{"title":"A load balancing scheme for multi-agent systems based on agent state and load condition","authors":"S. Shin, Hyun Chul Lee, Sung-Keun Song, H. Youn","doi":"10.1109/CYBERC.2009.5342175","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342175","url":null,"abstract":"In ubiquitous environment intelligent and transparent services are provided to the users anytime and anywhere. Ubiquitous systems can be effectively implemented using the agent technology, while the agent platform supports efficient and stable interaction among the agents. In this paper we propose a load-balancing scheme which considers agent state for fair and efficient resource allocation to the agents. It is achieved by the migration of agents decided according to the condition of message load and resource allocation. Experiment with an actual multi-agent system shows that the mean round trip time is significantly reduced compared to the existing scheme especially when the agents frequently change the state and transmit the messages.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115700232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance analysis of single-tree and split-tree approach in wireless sensor networks","authors":"Shaohua Wan, Yanxiang He","doi":"10.1109/CYBERC.2009.5342196","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342196","url":null,"abstract":"This paper designs and implements a tree-based routing algorithm that allows a user to gather aggregated information from individual sensor node's readings in a large-scale sensor network setting. Obviously, the nodes near the roots of the tree-structures, which are called “hot spots”, will quickly deplete the sensor nodes' energy and dramatically shorten the network lifetime. Hence, we have implemented the split-tree mechanism to prolong the operational lifetime of the nodes, through splitting and pushing inwards the root of the tree that can be used concurrently providing the same spatial coverage for a given query-region, however, yielding better energy consumption than a single tree. We configure and run experiments on SIDnet-SWANS comparing the benefits in terms of energy consumption, lifetime extension and packet loss rate, and the experimental results also demonstrate our designed mechanism can not only prolong the sensor network lifetime, but also yield a considerable improvements on the robustness of the transmission.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125325897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jianfeng Liu, Guoping Liu, Jinfeng Zhang, Shaohua Qin, Yong Du, H. Jin
{"title":"Efficient importance-based MAC scheduling for video streaming in Bluetooth Piconet","authors":"Jianfeng Liu, Guoping Liu, Jinfeng Zhang, Shaohua Qin, Yong Du, H. Jin","doi":"10.1109/CYBERC.2009.5342203","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342203","url":null,"abstract":"In order to provide the high quality service for transporting video streaming in the Bluetooth Piconet, in which the bandwidth is limited and the structure is heterogeneous, a MAC scheduling algorithm for video streaming in the Bluetooth Piconet is proposed. The main idea of the algorithm is to model the video streaming and calculate the importance of the packet relative to the video quality before transporting. The packet on the transportation is scheduled by the importance in the MAC layer to attain the maximum perceived quality of the overall Slaves in the Piconet. The simulation shows that the proposed algorithm can assign the network resource more efficiently, and improve the perceived video quality of the Slaves in the Piconet more significantly in contrast with the other algorithms.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125694741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. Moo-Mena, J. Garcilazo-Ortiz, L. Basto-Díaz, F. Curi-Quintal, Salvador Medina-Peralta, F. Alonzo-Canul
{"title":"A diagnosis module based on statistic and QoS techniques for self-healing architectures supporting WS based applications","authors":"F. Moo-Mena, J. Garcilazo-Ortiz, L. Basto-Díaz, F. Curi-Quintal, Salvador Medina-Peralta, F. Alonzo-Canul","doi":"10.1109/CYBERC.2009.5342157","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342157","url":null,"abstract":"In literature it is common to find that a self-healing architecture is made up basically of three modules: monitoring, diagnosis, and recovery. Of these three modules, the diagnosis module represents a crucial point, since in this one the state that keeps the system is established. Nevertheless, a standardized way does not exist to implement this module in this kind of architecture. In this paper we propose a strategy of implementation of diagnosis module based on statistic methods by using box plot diagrams. This technique allows us to calibrate the parameters of quality of service (QoS) in a Web services based application. This way, based on the values of QoS, the diagnosis module determines if the system is stable or if a QoS degradation is presented.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132824718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xin-sheng Wang, Yong-Zhao Zhan, Shu-ming Xiong, Liang-min Wang
{"title":"Lightweight defense scheme against selective forwarding attacks in wireless sensor networks","authors":"Xin-sheng Wang, Yong-Zhao Zhan, Shu-ming Xiong, Liang-min Wang","doi":"10.1109/CYBERC.2009.5342206","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342206","url":null,"abstract":"In data-centric wireless sensor networks, the malicious nodes may selectively drop some crucial data packets, which seriously destroy the network's data collection and decrease the availability of sensor services. In this paper, we present a lightweight defense scheme against selective forwarding attacks. According to characteristics of easy positioning the nodes around transmission paths in a structured topology made of hexagonal mesh, the nodes around transmission path are used to monitor packet transmission of its neighbor nodes, judge the attackers' location and resend the packets dropped by the attackers. The method is effective in detecting selective forwarding attacks to ensure reliable packet delivery. Analysis and simulation results show that the proposed scheme consumes less energy and storage.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131792819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A semantic and adaptive context management service for smart vehicle space in ubiquitous computing environments","authors":"Qing Wu, Yinghong Li","doi":"10.1109/CYBERC.2009.5342161","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342161","url":null,"abstract":"This paper presents a semantic and adaptive service for context-aware information management system for supporting ubiquitous computing applications in a smart vehicle space. In ubiquitous computing environments, systems consisting of different device types, operating systems, network interfaces, and communication protocols. These contexts change dynamically and the applications have to adapt their behaviors in terms of the contexts. In order to facilitate the realization of such ability, the software middleware platform is required to manage their context information effectively and satisfy qualities of context information required by applications. As a result, we suggest a semantic and adaptive service based on a QoS-based semantic ontology, which describes the non-functionality aspects of contexts such as life cycle, usability, accuracy, reliability to achieve adaptive context management. The paper introduces the QoS-based semantic ontology, and gives the design and implementation the semantic and adaptive context management service.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123269630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On consensus of nonlinear multi-agent systems under directed interaction topologies","authors":"Y. Shang","doi":"10.1109/CYBERC.2009.5342209","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342209","url":null,"abstract":"In a consensus problem, autonomous agents constituting a dynamical system communicate with one another to reach agreement on certain quantities of interest. By merging control theory and spectral graph theory, we generalize the previous consensus problems under nonlinear protocols for networks with undirected graphs to directed graphs. We prove that, when the nonlinear protocol is strictly increasing, consensus can be achieved if and only if the underlying directed interaction graph has a spanning tree. Numerical examples are taken to show the effectiveness of our theoretical results.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114182651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gang Huang, Qi Zhao, Jiyu Huang, Xuanzhe Liu, Teng Teng, Yong Zhang, Honggang Yuan
{"title":"Towards service composition middleware embedded in web browser","authors":"Gang Huang, Qi Zhao, Jiyu Huang, Xuanzhe Liu, Teng Teng, Yong Zhang, Honggang Yuan","doi":"10.1109/CYBERC.2009.5342195","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342195","url":null,"abstract":"Due to the rich user experience and Internet-wide scalability, more and more Web-delivered services are assembled in web browsers and the resulted service composition itself is also running in the browsers. Today's popular service composition environments embedded in web browsers mainly focus on the experiences of end-users or non-professional users. The solutions for other composition issues, e.g. service access and interaction enablement, are private and tightly coupled with the user interfaces. In this paper, we propose a new type of middleware, which is embedded in web browsers and encapsulates reusable solutions for common problems to the composition of Web-delivered services, including a container for component instances, a set of communication mechanisms for interactions within the browser, between the browser and server, between the browser and local resources. Based on iCM, different service composition environments preferred by different users can be constructed easily with high quality. In the evaluation, we implement a prototype of the browser middleware, called Internetware Client Middleware (iCM), construct a new service composition environment, called iMashup, with iCM and compare iMashup with some popular environments. The evaluation results demonstrates that iMashup has richer composition capabilities, supports more types of web browsers, consumes smaller memory and gains practical scalability. These observations show the feasibility and effectiveness of the proposed middleware.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1988 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125481607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel MAC protocol for underwater acoustic, sensor networks","authors":"Mingsheng Gao, Guangzhong Liu, Q. Ma","doi":"10.1109/CYBERC.2009.5342162","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342162","url":null,"abstract":"Constrained by the interior properties of underwater acoustic channels such as limited bandwidth, time-varying multipath propagation, and large propagation delay, the design of multiple access (MAC) protocols for underwater acoustic sensor networks (UWSN) poses significant challenges. Existing MAC protocols for UWSNs exhibit very low performance in channel utilization, throughput and end-to-end delay, as well as energy consumption since 1) they are based on the conventional stop-and-wait (SW) transmission scheme, and 2) fewer has error-control mechanism at the data link layer. In this paper, we assume the UWSN has a multi-hop flat topology, where there exist a sink node and some other common sensor nodes; all the nodes adopt Time Division Multiple Access (TDMA) to access channel. First, we classify all the nodes into different groups according to the numbers of hops between these nodes themselves and the sink node; the nodes belonging to different groups adopt TDMA frames with different starting time. We then propose a new MAC protocol by incorporating the multi-channel technique and the juggling-like stop-and-wait (JSW) transmission scheme (which was tailored for underwater acoustic communications), which is called the JB-MAC. Finally, simulation results are presented to highlight its good performance in terms of channel utilization, throughput and delay.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125514093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A single-antenna dual-carrier selection technique for frequency selective fading channels","authors":"Jingli Li, Gang Zhao, Xiangqian Liu","doi":"10.1109/CYBERC.2009.5342193","DOIUrl":"https://doi.org/10.1109/CYBERC.2009.5342193","url":null,"abstract":"This paper presents a novel diversity technique for single-antenna systems in frequency-selective channels. Assuming that the channel band is divided into multiple subchannels, symbols are transmitted on two frequency hopped subchannels simultaneously. To keep the total transmission power constant, the signal power in each of the two subchannels is reduced to half of what would be in single channel transmission. At the receiver selection diversity is collected by decoding the subchannel with a large gain. Furthermore, channel diversity can be obtained by combining complex-field coding (CFC) with the dual carrier selection design. We show that the effect of our design is similar to that of orthogonal frequency division multiplexing (OFDM), but ours achieves higher data transmission rate and collects selection diversity at the expense of increased implementation complexity. Numerical simulations are provided to validate the theoretical analysis.","PeriodicalId":222874,"journal":{"name":"2009 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125561812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}