Dartmouth College Computer Science
Technical Report series
TR search TR listserv
|By author:||A B C D E F G H I J K L M N O P Q R S T U V W X Y Z|
|By number:||2017, 2016, 2015, 2014, 2013, 2012, 2011, 2010, 2009, 2008, 2007, 2006, 2005, 2004, 2003, 2002, 2001, 2000, 1999, 1998, 1997, 1996, 1995, 1994, 1993, 1992, 1991, 1990, 1989, 1988, 1987, 1986|
Wireless networks are an ideal environment for mobile agents, since their
mobility allows them to move across an unreliable link to reside on a wired
host, next to or closer to the resources that they need to use. Furthermore,
client-specific data transformations can be moved across the wireless link and
run on a wired gateway server, reducing bandwidth demands. In
this paper we examine the tradeoffs faced when deciding whether to use mobile
agents in a data-filtering application where numerous wireless clients filter
information from a large data stream arriving across the wired network. We
develop an analytical model and use parameters from filtering experiments
conducted during a U.S. Navy Fleet Battle Experiment (FBE) to explore the
Updated version of TR2000-366. To appear, after revisions, in the journal
Mobile Networks and Applications (ACM MONET).
Bibliographic citation for this report: [plain text] [BIB] [BibTeX] [Refer]
Or copy and paste:
David Kotz, George Cybenko, Robert S. Gray, Guofei Jiang, Ronald A. Peterson, Martin O. Hofmann, Daria A. Chacon, Kenneth R. Whitebread, and James Hendler, "Performance Analysis of Mobile Agents for Filtering Data Streams on Wireless Networks." Dartmouth Computer Science Technical Report TR2000-377, October 2000.
Notify me about new tech reports.
Search the technical reports.
To receive paper copy of a report, by mail, send your address and the TR number to reports AT cs.dartmouth.edu
Copyright notice: The documents contained in this server are included by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.
Technical reports collection maintained by David Kotz.