the time to solution of linear equation solver strongly depends on the type of the problem, the target computer architecture, the selected algorithm, its implementation and the control parameters. thus huge work has b...
详细信息
ISBN:
(纸本)9781467308946;9788994364261
the time to solution of linear equation solver strongly depends on the type of the problem, the target computer architecture, the selected algorithm, its implementation and the control parameters. thus huge work has been performed to propose GridTLSE whose expert web site part provides assistance to a user in choosing the right solver for his problems as well as appropriate values for the control parameters of the selected solver, in addition to a collection of well-known matrices. GridTLSE manages entire expertises for the user, managing data transfers, tasks executions, and graphical charts to help analysing the overall execution. GridTLSE uses the open source GridRPC DIET middleware to distribute computing tasks over the grid platform. Data required by the computational services are matrices whose size can vary from some KBytes to several GBytes, so their management on the platform impacts performances. We present in this paper performance results showing how GridTLSE fulfill its goals, taking care of user good experiences related to time to completion, by using the open source data management middleware DAGDA along withthe DIET framework.
Global in-house development centers of multinational companies (MNCs) typically develop products and work on R & D projects. the ability to attract and more importantly retain talented employees is a critical succ...
详细信息
the proceedings contain 31 papers. the topics discussed include: estimating packaged software implementations: the first part of a framework;quality of estimations - how to assess reliability of cost predictions;effor...
ISBN:
(纸本)9780769548401
the proceedings contain 31 papers. the topics discussed include: estimating packaged software implementations: the first part of a framework;quality of estimations - how to assess reliability of cost predictions;effort estimation of web applications through web CMF objects;the effects of moving windows to software estimation: comparative study on linear regression and estimation by analogy;measuring and evaluating a DotNet application system to better predict maintenance effort;measuring inappropriate generosity with access modifiers in java systems;measuring software sustainability from a process-centric perspective;metrics based software supplier selection - best practice used in the largest Dutch telecom company;metrics to evaluate & monitor agile based software development projects - a fuzzy logic approach;and evaluation of non functional requirements in a request for proposal (RFP).
Use case modeling is a very popular technique for eliciting, specifying and validating functional requirements. Use case modeling possesses a very rich notational set that allows its users to accurately specify a larg...
详细信息
ISBN:
(纸本)9789898565136
Use case modeling is a very popular technique for eliciting, specifying and validating functional requirements. Use case modeling possesses a very rich notational set that allows its users to accurately specify a large variety of aspects about the underlying system's requirements. Many authoring techniques and templates were introduced to accurately describe a system's functional requirements. Although a relatively simple modeling technique, the literature has repeatedly reported on its misuse, leading to the development of end systems that do not satisfy the intended requirements. To this end, we have conducted a survey of use case models available online to shed light on the level of utilization of the use case modeling notation and how they are described, which can be symptomatic of how well do requirements engineers utilize the use case modeling technique and its modeling capabilities. In our survey we have collected and analysed 105 use case models. the results show an underutilization of the use case modeling notation and improper authoring techniques, which raises concern over the quality of the end systems.
the proceedings contain 26 papers. the topics discussed include: computability and non-computability issues in amorphous computing;static single information form for abstract compilation;probabilistic inference and mo...
ISBN:
(纸本)9783642334740
the proceedings contain 26 papers. the topics discussed include: computability and non-computability issues in amorphous computing;static single information form for abstract compilation;probabilistic inference and monadic second order logic;Cinderella versus the wicked stepmother;worst- and average-case privacy breaches in randomization mechanisms;weak bisimulations for coalgebras over ordered functors;a context-free linear ordering with an undecidable first-order theory;open bisimulation for quantum processes;a modular LTS for open reactive systems;on properties and state complexity of deterministic state-partition automata;on union-free and deterministic union-free languages;a characterisation of languages on infinite alphabets with nominal regular expressions;formal verification of distributed algorithms: from pseudo code to checked proofs;and unique parallel decomposition in branching and weak bisimulation semantics.
In this paper we have proposed a lazy learning mechanism for multiclass classification using genetic programming. this method is an improvement of traditional binary decomposition method for multiclass classification....
详细信息
ISBN:
(纸本)9783642259432
In this paper we have proposed a lazy learning mechanism for multiclass classification using genetic programming. this method is an improvement of traditional binary decomposition method for multiclass classification. We train classifiers for individual classes for a certain number of generations. Individual trained classifiers for each class are combined in a single chromosome. A population of such chromosomes is created and evolved further. this method suppresses the conflicting situations common in binary decomposition method. the proposed lazy learning method has performed better than traditional binary decomposition method over five benchmark datasets taken from UCI ML repository.
the proceedings contain 26 papers. the topics discussed include: adaptively secure forward-secure non-interactive threshold cryptosystems;cryptanalysis vs. provable security;boosting scalability in anomaly-based packe...
ISBN:
(纸本)9783642347030
the proceedings contain 26 papers. the topics discussed include: adaptively secure forward-secure non-interactive threshold cryptosystems;cryptanalysis vs. provable security;boosting scalability in anomaly-based packed executable filtering;searching short recurrences of nonlinear shift registers via directed acyclic graphs;differential and linear cryptanalysis using mixed-integer linear programming;Adleman-Manders-Miller root extraction method revisited;multi-pixel encryption visual cryptography;an improved electronic voting scheme without a trusted random number generator;fault attacks against the miller algorithm in Hessian coordinates;benchmarking for steganography by kernel fisher discriminant criterion;non-interactive deniable authentication protocols;efficient self-certified signatures with batch verification;and a generic construction from selective-IBE to public-key encryption with non-interactive opening.
Education in the field of computer programming is a challenging task, in particular when some complex issues are introduced for non-computer science students. A number of simplified programming languages, environments...
详细信息
Today the channels for expressing opinions seem to increase daily. When these opinions are relevant to a company, they are important sources of business insight, whether they represent critical intelligence about a cu...
详细信息
In this paper we address the problem of dimensioning infrastructure, comprising both network and server resources, for large-scale decentralized distributed systems such as grids or clouds. We will provide an overview...
详细信息
ISBN:
(纸本)9781457720536
In this paper we address the problem of dimensioning infrastructure, comprising both network and server resources, for large-scale decentralized distributed systems such as grids or clouds. We will provide an overview of our work in this area, and in particular focus on how to design the resulting grid/cloud to be resilient against network link and/or server site failures. To this end, we will exploit relocation: under failure conditions, a request may be sent to an alternate destination than the one under failure-free conditions. We will provide a comprehensive overview of related work in this area, and focus in some detail on our own most recent work. the latter comprises a case study where traffic has a known origin, but we assume a degree of freedom as to where its end up being processed, which is typically the case for e. g., grid applications of the bag-of-tasks (BoT) type or for providing cloud services. In particular, we will provide in this paper a new integer linear programming (ILP) formulation to solve the resilient grid/cloud dimensioning problem using failure-dependent backup routes. Our algorithm will simultaneously decide on server and network capacity. We find that in the anycast routing problem we address, the benefit of using failure-dependent (FD) rerouting is limited compared to failure-independent (FID) backup routing. We confirm our earlier findings in terms of network capacity savings achieved by relocation compared to not exploiting relocation (order of 6-10% in the current case studies).
暂无评论