基于Pub/Sub系统的RFID网络及其路由研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
RFID网络已成为RFID应用的研究热点,研究人员提出了以中间件为基础的应用框架,并在诸多领域得到了广泛应用,如物流、供应链、零售业、食品以及铁路车号自动识别系统等。
     早期的RFID应用,由于应用的简单性,研究人员对应用架构的研究较少,侧重关注RFID数据获取以及制造成本等问题,包括:廉价的标签和阅读器的研究与设计、标签及阅读器冲突、特定应用环境下的标签、以及数据读取的可靠性等问题。
     传统的RFID应用主要是针对特定领域的应用,大都采用基于数据中心的应用方式,即由阅读设备获取标签对象数据,并集中进行存储和处理。重点关注如何将RFID数据与现有的应用系统相关联,因而,中间件技术被认为是解决RFID网络的关键手段和技术方法。
     近年来,随着RFID的普及,RFID应用正在经历由简单应用向复杂应用的转变;从简单的数据处理转向面向事件的处理;从局部应用走向全球化应用;从RFID与后台单一应用系统相结合,转变为在异构环境下实现数据共享等。这些转变给RFID数据管理和系统架构带来了新的挑战,要求新一代的RFID应用架构能处理具有以下特征的数据事件:RFID数据的时态性、动态性和关联性,数据的流特性和海量数据,冗余和差错,以及在异构网络实现数据共享等特征。
     为满足新一代RFID网络应用的要求,本文提出了面向复杂事件处理的普适应用环境下的RFID网络体系结构,并对其中的关键理论和方法进行了深入的研究。
     本文的主要工作包括:
     (1)将Pub/Sub系统与RFID复杂事件处理相结合,提出了RFID分层网络结构,给出了RFID网络关键描述及定义,包括RFID网络的形式化描述、匹配、路由等,研究并讨论了RFID网络中的关键组成部分一代理的结构和主要功能。
     (2)考虑到海量数据条件下RFID网络的负载和可扩展性,基于复杂网络和结构化P2P,提出了分层RFID网络结构和模型。在此基础上,针对著名的基于内容的CBCB路由,通过考虑代理邻居间关系,提出了簇首代理网络中的代理遍历路由算法,实验结果表明:考虑代理邻居间关系的代理遍历算法,可有效地减少簇首代理网络由于遍历而带来的通信开销。
     (3)为限制簇首代理网络内部开销,考虑到客户订阅间的相关性,提出了带有源地址的基于边的覆盖合并精确路由算法,并进一步给出了Chord环簇首与簇内代理的基本算法,算法可以减少传统的Chord环覆盖路由中的订阅重复传播的问题。同时,为适应Chord环的动态变化,采用数据代理的方法,对Chord环进行维护。研究表明:利用上述方法一方面可有效地减少网络内订阅的传播数量,另一方面也使得Chord维护开销更低。
     (4)研究并讨论了基于Chord环的簇内和簇间移动性问题,提出了基于Chord环的簇内移动性支持算法以及簇间移动性支持算法,包括订阅路由、订阅取消路由算法等,并根据弱有效路由准则,证明了算法的正确性。实验表明:在移动情况下与标准算法和延时优化算法相比,在路由重构开销、网络负载等方面具有较好的表现。
With RFID network becoming hot in RFID applications,researchers proposed the middleware-based application framework which has been widely used in many fields, such as logistics,supply chain,retail,food,automatic train identification system and so on.
     Due to the simplicity of the early RFID applications,few researches paid attention to the structure,while most of the work focused on the RFID data acquisition as well as the manufacturing costs,including:low-cost tags,research and design of the readers, the tag collision,the reader collision,tag in a specific application environments,and the reliability of the data reading.
     Traditional RFID applications are mainly used in specific fields,and the application modes are mostly based on the data center,that is,labeled object data acquisition through reading equipment,then centralized storage and processing.How to associate RFID data with the existing application systems will be the focus point,thus, the middleware is considered to be a key method and technology in the RFID network.
     Recently,with its popularizing,RFID is going through the application changes from simplicity to complexity;from simple data-processing to event-oriented processing;from local applications to global applications;from the RFID combined with back-end single application systems to data sharing in a heterogeneous environment,and so on.These changes bring new challenges to the RFID data management and system" architecture,and demand a new generation of RFID application framework which can process data events with the following characteristics: RFID data tense,dynamic and relevant,the data flow and the mass data,redundancy and error,as well as data sharing in heterogeneous network.
     In order to meet the needs of the new generation of RFID network applications, this paper presents a complex event-oriented processing RFID network architecture for the universal application environment,and makes an intensive investigation about the key theories and methods.The main work includes as follows:
     (1) Pub/Sub system is combined with the RFID complex event processing,and a hierarchical RFID network structure based on Pub/Sub System is proposed,as well as some key descriptions and definitions about the RFID network are given,including the formal description of the RFID network,matching,routing,and so on.The key components about RFID network - the structure and main function of the broker are also discussed.
     (2) Considering the load and scalability of the RFID network in conditions of massive data,a hierarchical structure and model of the RFID network based on the complex network and the structuring P2P is put forward.On this basis,for the well-known content-based routing CBCB,considering the relationship between the broker neighbors,a broker traversal routing algorithm in a network of cluster-head broker is proposed,and results show that:the broker traversal algorithm considering the relationship between broker neighbors can effectively reduce communication overhead brought by the traversal in the network of cluster-head broker.
     (3) For the restrictions of network overhead on cluster-head broker network, considering the dependency of the client subscription,this paper proposes a edge-based precisely cover routing algorithm combined with the source address,and further gives the basic algorithm about cluster-head broker and broker in the cluster,which can reduce the repeated spread of subscribers in the traditional Chord ring coverage route. At the same time,in order to adapt to the dynamic changes of the Chord ring,a data proxy approach is used in Chord ring maintenance.Research shows that:on one hand, these methods can be effective in reducing the number of subscribers spreading in the network;on the other hand,they can also reduce the Chord ring maintenance costs.
     (4) This paper studies and discusses problems about mobility of intra-cluster and inter-cluster based on the Chord ring,and proposes algorithms which can support the mobility for botfi the intra-cluster and inter-cluster based on the Chord ring,including the subscription route algorithm,subscription to the abolition of the route algorithm and so on.This paper also proves the correctness of the algorithms based on weak efficient routing criteria.Experiments show that in comparing with the standard and delay optimization algorithms in route reconstructing expenses,and network load,the algorithms have better performance when in the situation of mobile clients.
引文
[1]Nath B,Reynolds F,Want R.RFID technology and applications [J].IEEE Pervasive Computing,2006,5(1):22-24.
    [2]Lee Y,Cheng F.A quantitative view on how RFID will improve a supply chain [R].USA:IBM Research Center,2005.
    [3]Fuhrer P,Guinard D.Building a smart hospital using RFID technologies [A].Proceedings of 1st European Conference on eHealth[C].Switzerland:Fribourg,2006.131-142.
    [4]Derakhshan R,Orlowska M.RFID data management:challenges and opportunities [A].Proceedings of IEEE 1st International Conference on RFID[C].New York:ACM Press,2007.175-182.
    [5]Masciari E.RFID data management for effective objects tracking [A].Proceedings of the 2007 ACM Symposium on Applied computing[C].New York:ACM Press,2007.457-461.
    [6]Floerkemeier C,Lampe M.RFID middleware design:addressing application requirements and RFID constraints [A].Proceedings of the 2005 Joint Conference on Smart Objects and Ambient IntelligencefC].New York:ACM Press,2005.219-224.
    [7]Wang F S,Liu P Y.Temporal management of RFID data [A].Proceedings of the 31st VLDB Conference[C].Berlin:VLDB Endowment,2005.1128-1139.
    [8]Yang D Y,Zou P.Event driven RFID reader for warehouse management [A].Proceedings of the 6th International Conference on Parallel and Distributed Computing Applications and Technologies[C].USA:IEEE Computer Science,2005.895-899.
    [9]Dong L,Wang D,Sheng H Y Design of RFID middleware based on complex event processing [A].Proceedings of IEEE conference on Cybernetics and Intelligent Systems[C].New York:ACM Press,2006.1-6.
    [10]Moon M,Kim Y,Yeom K.Contextual events frameworks in RFID system [A].Proceedings of the 3rd International Conference on Information Technology:New Generations[C].USA:IEEE Computer Society,2006.586-587.
    [11]EPCGlobal Standard.Low level reader protocol,version 1.0 [EB/OL].http://www.epcglobalinc.org/standards/llrp/llrp_l_0-standard-20070412.pdf,2006.
    [12]Microsoft.Biztalk user manual [EB/OL].http://msdn.microsoft.com/en-us/biztalk/default.aspx,2006.
    [13]Paton N W,Campin J,Williams M H.Formal specification of active database functionality:a survey [EB/OL].http://www.cs.man.ac.uk/~norm/papers/active.ps,1995.
    [14]Gyllstrom D,Wu E,Chae H J.SASE:complex event processing over streams [A].Proceedings of the 3rd Biennial Conference on Innovative Data Systems Research[C].New York:ACM Press,2007.108-119.
    [15]Diao Y,Immerman N,Gyllstrom D.Sase+:an agile language for kleene closure over event streams[R].Amherst:University of Massachusetts,2007.
    [16]Brenna L,Demers A.Cayuga:a high-performance event processing engine [A].Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data[C].New York:ACM Press,2007.1100-1102.
    [17]Garg V.Estream:an integration of event and stream processing [D].USA:University of Texas at Arlington,2005.
    [18]McCaffery D,Finney J.Low latency optimization of content based publish subscribe for real-time mobile gaming applications [A].Proceedings of the 25th IEEE International Conference on Distributed Computing Systems WorkshopsfC].New York:ACM Press,2005.438-443.
    [19]OKI B,Pfluegl M,Siegel A.The information bus:architecture for extensible distributed systems [J].ACM SIGOPS Operating Systems Review,1993,27(5):8-68.
    [20]Yan T W,Garcia-molina H.The SIFT information dissemination system [J].ACM Transactions on Database Systems,1999,24(4):529-565.
    [21]IBM Red Book.Internet application development with MQSeries and Java [EB/OL].http://www.redbooks.ibm.com/redbooks/ SG244896.html,1997.
    [22]Baldoni R,Virgillito A.Distributed event routing in publish/subscribe communication systems:a survey [EB/OL].http://www.dis.uniromal.it/~midlab/artic oli/BV.pdf,2005.
    [23]Aguilera M K,Strom R E,Sturman D C.Matching events in a content-based subscription system [A].Proceedings of the 18th ACM Symposium on Principles of Distributed Computing[C].New York:ACM Press,1999.53-61.
    [24]Cao F Y,Singh J P.Efficient event routing in content-based publish/subscribe service network [A].Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies[C].USA:IEEE INFOCOM,2004.929-940.
    [25]Segall B,Arnold D,Boot J.Content based routing with elvin4 [EB/OL].http://elvin.dstc.edu.au/doc/papers/auug2k/ auug2k.pdf,2000.
    [26]Gough K J,Smith G Efficient recognition of events in distributed systems [A].Proceedings of the 18 th Australasian Computer Science Conference[C].Adelaide:IEEE Computer Society,1995.189-197.
    [27]Carzaniga A,Rosenblum D S,Wolf A L.Design and evaluation of a wide-area event notification service [J].ACM Trans,on Computer Systems,2001,19(3):332-383.
    [28]Cugola G,Nitto E D,Fuggetta A.The JEDI event-based infrastructure and its application to the development of the OPSS WFMS [J].IEEE Trans,on Software Engineering,2001,27(9):827-850.
    [29]Pietzuch P R.Hermes:a scalable event-based middleware [D].England:University of Cambridge,2004.
    [30]Indiana University.The NaradaBrokering project [EB/OL].http://www.naradabrokering.org/,2008.
    [31]Mühl G Large-Scale content-based publish/subscribe systems [D].Germany:Darmstadt University of Technology,2002.
    [32]Wang C,Carzaniga A,Evans D.Security issues and requirements for Internet-scale publish-subscribe systems [A].Proceedings of the 35th Hawaii International Conference on System Sciences[C].Washington:IEEE Computer Society,2002.303-310.
    [33]Miklos Z.Towards an access control mechanism for wide-area publish/subscribe systems [A].Proceedings of the 22nd International Conference on Distributed Computing Systems, Workshops[C].Washington:IEEE Computer Society,2002.516-524.
    [34]Belokosztolszki A,Eyers D M,Pietzuch P R.Role-based access control for publish/subscribe middleware architectures [A].Proceedings of the 2nd International Workshop on Distributed Event-Based SystemsfC].New York:ACM Press,2003.1-8.
    [35]Fiege L,Zeidler A,Buchmann A.Security aspects in publish/subscribe systems [A].Proceedings of the 3rd International Workshop on Distributed Event-Based Systems[C].Edinburgh:IEEE Computer Society,2004.44-49.
    [36]Rowstron A,Kermarrec A M,Castro M.SCRIBE:the design of a large-scale event notification infrastructure [A].Proceedings of the 3rd International Workshop on Networked Group Communication[C].London:Springer-Verlag,2001.30-43.
    [37]Zhuang S Q,Zhao B Y,Joseph A D.Bayeux:an architecture for scalable and fault-tolerant wide-area data dissemination [A].Proceedings of the 11th NOSSDAV[C].New York:ACM Press,2001.11-20.
    [38]Tam D,Azimi R,Jacobsen H A.Building content-based publish/subscribe systems with distributed hash tables [A].Proceedings of the 1st International Workshop on Databases,Information Systems and Peer-to-Peer Computing[C].Berlin:Springer-Verlag,2003.138-152.
    [39]Yang X Y,Zhu Y W,Hu Y M.Scalable content-based publish/subscribe services over structured peer-to-peer networks [A].Proceedings of the 15th Euromicro International Conference on Parallel,Distributed and Network-Based Processing[C].USA:IEEE Computer Society,2007.171-178.
    [40]Gupta A,Sahin O D,Agrawal D.Meghdoot:content-based publish/subscribe over P2P networks [A].Proceedings of the 5th ACM/IFIP/USENIX International Conference on Middleware[C].Toroto:Springer-Verlag,2004.254-273.
    [41]Bacon J,Moody K,Bates J.Generic support for distributed applications [J].IEEE Computer,2000,33(3):68-76.
    [42]Caporuscio M,Carzaniga A,Wolf A L.Design and evaluation of a support service for mobile,wireless publish/subscribe applications [J].IEEE Trans,on Software Engineering,2003,29(12):1059-1071.
    [43]Zeidler.A distributed publish/subscribe notification service for pervasive environments [D].Germany:Damastadt University of Technology,2004.
    [44]Fiege L,Gartner F C,Kasten O.Supporting mobility in content-based publish/subscribe middleware [A].Proceedings of the 4th ACM/IFIP/USENDC International Middleware Conference[C].Berlin:Springer-Verlag,2003.103-122.
    [45]Podnar I.Service architecture for content dissemination to mobile users [D].Zagreb:University of Zagreb,2004.
    [46]Yoneki E,Bacon J.Pronto:mobile gateway with publish-subscribe paradigm over wireless network [R].Cambridge:University of Cambridge,2003.
    [47]Buchmann A,Bornhovd C,Cilia M.DREAM:distributed reliable event-based application management [M].London:Springer-Verlag,2004.319-352.
    [48]Petrovic M,Burcea I,Jacobsen H A.S-ToPSS:semantic toronto publish/subscribe system [A].Proceedings of the 29th International Conference on Very Large Databases[C].Berlin: Morgan Kaufmann Publishers,2003.1101-1104.
    [49]Wang J L,Jin B H,Li J.An ontology-based publish/subscribe system [A].Proceedings of the 5th ACM/IFIP/USENIX International Conference on Middleware[C].Toronto:Springer-Verlag,2004.232-253.
    [50]Cugola G,Picco G P,Murphy A L.Towards dynamic reconfiguration of distributed publish-subscribe middleware [A].Proceedings of the 3rd International Workshop on Software Engineering and Middleware[C].Orlanda:Springer-Verlag,2002.187-202.
    [51]Costa P,Migliavacca M,Picco G P.Epidemic algorithms for reliable content-based publish-subscribe:an evaluation [A].Proceedings of the ICDCS 2004[C].Tokyo:IEEE Computer Society,2004.552-561.
    [52]Bhola S.Topology changes in a reliable publish/subscribe system [R].Yorktown Heights:IBM Watson Research Center,2004.
    [53]Bhola S,Strom R,Bagchi S.Exactly-once delivery in a content-based publish-subscribe system [A].Proceedings of the International Conference on Dependable Systems and Networks[C].Bethesda:IEEE Computer Society,2002.7-16.
    [54]Banavar G,Chandra T,Mukherjee B.An efficient multicast protocol for content-based publish-subscribe system [A].Proceedings of the 19th IEEE International Conference on Distributed Computing Systems[C].New York:ACM Press,1999.262-272.
    [55]Carzaniga A,Wolf A L.Content-based networking:a new communication infrastructure [A].Developing an Infrastructure for Mobile and Wireless Systems[C].Berlin:LNCS,2002.59-68.
    [56]Mühl G,Fiege L,Buchmann A.Filter similarities in content-based publish/subscribe systems [A].Proceedings of the IEEE International Conference on Architecture of Computing Systems[C].USA:ACM Press,2002.224-238.
    [57]Mühl G Generic constraints for content-based publish/subscribe [A].Proceedings of the 6th International Conference on Cooperative Information Systems[C].Trento:LNCS,2001.211-225.
    [58]Pereira J,Fabret F,Llirbat F.Efficient matching for web-based publish/subscribe systems [A].Proceedings of the 7th International Conference on Cooperative Information Systems[C].London:Springer-Verlag,2000.162-173.
    [59]Muthusamy V,Petrovic M,Jacobsen H.Effects of routing computations in content-based routing networks with mobile data sources [A].Proceedings of the 11th Annual International Conference on Mobile Computing and Networking[C].New York:ACM Press,2005.103-116.
    [60]Burcea I,Jacobsen H A.Disconnected operation in publish/subscribe middleware [A].Proceedings of 2004 IEEE International Conference on Mobile Data Management[C].Berlin:LNCS,2004.39-50.
    [61]Caporuscio M,Carzaniga A,Wolf A L.An experiences in evaluating publish/subscribe services in a wireless network [A].Proceedings of the 3rd International Workshop on Software and PerformancefC].New York:ACM Press,2002.128-133.
    [62]Hoag J,Thompson C.Architecting RFID middleware [J].IEEE Internet Computing,2006,5(10):88-92.
    [63]Cheong T,Kim Y,Lee Y.REMS and RBPTS:ALE-compliant RFID middleware software platform[EB/OL].http://ieeexplore.ieee.org/ie15/10826/34120/01625667.pdf?tp=&isnum ber=&arnumber=1625667,2006.
    [64]Pan Y L,Lee Y C,Wu E Job scheduling of savant for grid computing on RFID EPC network[A].Proceedings of the 2005 IEEE International Conference on Services Computing[C].USA:IEEE Computer Society,2005.75-84.
    [65]Chawathe S S,Krishnamurthy V,Ramachandran S.Managing RFID data[A].Proceedings of the 30th International Conference on Very Large Data Bases[C].Berlin:VLDB Endowment,2004.1189-1195.
    [66]Engels D W,Sarma S E.The reader collision problem[EB/OL].http://www.autoidcenter.Org/research/MIT-AUTOID-WH-007.pdf,2002.
    [67]Lee H,Kim K.A secure RFID reader protocol based on SLRRP[EB/OL].http://caislab.icu.ac.kr/Paper/paper_files/2007/SCI S2007_tAnk.pdf.2007.
    [68]Waldrop J,Engels D W,Sarma S E.Colorwave:an anti-collision algorithm for the reader collision problem[A].Proceedings of the 2003 IEEE Wireless Communications and Networking Conference[C].New York:ACM Press,2003.1206-1210.
    [69]Fabret F,Jacobsen H A,Llirbat E Filtering algorithms and implementation for very fast publish/subscribe systems[A].Proceedings ofACM SIGMOD[C].New York:ACM Press,2001.115-126.
    [70]Sarma A D,Jeffery S R,Franklin M.Estimating data stream quality for object-detection application[R].Berkeley:Electrical Engineering and Computer Sciences University of California,2005.
    [71]Jeffery S R,Alonso G,Franklin M J.Declarative support for sensor data cleaning[M].Heidelberg:Springer Berlin,2006.83-100.
    [72]Gonzalez H,Han J,Klabjan D.Warehousing and analyzing massive RFID data sets[A].Proceedings of the 22nd International Conference on Data Engineering[C].USA:IEEE Computer Society,2006.83.
    [73]Yoneki E,Bacon J.Unified semantics for event correlation over time and space in hybrid network environments[A].Proceedings of the IFIP International Conference on Cooperative Information Systems[C].New York:ACM Press,2005.366-384.
    [74]臧传真,范玉顺.基丁智能物件的制造企业复杂事件处理研究[J].计算机集成制造系统,2007,11(13):2243-2253.
    [75]Wang F,Liu S,Liu P.Bridging physical and virtual worlds:complex event processing for RFID data streams[A].Proceedings of the 10th International Conference on EDBT[C].Heidelberg:Springer Berlin,2006.588-607.
    [76]Walzer K,Schill A,L6ser A.Temporal constraints for rule-based event processing[A].Proceedings of the ACM 1st Ph.D.Workshop in CIKM[C].New York:ACM Press,2007.93-100.
    [77]Kim Y,Park J S.Study of RFID middleware framework for ubiquitous computing environment[EB/OL].http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1462903,2005.
    [78]Sun Technical White Paper.The Sun EPC network architecture[R].Santa Clara:Sunmicro Systems,2004.
    [79]Oracle White Paper.Oracle sensor-based service [EB/OL].http://www.oracle.com/technologies/rfid/,2005.
    [80]IBM Red Paper.IBM websphere RFID handbook-a solution guide [EB/OL].www.ibm.com/redbooks,2005.
    [81]Sybase White Paper.Sybase RFID middleware architecture [EB/OL].http://www.sybase.com/rfid/,2004.
    [82]Cisco White Paper.Cisco RFID solution overview [EB/OL].http://www.cisco.com/web/ strategy /retail/RFID.html,2005.
    [83]Cisco White Paper.Cisco application-oriented networking facilitates intelligent radio frequency identification processing at the edge [EB/OL].http://www.cisco.com/ web/strategy /retail/RFID.html,2004.
    [84]SAP White Paper.SAP RFID technology [EB/OL].http://www.sap.com/solutions/business-suite/scm/rfid/index.epx,2005.
    [85]Palmer M.Seven principles of effective RFID data management [EB/OL].http://www.progress.com.mx/realtime/docs/articles/,2004.
    [86]Jeffery S R,Franklin M J,Garofalakis M.An adaptive RFID middleware for supporting metaphysical data independence [J].The International Journal on Very Large Data Base,2008,17(2):265-289.
    [87]Altinel M,Franklin M J.Efficient filtering of XML documents for selective dissemination of information [A].Proceedings of VLDB Conference[C].USA:Morgan Kaufmann Publishers Inc.,2000.53-64.
    [88]Diao Y,Fischer P,Franklin M.YFilter:efficient and scalable filtering of XML documents [A].Proceedings of the 18th International Conference on Data Engineering[C].USA:IEEE Computer Society,2002.341.
    [89]Wu E,Diao Y.High-performance complex event processing over streams [A].Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data[C].New York:ACM Press,2006.407-418.
    [90]蔡泽名,张均合,吴钦诚.事件导向架构之研究现况与应用发展[EB/OL].http://www.mee.chu.edu.tw/labweb/CREDIT2005/paperdir/P0178.pdf,2005.
    [91]Faloutsos M,Faloutsos P,Faloutsos C.On power-law relationships of the internet topology [A].Proceedings of the Conference on Applications,Technologies,Architectures,and Protocols for Computer Communication[C].New York:ACM Press,1999.251-266.
    [92]Rowstron A T,Druschel P.Pastry:scalable,decentralized object location,and routing for large-scale peer-to-peer systems [A].Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg[C].London:Springer-Verlag,2001.329-350.
    [93]Zhao B,Kubiatowicz J,Joseph A.Tapestry:an infrastructure for fault-tolerant wide-area location and routing [R].USA:University of California at Berkeley,2001.
    [94]Stoica I,Morris R,Karger D.Chord:a scalable peer-to-peer lookup service for internet applications [A].Proceedings of the 2001 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications[C].New York:ACM Press, 2001.149-160
    [95]Ratnasamy S,Francis P,Handley M.A scalable content-addressable network[A].Proceedings of the 2001 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications[C].New York:ACM Press,2001.161-172.
    [96]Aberer K.P-grid:a self-organizing access structure for p2p information systems[A].Proceedings of the 6th International Conference on Cooperative Information Systems[C].Heidelberg:Springer Berlin,2001.179-194.
    [97]Castro M,Druschel P,Kermarrec A M.SCRIBE:a large-scale and decentralized application-level multicast infrastructure[J].IEEE Journal on Selected Areas in Communications,2002,20(8):100-110.
    [98]Terpstra W W,Behnel S,Fiege L.Peer-to-peer approaches to content-based publish/subscribe[A].Proceedings of the 2nd International Workshop on Distributed Event-Based Systems[C].New York:ACM Press,2003.1-8.
    [99]苏羽.传感器网络中的无尺度路由问题[D].沈阳:东北大学,2005.
    [100]李勇,李伟,韦洛霞.AD HOC网络的复杂网络视图[EB/OL].http://www.cqvip.com/qk/98390x/200601/21088935.html,2006.
    [101]李勇.复杂网络理论与应刚研究[D].广州:华南理工大学,2005.
    [102]Janson S,Luczak T,Rucinski A.Random graphs[M].New York:Academic Press,1999.
    [103]Janson S,Knuth D E,Luczak T.Random structures and algorithms[M].USA:John Wiley & Sons,Inc.,2005.
    [104]Cancho R F,Sole R V.The small-world of human language[J].Biological Sciences,2001,268(1482):2261-2266.
    [105]Watts D J.Small worlds:the dynamics of networks between order and randomness[M].Princeton:Princeton University Press,1999.
    [106]Barrat A,Weigt M.On the properties of small world networks[J].The European Physical Journal B - Condensed Matter and Complex Systems,2000,13(3):547-560.
    [107]Newman M E J.Models of the small world[J].Journal of Statistical Physics,2000,101(3/4):819-841.
    [108]Barthelemy M,Amaral A N.Small world networks:evidence for a crossover picture[J].Physical Review Letters,1999,82(15):3180-3183.
    [109]Ohio State University.Tutorial:working with J-Sim[EB/OL].http://www.j-sim.org/tutorial/jsim_tutorial.html,2003.
    [110]Li G L,Hou S,Jacobsen H A.A unified approach to routing,covering and merging in publish/subscribe systems based on modified binary decision diagrams[A].Proceedings of the 25th IEEE International Conference on Distributed Computing Systems[C].USA:IEEE Computer Society,2005.447-457.
    [111]IBM.Gryphon:publish/subscribe over public networks[EB/OL].http://www.research.ibm.com/gryphon/papers/Gryphon-Overview.pdf.2001.
    [112]Cugola G,Nitto E D,Fuggetta A.Exploiting an event-based infrastructure to develop complex distributed systems[A].Proceedings of the 20th International Conference on Software Engineering[C].USA:IEEE Computer Society,1998.261-270.
    [113]苑洪亮,史殿习,王怀民.内容发布订阅中支持订阅覆盖的路由算法研究[J].计算 机学报,2006,29(10):1804-1812.
    [114]汪锦岭,金蓓弘,李京.结构化P2P网络上可靠的基于内容路由协议[J].软件学报,2006,17(5):1107-1114.
    [115]Carzaniga A,Wolf A L.Forwarding in a content-based network[A].Proceedings of the 2003 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications[C].New York:ACM Press,2003.163-174.
    [116]Caporuscio M,Carzaniga A,Wolf A L.An experience in evaluating publish/subscribe services in a wireless network[A].Proceedings of the 3rd International Workshop on Software and Performance[C].New York:ACM Press,2002.128-133.
    [117]Carzaniga A,Rutherford M J,Wolf A L.A routing scheme for content-based networking[R].USA:University of Colorado,2003.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700