Discrete Fourier transform (DFT) has many applications in digital signal and image processing and other scientific and technological domains, but its time complexity of direct computation is O(n2), limiting greatly it...
详细信息
A kind of negotiation policy is proposed for the allocation problem solved by agent-based system in distributed manufacturing environment, in which subtasks in the same task have in-tree precedence constraints and fle...
详细信息
Reconfigurable computing (RC) is the presence of hardware that can be reconfigured to implement specific functionality more suitable for specially tailored hardware than on a simple uniprocessor [1]. Although the conc...
详细信息
Internet computing and Grid technologies promise to change the way we tackle complex problems. Harnessing these new technologies effectively, it will transform scientific disciplines ranging from high-energy physics t...
详细信息
ISBN:
(纸本)0769524052
Internet computing and Grid technologies promise to change the way we tackle complex problems. Harnessing these new technologies effectively, it will transform scientific disciplines ranging from high-energy physics to life sciences. this paper describes a metropolitan-scale Grid computing platform named TIGER Project (standing for Taichung Integrating Grid Environment and Resource), which basically interconnects universities and high schools' cluster computing resources and sharing available resources among them, for investigations in system technologies and high performance applications. this novel project shows the viability of implementation of such project in a metropolitan city.
Wireless sensor networks (WSNs) are important for a number of strategic applications. Target localization is an important task in WSNs. In this paper, a distributed and cooperative target localization algorithm in wir...
详细信息
this paper proposes a distributedparallel processing of Queen Ant Strategy named "ASqueen" which imitated an ant society where a queen ant governs. It is noted that the proposed processing method achieves &...
详细信息
this article presents a genetic algorithm application to support the construction site layout-planning task using an evolutionary approach to determine the locations of site facilities. It uses a Multi-Subpopulation G...
详细信息
ISBN:
(纸本)0889865361
this article presents a genetic algorithm application to support the construction site layout-planning task using an evolutionary approach to determine the locations of site facilities. It uses a Multi-Subpopulation Genetic Algorithm (MSGA) to perform site layout optimisation in which the temporary facilities positioned in order to optimally satisfy travelling distance minimisation and safety maximisation criteria. the algorithm allows for the parallel evolution of its subpopulations based on the migration model to improve its genetic search power for (near) optimum construction site facility layouts.
BitTorrent is a popular, open-source content distribution system that is conducive for distribution of large-volume files. In this paper, we first model the parallel downloading problem as directed graph and discuss p...
详细信息
Gnutella-like Peer-to-Peer Networks, due to their extreme connectivity fluctuations, are highly robust against random failures. However, such error tolerance comes at a high price of attack survivability. In this pape...
详细信息
ISBN:
(纸本)0769524052
Gnutella-like Peer-to-Peer Networks, due to their extreme connectivity fluctuations, are highly robust against random failures. However, such error tolerance comes at a high price of attack survivability. In this paper, to enhance such attack survivability, we propose a new formulation used for defense against deliberately attacks based on two leading concepts: cost and load the cost measures how expensive it is to cure an attacked or infected node, and the load measures how important a link between two nodes is when propagating attacks or updating immunization information reversely. the combination of these factors leads us to introduce the concept of optimal targeted immunization, which formalizes the ideas of minimizing the risk of epidemic outbreaks in these networks. Using this analysis framework, we then devise a novel efficient targeted immunization scheme. the simulation results under a realistic Gnutella network show that our immunization scheme outperforms other existing methods, producing an arresting increase of the network attack tolerance at a lower price of eliminating malicious attacks.
distributedapplications operating in pervasive computing environment should have abilities to cope withthe high heterogeneity and variability of this environment. In a high abstract level, the dynamic software archi...
详细信息
暂无评论