{"title":"Node joining and grouping scheme for avoiding hidden node problem in IEEE 802.15.4 wireless sensor networks","authors":"Hsueh-Wen Tseng, Shiann-Tsong Sheu, S. Ou","doi":"10.1145/2513228.2513247","DOIUrl":"https://doi.org/10.1145/2513228.2513247","url":null,"abstract":"IEEE 802.15.4 standard is designed to achieve low-power transmissions in low-rate and short-distance wireless personal area networks (WPANs). For the sake of reducing the power consumption, IEEE 802.15.4 uses the modified CSMA/CA protocol and does not have the hidden node protection mechanism, such as RTS/CTS mechanism. Previous studies indicated that the probability of any two nodes in an infrastructure network unheard of each other is around 41%. Therefore, the hidden node problem (HNP) results in inefficient data transmission and serious power consumption issues in WPAN. In this paper, we propose an efficient grouping strategy, which is performed during node joining, to completely avoid the HNP. We allocate the hidden nodes into different groups to transmit their frame, and the new joining node does not affect the existent groups. Based on the grouping result, the proposed scheme partitions the time of a superframe into several subperiods, and the length of subperiod depends on the number of hidden nodes in a group. Simulation results show that the proposed scheme not only avoids the HNP but also outperforms the performance of IEEE 802.15.4 standard.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128626814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards optimal priority assignments for the transactional event handlers of P-FRP","authors":"Y. Wen, Chaitanya Belwal, A. Cheng","doi":"10.1145/2513228.2513263","DOIUrl":"https://doi.org/10.1145/2513228.2513263","url":null,"abstract":"Priority-based Functional Reactive Programming (P-FRP) is a new functional programming formalism for real-time systems. P-FRP allows static priority assignment and guarantees real-time response by preempting lower priority tasks. Due to the state-less nature, preempted tasks are aborted and restarted after higher priority tasks have completed execution. Therefore, the rate-monotonic (RM) priority assignment is not optimal in P-FRP, and it has been unknown whether an optimal fixed priority assignment can even exist for such an execution model. In this paper, we first present the priority assignment characteristics of P-FRP. We then discuss the priority assignment in a task set with two tasks. We derive the conditions when the RM priority assignment is optimal and show that at least one of RM or utilization-monotonic (UM) is the optimal for the task set with two tasks. We prove the optimal priority assignment for a general P-FRP system having more than two tasks exists when the period of the task is a multiple of others. Experimental results using task sets of different sizes are also presented.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132917789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predictive handover scheme using mobility history in PMIPv6","authors":"Geumsan Jo, H. Choe, Hyunseung Choo","doi":"10.1145/2513228.2513260","DOIUrl":"https://doi.org/10.1145/2513228.2513260","url":null,"abstract":"People have a limited mobility pattern to go to work or school in the same path at the almost same time each day. The study on finding human mobility pattern shows that the mobile phone users eventually return to the designated place even if they move to various places. It also finds out 93% potential predictability in user mobility. In the cellular network, several schemes are proposed to effectively find the mobile node (MN) using regularly repeated mobility characteristic. If the mobility characteristic, which is a limited travel pattern, integrates with Proxy Mobile IPv6 (PMIPv6), it can reduce the handover latency by predicting the next Mobile Access Gateway (nMAG). In the proposed scheme, the Local Mobility Anchor (LMA) keeps the movement history of an MN, and predicts the nMAG by comparison between the current location of the MN and the previous location. In the performance evaluation, we compare the proposed scheme with PMIPv6 using the mathematical modeling. The performance evaluation results show the proposed scheme reduces the handover latency up to 28% compared with that of PMIPv6.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132966415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Byung-Kun Park, Sanghee Yoon, Kyung-Seop Kim, Woon-Mook Kim
{"title":"XpeedQ: a reliable and efficient application level message queue","authors":"Byung-Kun Park, Sanghee Yoon, Kyung-Seop Kim, Woon-Mook Kim","doi":"10.1145/2513228.2513276","DOIUrl":"https://doi.org/10.1145/2513228.2513276","url":null,"abstract":"Recent transactional systems such as financial trading systems require a more reliable, high-performance inter-process communication (IPC) technology. The main goal is to interact among processes and handle server shutdowns and failures in an efficient ways. In this paper, we present a reliable, high-performance inter-process communication (IPC) using a message queue, called XpeedQ. Our proposed scheme provides a block level message processing, but also offers reliable message delivery based on optional persistence to disk. We have implemented the XpeedQ in Linux and measured its performance in terms of the average latency. The implementation results show that the proposed scheme can improve the efficiency of IPC while providing a persistence of messages.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133838687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast retransmit for flooding-based routing in underwater wireless sensor networks","authors":"Sungwon Lee, Dongkyun Kim","doi":"10.1145/2513228.2513333","DOIUrl":"https://doi.org/10.1145/2513228.2513333","url":null,"abstract":"In underwater wireless sensor networks (UWSNs), flooding-based routing protocols are preferred for reducing routing overhead. In addition to routing, a transport protocol should operate to provide the end-to-end reliability in USWNs. Fortunately, the Fast Retransmit technique can be exploited for fast retransmissions of lost DATA segments. However, if it operates over the flooding-based routing protocols, each source node will receive multiple copies of ACKs which are transmitted along different paths. Since the source node cannot distinguish between these multiple copies of ACK segments and real duplicate ACK segments (defined as an ACK indiscretion problem in this paper), unnecessary retransmissions are performed.\u0000 In this paper, we therefore propose a new Fast Retransmit technique to address the ACK indiscretion problem. In our proposed technique, the sink records a new count number into a header, informing how many duplicate ACK segments have been transmitted from the sink. The source nodes becomes aware of the number of duplicate ACK segments transmitted from the sink and can perform the Fast Retransmit correctly.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121181329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Malware analysis method using visualization of binary files","authors":"Kyoung-Soo Han, Jae Hyun Lim, E. Im","doi":"10.1145/2513228.2513294","DOIUrl":"https://doi.org/10.1145/2513228.2513294","url":null,"abstract":"Malware authors have been generating and disseminating malware variants through various ways, such as reusing modules or using automated malware generation tools. With the help of the malware generation techniques, the number of malware keeps increasing every year. Therefore, new malware analysis techniques are needed to reduce malware analysis overheads. Recently several malware visualization methods were proposed to help malware analysts. In this paper, we proposed a novel method to visually analyze malware by transforming malware binary information into image matrices. Our experimental results show that the image matrices of malware can effectively classify malware families.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115364586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing lookup performance of key-value stores using cuckoo hashing","authors":"Joonhyouk Jang, Yookun Cho, Jinman Jung, Gwangil Jeon","doi":"10.1145/2513228.2513246","DOIUrl":"https://doi.org/10.1145/2513228.2513246","url":null,"abstract":"Recently, many studies have been conducted on key-value store as a platform for distributed storage services. A key-value store manages data as key-value pairs using hash tables. In this paper, we propose a hybrid hash table management technique to improve the performance of single nodes in a key-value store. The proposed scheme uses cuckoo hashing and separate chaining at the same time. Using this hybrid hashing scheme, cuckoo hashing and separate chaining offset the respective disadvantages while preserving the advantages of both. Experiments show that the proposed scheme is much faster than the hash table with separate chaining for temporal locality workloads.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115707447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A threat monitoring system for smart mobiles in enterprise networks","authors":"Wei Yu, Zhijiang Chen, Guobin Xu, Sixiao Wei, Nnanna Ekedebe","doi":"10.1145/2513228.2513266","DOIUrl":"https://doi.org/10.1145/2513228.2513266","url":null,"abstract":"With the development of modern mobile operating systems, computing and communication technologies, smart mobile devices have been widely used to support rich applications and have been integrated to enterprise networks for various organizations. With accessing sensitive personal and business information, the security of smart mobile devices has become a serious problem for enterprise networks. To address this issue, we developed a threat monitoring system to monitor and detect threats on mobile devices in enterprise networks. In our system, the detection related information will be collected by mobile devices and transmitted to the operation center, which will further monitor and detect threats by using both signature and anomaly based detection schemes. Using real-world benign and malware samples, our experimental data shows that our developed system can accurately and effectively detect malware on the Android platform with a low overhead to the system in terms of energy and CPU usage.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114648540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A locality-aware home migration for software distributed shared memory","authors":"Sanghoon Choi, Jinman Jung","doi":"10.1145/2513228.2513316","DOIUrl":"https://doi.org/10.1145/2513228.2513316","url":null,"abstract":"In this paper, we present a locality-aware home migration for software distributed shared memory. The goal is to reduce the load on the network caused by managing cached copies of objects and their consistency. Our approach dynamically changes the location of home nodes for each shared object according to localities found in memory access. Our migration system is designed to track the access frequency of objects during a given interval and exploit the locality statistics to adaptively determine the home node of each shared object. We demonstrate the efficiency of our scheme through simulations. The simulation results show that our adaptive home migration decisions result in much lower data traffic than existing home-based protocols for varying locality conditions.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126077868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scheduling data processing flows under budget constraint on the cloud","authors":"Fei Cao, Dabin Ding, D. Che, Mengxia Zhu, W. Hou","doi":"10.1145/2513228.2513250","DOIUrl":"https://doi.org/10.1145/2513228.2513250","url":null,"abstract":"Cloud computing is emerging as a promising paradigm for large-scale data-intensive queries modeled as complex Directed Acyclic Graph (DAG)-structured dataflows with arbitrary data operators as nodes and producer-consumer interactions as directed edges. The optimization problem of scheduling dataflows on the Cloud is a very complex and challenging task which is similar to query optimization. Optimization must satisfy a variety of objectives and constraints, while taking into account the particular characteristics of the underlying Cloud environment. In addition to achieving minimum completion time, the commercialization of Clouds requires policies to take users' economic concerns as well. In this paper, we formulate scheduling of dataflows onto Cloud resources under the objective of minimizing the completion time under certain budget constraint. A heuristic scheduling algorithm, Layer-oriented Resource Allocation within Budget constraint (LRA-B) is proposed and evaluated. Experiments are conducted on numerous dataflows and Cloud environment configurations, and the overall results are quite promising and indicate the effectiveness of our algorithm.","PeriodicalId":120340,"journal":{"name":"Research in Adaptive and Convergent Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127784464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}