The dynamics of a distributed team today are of particular importance in times of pandemics and wars. The behavioural model of the team and its dynamics throughout the life cycle of the project are considered. The app...
详细信息
distributed in-memory key-value stores (KVSs), such as Redis and Memcached, are widely deployed in modern data centers. In Redis, the throughput of Murmurhash2 is important to the performance of the whole KVS, and fur...
详细信息
The emergence of malicious codes has increased exponentially due to the spread of malicious code creation tools with the development of the network, but there are limitations in response through the existing malicious...
详细信息
ISBN:
(纸本)9781665418430
The emergence of malicious codes has increased exponentially due to the spread of malicious code creation tools with the development of the network, but there are limitations in response through the existing malicious code detection methods. In accordance with this situation, machine learning-based malicious code detection methods are developing, and in this paper, features are extracted by statically analyzing PE files for machine learning-based malicious code detection, and then malicious codes are detected through autoencoder. Research on how to extract features that represent better features is underway. This paper extracts 549 features consisting of information such as DLL/API that can be checked from PE files that are commonly used in malicious code analysis and compresses the data by storing data through SAE (stacked AutoEncoder) among autoencoders. Was extracted to prove that it is very effective in providing excellent accuracy and shortening processing time.
We propose a distributed backup resource allocation scheme to enhance the reliability of mobile edge computing (MEC) services in a Fiber-Wireless (FiWi) access network. An Integer Linear Programming (ILP) model is dev...
详细信息
Prior studies have established the performance impact of coherence protocols optimized for specific patterns of shared-data accesses in Non-Uniform-Memory-Architecture (NUMA) systems. First, this work incorporates a d...
详细信息
ISBN:
(纸本)9781479959754
Prior studies have established the performance impact of coherence protocols optimized for specific patterns of shared-data accesses in Non-Uniform-Memory-Architecture (NUMA) systems. First, this work incorporates a directorybased protocol into the runtime system of X10-a PartitionedGlobal- Address-Space (PGAS) programming language-to manage read-mostly, producer-consumer, stencil, and migratory variables. This protocol complements the existing X10Protocol, which keeps a unique copy of a shared variable and relies on message transfers for all remote accesses. The X10Protocol is effective to manage accumulator, write-mostly and general read-write variables. Then, it introduces a new shared-variable access-pattern profiler that is used by a new coherence-policy manager to decide which protocol should be used for each shared variable. The profiler can be run in both offline and online modes. An evaluation on a 128-core distributed-memory machine reveals that coordination between these protocols does not degrade performance on any of the applications studied, and achieves speedup in the range of 15% to 40% over X10Protocol. The performance is also comparable to carefully hand-written versions of the applications.
Under the paradigm of Edge computing, the enormous data generated at the network edge can be processed locally. Machine learning methods are often adopted to make full utilization of these data, among which the deep l...
详细信息
In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenance...
详细信息
ISBN:
(纸本)9781424456192
In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these provenances is important and useful in various security areas such as computer auditing and safeguarding delegations. Based on the newly proposed logic, we define one type of authorization provenances. We exemplify the applications of these provenances by a case study.
Maintaining hand hygiene is the one of the most effective way to prevent the spread of germs during a pandemic. This paper focuses on encouraging people to use a hand sanitizer more frequently by applying the nudge th...
详细信息
ISBN:
(纸本)9781450386197
Maintaining hand hygiene is the one of the most effective way to prevent the spread of germs during a pandemic. This paper focuses on encouraging people to use a hand sanitizer more frequently by applying the nudge theory to improve hand hygiene behavior in private organizations. We propose a system that recognizes hand hygiene behavior using face recognition and detects hand sanitizer use. The system responds to the user's personal hand hygiene behavior with animation of a virtual bonsai as an interactive agent. To preserve user privacy, we implemented the system on an edge device and conducted experiments for 4 case studies in 2 real-world organizations. The results showed that the system improved the hand hygiene behavior of people in a private organization.
We have developed an interactive algorithm animation system for an electronic classroom. In order to design various protocols required by this system, we have proposed a two level client-server model. Using this model...
详细信息
暂无评论