This paper presents a dual priority transmission system for mobile channels suitable for mobile video applications. The transmission system is comprised of a 16 Quadrature Amplitude Modulation (QAM) technique and chan...
详细信息
The Grid technology is the third network current after the traditional Internet and WWW, and could be specified as the third generation of network application. The main topic of the Grid technology is to integrate all...
详细信息
ISBN:
(纸本)076952138X
The Grid technology is the third network current after the traditional Internet and WWW, and could be specified as the third generation of network application. The main topic of the Grid technology is to integrate all the resources in the network that include the computing capacity, the storage system, the communication system, software, information, and knowledge. In another word, the grid structure is a huge sharing platform that integrates all kinds of resources from Internet. National Center for High-performance computing, Taiwan is the main computing center taking charge of the integration and application of high-performance computing and networking in Taiwan. The Grid technology is applied in this article to integrate techniques of network, database, hydrology, fluid mechanics, and related applications. Experts are called together to join the project. The main goal in this study is to build a networked, web-based, and distributed flood forecast system with the integration of computation grid. Users could access this system simultaneously through web browser. A plurality of flood forecast projects could be as well managed at the same time. Results of the flood forecast projects would be provided to the Central Disaster Emergency Center and local government units to help process the flood forecast and the exigent disaster-reducing assignments through Internet.
A novel ID method based on Support Vector Machine (SVM) is proposed to solve the classification problem for the large amount of raw intrusion event dataset of the grid computing environment. A new radial basic functio...
详细信息
ISBN:
(纸本)3540235647
A novel ID method based on Support Vector Machine (SVM) is proposed to solve the classification problem for the large amount of raw intrusion event dataset of the grid computing environment. A new radial basic function (RBF), based on heterogeneous value difference metric (HVDM) of heterogeneous datasets, is developed. Two different types of SVM, Supervised C_SVM and unsupervised One_Class SVM algorithms with kernel function, are applied to detect the anomaly network connection records. The experimental results of our method on the corpus of data collected by Lincoln Labs at MIT for an intrusion detection system evaluation sponsored by the U.S. Defense Advanced Research Projects Agency (DARPA) shows that the proposed method is feasible and effective.
Constructing rigorous models for analysing the behaviour of concurrent and distributed systems is a complex task. Our aim is to facilitate model construction. Scenarios provide simple, intuitive, example based descrip...
详细信息
Constructing rigorous models for analysing the behaviour of concurrent and distributed systems is a complex task. Our aim is to facilitate model construction. Scenarios provide simple, intuitive, example based descriptions of the behaviour of component instances in the context of a simplified architecture instance. The specific architecture instance is generally chosen to provide sufficient context to indicate the expected behaviour of particular instances of component types to be used in the real system. Existing synthesis techniques provide mechanisms for building behaviour models for these simplified and specific architectural settings. However, the behaviour models required are those for the full generality of the system architecture, and not the simplified architecture used for scenarios. In this paper we exploit architectural information in the context of behaviour model synthesis from scenarios. Software architecture descriptions give the necessary contextual information so that component instance behaviour can be generalised to component type behaviour. Furthermore, architecture description languages can be used to describe the complex architectures in which the generalised behaviours need to be instantiated. Thus, architectural information used in conjunction with scenario-based model synthesis can support both model construction and elaboration, where the behaviour derived from simple architecture fragments can be instantiated in more complex ones. Copyright 2004acm.
The proceedings contain 18 papers. The topics discussed include: the electronic paper prototype with visual interaction enriched windows;informing intelligent environments: creating profiled user interfaces;an ambient...
ISBN:
(纸本)1581139926
The proceedings contain 18 papers. The topics discussed include: the electronic paper prototype with visual interaction enriched windows;informing intelligent environments: creating profiled user interfaces;an ambient, personalized, and context-sensitive information system for mobile users;experiencing 3D interactions in virtual reality and augmented reality;multi-application smartcard user interface;a physical notice board with digital logic and display;DomoML: the definition of a standard markup for interoperability of human home interactions;user activity synthesis in ambient intelligence environments;an architecture for the personalized control of domotic resources;a context based storage for ubiquitous computing applications;the human side of sharing in peer-to-peer networks;an integrated user interface providing unified access to intelligent environments and personal media;and an interaction model for passively influencing the environment.
This paper proposes the use of feature weights to reveal the hierarchical nature of music audio. Feature weighting has been exploited in machine learning, but has not been applied to music audio segmentation. We descr...
详细信息
Simulated tempering and swapping are two families of sampling algorithms in which a parameter representing temperature varies during the simulation. The hope is that this will overcome bottlenecks that cause sampling ...
详细信息
Simulated tempering and swapping are two families of sampling algorithms in which a parameter representing temperature varies during the simulation. The hope is that this will overcome bottlenecks that cause sampling algorithms to be slow at low temperatures. Madras and Zheng demonstrate that the swapping and tempering algorithms allow efficient sampling from the low-temperature mean-field Ising model, a model of magnetism, and a class of symmetric bimodal distributions. Local Markov chains fail on these distributions due to the existence of bad cuts in the state space. Bad cuts also arise in the q-state Potts model, another fundamental model for magnetism that generalizes the Ising model. Glauber (local) dynamics and the Swendsen-Wang algorithm have been shown to be prohibitively slow for sampling from the Potts model at some temperatures. It is reasonable to ask whether tempering or swapping can overcome the bottlenecks that cause these algorithms to converge slowly on the Potts model. We answer this in the negative, and give the first example demonstrating that tempering can mix slowly. We show this for the 3-state ferromagnetic Potts model on the complete graph, known as the mean-field model. The slow convergence is caused by a first-order (discontinuous) phase transition in the underlying system. Using this insight, we define a variant of the swapping algorithm that samples efficiently from a class of bimodal distributions, including the mean-field Potts model.
Vector processors often use a cache to exploit temporal locality and reduce memory bandwidth demands, but then require expensive logic to track large numbers of outstanding cache misses to sustain peak bandwidth from ...
详细信息
ISBN:
(纸本)0769521266
Vector processors often use a cache to exploit temporal locality and reduce memory bandwidth demands, but then require expensive logic to track large numbers of outstanding cache misses to sustain peak bandwidth from memory. We present refill/access decoupling, which augments the vector processor with a Vector Refill Unit (VRU) to quickly pre-execute vector memory commands and issue any needed cache line refills ahead of regular execution. The VRU reduces costs by eliminating much of the outstanding miss state required in traditional vector architectures and by using the cache itself as a cost-effective prefetch buffer We also introduce vector segment accesses, a new class of vector memory instructions that efficiently encode two-dimensional access patterns. Segments reduce address bandwidth demands and enable more efficient refill/access decoupling by increasing the information contained in each vector memory command. Our results show that refill/access decoupling is able to achieve better performance with less resources than more traditional decoupling methods. Even with a small cache and memory latencies as long as 800 cycles, refill/access decoupling can sustain several kilobytes of in-flight data with minimal access management state and no need for expensive reserved element buffering.
The notion of spatial uncertainty indicates the lack of exact knowledge about where, within the simulated space, an event actually occurs. In one of our previous works, we have shown how to exploit spatial uncertainty...
详细信息
ISBN:
(纸本)0769522327
The notion of spatial uncertainty indicates the lack of exact knowledge about where, within the simulated space, an event actually occurs. In one of our previous works, we have shown how to exploit spatial uncertainty to reduce the synchronization cost in optimistic simulation, in terms of amount of rollback. In this paper we show how to exploit spatial uncertainty also for reducing the expected cost of simulation events during forward computation, thus achieving further reduction of the wall-clock time for the simulation model execution. The application of this proposal to optimistic simulation of a Personal Communication System (PCS) is also presented, together with experimental results supporting the claim of increased execution speed of the simulation system.
暂无评论