In this paper, two Translation Memory (TM) sharing models adopted in XMCAT, a Computer Assisted Translation tool (CAT) supporting cooperated work in machine translation, was described in detail. One is Center-based TM...
详细信息
ISBN:
(纸本)9781424409624
In this paper, two Translation Memory (TM) sharing models adopted in XMCAT, a Computer Assisted Translation tool (CAT) supporting cooperated work in machine translation, was described in detail. One is Center-based TM sharing model, which is only fit for users in a local area network (LAN) and the other is a novel model called P2P-based TM sharing model, which could be used through Internet by geographically distributed users. Withthe two TM sharing models, a user may share data with other users through network, so that he/she may reduce the repeated work further and cooperate with others more easily. Besides, the methods used in XMCA T to deal withthe problem of multi-translations arose in the cooperated memory sharing models, were also proposed in this paper. XMCAT system has been adopted and approved by some translation companies.
the Grid represents an emerging class of highly complex distributed systems that aims to realize the full potential of the Web services computational and architectural models. Blueprints and recipes for building Grids...
详细信息
ISBN:
(纸本)076952530X
the Grid represents an emerging class of highly complex distributed systems that aims to realize the full potential of the Web services computational and architectural models. Blueprints and recipes for building Grids do not as of yet exist. We present a Grid architectural style, and describe how it has been designed, and its relationships with other key elements of distributed systems.
We propose a novel anonymity quantification method for privacy protection in pervasive computing environments. Its main feature is that it can quantitatively control anonymity by a single value (disclosure threshold v...
详细信息
ISBN:
(纸本)0769524664
We propose a novel anonymity quantification method for privacy protection in pervasive computing environments. Its main feature is that it can quantitatively control anonymity by a single value (disclosure threshold value) using a classification algorithm of the decision tree. the value is not affected by the user set size or the contents of private information. this property was confirmed by evaluation using sample databases. In order to decide the disclosure threshold value for controlling anonymity, we established a model of privacy information disclosure that achieves a balance (equilibrium point) between users' privacy protection requirements and service providers' disclosure requirements. Applying web questionnaire data to this model, we found the equilibrium point for each service.
this paper presents a proposal to facilitate the use of the annotated web as corpus by alleviating the annotation bottleneck for corpus data drawn from the web. We describe a framework for large-scale distributed corp...
the combined and separated research advancement in the fields of sensing, communication, and computing have driven the research efforts in wireless sensor networks (WSN) in recent years. According to the traditional d...
详细信息
A new token-passing algorithm called AR-TP for avoiding the non-determinism of some networking technologies is presented. this protocol-based on RT-EP, a research protocol also based on transmission control techniques...
详细信息
ISBN:
(纸本)3540346635
A new token-passing algorithm called AR-TP for avoiding the non-determinism of some networking technologies is presented. this protocol-based on RT-EP, a research protocol also based on transmission control techniques-allows the schedulability analysis of the network, enabling the use of standard Ethernet hardware for Hard Real-Time behavior while adding congestion management. It is specially designed for High-Integrity distributed Hard Real-Time Systems, being fully written in Ada and taking advantage of some of the new Ada 2005 features, like the Ravenscar Profile.
the efforts of EuroSys, the professional society for European systems community, towards researching distributed systems, are discussed. As far as publishing about distributed systems is concerned European are way beh...
详细信息
the efforts of EuroSys, the professional society for European systems community, towards researching distributed systems, are discussed. As far as publishing about distributed systems is concerned European are way behind the US. the Symposium on Operating Systems Design and Implementation, ACM Transactions on Computer Systems, and the ACM Symposium on Operating Systems Principles rank 1st, 8th, and 11th on the CiteSeer impact list. the ACM sigops European workshop is 216th, the internationalconference on distributedcomputing Systems is 217th, the international Symposium on Fault-Tolerant computing is 270th, and the European conference on Parrallel PRocessing is 491st. Researchers are trying to change the system from within by creating the Euro Sys professional society, holding workshops, launching the EuroSys conference series, networking and exchanging information, and so on.
Proliferation of distributedcomputing platforms, in both small and large scales, and mobile applications makes it important to protect remote hosts (servers) from mobile applications and mobile applications from remo...
详细信息
ISBN:
(纸本)3540346635
Proliferation of distributedcomputing platforms, in both small and large scales, and mobile applications makes it important to protect remote hosts (servers) from mobile applications and mobile applications from remote hosts. this paper proposes and evaluates a solution to the latter problem for applications based on linear computations that involve scalar as well as array arithmetic. We demonstrate that, for certain classes of applications, it is possible to use an optimizing compiler to automatically transform code structure and data layout so that an application can safely be executed on an untrusted remote host without being reverse engineered.
In this paper, we describe an efficient coordinated checkpointing and recovery algorithm which can work even when the channels are assumed to be non-FIFO, and messages may be lost. Nodes are assumed to be autonomous, ...
详细信息
Continuous range monitoring on moving objects has been increasingly important in mobile environments. Withthe computational power and memory capacity on the mobile side, the distributed processing could relieve the s...
详细信息
ISBN:
(纸本)3540333371
Continuous range monitoring on moving objects has been increasingly important in mobile environments. Withthe computational power and memory capacity on the mobile side, the distributed processing could relieve the server from high workload and provide real-time results. the existing distributed approaches typically partition the space into subspaces and associate the monitoring regions withthose subspaces. However, the spatial irrelevance of the subspaces and the monitoring regions incurs the redundant processing as well as the extra communication cost. In this paper, we propose continuous expansion (CEM), a novel approach for efficient processing of continuous range monitoring in mobile environments. Considering the concurrent execution of multiple continuous range queries, CEM abstracts the dynamic relations between the movement of objects and the change of query answers, and introduces the concept of query view. the query answers are affected if and only if there are objects changing their current query views, which lead to the minimum transmission cost on the moving object side. CEM eliminates the redundant processing by handling the updates only from the objects that potentially change the answers. the experimental results show that CEM achieves the good performance in terms of server load and communication cost.
暂无评论