Most system developers pay little attention toprogram business logic mightimpact on system performance in the database adjustment and optimization process. Based on summary of database optimization manners, they are d...
详细信息
Most system developers pay little attention toprogram business logic mightimpact on system performance in the database adjustment and optimization process. Based on summary of database optimization manners, they are divided intofive levels according tooptimization objects. The concept of logical optimization of program business was brought out. Itis indicated that the method can produce significant optimization effect similar toother methods. A practical example was given toillustrate optimal design method on program business logic in accordance with database. The operation result alsoproves that the proposed method can improve program performance significantly.
In this paper, we introduce a cooperative game model arising from bin covering problem, called bin covering game, and discuss the computational complexity issues on the core and the approximate core of the game. Makin...
详细信息
In this paper, we introduce a cooperative game model arising from bin covering problem, called bin covering game, and discuss the computational complexity issues on the core and the approximate core of the game. Making use of duality theorem of linear programming, a sufficient and necessary condition on core nonemptiness is proposed. When the core is empty, a lower bound on the minimum taxrate of the approxi-mate core is obtained. Furthermore, both problems of checking membership and testing nonemptiness for the core and the approximate core of a bin covering game are proved tobe NP-hard.
In cybercrime, the evaluation results of the weight of digital evidence are directly influencing the cognizance of the relevant case, further influencing the judgment of the case. Now, it lacks a universally accepted ...
详细信息
In cybercrime, the evaluation results of the weight of digital evidence are directly influencing the cognizance of the relevant case, further influencing the judgment of the case. Now, it lacks a universally accepted standard toevaluate the weight of digital evidence. Furthermore, the result of the evaluation will be easily influenced by experts. A system, which is based on Naive Bayesian Classification, of digital evidence evaluation is put forward in this paper. It can help normalize the evaluation process effectively and automatically, avoid manual intervention, and then provide reliable evaluation results for the judge's judgment.
Objects having social properties is a well explored field in Sociology and the idea has been introduced intothe field of Internet of Things(IoT) recently. In this paper, the authors analyze some social features of IoT...
详细信息
Objects having social properties is a well explored field in Sociology and the idea has been introduced intothe field of Internet of Things(IoT) recently. In this paper, the authors analyze some social features of IoT and propose a Sociologybased interaction relationship model between IoT objects. The relationship model, together with the automatic relationship recognition, can enhance the dynamics and the autonomy of communications in IoT. In the latter part of the paper, the authors give an experiment based on real data as a simple example toshow how the paper's idea reduces the dependency of IoT on human intervention and makes IoT objects more 'smart'.
Buchmann and Williams presented in 1988 a key exchange system based on the quadratic imaginary fields. In this paper, we introduce a key exchange protocol based on some imaginary biquadratic fields which is inspired b...
详细信息
Buchmann and Williams presented in 1988 a key exchange system based on the quadratic imaginary fields. In this paper, we introduce a key exchange protocol based on some imaginary biquadratic fields which is inspired by the Buchmann-Williams' method. We also give the theoretical method in order to generalize the Buchmann-Williams protocol to other fields extensions.
The effect of the business operation performance has a great influence on the growth and development of a corporation;therefore, the purpose of measuring the business operation performance is to understand whether the...
详细信息
There are strong demands to utilize multi-core computing resources effectively for large-scale and highly detailed multi-agent simulations. We have proposed a framework to assist parameter tuning process of multi-core...
详细信息
There are strong demands to utilize multi-core computing resources effectively for large-scale and highly detailed multi-agent simulations. We have proposed a framework to assist parameter tuning process of multi-core programming for simulation developers to utilize many parallel cores in their simulation programs efficiently. However, due to its massive computation costs, it is not easy task to seek the sufficient compilation and execution parameters and analyze their performance characteristics for various execution settings. In this paper, we present a preliminary analysis of parameter optimization based on BLMAB by utilizing our framework. We show how our BLMAB-based approach can effectively be used on the parameter optimization process.
Cloud computing is becoming a widely adopted paradigm for the provision of different types of ICT services. Building on a set of combined technologies, it enables service provision following on-demand usage patterns. ...
详细信息
Cloud computing is becoming a widely adopted paradigm for the provision of different types of ICT services. Building on a set of combined technologies, it enables service provision following on-demand usage patterns. Different vendors aim at addressing the needs of private and public large and small organizations. To this end, several solutions have been developed tackling varying service, platform and infrastructure needs. In this paper, we present the outcomes of our experimentation with respect to two open-source infrastructure-level solutions, namely OpenStack and Synnefo which have attracted the attention both of the research community and of the industrial one. The goal of our qualitative and quantitative survey and experimentation is to identify shortcomings and areas for improvement in the widely adopted OpenStack project.
We use public data from Twitter to study the breakups of the romantic relationships of 661 couples. Couples are identified through profile references such as @user1 writing "@user2 is the best boyfriend ever!!&qu...
详细信息
Data provenance is the lineage of a digital artifact or object. Its capture in workflow-controlled distributed applications is well studied but less is known about quality of provenance captured solely through existin...
详细信息
Data provenance is the lineage of a digital artifact or object. Its capture in workflow-controlled distributed applications is well studied but less is known about quality of provenance captured solely through existing control infrastructures (i.e., middleware frameworks used for high throughput computing). We study completeness of provenance in case where information is only available from the middleware layer. We use WorkQueue to validate our model. Our evaluation shows that provenance captured from a middleware framework is sufficient to represent the existence of output data and trace certain failures independent of the application semantics. We show the method's limitations as well.
暂无评论