05 Fakultät Informatik, Elektrotechnik und Informationstechnik
Permanent URI for this collectionhttps://elib.uni-stuttgart.de/handle/11682/6
Browse
104 results
Search Results
Item Open Access A context-aware hoarding mechanism for location-dependent information systems(2000) Kubach, Uwe; Rothermel, KurtWhen used in an outdoor environment mobile information systems often suffer from the disadvantages of wireless WANs, especially low bandwidth, high delay, and frequent disconnections. Hoarding is an effective method to overcome these disadvantages by transferring information which is probably needed by the user in advance. In this paper we propose a generic, context-aware hoarding mechanism. When selecting the information to hoard, it considers the user's future location as well as the expected speed of movement. In contrast to existing hoarding mechanisms it is universally applicable for different types of location-dependent, mobile information systems. Its flexibility allows it to rely on different knowledge sources in order to get information about a user's context.Item Open Access A protocol for preserving the exactly-once property of mobile agents(1997) Rothermel, Kurt; Straßer, MarkusMobile agents are autonomous objects that can migrate from node to node of a computer network. Mobile agent technology has been proposed for various application areas, including electronic commerce, systems management and active messaging. Many of these applications - especially those for electronic commerce - require agents to be performed 'exactly once', independent of communication and node failures. In other words, once a mobile agent has been launched, it must never be lost before its execution is finished. Moreover, each 'portion' of the agent performed at the visited nodes is performed exactly once. Due to the autonomy of mobile agents, there is no 'natural' instance that monitors the progress of an agent's execution. As a result of that agents may be blocked due to node crashes or network partitioning even if there are other nodes available that could continue processing. In this paper, we will describe a protocol that ensures the exactly once property of agents and additionally reduces the blocking probability of agents by introducing so-called observer nodes for monitoring the progress of agents. This protocol is based on conventional transactional technology, such as defined by X/Open DTP or CORBA OTS. It is implemented in the Mole, a mobile agent system developed at Stuttgart University.Item Open Access Abstract syntax of WS-BPEL 2.0(2008) Kopp, Oliver; Mietzner, Ralph; Leymann, FrankWS-BPEL 2.0 is the current version of the "Business Process Execution Language for Web Services". Until now, no formal definition of its syntax exists. We present a complete syntax of WS-BPEL 2.0 of both abstract and executable processes.Item Open Access Application sharing in teaching context with wireless networks(2001) Burger, Cora; Papakosta, Stella; Rothermel, KurtThe success of teaching is depending on a couple of factors: on how far students are involved into lectures, on the material, its completeness and on co-learning of students. Involvement of students into lectures means, being able to follow the thoughts of the teacher, ask questions and make comments. The material must be presented in a suitable form and essential parts of it have to be available during the whole learning process, for preparing participation in lectures and exercises as well as for exams. For more effective learning and training of social abilities, working in groups of co-learners has to be encouraged. Mobile and ubiquitous computing offer new possibilities to achieve these goals by increasing the awareness in class and supporting an active participation of students. By promoting existing concepts and enabling new ways of application sharing, the project SASCIA (System architecture supporting cooperative and interactive applications) aims at developing a framework for multiple applications to support teaching in collocated, remote and hybrid scenarios. Its core is composed of components to capture and distribute context information about sessions, participants and those applications that are used during a lecture or encounter among students. A configurable floor control was designed to cope with a wide spectrum of applications and learning situations. For some cases, even a control for semantic consistency can be necessary. In combination with a suitable user and session management, a whiteboard for annotations and a recording facility to support latecomers as well as subsequent replay, these components are providing the required functionality. As a consequence, SASCIA offers remote control and viewing facilities to all participants during lectures and co-learning sessions.Item Open Access Fragments of first-order logic over infinite words(2009) Diekert, Volker; Kufleitner, ManfredWe give topological and algebraic characterizations as well as language theoretic descriptions of the following subclasses of first-order logic for omega-languages: Sigma2, FO2, the intersection of FO2 and Sigma2, and Delta2 (and by duality Pi2 and the intersection of FO2 and Pi2). These descriptions extend the respective results for finite words. In particular, we relate the above fragments to language classes of certain (unambiguous) polynomials. An immediate consequence is the decidability of the membership problem of these classes, but this was shown before by Wilke and Bojanczyk and is therefore not our main focus. The paper is about the interplay of algebraic, topological, and language theoretic properties.Item Open Access Reachability analysis of multithreaded software with asynchronous communication(2005) Bouajjani, Ahmed; Esparza, Javier; Schwoon, Stefan; Strejcek, JanWe introduce asynchronous dynamic pushdown networks (ADPN), a new model for multithreaded programs in which pushdown systems communicate via shared memory. ADPN generalizes both CPS (concurrent pushdown systems) and DPN (dynamic pushdown networks). We show that ADPN exhibit several advantages as a program model. Since the reachability problem for ADPN is undecidable even in the case without dynamic creation of processes, we address the bounded reachability problem, which considers only those computation sequences where the (index of the) thread accessing the shared memory is changed at most a fixed given number of times. We provide efficient algorithms for both forward and backward reachability analysis. The algorithms are based on automata techniques for symbolic representation of sets of configurations.Item Open Access Sub-lexical investigations: German particles, prefixes and prepositions(2013) Roßdeutscher, AntjeThe papers investigate constructions with P(repositional) elements in German. It aims at a comprehensive theory of the syntax-semantics interface for the different verbal constructions in German, including verb plus prepostional phrase, (separable) particle verbs, and (inseparable) prefix verbs. The constructions are given syntactic representations following minimalist principles as known from \textit{Distributive Morphology} (DM) according to which a single syntactic engine drives formation of both words and phrases. Among the syntactic principles the Split-P hypothesis plays a central role. A crucial feature of the approach is that the syntactic structures are used as input to the computation of semantic representations according to principles of Discourse Representation Theory (DRT). Several challenges that present themselves for a compositional theory of word- and phrase- formation with P-elements in German are accounted for in the paper: syntactic separability of verb-particle constructions vs non-separability of prefix-verbs; semantic restrictions in the P-elements to build constructions of the former and the latter type; syntactic alternations w.r.t. the realisation of figure and ground arguments and the semantic basis of these alternations. A particular challenge are the differences in the conceptual and aspectual contribution of the same prepositional root in different syntactic contexts.Item Open Access Task allocation in distributed multimedia systems based on the host-satellite model(1998) Dermler, Gabriel; Iqbal, AshrafMultimedia applications require intermediate processing between media sources and sinks. In addition to end-user machines intermediate computers can be used for performing media processing. This possibility leads to the problem of allocating processing components on various computers. In this paper, we study this problem in the context of star-shaped application graphs which have to be allocated between given end-user machines (satellites) and a central computer (host). The problem is formulated in terms of best achievable bottleneck resource usage. Several approaches are considered including anapproximate scheme and two fast-heuristics. Performance measurements show the efficiency of the considered approaches. A discussion of our approach shows important differences to solutions provided for related problems of graph partitioning and mapping.Item Open Access Existential and positive theories of equations in graph products(2001) Diekert, Volker; Lohrey, MarkusWe prove that the existential theory of equations with normalized rational constraints in a fixed graph product of finite monoids, free monoids, and free groups is PSPACE-complete. Under certain restrictions this result also holds if the graph product is part of the input. As the second main result we prove that the positive theory of equations with recognizable constraints in graph products of finite and free groups is decidable.Item Open Access Spatial aware geographic Forwarding for mobile ad hoc networks(2002) Tian, Jing; Stepanov, Illya; Rothermel, KurtStateless greedy forwarding based on physical positions of nodes is considered to be more scalable than conventional topology-based routing. However, the stateless nature of geographic forwarding also prevents it from predicting holes in node distribution. Thus, frequent topology holes can significantly degrade the performance of geographic forwarding. So far the approaches mostly depend on excessive state maintenance at nodes to avoid forwarding failures at topology holes. In this paper, we propose and analyse spatial aware geographic forwarding (SAGF), a new approach that proactively avoids constant topology holes caused by spatial constraints while still preserving the advantage of stateless forwarding. Geographic source routes (GSR) based on intermediate locations are selected to bypass topology holes. Proactive route selection based on the spatial knowledge is a general approach, and thus can be used with any geographic forwarding algorithms. We evaluate our approach by extending greedy forwarding with spatial knowledge. Simulation results comparing with GPSR show that even simple spatial information can effectively improve the performance of geographic forwarding.