2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications最新文献

筛选
英文 中文
Application management techniques for the Bifrost system Bifrost系统的应用管理技术
2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2003-10-27 DOI: 10.1109/MCSA.2003.1240768
Avneesh Bhatnagar, W. Speight, Daniel Crawl, J. Dunn, J. Bennett
{"title":"Application management techniques for the Bifrost system","authors":"Avneesh Bhatnagar, W. Speight, Daniel Crawl, J. Dunn, J. Bennett","doi":"10.1109/MCSA.2003.1240768","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240768","url":null,"abstract":"We describe the adaptive component migration facility in the Bifrost location-independent computing system. We present a facility that allows mobile clients to selectively invoke application component functionality locally or remotely in order to improve user response time. The Bifrost runtime system uses a decision-making process that takes into account a variety of issues affecting the migration decision, including client and server resources, component size, the size of the data associated with the component, and network characteristics. We present a detailed design of this system, while examining the options of function call re-direction and API wrappers as a means to extend the semantics of the underlying remote execution technology (DCOM). The adaptive functionality provided by Bifrost resulted in a minimum 29% reduction in response time experienced by the client over a default DCOM-based implementation for mobile client devices.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122781165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Garbage collector assisted memory offloading for memory-constrained devices 垃圾收集器协助内存受限设备的内存卸载
2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2003-10-27 DOI: 10.1109/MCSA.2003.1240767
DeQing Chen, A. Messer, D. Milojicic, S. Dwarkadas
{"title":"Garbage collector assisted memory offloading for memory-constrained devices","authors":"DeQing Chen, A. Messer, D. Milojicic, S. Dwarkadas","doi":"10.1109/MCSA.2003.1240767","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240767","url":null,"abstract":"Our everyday lives are becoming increasingly filled with mobile devices of varying capabilities. The common practice of creating multiple versions of the same application to cope with diverse device resource capabilities increases software development and maintenance costs. We discuss an offloading method to mask out the memory constraints on devices running a typical Java virtual machine. The method allows the garbage collector to selectively offload part of the object heap into a nearby wired server. In comparison with traditional virtual memory techniques, the garbage collector can make wiser offloading choices using information about object access patterns at a finer granularity. Our experiments show that our prototype introduces modest overhead in the JVM while allowing applications to execute on devices without enough physical memory. In addition, when running with the Linux virtual memory system under intense memory constraints, the prototype achieves an average improvement of 24% in run-time performance and 53% in energy savings.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Facile: a framework for attention-correlated local communication Facile:一个关注相关的局部交流框架
2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2003-10-27 DOI: 10.1109/MCSA.2003.1240775
K. Partridge, Sarah Newman, G. Borriello
{"title":"Facile: a framework for attention-correlated local communication","authors":"K. Partridge, Sarah Newman, G. Borriello","doi":"10.1109/MCSA.2003.1240775","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240775","url":null,"abstract":"In ubiquitous computing systems, several devices may coordinate to help a user accomplish her tasks. Careful design of device-device and user-device interaction is crucial to protect the user from the complexity of these systems. Proxies that act on the user's behalf can significantly improve user-device interaction by \"invisibly\" providing personalization data and collecting information from devices. But correctly associating devices and user proxies is challenging, particularly in highly mobile, multiperson, multidevice environments. Highly accurate association generally requires an explicit action on the user's part, which distracts them from their task. We present Facile, a software framework for supporting applications that require invisible association. Facile is independent of the physical communication layer and is designed to minimize latency and power consumption. We describe the construction of three applications in Facile, and our work toward integrating Facile with a capacitively-coupled communication mechanism.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128193865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Footloose: a case for physical eventual consistency and selective conflict resolution 自由自在:物理最终一致性和选择性冲突解决的案例
2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2003-10-27 DOI: 10.1109/MCSA.2003.1240778
Justin Mazzola Paluska, David Saff, Tom Yeh, K. Chen
{"title":"Footloose: a case for physical eventual consistency and selective conflict resolution","authors":"Justin Mazzola Paluska, David Saff, Tom Yeh, K. Chen","doi":"10.1109/MCSA.2003.1240778","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240778","url":null,"abstract":"Users are increasingly inundated with small devices with communication and storage capabilities. Unfortunately, the user is still responsible for reconciling all of the devices whenever a change is made. We present Footloose, a user-centered data store that can share data and reconcile conflicts across diverse devices. Footloose is an optimistic system based on physical eventual consistency: consistency based on the movement of devices, and selective conflict resolution, which allows conflicts to flow through devices that cannot resolve the conflict to devices that can. Using these techniques, Footloose can present consistent views of data on the devices closest to the user without user interaction.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133596838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Real-world implementation of the location stack: the universal location framework 位置堆栈的实际实现:通用位置框架
2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2003-10-27 DOI: 10.1109/MCSA.2003.1240773
D. Graumann, Jeffrey Hightower, Walter Lara, G. Borriello
{"title":"Real-world implementation of the location stack: the universal location framework","authors":"D. Graumann, Jeffrey Hightower, Walter Lara, G. Borriello","doi":"10.1109/MCSA.2003.1240773","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240773","url":null,"abstract":"Both the research community and developers in industry have identified the need for a clearly defined vocabulary and programming framework for location technologies. A layered location stack that provides appropriate abstractions, common terminology, and a clear API has been proposed in the last edition of WMCSA. We relate the experience gained in applying the location stack abstractions to the design and implementation of a location system using three separate location technologies integrated in a wireless computer. A single application interface, termed the universal location framework, is designed to aggregate indoor, outdoor, and proximity sensor technologies. Our focus is on how well partitioning and parameter passing between the layers worked for our purposes as well as identifying system requirements not currently part of the stack. In closing, we provide evidence in support of the location stack's usefulness and we make some recommendations for its potential evolution.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130686730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 91
Energy efficiency through burstiness 通过爆发力提高能源效率
2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2003-10-27 DOI: 10.1109/MCSA.2003.1240766
A. Papathanasiou, M. Scott
{"title":"Energy efficiency through burstiness","authors":"A. Papathanasiou, M. Scott","doi":"10.1109/MCSA.2003.1240766","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240766","url":null,"abstract":"OS resource management policies traditionally employ buffering to \"smooth out\" fluctuations in resource demand. By minimizing the length of idle periods and the level of contention during nonidle periods, such smoothing tends to maximize overall throughput and minimize the latency of individual requests. For certain important devices, however (disks, network interfaces, or even computational elements), smoothing eliminates opportunities to save energy using low-power modes. As devices with such modes proliferate, and as energy efficiency becomes an increasingly important design consideration, we argue that OS policies should be redesigned to increase burstiness for energy-sensitive devices. We are currently experimenting with techniques to increase the disk access pattern burstiness of the Linux operating system. Our results indicate that the deliberate creation of bursty activity can save up to 78.5% of the energy consumed by a Hitachi DK23DA disk (in comparison with current policies), while simultaneously decreasing the negative impact of disk congestion and spin-up latency on application performance.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122000533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
A historic name-trail service 历史悠久的命名路线服务
2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications Pub Date : 2002-10-19 DOI: 10.1109/MCSA.2003.1240770
Petros Maniatis, Mary Baker
{"title":"A historic name-trail service","authors":"Petros Maniatis, Mary Baker","doi":"10.1109/MCSA.2003.1240770","DOIUrl":"https://doi.org/10.1109/MCSA.2003.1240770","url":null,"abstract":"We consider the mobility of personal online identifiers. People change the identifiers through which they are reachable online as they change jobs or residences or Internet service providers. This kind of personal mobility makes reaching people online error-prone. As people move, they do not always know who or what has cached their now obsolete identifiers so as to inform them of the move. Use of these old identifiers can cause delivery failure of important messages, or worse, may cause delivery of messages to unintended recipients. For example, a sensitive email message sent to my now obsolete work address at a former place of employment may reach my unfriendly former boss instead of me. We describe HINTS, a historic name-trail service. This service provides a persistent way to name willing participants online using today's transient online identifiers. HINTS accomplishes this by connecting together the names a person uses along with the times during which those names were valid for that person. A correspondent who wishes to reach a mobile person can use an obsolete online name for that person, qualified with a time at which the online name was successfully used; HINTS resolves this historic name to a current valid online identifier for the intended recipient, if that recipient has chosen to leave a name trail in HINTS.","PeriodicalId":382210,"journal":{"name":"2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133977731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信