W Expressing User Profiles for Data Recharging

نویسنده

  • Stan Zdonik
چکیده

are rapidly heading toward a world in which the computing infrastructure will contain billions of devices that are carried or worn by their users as they go through their daily routines. These devices require two key resources to function: power and data. The mobile nature of such devices combined with the economic limitations of size and cost makes it impractical to keep them continually connected to fixed sources of either resource. Mobile devices cope with disconnection from fixed sources of power and data by " caching. " For power, devices typically use rechargeable batteries ; batteries act as a cache of power from the fixed power grid. Likewise, data from the " information grid " (i.e., the Internet) is cached in device-local storage (memory, flash memory, disk, etc.) for use by the applications running on that device. Periodically, a device's batteries must be recharged by connecting with the fixed power grid. Performing such recharging is easy: the device can be plugged into any electrical outlet that is available; the charge can be interrupted at any time —-the longer it is plugged in, the better the charge gets, until it is fully charged; and most important, the process happens with minimal intervention by the user. Data recharging is a service that aims to provide the analogous functionality for recharging the device-resident data cache. As with battery recharging, the goal is for data recharging to function in a flexible and geographically independent manner. That is, mobile devices should be able to efficiently recharge their data by connecting at any point in the global Internet, using whatever bandwidth is available at that point, connecting for whatever amount of time they can spare, and doing so with little or no help from the user. While the analogy between recharging power and recharging data is an appealing one, obviously it can only be taken so far. A key place where the analogy breaks down is that while electrons are basically fungible, the data needed on a particular device is highly dependent on the user of that device and the tasks they will be performing when they need the data. Thus, the choice of data that must be sent to a device in order to recharge it is dependent on the semantics of the applications. The data recharging infrastructure must therefore maintain and exploit information about the data needs of users. The key technology used for …

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Expressing user profiles for data recharging

We are rapidly heading towards a world in which the computing infrastructure will contain billions of devices that are carried or worn by their users as they go through their daily routines. These devices require two key resources to function: power and data. The mobile nature of such devices combined with the economic limitations of size and cost makes it impractical to keep them continually c...

متن کامل

Improving the performance of recommender systems in the face of the cold start problem by analyzing user behavior on social network

The goal of recommender system is to provide desired items for users. One of the main challenges affecting the performance of recommendation systems is the cold-start problem that is occurred as a result of lack of information about a user/item. In this article, first we will present an approach, uses social streams such as Twitter to create a behavioral profile, then user profiles are clusteri...

متن کامل

تشخیص ناهنجاری روی وب از طریق ایجاد پروفایل کاربرد دسترسی

Due to increasing in cyber-attacks, the need for web servers attack detection technique has drawn attentions today. Unfortunately, many available security solutions are inefficient in identifying web-based attacks. The main aim of this study is to detect abnormal web navigations based on web usage profiles. In this paper, comparing scrolling behavior of a normal user with an attacker, and simu...

متن کامل

Expressing and implementing operational profiles for reactive software validation

Lutess is a tool that we developed for testing reactive synchronous software and which is being used in different industrial contexts. It offers several formal testing methods with automatic generation of test data from the environment specification. Lutess provides also an approach to assign a probability to the next event issued by the environment. However, a Lutess’ user faces the problem of...

متن کامل

Implantable wireless battery recharging system for bladder pressure chronic monitoring.

This paper presents an implantable wireless battery recharging system design for bladder pressure chronic monitoring. The wireless recharging system consists of an external 15 cm-diameter 6-turn powering coil and a silicone-encapsulated implantable rectangular coil with a dimension of 7 mm × 17 mm × 2.5 mm and 18 turns, which further encloses a 3 mm-diameter and 12 mm-long rechargeable battery,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001