For five single machine total tardiness problems a fully polynomial-time approximation scheme (FPTAS) based on a graphical algorithm is presented. the FPTAS has the best running time among the known approximation sche...
详细信息
this paper presents a proposal of digital mediation for direct public participation during electoral periods. the proposal is based on a conceptual model and proof of concept - A Web application. It is intended to nar...
详细信息
Summary form only given. this tutorial will cover both basic and advanced Android Dalvik programming concepts and how they can be implemented efficiently and securely within the Android permission model. In addition, ...
详细信息
Summary form only given. this tutorial will cover both basic and advanced Android Dalvik programming concepts and how they can be implemented efficiently and securely within the Android permission model. In addition, we will present examples of Android code that is not well designed both in terms of security and power consumption and the potential implications of such code in the reliability of an Android device. We will conclude by presenting what are currently considered the best coding practices. Our goal is to assist both experience and novice mobile developers steer away from security and reliability pitfalls in their code while delivering efficient and robust applications.
Declarative techniques such as Constraint programming are very useful in modeling complex requirements. they have the added benefit of being executable specifications and, when properly tuned, high-performance ones. I...
详细信息
ISBN:
(纸本)9781467329125
Declarative techniques such as Constraint programming are very useful in modeling complex requirements. they have the added benefit of being executable specifications and, when properly tuned, high-performance ones. In this paper we argue that Information Systems ought to include constraint-based techniques in their design and implementation. We support this claim by introducing tools based on constraint programming, which we apply to an actual use-case: the academic timetable construction and maintenance problem, as developed at the University of Evora. the system we built was implemented using the GNU Prolog language. Moreover, Constraints have the potential to describe global properties that a model must observe, which makes them a semantically very interesting extension to the capabilities of present model-driven techniques and tools.
the lattice Boltzmann method (LBM) is an increasingly popular approach for solving fluid flows in a wide range of applications. the LBM yields regular, data-parallel computations;hence, it is especially well fitted to...
详细信息
the lattice Boltzmann method (LBM) is an increasingly popular approach for solving fluid flows in a wide range of applications. the LBM yields regular, data-parallel computations;hence, it is especially well fitted to massively parallel hardware such as graphics processing units (GPU). Up to now, though, single-GPU implementations of the LBM are of moderate practical interest since the on-board memory of GPU-based computing devices is too scarce for large scale simulations. In this paper, we present a multi-GPU LBM solver based on the well-known D3Q19 MRT model. Using appropriate hardware, we managed to run our program on six Tesla C1060 computing devices in parallel. We observed up to 2.15 x 10(9) node updates per second for the lid-driven cubic cavity test case. It is worth mentioning that such a performance is comparable to the one obtained with large high performance clusters or massively parallel supercomputers. Our solver enabled us to perform high resolution simulations for large Reynolds numbers without facing numerical instabilities. though, we could observe symmetry breaking effects for long-extended simulations of unsteady flows. We describe the different levels of precision we implemented, showing that these effects are due to round off errors, and we discuss their relative impact on performance. (C) 2011 Elsevier Ltd. All rights reserved.
Ontology-based reasoning is considered a crucial task in the area of knowledge management. In this context, the interest in approaches that resort to Datalog (and its extensions) for implementing various reasoning tas...
详细信息
Programmers develop code with a sense of purpose and with expectations on how units of code should interact with other units of code. But this intent of programmers is typically implicit and undocumented, goes beyond ...
详细信息
In the recent years, return-oriented programming (ROP) has become the most widely used exploitation technique, achieving arbitrary code execution without injecting any code at all. this is possible by executing small ...
详细信息
A paced transfer line has to be designed for the mass production of parts of several types. Each part requires a specific set of operations. the superset of all required operations has to be distributed between statio...
详细信息
Computing grid are a set of unsymmetrical systems have provided a ground for sharing the computing resources. Regarding the facilities of grid and advantages of mobile agents and also the present problems reduction on...
详细信息
ISBN:
(纸本)9781479903948
Computing grid are a set of unsymmetrical systems have provided a ground for sharing the computing resources. Regarding the facilities of grid and advantages of mobile agents and also the present problems reduction on distributed systems, the grid ground of “Alchemi” has been applied that is a low capacity system fixed with windows operating system. In this paper, changes have been made in Alchemi which has an open origin and the possibility Of inter thread communication and strong mobility added to it and then by using mobile agents in this system, the possibility of agent -based programming provided in it .Two main innovations of this paper are including: -Generating a strong excitation in NET environment. Developing the possibility of parallel programming based on the agents over the grid.
暂无评论