Scheduled System Maintenance on May 29th, 2015:
IEEE Xplore will be upgraded between 11:00 AM and 10:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Communications and Mobile Computing, 2009. CMC '09. WRI International Conference on

Date 6-8 Jan. 2009

Go

Filter Results

Displaying Results 1 - 25 of 132
  • [Front cover - Vol 3]

    Publication Year: 2009 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (319 KB)  
    Freely Available from IEEE
  • [Title Page i - Volume 3]

    Publication Year: 2009 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (18 KB)  
    Freely Available from IEEE
  • [Title page iii - Volume 3]

    Publication Year: 2009 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (137 KB)  
    Freely Available from IEEE
  • [Copyright notice - Volume 3]

    Publication Year: 2009 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (108 KB)  
    Freely Available from IEEE
  • Table of contents - Volume 3

    Publication Year: 2009 , Page(s): v - xiv
    Save to Project icon | Request Permissions | PDF file iconPDF (189 KB)  
    Freely Available from IEEE
  • Preface - Volume 3

    Publication Year: 2009 , Page(s): xv
    Save to Project icon | Request Permissions | PDF file iconPDF (90 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference Committee - Volume 3

    Publication Year: 2009 , Page(s): xvi - xvii
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB)  
    Freely Available from IEEE
  • Technical Program Committee - Volume 3

    Publication Year: 2009 , Page(s): xviii - xxii
    Save to Project icon | Request Permissions | PDF file iconPDF (96 KB)  
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2009 , Page(s): xxiii
    Save to Project icon | Request Permissions | PDF file iconPDF (61 KB)  
    Freely Available from IEEE
  • The Design of Way-Prediction Scheme in Set-Associative Cache for Energy Efficient Embedded System

    Publication Year: 2009 , Page(s): 3 - 7
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (505 KB) |  | HTML iconHTML  

    Embedded system develops rapidly, functions turn into more complicate, and multi-media applications are growing daily and they consume more electrical power. Therefore, how to improve stand-by time will become a very important issue. Related researches indicate that the power consumption of processor cache is accounted for a big proportion. Way-prediction and LRU (least recently used) algorithms improve hit rate and would help in reducing the number of tag comparisons, and therefore save energy consumption. In this paper, we use MRU (most recently used) table to record the most used block for each index and use modified pseudo LRU (MPLRU) replacement algorithm for reducing hardware complexity and cache miss rate.Experiments show our prediction hit rate reach 90.15%, thus save 64.12% energy. The experimental results are obtained by using Wattch cache simulator for SPEC95 benchmarks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Vector Graphics Rendering on Mobile Device

    Publication Year: 2009 , Page(s): 8 - 11
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (273 KB) |  | HTML iconHTML  

    In order to solve the lower performance of vector graphics rendering on mobile device. The path generation and drawing in OpenVG is researched. After analyzing the OpenVG rendering pipeline, accelerated rendering methods are presented in three major aspects: rasterizer, tessellate and mathematical function. Experimental results indicate that the time of tessellation and rasterization is reduced. When applied to VG samples, the algorithm results in improved performance and good visual quality graphics. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Heterogeneous Multicore SoC Optimized for Embedded Visual Media Process

    Publication Year: 2009 , Page(s): 12 - 16
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (346 KB) |  | HTML iconHTML  

    Embedded high performance computing is a challenge to both software and hardware engineers. Visual media process is a computing intensive and complex application. A heterogeneous multicore SoC is described which is optimized for embedded visual media process. Optimization begins from the very beginning of the chip design, by analyzing of application workload characteristics, such as computing model, data formats, memory access modes and data arrangements. Through a case study of three dimensional reconstruction from multi images, the efficiency and usability of the SoC proved to be high. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Component-based multi-threading support of the multi-core mobile software

    Publication Year: 2009 , Page(s): 17 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (285 KB) |  | HTML iconHTML  

    With the incoming times of multi-core architecture, the mobile platform will focus on the chip multiprocessor design too. To fully exert this advantage, the software can be component-based development to use the multi-threading characters. In this paper, thread is encapsulated by the component model for the support of the CPU cores and the easy development of the large program. Some research about the component-based multi-threading support of the multi-core embedded software is also taken out. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Analysis of Resource's Load-Scale in P2P Network

    Publication Year: 2009 , Page(s): 21 - 25
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (529 KB) |  | HTML iconHTML  

    Convenient, rapid, efficient and anonymous characteristic of P2P technology, enables P2P network gathering enormous users very quickly, and P2P traffic has occupied 60~80% bandwidth of Internet. Such giant traffic has formed a threat to the service quality of other Internet application and the security of Internet itself. However, most study about P2P traffic focuses on traffic monitoring and characteristic identifying technique. Rare study analyzes P2P traffic behavior from P2P mechanism itself. This paper construct P2P network queuing model, analyzes the influence of related factors to the load-scale of concrete resource. Main conclusion including, compared with other factors, average degree of node and TTL value is the most key factor to load-scale. Load-scale increases with node quantity, initial number of objected resource and resourcepsilas total quantity, however, when those quantity reach to some critical threshold, the influence of those factors become quite weak to load-scale of resource. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Peers' Segment Replacement Strategies in P2P Vod System Based On Client-Side Segmented Cache

    Publication Year: 2009 , Page(s): 26 - 33
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (510 KB) |  | HTML iconHTML  

    In client-side segmented cache based P2P VOD system, statically cached video files in peers' disks can efficiently improve data acquisition rate. However, since disk space in a single peer is very limited, it becomes a key problem to design reasonable strategies for replacing those data segments. We start at studying the three VOD system models, and analyze the necessity of utilizing segmented storage mechanism, then focus on discussing and comparing five segment replacement strategies at client side: FIFO, LRU, LRF, EDF, and LSSF. These strategies sufficiently take local system parameters of a peer and global data distribution patterns into consideration, and manage to save high use rate, high hit rate segments in limited peers' disk space. Our experiment results indicate that, when a peer's cache size is increased from 240 M to 960 M, the use rate of data segments at client side rises by 36%, but the rate will rise little if continuously increasing its cache size; overall, under the same system environment, LSSF shows best performance. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Implementation of Grid Monitoring System Based on GMA

    Publication Year: 2009 , Page(s): 34 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (316 KB) |  | HTML iconHTML  

    Grid technology opens the way to build collaborative environments that enable distributed multi-organizational teams to jointly use computing resources. Thus automatic resources/services discovery should be launched with the dynamicity of grid elements. Hardware and software failure can be found and solved in time by monitoring. Analyzing the gathered data could help to find performance bottleneck. In this paper, we analyzed the aims and main tasks of grid monitoring and the advantage of GMA (Grid monitoring Architecture), then proposed a Java-based design pattern of Grid Monitoring System (JGMS) on the basis of GMA. The JGMS uses special agents to complete the communication between producers and consumers in different grid nodes. So, it can work on different platforms, pass through firewalls and be easy to deploy and use. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on GridFTP Traffic Features

    Publication Year: 2009 , Page(s): 39 - 43
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (324 KB) |  | HTML iconHTML  

    GridFTP is a secure and efficient data transfer protocol in Grid. This paper proposes a test scenario for the GridFTP traffic features. Firstly it gives a general description of the testbed traffic from the aspects of packet characteristics and throughput distribution; then analyses the self-similarity features of the GridFTP traffic and their decomposed data flows both in WAN and in LAN. Analysis results show that the parallel transfer of GridFTP increases both the self-similarity degree and the throughputs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Streaming Live Media over BitTorrent

    Publication Year: 2009 , Page(s): 44 - 49
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (248 KB) |  | HTML iconHTML  

    In this paper, we present an effective approach for live media streaming based on BitTorrent mechanism. In the approach, several modifications have been incorporated into BitTorrent to support on-time content delivery. First, pieces are selected based on their scheduler play back deadline. Second, source behaves in a push-based way instead of pull-based way. Finally, each peer periodically examines its active neighbors to improve the bandwidth utilization. Our simulations indicate that our proposals improve the bandwidth utilization and accommodate high scalability and resilience, and a good streaming quality can be achieved. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P Service Performance Analysis of Unstructured P2P Network

    Publication Year: 2009 , Page(s): 50 - 54
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (586 KB) |  | HTML iconHTML  

    Convenient, efficient and anonymous characteristic enables P2P network to own enormous users very quickly. However, how much service performance of searching and transmitting is provided by P2P network for a concrete resource? How much is the success ratio and recall ratio of resource's searching of existing P2P network? Rare research is deepened about those questions. This paper, for unstructured P2P network, provides calculating method of service performance of concrete resource; analyzes success ratio and recall ratio of resource's searching, and by experiment simulation, discusses the influence of resource's popularity, Peer's quantity, initial number of objected resource, Peer's average degree and TTL value to success ratio and recall ratio of resource's searching. We conclude that recall ratio is only related with topology character of P2P network itself but not related with resource's quantity. Otherwise, when, mostly searching process can reach higher success ratio and recall ratio. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Application of Backfilling in Cluster Systems

    Publication Year: 2009 , Page(s): 55 - 59
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (307 KB) |  | HTML iconHTML  

    As backfilling resolves the fragmentation problem caused by resource reservation and produces significant benefits in scheduling of parallel jobs, it is widely used by most cluster management software suites. This paper introduces typical backfilling algorithms, focuses on analyzing the different implementations of backfilling in some common workload managers and points out the drawbacks of backfilling. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Network Substrate for Peer-to-Peer Grid Computing beyond Embarrassingly Parallel Applications

    Publication Year: 2009 , Page(s): 60 - 68
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1746 KB) |  | HTML iconHTML  

    Embarrassingly parallel grid applications require no inter-worker interaction. Thus, the underlying communication infrastructure is based on the simple but well understood client/server execution model. This is no longer sufficient if more demanding parallel applications that require true peer-to-peer interaction are to be deployed on grids. In this paper, we propose the industrial-strength eXtensible Messaging and Presence Protocol (XMPP) as a network substrate for these non-trivial peer-to-peer grid computing applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research on Methodology of Enhancing 3D Scene Scanning Speed in TerraExplorer

    Publication Year: 2009 , Page(s): 69 - 73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (299 KB) |  | HTML iconHTML  

    Recently, 3D-GIS is one of the host spots in the process of GIS development. The complex structure and diversified texture make 3D scenes massive information databases which prevent 3D scenes from fast loading and displaying. TerraExplorer, a software of SkylineGlobe series, is a powerful, easy-to-use tool for editing, annotating and publishing photo-realistic interactive 3D environments. This article lay a emphasis on the study of the concept, principle and realizing method of streaming technology as well as multiscale scene displaying skills in TerraExplorer. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Context-Dependent Objective Coordination Model in Mobile Agent Systems

    Publication Year: 2009 , Page(s): 74 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (365 KB) |  | HTML iconHTML  

    Mobile agent application always consists of multiple agents cooperating with each other to achieve the overall goal. However the world perceived by mobile agent varies from site to site due to agent migration, which induces context-dependent coordination issues. The role-based context-dependent objective coordination model proposed in this paper adopts local programmable reactive tuple space at every mobile agent environment to address the context-dependent coordination problems. Additionally, role mechanism is adopted for access control to prevent unauthorized access. Type system is introduced to formalize this role mechanism. A sample application is discussed to illustrate the proposed mode. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Peer-to-Peer Resources Search Algorithm Based on Small-World Model

    Publication Year: 2009 , Page(s): 79 - 84
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (447 KB) |  | HTML iconHTML  

    Resources search has become a hot research issue in peer-to-peer (P2P) systems. In most unstructured P2P systems with flooding mechanism, with exponential growth of the number of messages, serious network congestion and waste of bandwidth result in low efficiency of resources search. In this paper, we propose an unstructured P2P resources search algorithm based on small-world model, in which peers perform k-means clustering on local resources separately, and then build a few similar-links between peers who own similar clusters and some random-links between non-similar peers. Experiment results demonstrate that our algorithm can effectively shorten the average searching length and get high success rate. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of iATA on Windows CE Platform: An ATA-Based Virtual Storage System

    Publication Year: 2009 , Page(s): 85 - 89
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (519 KB) |  | HTML iconHTML  

    The storage limitation in mobile appliance has become a significant problem due to the rapid growth of data-centric application. To alleviate the above problem, we developed a new block-level storage network protocol, iATA (Internet advanced technology attachment) as a transport for carrying ATA block-level access protocol over the ubiquitous TCP/IP network. With iATA, mobile user is able to access their valuable data natively through the network from anywhere and at anytime as if the storage device is attached locally. In this paper, we describe concepts, design, and operations of iATA protocol. We also demonstrate the feasibility experiment by implementing iATA protocol on Windows based mobile operating platform. The result of our implementation shows that the iATA protocol is feasible to be applied on Windows CE platform device. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.