{"title":"Transient Fault Tolerance for ccNUMA Architecture","authors":"Xingjun Zhang, Endong Wang, F. Tang, Meishun Yang, Hengyi Wei, Xiaoshe Dong","doi":"10.1109/IMIS.2012.188","DOIUrl":"https://doi.org/10.1109/IMIS.2012.188","url":null,"abstract":"Transient fault is a critical concern in the reliability of microprocessors system. The software fault tolerance is more flexible and lower cost than the hardware fault tolerance. And also, as architectural trends point toward multi core designs, there is substantial interest in adapting parallel and redundancy hardware resources for transient fault tolerance. The paper proposes a process-level fault tolerance technique, a software centric approach, which efficiently schedule and synchronize of redundancy processes with ccNUMA processors redundancy. So it can improve efficiency of redundancy processes running, and reduce time and space overhead. The paper focuses on the researching of redundancy processes error detection and handling method. A real prototype is implemented that is designed to be transparent to the application. The test results show that the system can timely detect soft errors of CPU and memory that cause the redundancy processes exception, and meanwhile ensure that the services of application is uninterrupted and delay shortly.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133264129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Diego Gachet, M. Rodríguez, Fernando Aparicio, Víctor Padrón
{"title":"Integrating Internet of Things and Cloud Computing for Health Services Provisioning: The Virtual Cloud Carer Project","authors":"Diego Gachet, M. Rodríguez, Fernando Aparicio, Víctor Padrón","doi":"10.1109/IMIS.2012.25","DOIUrl":"https://doi.org/10.1109/IMIS.2012.25","url":null,"abstract":"The demographic and social changes are causing a gradual increase of the population in situation of dependency. The main concern of the elder people is their health and its consequences in terms of dependence and also is the primary cause of suffering and self-rated ill health. Since elder people have different health problems that the rest of the population, we need a deep change in national's health policy to get adapted to population aging. This paper describes the preliminary advances of \"Virtual Cloud Carer\" (VCC), a Spanish national R&D project, whose primary purpose is the creation of new health services for dependents and chronics elder lies, using technologies associated with internet of things and cloud computing.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131290368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrés L. Bleda, Rafael Maestre, Guadalupe Santa, A. Jara, A. Gómez-Skarmeta
{"title":"Web of Things as a Product Improvement tool: Furniture as Case Study","authors":"Andrés L. Bleda, Rafael Maestre, Guadalupe Santa, A. Jara, A. Gómez-Skarmeta","doi":"10.1109/IMIS.2012.111","DOIUrl":"https://doi.org/10.1109/IMIS.2012.111","url":null,"abstract":"Sensors integrated within a product can provide lots of information about how the product is used and its status. Easy to extract information, such as hours used per day, temperature or humidity could be very valuable to the manufacturer in order to improve its product for real use. The manufacturer may realize that his/her initial estimations do not match reality and may decide to select different materials or design based on real data. For non-technological products the integration of sensors is not trivial and has not been analyzed prior to this work. The selection of suitable sensors is critical in order to achieve an accurate description about product use. This paper analyzes this problem focusing on a furniture product, more specifically a sofa, as a case study of a non-technological product. First, we compare different kinds of suitable sensors in relation to furniture integration, how good they describe the product usage and other important variables such as material degradation. We later describe the experiments that have been used to validate the previous assumptions. The experimental results summarize the usefulness and accuracy of each sensor data for describing the product use and/or degradation. Finally, the paper proposes an architecture for a complete \"web of things\" system capable of gathering the information from the WSN and sending it to a remote server. This architecture has been implemented with a ZigBee WSN and a coordinator node with Ethernet connectivity.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114404280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application-Aware Virtual Machine Placement in Data Centers","authors":"Fei Song, Daochao Huang, Huachun Zhou, I. You","doi":"10.1109/IMIS.2012.119","DOIUrl":"https://doi.org/10.1109/IMIS.2012.119","url":null,"abstract":"Based on the convex optimization theory, the energy-efficient and scalability problems of modern data centers are studied. Then a novel application-aware virtual machine (VM) placement algorithm is proposed to cope with these problems. Firstly, the definition of VM placement fairness and utility function are given, and the basic algorithm of VM placement which fulfills server constraints of physical machines is con-ducted. Secondly, we formulate the VM placement as an optimization problem. A two-tier algorithm that efficiently solves the VM placement problem in large scale was designed. Comparing to existing methods, we illustrate the performance improvement such as reducing the number of physical machines efficiently, decreasing communication distance between VMs, improving energy-efficient and scalability of data centers.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116973988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Requirement-Based Socket API for a Transition to Future Internet Architectures","authors":"A. Siddiqui, P. Müller","doi":"10.1109/IMIS.2012.117","DOIUrl":"https://doi.org/10.1109/IMIS.2012.117","url":null,"abstract":"The existing application programming interface (API) between applications and the network architecture is one reason that it is hard to deploy novel protocols into the network architecture. Coupling between applications and underlying protocols makes it almost impossible to change one without changing the other. Coupling can be loosened or resolved by not involving applications in protocols implementation details but, only in functionality necessary to establish a communication. This way underlying network can deploy novel or updated implementations of a functionality without needing to change the applications. Using intermediate abstraction layers is an approach to break the dependency between applications and network protocols. One of the major goals in future internet architectures is to be flexible enough to adapt to application's requirements. In this paper, a requirement-based API is presented as an abstraction layer to make applications independent of network mechanisms, which also helps in the transition to future internet architectures.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129729838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved AODV Routing Protocol to Cope with High Overhead in High Mobility MANETs","authors":"Mohannad Ayash, M. Mikki, Kangbin Yim","doi":"10.1109/IMIS.2012.44","DOIUrl":"https://doi.org/10.1109/IMIS.2012.44","url":null,"abstract":"Ad-hoc On-demand Distance Vector (AODV) routing protocol is the most popular routing protocol for mobile ad-hoc networks (MANETs). This paper enhances AODV protocol by minimizing its control messages overhead. Enhancements include developing two improved versions of AODV protocol. These two versions use Global Positioning System (GPS) to limit the routing discovery control messages. The first version (AODV-LAR) is a variation of the Location Aided Routing (LAR) protocol. The second version (AODV-Line) limits nodes participating in route discovery between source and destination based on their distance from the line connecting source and destination. We evaluate performance of the two proposed protocols using two simulation scenarios. The simulation was done using JIST/SWANS simulator. The results show that the two proposed protocols outperform the original AODV, where the results show a significant reduction of control overhead and delay compared to the original AODV. Results also show that the delivery ratio in the proposed protocols is comparable to the delivery ratio in the original AODV.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127047545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bowen Deng, Yujia Zhai, Yue Wang, Jinhai Huo, Jian Yuan, I. You
{"title":"A Terrain-Awareness Based Mobility Model with Markov Random Disturbance for Tactical MANET","authors":"Bowen Deng, Yujia Zhai, Yue Wang, Jinhai Huo, Jian Yuan, I. You","doi":"10.1109/IMIS.2012.90","DOIUrl":"https://doi.org/10.1109/IMIS.2012.90","url":null,"abstract":"Terrain factors may have significant impacts on the dynamic characteristics of mobile nodes, especially in tactical MANET. However, most of the existing mobility models are probability models, which do not catch real tactical feature behaviors such as random disturbance and bypass processes. In this work, we establish a formalized process model to imitate the impact of small-scale terrain factors on the movement of nodes. In the model, we use a linear time invariant system to generate a colored noise with first-order Markov property, as a tiny random disturbance in the acceleration. Furthermore, we propose a terrain-awareness based bypass strategy to enable the nodes to perceive and bypass the area of obstacles. This strategy imitates the reaction of nodes when the nodes face large-scale terrain factors such as lakes and hills. The mobility traces show that our model realistically presents the impacts of terrain factors on the mobility of nodes. And parameters in our process model can be configured flexibly for different tactical scenarios.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129080978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Biological Modelling in Semantic Data Analysis Systems","authors":"L. Ogiela","doi":"10.1109/IMIS.2012.81","DOIUrl":"https://doi.org/10.1109/IMIS.2012.81","url":null,"abstract":"This publication presents using modelling methods based on biological aspects by DNA cryptography to semantically analyse data. The solutions proposed are illustrated with the example of selected E-UBIAS systems which analyse medical image data in combination with the identity analysis. The use of DNA cryptography and DNA code to analyse personal data makes it possible to unanimously assign analysed data to an individual at the personal identification stage. In this publication presents also the system with semantic analysis processes conducted based on semantic interpretation and cognitive processes allows the possible lesions that the person suffers from to be identified and authorized.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130593541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tzu-Liang Kung, Cheng-Kuan Lin, Jimmy J. M. Tan, Hon-Chan Chen, Hsing-Chung Chen
{"title":"Identifying Restricted-Faults in Multiprocessor Meshes under the PMC Diagnostic Model","authors":"Tzu-Liang Kung, Cheng-Kuan Lin, Jimmy J. M. Tan, Hon-Chan Chen, Hsing-Chung Chen","doi":"10.1109/IMIS.2012.87","DOIUrl":"https://doi.org/10.1109/IMIS.2012.87","url":null,"abstract":"System-level fault identification is a key subject for maintaining the reliability of a multiprocessor interconnected system. As a popular network topology, meshes have various applications to real multiprocessor systems. In this paper, a system contains only restricted-faults if every of its fault-free units has at least one fault-free neighbor. Then this paper aims to study the method for identifying restricted-faults in a multiprocessor mesh. The proposed method relies on an easily constructed architecture, and its time complexity is just proportional to the total number of processors due to the fact that multiprocessor meshes have a constant degree.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Search System for Protecting Search Word","authors":"Kyungroul Lee, Eun-Ae Cho, Kangbin Yim","doi":"10.1109/IMIS.2012.197","DOIUrl":"https://doi.org/10.1109/IMIS.2012.197","url":null,"abstract":"The rate of growth to share diverse information between users is increasing in the market of current search engine systems. However, in spite of this development, a user inputted search word is not protected, and when it is utilized by a third party for malicious purposes, this situation can cause critical damages. Therefore, in this paper, we analyze possible security threats when the search word is exposed by the third party. Also, we propose a novel search system protecting the search words using a hash operation method, and prove a security satisfaction based on the analyzed security threats.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123411392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}