In this paper, an efficient ontology integration model for cooperative agent framework is proposed. Context aware computing with inference based on ontology investigates distributed entities on surveillance devices su...
详细信息
network coding is a highly regarded technology for improving the capacity of wireless networks. COPE-sys network coding is an easily implemented and widely studied coding system. this paper studies the maximum through...
详细信息
the proceedings contain 335 papers. the topics discussed include: phase based and application based dynamic encoding scheme for multi-level cell STT-RAM;StackPool: a high-performance scalable network architecture on m...
ISBN:
(纸本)9780769550886
the proceedings contain 335 papers. the topics discussed include: phase based and application based dynamic encoding scheme for multi-level cell STT-RAM;StackPool: a high-performance scalable network architecture on multi-core servers;a hybrid reconfigurable system for parallel and intensive computation;ACStack: adaptive composite stack for adjoint models in code optimization;QoS-aware task placement in geo-distributed data centers with low OPEX using dynamic frequency scaling;CLSIFT: an optimization study of the scale invariance feature transform on GPUs;a novel image encryption algorithm based on hyperchaotic system and shuffling scheme;multi-core computation of transfer matrices for strip lattices in the potts model;GPU-accelerated parallel 3D image thinning;and privacy-preserving ranked search on public-key encrypted data.
Midimew connected Mesh network (MMN) is a Minimal DIstance MEsh with Wrap-around links (midimew) network. In this paper, we present the architecture of MMN and evaluate the total wire length of MMN, TESH, mesh, and to...
详细信息
the proceedings contain 35 papers. the topics discussed include: software system for inventory and assessment of the wear of computing machines from a network of grid data centers;developing cloud architectures in an ...
ISBN:
(纸本)9781479968602
the proceedings contain 35 papers. the topics discussed include: software system for inventory and assessment of the wear of computing machines from a network of grid data centers;developing cloud architectures in an enterprise framework;design and deployment of reconfigurable hardware using web services;adapting the local clusters for execution parallel applications and training;e-infrastructures and e-services in the eastern partnership countries;diagram generation using genetic layout algorithms and orthogonal routing;a new bound in information theory;analysis and prevention of network password guessing attacks in an enterprise environment;practical malware analysis based on sandboxing;secure cloud video streaming using tokens;and graphical packet generator - a solution for automatic discovery of the network topology and packet generation.
the proceedings contain 35 papers. the special focus in this conference is on Machine Learning, Data Mining, Web Mining, Multi-agent Systems, Automatic Reasoning, Decision Algorithms, Multimedia Pattern Recognition an...
ISBN:
(纸本)9783662449790
the proceedings contain 35 papers. the special focus in this conference is on Machine Learning, Data Mining, Web Mining, Multi-agent Systems, Automatic Reasoning, Decision Algorithms, Multimedia Pattern Recognition and Information Security. the topics include: Semi-paired probabilistic canonical correlation analysis;using bat algorithm with levy walk to solve directing orbits of chaotic systems;complex proteomes analysis using label-free mass spectrometry- based quantitative approach coupled with biomedical knowledge;online migration solver based on instructions statistics;extracting part-whole relations from online encyclopedia;topic detection and evolution analysis on microblog;adaptive mechanism based on shared learning in multi-agent system;an agent-based autonomous management approach to dynamic services;research and application analysis of feature binding mechanism;verification of branch-time property based on dynamic description logic;dynamic description logic based on DL-Lite;formalizing the matrix inversion based on the adjugate matrix in HOL4;a heuristic approach to acquisition of minimum decision rule sets in decision systems;cooperative decision algorithm for time critical assignment without explicit communication;using PDDL to solve vehicle routing problems;automated localization and accurate segmentation of optic disc based on intensity within a minimum enclosing circle;a traffic camera calibration method based on multi-rectangle;a multi-instance multi-label learning framework of image retrieval;the retrieval of shoeprint images based on the integral histogram of the Gabor transform domain;scene classification using spatial and color features;multipath convolutional-recursive neural networks for object recognition;identification of co-regulated gene network by using path consistency algorithm based on gene ontology and efficient integrity protection for P2P streaming.
Over the past few years, network coding has been employed in data reconstruction process of storage systems to minimize the recovery bandwidth. However, the time consumption of the decoding operations incurs a signifi...
详细信息
Nowadays, one of the major paradigms of distributed processing is SOA. To improve the reliability of SOA-based systems, a ReServE service that ensures recovery of consistent processing state, has been proposed. ReServ...
详细信息
In this paper, we present a novel stochastic analyzing model for e2e virtualized cloud services using hierarchical Quasi-Birth Death structures (QBDs). We divide the overall virtualized cloud services into three sub-h...
详细信息
All currently available network-based Intrusion Detection Systems (NIDS) rely upon passive protocol analysis which is fundamentally flawed as an attack can evade detection by exploiting ambiguities in the traffic stre...
详细信息
暂无评论