In this paper we propose a parallel tabu search algorithm based on the consecutive tabu algorithm constructed by us earlier to solve the problem of the distributed database optimal logical structure synthesis. Also we...
详细信息
In this paper we propose a parallel tabu search algorithm based on the consecutive tabu algorithm constructed by us earlier to solve the problem of the distributed database optimal logical structure synthesis. Also we provide a reader with some information about the performance of our new parallel algorithm and the quality of the solutions obtained with help of it.
Data mining algorithms are widely used today for the analysis of large corporate and scientific datasets stored in databases and data archives. Industry, science and commerce fields often need to analyze very large da...
详细信息
ISBN:
(纸本)9783642226052
Data mining algorithms are widely used today for the analysis of large corporate and scientific datasets stored in databases and data archives. Industry, science and commerce fields often need to analyze very large datasets maintained over geographically distributed sites by using the computational power of distributed and parallel systems. Grid computing emerged as an important new field of distributedcomputing, which could support the distributed knowledge discovery applications. In this paper, we have proposed a method to perform Data Mining on Grids. the Grid has been setup using Foster and Kesselman's Globus Toolkit, which is the most widely used middleware in scientific and data intensive grid applications. For the development of data mining applications on grids we have used Weka4WS. Weka4WS is an open source framework extended from the Weka toolkit for distributed data mining on Grid, which deploys many of machine learning algorithms provided by Weka Toolkit. To evaluate the efficiency of the proposed system, a performance analysis of Weka4WS by executing distributed data mining tasks, namely clustering and classification, in grid scenario has been performed. At last, a study on the speed up obtained by doing data mining on grids is done.
In this paper we investigate the problem of gathering the data in wireless sensor network using a single Mobile Element. In particular we consider the case where the data are produced by measurements and they need to ...
详细信息
We investigate schemes to accelerate the decay of aircraft trailing vortices. these structures are susceptible to several instabilities that lead to their eventual destruction. We employ an Evolution Strategy to desig...
详细信息
ISBN:
(纸本)9783642193279
We investigate schemes to accelerate the decay of aircraft trailing vortices. these structures are susceptible to several instabilities that lead to their eventual destruction. We employ an Evolution Strategy to design a lift distribution and a lift perturbation scheme that minimize the wake hazard as proposed in [6]. the performance of a scheme is measured as the reduction of the mean rolling moment that would be induced on a following aircraft;it is computed by means of a Direct Numerical Simulation using a parallel vortex particle code. We find a configuration and a perturbation scheme characterized by an intermediate wavelength lambda similar to 4.64, necessary to trigger medium wavelength instabilities between tail and flap vortices and subsequently amplify long wavelength modes.
A significant part of packet processing consists of detecting whether certain standard protocol headers are present, where they are located and whether they include optional information. Packet processing programs are...
详细信息
this two-volume set CCIS 166 and CCIS 167constitutes the refereed proceedings of the internationalconference on Digital Information and Communication Technology and its applications, DICTAP 2011, held in Dijon, Franc...
ISBN:
(数字)9783642219849
ISBN:
(纸本)9783642219832
this two-volume set CCIS 166 and CCIS 167constitutes the refereed proceedings of the internationalconference on Digital Information and Communication Technology and its applications, DICTAP 2011, held in Dijon, France, in June 2010. the 128 revised full papers presented in both volumes were carefully reviewed and selected from330 submissions. the papers are organized in topical sections on Web applications; image processing; visual interfaces and user experience; network security; ad hoc network; cloud computing; Data Compression; Software Engineering; Networking and Mobiles; distributed and parallel processing; social networks; ontology; algorithms; multimedia; e-learning; interactive environments and emergent technologies for e-learning; signal processing; information and data management.
distributed file system (DFS) is playing important roles of supporting large distributed data-intensive applications to meet storage needs. Typically, the design of DFS, such as GFS in Google, DMS in Cisco and TFS in ...
详细信息
In this paper. we propose a process grid free algorithm for a massively parallel dense symmetric eigensolver with a communication splitting multicasting algorithm. In this algorithm, a tradeoff exists between speed an...
详细信息
ISBN:
(纸本)9783642193279
In this paper. we propose a process grid free algorithm for a massively parallel dense symmetric eigensolver with a communication splitting multicasting algorithm. In this algorithm, a tradeoff exists between speed and memory space to keep the Householder vectors. As a result of a performance evaluation withthe T2K Open Supercomputer (U. Tokyo) and the RX200S5, we obtain the performance with 0.86x and 0.95x speed-downs and 1/2 memory space compared to the conventional algorithm for a square process grid. We also show a new algorithm for small-sized matrices in massively parallel processing that takes an appropriately small value of p of the process grid p x q. In this case, the execution time of inverse transformation is negligible.
this book constitutes the refereed proceedings of the First internationalconference on Advances in parallel, distributedcomputingtechnologies and applications, PDCTA 2011, held in Tirunelveli, India, in September 2...
ISBN:
(数字)9783642240379
ISBN:
(纸本)9783642240362
this book constitutes the refereed proceedings of the First internationalconference on Advances in parallel, distributedcomputingtechnologies and applications, PDCTA 2011, held in Tirunelveli, India, in September 2011. the 64 revised full papers were carefully reviewed and selected from over 400 submissions. Providing an excellent international forum for sharing knowledge and results in theory, methodology and applications of parallel, distributedcomputingthe papers address all current issues in this field with special focus on algorithms and applications, computer networks, cyber trust and security, wireless networks, as well as mobile computing and bioinformatics.
the secure requirement of modern information systems is increasing significantly nowadays, especially in cloud computing withdistributedapplications. Among secure mechanisms of an organization, the access control (A...
详细信息
ISBN:
(纸本)9780769545769
the secure requirement of modern information systems is increasing significantly nowadays, especially in cloud computing withdistributedapplications. Among secure mechanisms of an organization, the access control (AC) is a foundation for modern information systems. In order to reach an effective and flexible approach of access control, the Rolebased Access Control (RBAC) models are widely deployed in organizations. Comparing with traditional discretionary access control (DAC) and mandatory access control (MAC), the userrole- subject mapping of a RBAC model provides effective permissions assignments for access control of an organization. However, the RBAC sessions could be stretched over multiple distributed servers in cloud computing. the traversed sessions between servers could be modified, monitored and attacked by modern hacker techniques, and become secure leaks in RBAC models. In order to ensure secure sessions in cloud computing, various encryption approaches are used. Among these encryption approaches, the use of digital certificates by asymmetric encryption methods could be an appropriate solution to ensure the security of RBAC sessions. However, the cost of public/private keys management and issuing an appropriate certificate tokens for each member in organizations could be very expensive. the high cost might block the deployment of secure RBAC sessions, and then reduce the secure level of organizations. In order to improve this issue, a low-cost approach of secure sessions for RBAC models is proposed in this paper. the personal smart cards can be used as a certificate tokens in RBAC models to reach effective user authentications. Moreover, each session of RBAC models, including user-role-subject assignments and contentbased accesses, can be protected by digital certificates which is generated by user own smart cards. thus the security of RBAC sessions can be improved significantly. It is worth noting that personal smart cards are issued by public departm
暂无评论