Second International Conference on Embedded Software and Systems (ICESS'05)最新文献

筛选
英文 中文
PG: a novel scheme to distinguish bursty packet loss from random loss in heterogeneous network PG:一种区分异构网络中突发丢包和随机丢包的新方案
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.75
Jinsen Xu, Weidong Chen
{"title":"PG: a novel scheme to distinguish bursty packet loss from random loss in heterogeneous network","authors":"Jinsen Xu, Weidong Chen","doi":"10.1109/ICESS.2005.75","DOIUrl":"https://doi.org/10.1109/ICESS.2005.75","url":null,"abstract":"In this paper, we propose a PG scheme. PG is a group of packets, which consists of more than two packets sent back to back with no delay between consecutive packets. The packets sent in such a fashion are not only for transmitting the data, but also for probing network state. Through this scheme, the bursty packet loss can be discriminated from the random packet loss at the receiver in the wired/wireless heterogeneous network. The experiments are conducted in the emulated heterogeneous network, and the results show that this scheme works well and efficiently.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114533408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated access device (IAD) solution using Intel IXP2350 network processor IAD (Integrated access device)解决方案采用Intel IXP2350网络处理器
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.65
Yan Chen, Naiqi Liu, Kecheng Zhang
{"title":"Integrated access device (IAD) solution using Intel IXP2350 network processor","authors":"Yan Chen, Naiqi Liu, Kecheng Zhang","doi":"10.1109/ICESS.2005.65","DOIUrl":"https://doi.org/10.1109/ICESS.2005.65","url":null,"abstract":"This paper introduces a solution of integrated access device (IAD) using IXP2350. Firstly, this paper describes IAD and IXP2350 hardware architecture and the benefit of using IXP2350 for an IAD solution. Then this article introduces the hardware and software design of this IAD solution. This solution use Intel IXP-C and auto-partitioning programming model and implements the basic functions IAD needs including voice and wireless processing, DiffServ, traffic management, etc.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"25 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116834154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An effective vertical handoff scheme supporting multiple applications in ubiquitous computing environment 一种在普适计算环境下支持多种应用的有效垂直切换方案
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.24
Chung-Pyo Hong, Tae-Hoon Kang, Shin-Dug Kim
{"title":"An effective vertical handoff scheme supporting multiple applications in ubiquitous computing environment","authors":"Chung-Pyo Hong, Tae-Hoon Kang, Shin-Dug Kim","doi":"10.1109/ICESS.2005.24","DOIUrl":"https://doi.org/10.1109/ICESS.2005.24","url":null,"abstract":"An intelligent network management should be designed to satisfy all the requirements of applications designed for ubiquitous computing environment. Recently there may be several heterogeneous network interfaces in the same location, where a mobile terminal needs switching from one wireless interface to another. However, most of vertical handoff mechanisms are based on the network information or requirements of any single application. Thus, they cannot perform vertical handoff (VHO) at the right time and do not satisfy all the applications running on any mobile terminal. To overcome this problem, we propose an efficient scheme to solve multi-application situation by designing application manager and VHO decision manager. The proposed scheme performs VHO after checking the quality of service (QoS) in factor by factor. Factors of the abstracted profile are used to verify the QoS of networks. By performing VHO in this way, we can design an effective handoff decision algorithm and consequently this algorithm provides a multi-application oriented and QoS enhanced VHO scheme.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129993032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Mobile NodeID based P2P algorithm for the heterogeneous network 基于移动节点id的异构网络P2P算法
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.69
Kyungbaek Kim, D. Park
{"title":"Mobile NodeID based P2P algorithm for the heterogeneous network","authors":"Kyungbaek Kim, D. Park","doi":"10.1109/ICESS.2005.69","DOIUrl":"https://doi.org/10.1109/ICESS.2005.69","url":null,"abstract":"A lot of research papers discussed the distributed hash table (DHT) based p2p algorithms to promise that idle resources may be efficiently harvested. However, p2p systems are composed of components with extremely heterogeneous availabilities and to handle churn, the system will generate the heavy information maintenance traffic to keep the efficiency of the DHT based p2p algorithms. In this paper, we suggest the mobile ID based p2p algorithm to reduce the overhead by exploiting the heterogeneity of participant nodes efficiently. Unlike the DHT based p2p algorithms, the node ID of a node changes according to its characteristic to support the p2p system efficiency and each nodes takes the different responsibility in accordance with its node ID. We classify nodes into the two types according to the characteristics of nodes : the reliable nodes and the leaf nodes. The reliable node has the load-balanced ID to balance the loads and the leaf nodes has the load-free ID to reduce the responsibility. We examine the efficiency of our p2p algorithm via a event driven simulation and show that the information maintenance traffic reduces and the routing process is more efficient.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130722920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A wireless payment system 无线支付系统
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.17
Jerry Gao, Jacky H. Cai, Kiran Patel, Simon Shim
{"title":"A wireless payment system","authors":"Jerry Gao, Jacky H. Cai, Kiran Patel, Simon Shim","doi":"10.1109/ICESS.2005.17","DOIUrl":"https://doi.org/10.1109/ICESS.2005.17","url":null,"abstract":"The swift advance of wireless networking, communication, and mobile technology is making a big impact to daily life. The significant increase of mobile device users in the recent years causes a strong demand on secured wireless information services and reliable mobile commerce (m-commerce) applications. Since mobile payment (m-payment) is a critical part of most wireless information services and applications, how to generate secured m-payment systems has become a hot research topic. This paper proposes a peer-to-peer m-payment system, known as P2P-Paid to allow mobile users to conduct wireless payments over the Bluetooth communications and to perform related secured transactions with the server. This paper introduces backgrounds, related work, and the system communication protocol, and provides system overview, security solution as well as implementation report.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123874987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
A task-specific approach to dynamic device power management for embedded system 嵌入式系统动态设备电源管理的任务特定方法
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.12
Wang Yue, Zhao Xia, Chen Xiangqun
{"title":"A task-specific approach to dynamic device power management for embedded system","authors":"Wang Yue, Zhao Xia, Chen Xiangqun","doi":"10.1109/ICESS.2005.12","DOIUrl":"https://doi.org/10.1109/ICESS.2005.12","url":null,"abstract":"One of the major challenges of dynamic device power management lies in the uncertain length of the idle periods of devices. In this paper, we focus on the problem of the accuracy of prediction when tasks change their request modes, leading the change of the device idle periods. We notice that there are some reasons causing the change of the idle periods. In order to capture these reasons, we first establish a two-level power management mechanism in the operating system. Then we provide a task-specific approach, which is based on the relationship between tasks and devices and takes dynamic weight of predictive value and actual value. Experiments show that our approach could save more than 40% power consumption and was more efficient and accurate than previous predictive policies.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125656789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of wireless gateway communication protocol for distributed monitoring systems 分布式监控系统无线网关通信协议的设计
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.45
Zhiping Jia, Zheng Liu
{"title":"Design of wireless gateway communication protocol for distributed monitoring systems","authors":"Zhiping Jia, Zheng Liu","doi":"10.1109/ICESS.2005.45","DOIUrl":"https://doi.org/10.1109/ICESS.2005.45","url":null,"abstract":"This paper is concerned with the problems of the wireless gateway communication protocol for distributed monitoring systems. For large-scale monitoring systems, the wireless gateway is needed to improve the communicating ability. We present the framework of the wireless gateway protocol stacks, which can be used in embedded systems. By introducing the mechanism of segment caching and local retransmission to the TCP protocol, the process working mode of the protocol stacks can be improved. The result of this paper demonstrates that the scheme can effectively raise the real-time character and compatibility of the wireless gateway communication protocol.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132945780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improved dominating set indices for mobile peer-to-peer networks 改进的移动对等网络支配集指标
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.64
Shanping Li, Wei Shi, Xin Lin, C. Nizamuddin
{"title":"Improved dominating set indices for mobile peer-to-peer networks","authors":"Shanping Li, Wei Shi, Xin Lin, C. Nizamuddin","doi":"10.1109/ICESS.2005.64","DOIUrl":"https://doi.org/10.1109/ICESS.2005.64","url":null,"abstract":"According to 2-hop neighborhood information, dynamic dominant index set (DDIS) (W. Shi and S. Li, 2005) is constructed to cache metadata of shared resources in mobile ad hoc network (MANET). However, DDIS presents poor performance on system overhead and user satisfaction. To adapt network mobility, peers in DDIS have to periodically advertise their shared resources over the entire network, which consumes more bandwidth. In this paper, an improved dominating set indexing mechanism (IDSIM) for mobile peer-to-peer networks is proposed. In IDSIM, partial dominating sets automatically adjust themselves to the change of network topology in a distributed fashion. Metadata of identical resources belonged to deferent peers is clustered in one dominating set. This potentially increases in amount of query results with short latency to achieve considerable high user satisfaction. Based on random walk (C. Gkantsidis et al., 2004), query message roams in the network to maximize the number of results. Experiments indicate that besides greatly reducing the system overhead, IDSIM simplifies search process and, at the same time, improves user satisfaction without sacrifice of user response time.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The implement of status-checking on the platform of IXP1200 [implement read as implementation] 状态检测在IXP1200平台下的实现[实现读为实现]
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.94
Bo Ning, Yichao Li, Naiqi Liu
{"title":"The implement of status-checking on the platform of IXP1200 [implement read as implementation]","authors":"Bo Ning, Yichao Li, Naiqi Liu","doi":"10.1109/ICESS.2005.94","DOIUrl":"https://doi.org/10.1109/ICESS.2005.94","url":null,"abstract":"On the platform of IXP1200, we implement the status-checking module. We explain the core of the status-checking, the details in implementation and the influence on the performance. In this paper we introduce some new techniques in the implementation which is much different with the implementation before. And we analyze the feasibility of implementing the status-checking on the IXP2000 platform, based on the MicroACE architecture, from the whole dataflow, key technique and the performance influence. At last we get some test data to show the influence range.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116254964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Test case generation based on time constraints 基于时间约束的测试用例生成
Second International Conference on Embedded Software and Systems (ICESS'05) Pub Date : 2005-12-16 DOI: 10.1109/ICESS.2005.89
A. Cavalli, E. Vieira
{"title":"Test case generation based on time constraints","authors":"A. Cavalli, E. Vieira","doi":"10.1109/ICESS.2005.89","DOIUrl":"https://doi.org/10.1109/ICESS.2005.89","url":null,"abstract":"In real-time systems there are some messages exchanged within the system which must respect a certain delay, otherwise, the system cannot be considered correct. The test phase is essential in order to guarantee the correctness of these systems, and this phase cannot be correctly carried out unless all these factors are taken into account. This paper presents a test generation approach that looks at the use of time constraints and the messages exchange among the components for test purposes. In order to achieve our goal, we have adopted an efficient algorithm, called hit-or-jump, provided in a tool called Sirius, which supports the complete test generation phase.","PeriodicalId":360757,"journal":{"name":"Second International Conference on Embedded Software and Systems (ICESS'05)","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122842165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信