Caching in Ubiquitous Computing Environments: Light and Shadow
نویسندگان
چکیده
of the CA is described as follows. 1. Router retrieves a new task from the task queue. If there is no task in the task queue, then ends. 2. Router generates a PE chain which is used to process a task. Set the PEs in the PE chain as busy, which means these PE can not do any other task until they are released. 3. Router sends the PE chain information and task to PE1. 4. PE1 finishes its work and follows the PE chain information to transfer the task to PE2. 5. PE2 finishes its work and follows the PE chain information to transfer the task to PE3. 6. PE4 finishes its work and follows the PE chain information to transfer the task to PE5. 7. PE5 finishes its work and follows the PE chain information to transfer the task to PE6. 8. PE6 finishes its work and sends the processed task back to router. 9. Router sets all PEs in the PE chain as idle. 10. Remove the task from the task queue. If there is no task left in the task queue, then terminates. Otherwise go to Step (1). 4.2 Randomly Allocating Algorithm (RAA) The biggest limitation of the current policy is that if the RR allocates the PEs to the users once, the all PEs are reserved until the whole task will be finished. This is obviously a big useless of the computational resource. To regard as this point, we apply a randomly distribute algorithm to the UMP system. The concept of RAA is after the PE finished the
منابع مشابه
Context Shadow: A Person-Centric Infrastructure for Context Aware Computing
In ubiquitous computing environments, hardware and software services will create huge and ubiquitous service spaces. These service spaces will need to be organized in meaningful ways so that the services can be easily accessed and utilized by other services and humans. Context Shadow is a system that makes it possible for services to ask questions about a person’s current context, and specifica...
متن کاملSupporting Context Awareness in Ubiquitous Service Environments
Computing devices are becoming wireless, increasingly smaller and embedded into other artefacts. Some of them are mobile while others are built into the environment. The novel technologies are also becoming more dependent of communication with other computing devices over different kinds of networks. These interconnected devices constitute locally distributed computing environments that will se...
متن کاملGTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
متن کاملAn Efficient Role Specification Management Model for Highly Distributed Environments
Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For an efficient role based access control using attribute certificate, we use a technique of structuring role specification certificates. It can provide more flexible and secure collaborating environments. The roles are grouped an...
متن کاملEnergy-Efficient Data Caching and Prefetching for Mobile Devices Based on Utility
In mobile computing environments, vital resources like battery power and wireless channel bandwidth impose significant challenges in ubiquitous information access. In this paper, we propose a novel energy and bandwidth efficient data caching mechanism, called GreedyDual Least Utility (GD-LU), that enhances dynamic data availability while maintaining consistency. The proposed utility-based cachi...
متن کامل