{"title":"The Use of a Hopfield Neural Network in Solving the Mobility Management Problem","authors":"J. Taheri, A. Zomaya","doi":"10.1109/perser.2004.1356786","DOIUrl":"https://doi.org/10.1109/perser.2004.1356786","url":null,"abstract":"This work presents a new approach to solve the location management problem by using the location areas approach. Hopfield Neural Network is used in this work to find the optimal configuration of location areas in a mobile network. Toward this end, the location areas configuration of the network is modeled so that the mobility management cost of the system is related to the energy value of this artificial neural network. Since a pure Hopfield Neural Network was not efficient enough to be used in solving this problem, some modifications applied to it to make it a reasonable approach. Basically, these modifications deal with randomness of selection in manipulating the cells during the solving process. Simulation results are very promising and they lead to network configurations that are unexpected.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114960589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"How Long is Your Belt?\" Towards a Single Device for Multiple Functions","authors":"W. Najjar","doi":"10.1109/PERSER.2004.1","DOIUrl":"https://doi.org/10.1109/PERSER.2004.1","url":null,"abstract":"Personal communication and computing devices have become omnipresent: cellular phones, PDAs, MP3 players, still and video cameras. Characteristics shared by all these devices include a shrinking size and expanded performance and functionality. All can be carried by a person on a single belt. However, a suitcase is required for all the chargers, as well as the cables to connect to PCs and all the cradles, earplugs etc. The proliferation of such devices has also resulted in a proliferation of standards: TDMA, CDMA, GSM, GPRS, to name a few in cellular communication, Wi-Fi and Bluetooth. The same can be said of audio, image and video standards.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115683551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Principles for Inducing Reactivity in Ubiquitous Environments","authors":"F. Al-Bin-Ali","doi":"10.1109/perser.2004.1356784","DOIUrl":"https://doi.org/10.1109/perser.2004.1356784","url":null,"abstract":"Ubiquitous environments are becoming increasingly aware of their inhabitants: they posses vision capabilities, auditory capabilities and more interestingly intelligent capabilities. At the heart of such environments is the ability of systems to initiate responsive reactions to contextual changes. In this paper, we describe the concept of ubiquitous systems' reactivity. We identify important design principles that should be embraced by systems designers to build reactive systems that can engage users in richer and more meaningful interactions. Finally, we describe a prototype that we deployed in a domestic space and we explain how our design principles can help bridge the gap between end-users and ubiquitous systems.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121161473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Middies: Passive Middleware Abstractions for Pervasive Computing Environments","authors":"D. Cutting, A. Hudson, A. Quigley","doi":"10.1109/perser.2004.18","DOIUrl":"https://doi.org/10.1109/perser.2004.18","url":null,"abstract":"We present our model of middies, generalised passive middleware abstractions that can be used to construct middleware systems with operations and semantics desirable to the applications with which they will be used in a pervasive computing environment.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126851464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Cache Invalidation Schemes in Mobile Environments","authors":"Yuliang Bao, R. Alhajj, K. Barker","doi":"10.1109/perser.2004.1356801","DOIUrl":"https://doi.org/10.1109/perser.2004.1356801","url":null,"abstract":"To make cached data consistent, the server periodically broadcasts an invalidation report to all mobile clients in its cell so that each can invalidate obsolete data items from its local cache. In this paper, we present two hybrid cache invalidation schemes: Hybrid cache invalidation with Simple Broadcasting (HSB), and Hybrid cache invalidation with Attribute Bit Sequence Broadcasting (HABSB). In these schemes the server is stateful as it stores the caching information of each mobile client in its cell to allow for long disconnections. However, the server periodically broadcasts an invalidation report similar to a stateless server. In HABSB, attribute bit sequences are added in each broadcasted invalidation report to maximize the cache-hit ratio and to reduce the data transmission of queried data items. The simulation results show that HSB and HABSB can significantly reduce the bandwidth requirement, and HABSB is very efficient in improving mobile caching.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114654091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet Performance Modeling Using Mixture Dynamical System Models","authors":"Z. Liu, J. Almhana, V. Choulakian, R. McGorman","doi":"10.1109/perser.2004.17","DOIUrl":"https://doi.org/10.1109/perser.2004.17","url":null,"abstract":"This paper models Internet traffic input stream and TCP connection durations using dynamical system models. A linear dynamical model with mixture Gaussian output is proposed for the Internet traffic input stream, and a linear dynamical system with mixture lognormal output is developed to model the TCP connection durations. In the proposed models, a sum of independent AR (1) processes is used to approximate the autocorrelation of the real data, and a Gaussian mixture or lognormal mixture is used to fit the marginal distribution. As a result, the output processes can capture the correlation and the marginal distribution simultaneously. Making use of the fact that at each iteration the parameter increment of the EM algorithm has a positive projection on the gradient of the likelihood, a stochastic approximation-based recursive EM algorithm is proposed to fit the traffic marginal distribution. A cross-validation criterion is used for the model selection. To illustrate the usefulness of the proposed models, several experimental results are provided.","PeriodicalId":222266,"journal":{"name":"The IEEE/ACS International Conference on Pervasive Services","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127591435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}