scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Computer in 2004"


Journal ArticleDOI
TL;DR: Wireless sensor networks could advance many scientific pursuits while providing a vehicle for enhancing various forms of productivity, including manufacturing, agriculture, construction, and transportation.
Abstract: Wireless sensor networks could advance many scientific pursuits while providing a vehicle for enhancing various forms of productivity, including manufacturing, agriculture, construction, and transportation.

1,438 citations


Journal Article
TL;DR: Wireless sensor networks could advance many scientific pursuits while providing a vehicle for enhancing various forms of productivity, including manufacturing, agriculture, construction, and transportation.
Abstract: Wireless sensor networks could advance many scientific pursuits while providing a vehicle for enhancing various forms of productivity, including manufacturing, agriculture, construction, and transportation.

1,382 citations


Journal ArticleDOI
TL;DR: The rainbow framework provides reusable infrastructure together with mechanisms for specializing that infrastructure to the needs of specific systems, and lets the developer of self-adaptation capabilities choose what aspects of the system to model and monitor, what conditions should trigger adaptation, and how to adapt the system.
Abstract: While attractive in principle, architecture-based self-adaptation raises a number of research and engineering challenges. First, the ability to handle a wide variety of systems must be addressed. Second, the need to reduce costs in adding external control to a system must be addressed. Our rainbow framework attempts to address both problems. By adopting an architecture-based approach, it provides reusable infrastructure together with mechanisms for specializing that infrastructure to the needs of specific systems. The specialization mechanisms let the developer of self-adaptation capabilities choose what aspects of the system to model and monitor, what conditions should trigger adaptation, and how to adapt the system.

840 citations


Journal ArticleDOI
TL;DR: DakNet, an ad hoc network that uses wireless technology to provide asynchronous digital connectivity, is evidence that the marriage of wireless and asynchronous service may indeed be the beginning of a road to universal broadband connectivity.
Abstract: DakNet provides extraordinarily low-cost digital communication, letting remote villages leapfrog past the expense of traditional connectivity solutions and begin development of a full-coverage broadband wireless infrastructure. What is the basis for a progressive, market-driven migration from e-governance to universal broadband connectivity that local users will pay for? DakNet, an ad hoc network that uses wireless technology to provide asynchronous digital connectivity, is evidence that the marriage of wireless and asynchronous service may indeed be the beginning of a road to universal broadband connectivity. DakNet has been successfully deployed in remote parts of both India and Cambodia at a cost two orders of magnitude less than that of traditional landline solutions.

819 citations


Journal ArticleDOI
TL;DR: A review of current technology compares how, when, and where recomposition occurs.
Abstract: Interest in adaptive computing systems has increased dramatically in the past few years, and a variety of techniques now allow software to adapt dynamically to its environment. Compositional adaptation enables software to modify its structure and behavior dynamically in response to change in its execution environment. A review of current technology compares how, when, and where recomposition occurs.

651 citations


Journal ArticleDOI
TL;DR: This work is primarily interested in distinguishing a language's notation, or syntax, from its meaning, or semantics, as well as recognizing the differences between variants of syntax and semantics in their nature, purpose, style, and use.
Abstract: The Unified Modeling Language (UML) is a complex collection of mostly diagrammatic notations for software modeling, and its standardization has prompted an animated discussion about UML's semantics and how to represent it. We have thus set out to clarify some of the notions involved in defining modeling languages, with an eye toward the particular difficulties arising in defining UML. We are primarily interested in distinguishing a language's notation, or syntax, from its meaning, or semantics, as well as recognizing the differences between variants of syntax and semantics in their nature, purpose, style, and use.

577 citations


Journal ArticleDOI
TL;DR: Four key problems: membership maintenance, network awareness, buffer management,buffer management, and message filtering are described and some preliminary approaches to address them are suggested.
Abstract: Easy to deploy, robust, and highly resilient to failures, epidemic algorithms are a potentially effective mechanism for propagating information in large peer-to-peer systems deployed on Internet or ad hoc networks. It is possible to adjust the parameters of epidemic algorithm to achieve high reliability despite process crashes and disconnections, packet losses, and a dynamic network topology. Although researchers have used epidemic algorithms in applications such as failure detection, data aggregation, resource discovery and monitoring, and database replication, their general applicability to practical, Internet-wide systems remains open to question. We describe four key problems: membership maintenance, network awareness, buffer management, and message filtering, and suggest some preliminary approaches to address them.

539 citations


Journal ArticleDOI
TL;DR: A general framework for crime data mining is presented that draws on experience gained with the Coplink project, which researchers at the University of Arizona have been conducting in collaboration with the Tucson and Phoenix police departments since 1997.
Abstract: A major challenge facing all law-enforcement and intelligence-gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Detecting cybercrime can likewise be difficult because busy network traffic and frequent online transactions generate large amounts of data, only a small portion of which relates to illegal activities. Data mining is a powerful tool that enables criminal investigators who may lack extensive training as data analysts to explore large databases quickly and efficiently. We present a general framework for crime data mining that draws on experience gained with the Coplink project, which researchers at the University of Arizona have been conducting in collaboration with the Tucson and Phoenix police departments since 1997.

527 citations


Journal ArticleDOI
TL;DR: This survey shows that heterogeneous server clusters can be made more efficient by conserving power and energy while exploiting information from the service level, such as request priorities established by service-level agreements.
Abstract: This survey shows that heterogeneous server clusters can be made more efficient by conserving power and energy while exploiting information from the service level, such as request priorities established by service-level agreements.

489 citations


Journal ArticleDOI
TL;DR: Researchers at the Fundamental Computer Science Laboratory of Lille are developing strategies for selecting and updating an energy-efficient connected active sensor set that extends the network lifetime to optimize energy consumption in three separate problems: area coverage, request spreading, and data aggregation.
Abstract: The nodes in sensor networks must self-organize to monitor the target area as long as possible. Researchers at the Fundamental Computer Science Laboratory of Lille are developing strategies for selecting and updating an energy-efficient connected active sensor set that extends the network lifetime. We report on their work to optimize energy consumption in three separate problems: area coverage, request spreading, and data aggregation.

450 citations


Journal ArticleDOI
Avishai Wool1
TL;DR: Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines.
Abstract: The protection that firewalls provide is only as good as the policy they are configured to implement. Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines. Firewalls are the cornerstone of corporate intranet security. Once a company acquires a firewall, a systems administrator must configure and manage it according to a security policy that meets the company's needs. Configuration is a crucial task, probably the most important factor in the security a firewall provides.

Journal ArticleDOI
TL;DR: This research presents a meta-modelling architecture that automates the very labor-intensive and therefore time-heavy and expensive process of manually cataloging and cataloging location-based activities.
Abstract: At the core of invisible computing is context awareness, the concept of sensing and reacting to dynamic environments and activities. Location is a crucial component of context, and much research in the past decade has focused on location-sensing technologies, location-aware application support, and location-based applications. With numerous factors driving deployment of sensing technologies, location-aware computing may soon become a part of everyday life.

Journal ArticleDOI
TL;DR: The developments in wireless network technology and miniaturization makes it possible to realistically monitor the natural environment and domain knowledge is an essential fourth component within the field of environmental sensor networks.
Abstract: The developments in wireless network technology and miniaturization makes it possible to realistically monitor the natural environment. Within the field of environmental sensor networks, domain knowledge is an essential fourth component. Before designing and installing any system, it is necessary to understand its physical environment and deployment in detail. Sensor networks are designed to transmit data from an array of sensors to a server data repository. They do not necessarily use a simple one way data stream over a communication network rather elements of the system decide what data to pass on, using local area summaries and filtering to minimize power use while maximizing the information content. The Envisense Glacs Web project is developing a monitoring system for a glacial environment. Monitoring the ice caps and glaciers provides valuable information about the global warming and climate change.

Journal ArticleDOI
TL;DR: The mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet, and the MobileMan cross-layer architecture offers an alternative.
Abstract: Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered approach that promotes stricter local interaction among protocols in a manet node.

Journal ArticleDOI
TL;DR: The WiseNET platform uses a codesign approach that combines a dedicated duty-cycled radio with WiseMAC, a low-power media access control protocol, and a complex system-on-chip sensor node to exploit the intimate relationship between MAC-layer performance and radio transceiver parameters.
Abstract: A wireless sensor network consists of many energy-autonomous microsensors distributed throughout an area of interest. Each node monitors its local environment, locally processing and storing the collected data so that other nodes can use it. To optimize power consumption, the Swiss Center for Electronics and Microtechnology has developed WiseNET, an ultralow-power platform for the implementation of wireless sensor networks that achieves low-power operation through a careful codesign approach. The WiseNET platform uses a codesign approach that combines a dedicated duty-cycled radio with WiseMAC, a low-power media access control protocol, and a complex system-on-chip sensor node to exploit the intimate relationship between MAC-layer performance and radio transceiver parameters. The WiseNET solution consumes about 100 times less power than comparable solutions.

Journal ArticleDOI
TL;DR: The TRIPS architecture is the first instantiation of an EDGE instruction set, a new, post-RISC class of instruction set architectures intended to match semiconductor technology evolution over the next decade, scaling to new levels of power efficiency and high performance.
Abstract: Microprocessor designs are on the verge of a post-RISC era in which companies must introduce new ISAs to address the challenges that modern CMOS technologies pose while also exploiting the massive levels of integration now possible. To meet these challenges, we have developed a new class of ISAs, called explicit data graph execution (EDGE), that will match the characteristics of semiconductor technology over the next decade. The TRIPS architecture is the first instantiation of an EDGE instruction set, a new, post-RISC class of instruction set architectures intended to match semiconductor technology evolution over the next decade, scaling to new levels of power efficiency and high performance.

Journal ArticleDOI
Roy Want1
TL;DR: Radio frequency identification has attracted considerable press attention in recent years, and for good reasons: RFID not only replaces traditional barcode technology, it provides additional features and removes boundaries that limited the use of previous alternatives.
Abstract: Radio frequency identification has attracted considerable press attention in recent years, and for good reasons: RFID not only replaces traditional barcode technology, it also provides additional features and removes boundaries that limited the use of previous alternatives. Printed bar codes are typically read by a laser-based optical scanner that requires a direct line-of-sight to detect and extract information. With RFID, however, a scanner can read the encoded information even when the tag is concealed for either aesthetic or security reasons. In the future, RFID tags will likely be used as environmental sensors on an unprecedented scale.

Journal ArticleDOI
TL;DR: The ActiveCampus Project explores wireless context-aware computing as a means to enhance the "learning community" experience of a large urban university and has tested two applications.
Abstract: The continuing proliferation of handheld computing devices offers a new platform for mobile computing applications that could enrich our experience of the world around us. Yet many questions about realizing this vision remain open. We have been investigating these questions at the University of California, San Diego, through the ActiveCampus Project. ActiveCampus explores technologies that can enrich the learning community in the midst of these changes. It explores wireless context-aware computing as a means to enhance the "learning community" experience of a large urban university. We have tested two applications: ActiveClass supports classroom activities, such as asking questions during a lecture, and ActiveCampus Explorer supports context-aware activities, such as instant messaging and location-aware maps annotated with dynamic hyperlinked information.

Journal ArticleDOI
E. Dishman1
TL;DR: Ultimately, aging-in-place research supports a broader vision of "personal wellness systems" that provide highly individualized support for home based healthcare to all age groups.
Abstract: Unlike "mainframe healthcare," personal wellness technologies can scale with the needs of an aging population. They can also drive a demanding specification for the requirements of ubiquitous, proactive computing in everyday life. Ultimately, aging-in-place research supports a broader vision of "personal wellness systems" that provide highly individualized support for home based healthcare to all age groups.

Journal ArticleDOI
TL;DR: This analysis relies on experience collected and shared among four SEC members namely ABB, DaimlerChrysler, Motorola, and Nokia to generalize their findings by analyzing some of their common experiences in the particular context of large organizations with well-established structures and processes.
Abstract: The need to see compelling evidence before adopting new methods looms greater in large organizations because of their complexity and the need to integrate new technologies and processes with existing ones. To further evaluate agile methods and their underlying software development practices, several Software Experience Center (SEC) member companies initiated a series of activities to discover if agile practices match their organizations' needs. Although each organization evaluated agile methods according to its specific needs, here we attempt to generalize their findings by analyzing some of their common experiences in the particular context of large organizations with well-established structures and processes. We base this analysis on experience collected and shared among four SEC members namely ABB, DaimlerChrysler, Motorola, and Nokia.

Journal ArticleDOI
Nimrod Megiddo1, Dharmendra S. Modha1
TL;DR: The self-tuning, low-overhead, scan-resistant adaptive replacement cache algorithm outperforms the least-recently-used algorithm by dynamically responding to changing access patterns and continually balancing between workload recency and frequency features.
Abstract: The self-tuning, low-overhead, scan-resistant adaptive replacement cache algorithm outperforms the least-recently-used algorithm by dynamically responding to changing access patterns and continually balancing between workload recency and frequency features. Caching, a fundamental metaphor in modern computing, finds wide application in storage systems, databases, Web servers, middleware, processors, file systems, disk drives, redundant array of independent disks controllers, operating systems, and other applications such as data compression and list updating. In a two-level memory hierarchy, a cache performs faster than auxiliary storage, but it is more expensive. Cost concerns thus usually limit cache size to a fraction of the auxiliary memory's size.

Journal ArticleDOI
Butler W. Lampson1
TL;DR: Most computers today are insecure because security is costly in terms of user inconvenience and foregone features, and people are unwilling to pay the price.
Abstract: Most computers today are insecure because security is costly in terms of user inconvenience and foregone features, and people are unwilling to pay the price. Real-world security depends more on punishment than on locks, but it's hard to even find network attackers, much less punish them. The basic elements of security are authentication, authorization, and auditing: the gold standard. The idea of one principal speaking for another is the key to doing these uniformly across the Internet.

Journal Article
TL;DR: Epidemic algorithms have been recently recognized as robust and scalable means to disseminate information in large-scale settings and their general applicability to large scale distributed systems has yet to go through addressing many issues.
Abstract: Epidemic algorithms have been recently recognized as robust and scalable means to disseminate information in large-scale settings. Information is disseminated reliably in a distributed system the same way an epidemic would be propagated throughout a group of individuals: each process of the system chooses random peers to whom it relays the information it has received. The underlying peer-to-peer communication paradigm is the key to the scalability of the dissemination scheme. Epidemic algorithms have been studied theoretically and their analysis is built on sound mathematical foundations. Although promising, their general applicability to large scale distributed systems has yet to go through addressing many issues. These constitute an exciting research agenda.

Journal ArticleDOI
Shih-Lien Lu1
TL;DR: Approximation circuits can increase clock frequency by reducing the number of cycles a function requires by implementing the complete logic function using rough calculations to predict results.
Abstract: Current microprocessors employ a global timing reference to synchronize data transfer. A synchronous system must know the maximum time needed to compute a function, but a circuit usually finishes computation earlier than the worst-case delay. The system nevertheless waits for the maximum time bound to guarantee a correct result. As a first step in achieving variable pipeline delays based on data values, approximation circuits can increase clock frequency by reducing the number of cycles a function requires. Instead of implementing the complete logic function, a simplified circuit mimics it using rough calculations to predict results. The results are correct most of the time, and simulations show improvements in overall performance in spite of the overhead needed to recover from mistakes.

Journal ArticleDOI
TL;DR: This work proposes caching techniques that use the underlying routing protocols to overcome resource constraints and node mobility to overcome constraints and further improve performance.
Abstract: Cooperative caching, in which multiple nodes share and coordinate cached data, is widely used to improve Web performance in wired networks. However, resource constraints and node mobility have limited the application of these techniques in ad hoc networks. We propose caching techniques that use the underlying routing protocols to overcome these constraints and further improve performance.

Journal ArticleDOI
TL;DR: Razor is a voltage-scaling technology based on dynamic, in-situ detection and correction of circuit-timing errors that permits design optimizations that tune the energy in a microprocessor pipeline to typical circuit-operational levels.
Abstract: Voltage scaling has emerged as a powerful technology for addressing the power challenges that current on-chip densities pose. Razor is a voltage-scaling technology based on dynamic, in-situ detection and correction of circuit-timing errors. Razor permits design optimizations that tune the energy in a microprocessor pipeline to typical circuit-operational levels. This eliminates the voltage margins that traditional worst-case design methodologies require and lets digital systems run correctly and robustly at the edge of minimum power consumption. Occasional heavyweight computations may fail and require additional time and energy for recovery, but the optimized pipeline requires significantly less energy overall than traditional designs.

Journal ArticleDOI
TL;DR: Researchers at Intel Labs have experimented with alternative solutions that improve the server's ability to process TCP/IP packets efficiently and at very high rates.
Abstract: To meet the increasing networking needs of server workloads, servers are starting to offload packet processing to peripheral devices to achieve TCP/IP acceleration. Researchers at Intel Labs have experimented with alternative solutions that improve the server's ability to process TCP/IP packets efficiently and at very high rates.

Journal ArticleDOI
TL;DR: Proponents are advocating WiMax (worldwide interoperability for microwave access), a technology based on an evolving standard for point-to-multipoint wireless networking that addresses the European Telecommunications Standards Institute's (ETSI) similar high-performance radio metropolitan area network (HiperMAN) broadband standard.
Abstract: When users want broadband Internet service, they're generally restricted to a T1, DSL, or cable-modem-based connection. However, these wireline infrastructures can be considerably more expensive and time consuming to deploy than a wireless one. In addition, rural areas and developing countries frequently lack optical fiber or copper-wire infrastructures for broadband services, and providers are unwilling to install the necessary equipment for regions with little profit potential. Many residents thus must do without broadband service. Wireless approaches could address this problem. Therefore, proponents are advocating WiMax (worldwide interoperability for microwave access), a technology based on an evolving standard for point-to-multipoint wireless networking. Carriers can use WiMax to provide wireless Internet service via transceivers to users' antennas. In addition to IEEE 802.16, WiMax addresses the European Telecommunications Standards Institute's (ETSI) similar high-performance radio metropolitan area network (HiperMAN) broadband standard.

Journal ArticleDOI
TL;DR: Widespread adoption of sensors that monitor the wearer's vital signs and other indicators promises to improve care for the aged and chronically ill while amassing a database that can enhance treatment and reduce medical costs as discussed by the authors.
Abstract: Widespread adoption of sensors that monitor the wearer's vital signs and other indicators promises to improve care for the aged and chronically ill while amassing a database that can enhance treatment and reduce medical costs.

Journal ArticleDOI
M. Overmars1
TL;DR: Using game maker, users who can't code a single line can use game maker to build games and learn object-oriented design.
Abstract: Playing computer games is a popular recreational activity for young people. Not surprisingly, many of these enthusiasts dream that one day they will develop computer games themselves. Developing computer games involves many aspects of computing, including computer graphics, artificial intelligence, human-computer interaction, security, distributed programming, simulation, and software engineering. Users who can't code a single line can use game maker to build games and learn object-oriented design.