tailieunhanh - Performance Modeling of Critical Event Management for Ubiquitous Computing Applications
If your organised walk will potentially have enough participants to cause disruption to normal pedestrian or traffic flow, it’s always a good idea to consult with businesses and residents on the route. A simple way to do this is to deliver a general letter explaining the event’s route, timings and objectives. Always include a contact e-mail address or phone number for one of the events team who can answer any queries and do make sure you respond to all queries. Mostly, residents and businesses are grateful for the advance notification and may even support the event. . | Performance Modeling of Critical Event Management for Ubiquitous Computing Applications Tridib Mukherjee Krishna Venkatasubramanian Sandeep K. S. Gupta Department of Computer Science and Engineering Arizona State University Temp AZ tridib kkv @ ABSTRACT A generic theoretical framework for managing critical events in ubiquitous computing systems is presented. The main idea is to automatically respond to occurrences of critical events in the system and mitigate them in a timely manner. This is different from traditional fault-tolerance schemes where fault management is performed only after system failures. To model the critical event management the concept of criticality which characterizes the effects of critical events in the system is defined. Each criticality is associated with a timing requirement called its window-of-opportunity that needs to be fulfilled in taking mitigative actions to prevent system failures. This is in addition to any application-level timing requirements. The criticality management framework analyzes the concept of criticality in detail and provides conditions which need to be satisfied for a successful multiple criticality management in a system. We have further simulated a criticality aware system and its results conform to the expectations of the framework. Categories and Subject Descriptors Performance of Systems Fault tolerance Modeling techniques Special-Purpose Application-based Systems Real-time and embedded systems Performance Stochastic analysis Model Development Modeling methodologies General Terms Performance Reliability Security Theory. Keywords Autonomic Computing Event Management Proactive Computing Safety-Critical Systems Ubiquitous Computing. 1. INTRODUCTION Ubiquitous Computing UC systems also known as Pervasive Computing systems 12 consist of a possibly large number of heterogeneous massively distributed computing entities . embedded wireless sensors actuators and various .
đang nạp các trang xem trước