Application Server (application + server)

Distribution by Scientific Domains


Selected Abstracts


Mobile-initiated network-executed SIP-based handover in IMS over heterogeneous accesses

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, Issue 9-10 2010
Wei-Kuo Chiang
Abstract The services of next generation networks are envisioned to be potentially capable of seamless mobility in spite of the heterogeneity in underlying access technologies. It is undoubted that to accomplish seamless services across heterogeneous networking environments gets harder in case of simultaneous mobility. In this article, we propose a mobile-initiated network-executed (MINE) session initial protocol (SIP)-based handover mechanism to facilitate simultaneous mobility in IP multimedia subsystem over heterogeneous accesses. The novelty of the proposed approach is that no changes are required to the existing network infrastructure since handover decision is fully made by the mobile host (MH) and handover execution is performed by a new-added application server called mobility server (MS). When the MH decides to initiate a handover and obtains a new IP address, it will send a SIP Publish message to trigger the MS to carry out the handover execution. With the network-executed design of the MINE, the MS can perform third-party registration for security re-association and third-party call control for session re-establishment in parallel. Moreover, the Master,Slave Determination procedures derived from H.245 are used in the MS to handle fairly the racing conditions resulting from simultaneous mobility such that redundant message flows are eliminated. Mathematical analyses present that the MINE can shorten the handover latency and reduce power consumption, as observed from a comparison with the integrated solution of an optimized macro-mobility mechanism and a receiver-side simultaneous mobility approach. Copyright © 2010 John Wiley & Sons, Ltd. [source]


Mining temporal rules for software maintenance

JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION: RESEARCH AND PRACTICE, Issue 4 2008
David Lo
Abstract Software evolution incurs difficulties in program comprehension and software verification, and hence it increases the cost of software maintenance. In this study, we propose a novel technique to mine from program execution traces a sound and complete set of statistically significant temporal rules of arbitrary lengths. The extracted temporal rules reveal invariants that the program observes, and will consequently guide developers to understand the program behaviors, and facilitate all downstream applications such as verification and debugging. Different from previous studies that were restricted to mining two-event rules (e.g., ,lock,,,unlock,), our algorithm discovers rules of arbitrary lengths. In order to facilitate downstream applications, we represent the mined rules as temporal logic expressions, so that existing model checkers or other formal analysis toolkit can readily consume our mining results. Performance studies on benchmark data sets and a case study on an industrial system have been performed to show the scalability and utility of our approach. We performed case studies on JBoss application server and a buggy concurrent versions system application, and the result clearly demonstrates the usefulness of our technique in recovering underlying program designs and detecting bugs. Copyright © 2008 John Wiley & Sons, Ltd. [source]


A component-based approach to online software evolution

JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION: RESEARCH AND PRACTICE, Issue 3 2006
Qianxiang Wang
Abstract Many software systems need to provide services continuously and uninterruptedly. Meanwhile, these software systems need to keep evolving continuously to fix bugs, add functions, improve algorithms, adapt to new running environments and platforms, or prevent potential problems. This situation makes online evolution an important issue in the field of software maintenance and evolution. This paper proposes a component-based approach to online software evolution. Nowadays component technology has been widely adopted. Component technology facilitates software evolution, but also introduces some new issues. In our approach, an application server is used to evolve the application, without special support from the compiler or operating system. The implementation and performance analysis of our approach are also covered. Copyright © 2006 John Wiley & Sons, Ltd. [source]


Service control for next-generation applications in wireless IP multimedia networks

BELL LABS TECHNICAL JOURNAL, Issue 1 2003
Lynell E. Cannell
Within the 3rd Generation Partnership Project (3GPP), the thrust of the session initiation protocol (SIP)-based Internet protocol (IP) multimedia subsystem (IMS) is envisaged to allow a swift progression towards the provision of multimedia applications for increasingly demanding end users. The paradigm of service programmability using open network application programming interfaces (APIs), with open service access (OSA) as its main exponent, is helping to drive this development together with the use of SIP. The focal point of this paper will be the multimedia services architecture in the IMS by providing details of the interaction of the IMS and the application servers in the form of the OSA gateway and the SIP application server. The paper aims to assess the value of the IMS service control (ISC) interface on application server interaction in the IMS. The paper will provide an OSA application use case, and will also present the presence server as an example of a SIP application server that fits in with the IMS. © 2003 Lucent Technologies Inc. [source]