,计算机无处不在,使我们的日常生活方便,高效和无形。为了利用这一进程进行学习,提出了一种调度系统,即泛在学习系统(ULS)。ULS为提高学生的学习效率做出了巨大贡献。然而,仍然可以通过使用传感器网络对系统进行改进。在我们的新设计中,我们将各种传感器,如温度传感器,氧气传感器,光传感器,嵌入到环境中。根据这些传感器收集到的信息,控制中心可以做出决策,为学习者自动调整环境。我们的研究结果表明,改进后的语言学习量表不仅有利于学习者习得学习习惯,而且提高了学习者的学习效率。
{"title":"An Improved Design of the Ubiquitous Learning System Based on Sensor Networks","authors":"M. Dong, Gongwei Zhang, K. Ota, Song Guo, M. Guo","doi":"10.1109/EUC.2008.169","DOIUrl":"https://doi.org/10.1109/EUC.2008.169","url":null,"abstract":"With the great progress of information technologies, computers are embedded into everywhere to make our daily life convenient, efficient and invisible. In order to utilize this progress for learning, a scheduler system, a Ubiquitous Learning System (ULS) was proposed. ULS contributes a lot to improve studentpsilas learning efficiency. Yet improvement can still be made to the system by using sensor networks. In our new design, we embed various kinds of sensors, like temperature sensor, oxygen sensor, light sensor, into the environment. Based on the information collected by such sensors, decisions can be made by the control center to adjust the environment automatically for learner. Our research result reveals that the improved ULS not only benefited learners to acquire their learning habits but also improve their learning efficiency.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125121968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks 利用无线传感器网络单向链路的可靠密钥建立方案
Yuanyuan Zhang, Dawu Gu, B. Preneel
Wireless sensor networks are designed for outdoor environment surveillance and require benign coverage, steady working status and long lifetime, moreover, they require efficient security services for rigorous applications. Most security schemes are designed to work efficiently only when bidirectional links exist. So do most key establishment protocols for WSNs. Traditional key establishment schemes delete all the unidirectional links from the network. Hence, the sensors covered only by unidirectional links are excluded from the collaborating network, even if they are stable and energetic. These schemes shorten the lifetime and decrease the connectivity of the whole network. To improve the network connectivity and increase the number of available sensors in the network, a security mechanism is proposed for wireless sensor networks exploiting unidirectional links. By searching local connection components in a small area, this mechanism helps negotiate shared secrets among nodes that may covered by unidirectional links. It obtains identity authentication and perfect resilience against node compromise.The simulation reveals that, our scheme can greatly increase the proportion of available sensor nodes and network connectivity, which will efficiently prolong the network lifetime.
无线传感器网络是为室外环境监控而设计的,它要求良好的覆盖范围、稳定的工作状态和较长的使用寿命,并且需要高效的安全服务来满足苛刻的应用要求。大多数安全方案被设计为只有在存在双向链路的情况下才能有效工作。大多数无线传感器网络的密钥建立协议也是如此。传统的密钥建立方案删除了网络中的所有单向链路。因此,仅被单向链路覆盖的传感器被排除在协作网络之外,即使它们是稳定的和有能量的。这些方案缩短了生存期,降低了整个网络的连通性。为了提高网络连通性和增加网络中可用传感器的数量,提出了一种利用单向链路的无线传感器网络安全机制。通过在小范围内搜索本地连接组件,该机制有助于在可能由单向链路覆盖的节点之间协商共享秘密。它获得了身份认证和完美的抗节点妥协弹性。仿真结果表明,该方案可以大大提高传感器节点的可用比例和网络连通性,有效地延长了网络的生存期。
{"title":"Reliable Key Establishment Scheme Exploiting Unidirectional Links in Wireless Sensor Networks","authors":"Yuanyuan Zhang, Dawu Gu, B. Preneel","doi":"10.1109/EUC.2008.10","DOIUrl":"https://doi.org/10.1109/EUC.2008.10","url":null,"abstract":"Wireless sensor networks are designed for outdoor environment surveillance and require benign coverage, steady working status and long lifetime, moreover, they require efficient security services for rigorous applications. Most security schemes are designed to work efficiently only when bidirectional links exist. So do most key establishment protocols for WSNs. Traditional key establishment schemes delete all the unidirectional links from the network. Hence, the sensors covered only by unidirectional links are excluded from the collaborating network, even if they are stable and energetic. These schemes shorten the lifetime and decrease the connectivity of the whole network. To improve the network connectivity and increase the number of available sensors in the network, a security mechanism is proposed for wireless sensor networks exploiting unidirectional links. By searching local connection components in a small area, this mechanism helps negotiate shared secrets among nodes that may covered by unidirectional links. It obtains identity authentication and perfect resilience against node compromise.The simulation reveals that, our scheme can greatly increase the proportion of available sensor nodes and network connectivity, which will efficiently prolong the network lifetime.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125551604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Generalized Framework for System-Wide Energy Savings in Hard Real-Time Embedded Systems 硬实时嵌入式系统全系统节能的通用框架
Gang Zeng, H. Tomiyama, H. Takada, T. Ishihara
A generalized dynamic energy performance scaling (DEPS) framework is proposed for exploring application-specific energy-saving potential in hard real-time embedded systems. This software-centric framework focuses on system-wide energy reduction and takes advantage of possible power control mechanisms to trade off performance for energy savings. Three existing technologies, i.e., dynamic hardware resource configuration (DHRC), dynamic voltage frequency scaling (DVFS), and dynamic power management (DPM) have been employed in this framework to achieve the maximal energy savings. Static and dynamic schemes of DEPS are proposed to deal with stable or variable workload in the embedded systems. Through a case study, its effectiveness has been validated.
为探索硬实时嵌入式系统中特定应用的节能潜力,提出了一种广义动态能源性能缩放(DEPS)框架。这个以软件为中心的框架侧重于系统范围内的节能,并利用可能的功率控制机制来权衡性能以节省能源。该框架采用了三种现有技术,即动态硬件资源配置(DHRC)、动态电压频率缩放(DVFS)和动态电源管理(DPM),以实现最大的节能。针对嵌入式系统中稳定或可变的工作负载,提出了DEPS的静态和动态方案。通过实例分析,验证了该方法的有效性。
{"title":"A Generalized Framework for System-Wide Energy Savings in Hard Real-Time Embedded Systems","authors":"Gang Zeng, H. Tomiyama, H. Takada, T. Ishihara","doi":"10.1109/EUC.2008.101","DOIUrl":"https://doi.org/10.1109/EUC.2008.101","url":null,"abstract":"A generalized dynamic energy performance scaling (DEPS) framework is proposed for exploring application-specific energy-saving potential in hard real-time embedded systems. This software-centric framework focuses on system-wide energy reduction and takes advantage of possible power control mechanisms to trade off performance for energy savings. Three existing technologies, i.e., dynamic hardware resource configuration (DHRC), dynamic voltage frequency scaling (DVFS), and dynamic power management (DPM) have been employed in this framework to achieve the maximal energy savings. Static and dynamic schemes of DEPS are proposed to deal with stable or variable workload in the embedded systems. Through a case study, its effectiveness has been validated.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
On the Impact of DoS Attacks on Secure Service Discovery DoS攻击对安全服务发现的影响研究
S. Trabelsi, G. Urvoy-Keller, Y. Roudier
Service discovery, an essential building block of nomadic and ubiquitous computing applications, needs to be secured to be effectively deployed. Centralized and decentralized approaches have been proposed to this end. This paper analyzes the application layer secure matching function using a Markovian performance model in order to analyze the effects of DoS attacks in centralized and decentralized service discovery systems and to assess anti-clogging mechanisms as a protection against such attacks. This study highlights the determinant parameters that should be evaluated for ensuring a scalable and secure service discovery deployment.
服务发现是移动和无处不在的计算应用程序的基本构建块,需要对其进行保护才能有效地部署。为此目的提出了集中和分散的方法。本文利用马尔可夫性能模型分析了应用层安全匹配功能,分析了集中式和分散式服务发现系统中DoS攻击的影响,并评估了防范此类攻击的抗阻塞机制。本研究强调了应该评估的决定性参数,以确保可扩展和安全的服务发现部署。
{"title":"On the Impact of DoS Attacks on Secure Service Discovery","authors":"S. Trabelsi, G. Urvoy-Keller, Y. Roudier","doi":"10.1109/EUC.2008.182","DOIUrl":"https://doi.org/10.1109/EUC.2008.182","url":null,"abstract":"Service discovery, an essential building block of nomadic and ubiquitous computing applications, needs to be secured to be effectively deployed. Centralized and decentralized approaches have been proposed to this end. This paper analyzes the application layer secure matching function using a Markovian performance model in order to analyze the effects of DoS attacks in centralized and decentralized service discovery systems and to assess anti-clogging mechanisms as a protection against such attacks. This study highlights the determinant parameters that should be evaluated for ensuring a scalable and secure service discovery deployment.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130890964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Scalable and Secure Routing for Large-Scale Sensor Networks 大规模传感器网络的可扩展和安全路由
F. Tang, M. Guo, Minglu Li, Zhijun Wang, Zixue Cheng
Routing is an important issue in any type of networks. Multiple-hop based routing in sensor networks suffer performance downgrade from too many hops with the increase of the size of sensor nodes, as well as various attacks. A number of approaches have been proposed for routing in sensor networks, but they lack of sufficient support for secure routing in large-scale sensor networks. In this paper, we propose a scalable and secure routing protocol that can work energy-efficiently and resist most of attacks. By hierarchical and long-distance mesh routing, our protocol significantly reduces average number of hops for data transmission. Lightweight security mechanism enables the routing protocol to survive from most attacks against sensor networks.
路由在任何类型的网络中都是一个重要的问题。传感器网络中基于多跳的路由会随着节点数量的增加以及各种攻击而导致性能下降。针对传感器网络中的路由问题,已经提出了许多方法,但它们缺乏对大规模传感器网络中安全路由的足够支持。在本文中,我们提出了一种可扩展且安全的路由协议,该协议可以高效地工作并抵抗大多数攻击。通过分层和远距离网状路由,我们的协议显著减少了数据传输的平均跳数。轻量级的安全机制使路由协议能够抵御大多数针对传感器网络的攻击。
{"title":"Scalable and Secure Routing for Large-Scale Sensor Networks","authors":"F. Tang, M. Guo, Minglu Li, Zhijun Wang, Zixue Cheng","doi":"10.1109/EUC.2008.47","DOIUrl":"https://doi.org/10.1109/EUC.2008.47","url":null,"abstract":"Routing is an important issue in any type of networks. Multiple-hop based routing in sensor networks suffer performance downgrade from too many hops with the increase of the size of sensor nodes, as well as various attacks. A number of approaches have been proposed for routing in sensor networks, but they lack of sufficient support for secure routing in large-scale sensor networks. In this paper, we propose a scalable and secure routing protocol that can work energy-efficiently and resist most of attacks. By hierarchical and long-distance mesh routing, our protocol significantly reduces average number of hops for data transmission. Lightweight security mechanism enables the routing protocol to survive from most attacks against sensor networks.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128856178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Adaptive Load Balancing for Lookups in Heterogeneous DHT 异构DHT中查找的自适应负载均衡
Zhi Chen, Guowei Huang, Jingdong Xu, Yang Yang
In DHT based P2P networks, the heterogeneity of node capacity and the skewness in query pattern could result in lookup load imbalance. Indegree adjustment is an effective, light-weighted and heterogeneity-aware approach to balance lookup traffic in local area, but not globally. In this paper we present a hybrid algorithm combining in degree adjustment and virtual server (VS) approaches to address both local and global lookup imbalance in DHT networks. We divide local nodes into zones, and select strong nodes to form a virtual server group (VSG). Hot zones can apply for virtual servers from VSG in order to distribute load in system wide. Nodes and VSs in the zones use indegree adjustment to maintain zone balance. We can therefore significantly improve the load balancing of traffic in these systems, and consequently their performance.Results from experimental evaluation demonstrate the effectiveness of our approach.
在基于DHT的P2P网络中,节点容量的异构性和查询模式的偏性会导致查找负载的不平衡。度调整是一种有效的、轻量级的、异构感知的方法,可以平衡局部查找流量,而不是全局查找流量。本文提出了一种结合度调整和虚拟服务器(VS)方法的混合算法来解决DHT网络中的局部和全局查找不平衡问题。我们将本地节点划分为多个分区,并选择强节点组成虚拟服务器组(VSG)。热区可以从VSG申请虚拟服务器,以便在系统范围内分配负载。分区内的节点和VSs通过度调节来保持分区的平衡。因此,我们可以显著改善这些系统中流量的负载平衡,从而提高它们的性能。实验结果证明了该方法的有效性。
{"title":"Adaptive Load Balancing for Lookups in Heterogeneous DHT","authors":"Zhi Chen, Guowei Huang, Jingdong Xu, Yang Yang","doi":"10.1109/EUC.2008.153","DOIUrl":"https://doi.org/10.1109/EUC.2008.153","url":null,"abstract":"In DHT based P2P networks, the heterogeneity of node capacity and the skewness in query pattern could result in lookup load imbalance. Indegree adjustment is an effective, light-weighted and heterogeneity-aware approach to balance lookup traffic in local area, but not globally. In this paper we present a hybrid algorithm combining in degree adjustment and virtual server (VS) approaches to address both local and global lookup imbalance in DHT networks. We divide local nodes into zones, and select strong nodes to form a virtual server group (VSG). Hot zones can apply for virtual servers from VSG in order to distribute load in system wide. Nodes and VSs in the zones use indegree adjustment to maintain zone balance. We can therefore significantly improve the load balancing of traffic in these systems, and consequently their performance.Results from experimental evaluation demonstrate the effectiveness of our approach.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126861788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Trustworthy and Secure Kiosk Computing for Mobile Users 为流动用户提供可靠和安全的资讯亭计算服务
Dong Zhou, H. Inamura
A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a userpsilas typical surrounding environment. Security is a concern when integrating a mobile device with an environment kiosk. In particular, the mobile user needs to be assured that the environment kiosk that he is using does not contain malicious code that may exploit his sensitive data on device, and that such sensitive data will not be left on the kiosk for attackers to exploit. In this paper, we present an OS-agnostic approach for trustworthy and secure kiosk computing. Our approach supports secure user session initiation, strong session isolation and quick session startup, and mitigates a number of security threats such as man-in-the-middle attack, session stealing attack, and keyboard tampering attack.
用户随身携带的移动设备通常包含用户的私有数据,但具有有限的人机交互功能。但是,在用户和典型的周围环境中,并不缺乏具有丰富计算和用户交互资源的固定计算机或kiosks。在将移动设备与环境信息亭集成时,安全性是一个需要考虑的问题。特别是,移动用户需要确保他正在使用的环境kiosk不包含可能利用其设备上的敏感数据的恶意代码,并且这些敏感数据不会留在kiosk上供攻击者利用。在本文中,我们提出了一种与操作系统无关的方法,用于可靠和安全的kiosk计算。我们的方法支持安全的用户会话发起、强会话隔离和快速会话启动,并减轻了中间人攻击、会话窃取攻击和键盘篡改攻击等一系列安全威胁。
{"title":"Towards Trustworthy and Secure Kiosk Computing for Mobile Users","authors":"Dong Zhou, H. Inamura","doi":"10.1109/EUC.2008.170","DOIUrl":"https://doi.org/10.1109/EUC.2008.170","url":null,"abstract":"A mobile device that a user carries around usually contains data private to the user but has restricted human-device interaction capabilities. There is, however, no lack of stationary computers, or kiosks, with rich computing and user interaction resources in a userpsilas typical surrounding environment. Security is a concern when integrating a mobile device with an environment kiosk. In particular, the mobile user needs to be assured that the environment kiosk that he is using does not contain malicious code that may exploit his sensitive data on device, and that such sensitive data will not be left on the kiosk for attackers to exploit. In this paper, we present an OS-agnostic approach for trustworthy and secure kiosk computing. Our approach supports secure user session initiation, strong session isolation and quick session startup, and mitigates a number of security threats such as man-in-the-middle attack, session stealing attack, and keyboard tampering attack.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126338823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Probabilistic Approach to Consistency Checking for Pervasive Context 普适上下文一致性检验的概率方法
Yu Huang, X. Ma, Xianping Tao, Jiannong Cao, Jian Lu
Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to adapt themselves. In pervasive computing environments, users are often willing to accept certain degree of context inconsistency, as long as it can reduce the consistency maintenance cost, e.g., query delay and battery power. However, existing consistency maintenance schemes do not enable the users to make such tradeoffs. To this end, we propose the probabilistic consistency checking for pervasive context (PCCPC) algorithm. Detailed performance analysis shows that PCCPC enables the users to check consistency over arbitrarily specified ratio of context. We also conduct experiments to study the cost reduced by probabilistic checking. The analytical and the experimental results show that PCCPC enables the users to efficiently make tradeoffs between context consistency and the associated checking cost.
上下文感知是普适计算中的一个关键问题。上下文感知的应用程序容易出现上下文一致性问题,其中应用程序面临冲突的上下文,并且无法决定如何适应自己。在普适性计算环境中,用户通常愿意接受一定程度的上下文不一致,只要它可以降低一致性维护成本,例如查询延迟和电池电量。然而,现有的一致性维护方案不允许用户做出这样的权衡。为此,我们提出了普适上下文(PCCPC)算法的概率一致性检查。详细的性能分析表明,PCCPC使用户能够在任意指定的上下文比例上检查一致性。我们还通过实验研究了概率检查所降低的成本。分析和实验结果表明,PCCPC使用户能够有效地在上下文一致性和相关检查成本之间进行权衡。
{"title":"A Probabilistic Approach to Consistency Checking for Pervasive Context","authors":"Yu Huang, X. Ma, Xianping Tao, Jiannong Cao, Jian Lu","doi":"10.1109/EUC.2008.129","DOIUrl":"https://doi.org/10.1109/EUC.2008.129","url":null,"abstract":"Context-awareness is a key issue in pervasive computing. Context-aware applications are prone to the context consistency problem, where applications are confronted with conflicting contexts and cannot decide how to adapt themselves. In pervasive computing environments, users are often willing to accept certain degree of context inconsistency, as long as it can reduce the consistency maintenance cost, e.g., query delay and battery power. However, existing consistency maintenance schemes do not enable the users to make such tradeoffs. To this end, we propose the probabilistic consistency checking for pervasive context (PCCPC) algorithm. Detailed performance analysis shows that PCCPC enables the users to check consistency over arbitrarily specified ratio of context. We also conduct experiments to study the cost reduced by probabilistic checking. The analytical and the experimental results show that PCCPC enables the users to efficiently make tradeoffs between context consistency and the associated checking cost.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Hardware Support for Efficient Sparse Matrix Vector Multiplication 高效稀疏矩阵向量乘法的硬件支持
A. Ku, J.Y. Kuo, Jingling Xue
Sparse matrix vector multiplication (SpMxV) is a core operation in many engineering, scientific and financial applications. Due to the sparse nature of the underlying matrices, irregular memory access patterns and short row lengths often slow down the performance significantly. Past implementations of SpMxV have been reported to be run at 10% or less of the machine's peak capability. In this paper we present a novel hardware support called distTree for efficient SpMxV. It is shown that replacing the column indices of sparse matrices with extra hardware is achievable and yields an average speedup by a factor of two for the suite of benchmarks used. The matrix data set for the distTree is approximately 30% less than that for conventional CSR algorithms so that distTree is beneficial in terms of not only performance but also memory usage. Thorough analysis is done by looking at the correlation between the performance speedups and various matrices properties.
稀疏矩阵向量乘法(SpMxV)是许多工程、科学和金融应用中的核心运算。由于底层矩阵的稀疏特性,不规则的内存访问模式和较短的行长度通常会显著降低性能。据报道,过去的SpMxV实现在机器峰值能力的10%或更少的情况下运行。本文提出了一种新的硬件支持,称为distTree,用于高效的SpMxV。结果表明,用额外的硬件替换稀疏矩阵的列索引是可以实现的,并且对于所使用的基准测试套件,平均速度提高了两倍。distTree的矩阵数据集比传统CSR算法的矩阵数据集大约少30%,因此distTree不仅在性能方面,而且在内存使用方面都是有益的。通过查看性能加速与各种矩阵属性之间的相关性,可以进行彻底的分析。
{"title":"Hardware Support for Efficient Sparse Matrix Vector Multiplication","authors":"A. Ku, J.Y. Kuo, Jingling Xue","doi":"10.1109/EUC.2008.154","DOIUrl":"https://doi.org/10.1109/EUC.2008.154","url":null,"abstract":"Sparse matrix vector multiplication (SpMxV) is a core operation in many engineering, scientific and financial applications. Due to the sparse nature of the underlying matrices, irregular memory access patterns and short row lengths often slow down the performance significantly. Past implementations of SpMxV have been reported to be run at 10% or less of the machine's peak capability. In this paper we present a novel hardware support called distTree for efficient SpMxV. It is shown that replacing the column indices of sparse matrices with extra hardware is achievable and yields an average speedup by a factor of two for the suite of benchmarks used. The matrix data set for the distTree is approximately 30% less than that for conventional CSR algorithms so that distTree is beneficial in terms of not only performance but also memory usage. Thorough analysis is done by looking at the correlation between the performance speedups and various matrices properties.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130464458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Discovery Architecture for the Tracing of Products in the EPCglobal Network EPCglobal网络中产品追踪的发现体系结构
Gyeongtaek Lee, J. Shin, Dae-Won Park, H. Kwon
The EPCglobal Network is a network providing a shared view of the disposition of EPC-bearing objects between EPCglobal subscribers, within a relevant business context. In the EPCglobal Network, product data is distributed to several EPCISes(EPC Information Services) via movement of the product. The ONS (Object Naming Service) and the EPCISDS (EPCIS Discovery Service) are used to identify the distributed data for tracing the product. However, there is neither a standard scenario for access to the services when tracing the product nor a defined standard for EPCISDS. This paper suggests a novel architecture for tracing product data with EPCISDS and ONS. Our architecture provides a concrete substructure for product tracing services.
EPCglobal Network是一个网络,在相关的业务环境中,EPCglobal订户之间提供epc承载对象配置的共享视图。在EPC全球网络中,产品数据通过产品的移动分发到几个EPC信息服务(EPC Information Services)。使用ONS(对象命名服务)和EPCISDS (EPCIS发现服务)来识别分布式数据,以便跟踪产品。但是,在跟踪产品时既没有访问服务的标准场景,也没有为EPCISDS定义的标准。本文提出了一种利用EPCISDS和ONS跟踪产品数据的新体系结构。我们的体系结构为产品跟踪服务提供了具体的子结构。
{"title":"Discovery Architecture for the Tracing of Products in the EPCglobal Network","authors":"Gyeongtaek Lee, J. Shin, Dae-Won Park, H. Kwon","doi":"10.1109/EUC.2008.69","DOIUrl":"https://doi.org/10.1109/EUC.2008.69","url":null,"abstract":"The EPCglobal Network is a network providing a shared view of the disposition of EPC-bearing objects between EPCglobal subscribers, within a relevant business context. In the EPCglobal Network, product data is distributed to several EPCISes(EPC Information Services) via movement of the product. The ONS (Object Naming Service) and the EPCISDS (EPCIS Discovery Service) are used to identify the distributed data for tracing the product. However, there is neither a standard scenario for access to the services when tracing the product nor a defined standard for EPCISDS. This paper suggests a novel architecture for tracing product data with EPCISDS and ONS. Our architecture provides a concrete substructure for product tracing services.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"11 Suppl 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116693800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1