Caching in Ubiquitous Computing Environments: Light and Shadow

نویسندگان

  • Mianxiong Dong
  • Long Zheng
  • Kaoru Ota
  • Jun Ma
  • Song Guo
  • Minyi Guo
چکیده

of the CA is described as follows. 1. Router retrieves a new task from the task queue. If there is no task in the task queue, then ends. 2. Router generates a PE chain which is used to process a task. Set the PEs in the PE chain as busy, which means these PE can not do any other task until they are released. 3. Router sends the PE chain information and task to PE1. 4. PE1 finishes its work and follows the PE chain information to transfer the task to PE2. 5. PE2 finishes its work and follows the PE chain information to transfer the task to PE3. 6. PE4 finishes its work and follows the PE chain information to transfer the task to PE5. 7. PE5 finishes its work and follows the PE chain information to transfer the task to PE6. 8. PE6 finishes its work and sends the processed task back to router. 9. Router sets all PEs in the PE chain as idle. 10. Remove the task from the task queue. If there is no task left in the task queue, then terminates. Otherwise go to Step (1). 4.2 Randomly Allocating Algorithm (RAA) The biggest limitation of the current policy is that if the RR allocates the PEs to the users once, the all PEs are reserved until the whole task will be finished. This is obviously a big useless of the computational resource. To regard as this point, we apply a randomly distribute algorithm to the UMP system. The concept of RAA is after the PE finished the

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Context Shadow: A Person-Centric Infrastructure for Context Aware Computing

In ubiquitous computing environments, hardware and software services will create huge and ubiquitous service spaces. These service spaces will need to be organized in meaningful ways so that the services can be easily accessed and utilized by other services and humans. Context Shadow is a system that makes it possible for services to ask questions about a person’s current context, and specifica...

متن کامل

Supporting Context Awareness in Ubiquitous Service Environments

Computing devices are becoming wireless, increasingly smaller and embedded into other artefacts. Some of them are mobile while others are built into the environment. The novel technologies are also becoming more dependent of communication with other computing devices over different kinds of networks. These interconnected devices constitute locally distributed computing environments that will se...

متن کامل

GTrust: a group based trust model

Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...

متن کامل

An Efficient Role Specification Management Model for Highly Distributed Environments

Highly distributed environments such as pervasive computing environments not having global or broad control, need another attribute certificate management technique. For an efficient role based access control using attribute certificate, we use a technique of structuring role specification certificates. It can provide more flexible and secure collaborating environments. The roles are grouped an...

متن کامل

Energy-Efficient Data Caching and Prefetching for Mobile Devices Based on Utility

In mobile computing environments, vital resources like battery power and wireless channel bandwidth impose significant challenges in ubiquitous information access. In this paper, we propose a novel energy and bandwidth efficient data caching mechanism, called GreedyDual Least Utility (GD-LU), that enhances dynamic data availability while maintaining consistency. The proposed utility-based cachi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012