Content management and protection are important features of emerging home network technologies. In this paper, we present the design of content protection for workplace client technology (CPWCT), a novel secure conten...
详细信息
Content management and protection are important features of emerging home network technologies. In this paper, we present the design of content protection for workplace client technology (CPWCT), a novel secure content management system. In CPWCT, devices in a home network are organized in a secure P2P cluster leveraging the xCP cluster protocol. Additionally, a P2P content management mechanism is implemented which includes lightweight secure streaming and RDF based capability-aware content indexing technologies. We show how this approach can significantly enhance the ability to dynamically self-reorganize the underlying topology and deploy context sensitive functionality
Summary form only given. High power microwave research requires multiple simulation codes to address physics at different space and time scales. Costs associated with purchase, maintenance and training become importan...
详细信息
Summary form only given. High power microwave research requires multiple simulation codes to address physics at different space and time scales. Costs associated with purchase, maintenance and training become important issues when a "toolbox" of codes is needed. Usability issues involving user interface consistency between codes and use of a research community's vocabulary and units are also of concern. Access to source code is of enormous benefit to research groups but is usually not possible within the present technical software market. Along withthese "usability" issues, the codes must provide state-of-the-art simulation power. Field Marshal is a simulation environment aimed at addressing the above issues for small research groups involved in electromagnetics design and analysis. Consistent user interface, single-geometry/multiple-tools and inclusion of legacy codes are project goals. A key objective is to construct the environment in such a way that it is usable, maintainable, and extensible by researchers who are not expert programmers. Four primary elements are necessary to cost-effectively achieve this: finite difference techniques, multigrid techniques, a modern scripting environment (e.g. Python), and Internet-based distributed development. the role each of these plays in the environment is outlined. the Field Marshal architecture and key components is described along withthe present state of the environment.
In this paper, a method to divide a large-scale logic program is proposed. the hierarchical structure of the given logic program can be found by using graph theory. An Illustrative example of elevator control program ...
详细信息
ISBN:
(纸本)9780780387300
In this paper, a method to divide a large-scale logic program is proposed. the hierarchical structure of the given logic program can be found by using graph theory. An Illustrative example of elevator control program is shown as application of the proposed theory.
Heap management is responsible for the allocation of heap segments to a running application. When the logic of the heap management is left to the application programmer, as it is the case withprogramming languages li...
详细信息
ISBN:
(纸本)0769521991
Heap management is responsible for the allocation of heap segments to a running application. When the logic of the heap management is left to the application programmer, as it is the case withprogramming languages like C and C++, a number of problems may arise. One kind of problems related to imperfect heap management is that of memory leaks, which happen when heap segments become inaccessible before they are deallocated. Closely related to that problem, from the standpoint of programmer's operations, is the problem of corrupted heap due to redundant attempts to deallocate the same heap segment that has been previously allocated. this paper present a method for detecting such flaws in heap management. Our method is based on traces collected during the execution of an application and their off-line analysis in order to determine the presence of memory leaks and redundant deallocations of the same heap segment. When our method is applied to component-based embedded software, it allows to locate the component that had allocated heap memory and did not deallocate it before exiting, as well as the components that are responsible for the redundant deallocation of heap segments.
the ARM (Application Response Measurement) standard provides a way to manage business transactions. By embedding simple calls to an agent supporting ARM an application can be managed for availability, service level ag...
详细信息
the objective of this paper is to introduce a method of gathering Java performance and modeling measurements using the Byte Code Engineering Library (BCEL). the paper presents an overview of the Java class file and pr...
详细信息
First-order logic is one of the most expressive and widely used knowledge representations, and its application to the formalization of musical knowledge raises particularly interesting questions. this paper explores s...
详细信息
Current literature offers a number of different approaches to what could generally be called "probabilistic logicprogramming". these are usually based on Horn clauses. Here, we introduce a new formalism, Lo...
详细信息
ISBN:
(纸本)3540226710
Current literature offers a number of different approaches to what could generally be called "probabilistic logicprogramming". these are usually based on Horn clauses. Here, we introduce a new formalism, logic Programs with Annotated Disjunctions, based on disjunctive logic programs. In this formalism, each of the disjuncts in the head of a clause is annotated with a probability. Viewing such a set of probabilistic disjunctive clauses as a probabilistic disjunction of normal logic programs allows us to derive a possible world semantics, more precisely, a probability distribution on the set of all Herbrand interpretations. We demonstrate the strength of this formalism by some examples and compare it to related work.
A fuzzy logic approach to the challenge of composing both sound and moving image within a coherent framework is proposed. this approach is based on a fuzzy logic model that enables a flexible mapping of either aural o...
详细信息
Many software environments have been developed for computer music. programming environments typically provide constructs to implement synthesis or musical algorithms, whereas runtime environments allow performers to e...
详细信息
暂无评论