This paper addresses the problem of computing least-cost-path surfaces for massive grid-based terrains. Our approach follows a modular design, enabling the algorithm to make efficient use of memory, disk, and grid com...
ISBN:
(纸本)9781595931085
This paper addresses the problem of computing least-cost-path surfaces for massive grid-based terrains. Our approach follows a modular design, enabling the algorithm to make efficient use of memory, disk, and grid computing environments. We have implemented the algorithm in the context of the GRASS open source GIS system and---using our cluster management tool---in a distributed environment. We report experimental results demonstrating that the algorithm is not only of theoretical and conceptual interest but also performs well in practice. Our implementation outperforms standard solutions as dataset size increases relative to available memory and our distributed solver obtains near-linear speedup when preprocessing large terrains for multiple queries.
Mining data streams is a field of increase interest due to the importance of its applications and dissemination of data stream generators. Most of the streaming techniques developed so far have not addressed the need ...
详细信息
ISBN:
(纸本)9781595931085
Mining data streams is a field of increase interest due to the importance of its applications and dissemination of data stream generators. Most of the streaming techniques developed so far have not addressed the need of resource-aware computing in data stream analysis. The fact that streaming information is often generated or received onboard resource-constrained computational devices such as sensors and mobile devices motivates the need for resource-awareness in data stream processing systems. In this paper, we propose a generic framework that enables resource-awareness in streaming computation using algorithm granularity settings in order to change the resource consumption patterns periodically. This generic framework is applied to a novel threshold-based micro-clustering algorithm to test its validity and feasibility. We have termed this algorithm as RA-Cluster. RA-Custer is the first stream clustering algorithm that can adapt to the changing availability of different resources. The experimental results showed the applicability of the framework and the algorithm in terms of resource-awareness and accuracy.
In this paper we report on a multiinstitutional investigation into the reading and comprehension skills of novice programmers. This work extends previous studies (Lister 2004, McCracken 2001) by developing a question ...
详细信息
ISBN:
(纸本)9781920682347
In this paper we report on a multiinstitutional investigation into the reading and comprehension skills of novice programmers. This work extends previous studies (Lister 2004, McCracken 2001) by developing a question set within two key pedagogical frameworks: the Bloom and SOLO taxonomies. From this framework of analysis some interesting emergent patterns relating the cognitive level of the questions to student performance have been identified.
Due to the pervasive nature of current short range, low-power wireless connectivity and easy availability of low-cost light weight mobile devices, it is necessary to have an omnipresent customizable service. It can be...
详细信息
ISBN:
(纸本)9781595931085
Due to the pervasive nature of current short range, low-power wireless connectivity and easy availability of low-cost light weight mobile devices, it is necessary to have an omnipresent customizable service. It can be used by different types of users different fields such as education, healthcare, marketing, or business, at any time, and at any place. These devices can reach ubiquitously to neighboring devices using a free short range ad hoc network. Unfortunately, to the best of our knowledge, no one has designed such a service. In this paper, we present the details of the Ubicomp Assistant (UA), which is designed to accomplish the above objectives. To evaluate the design, we have developed an application which uses UA as a service. It uses MARKS (Middleware Adaptability for Resource Discovery, Knowledge Usability and Self-healing) as an underlying core service provider.
The proceedings contain 317 papers. The topics discussed include: experimenting with a real-size Man-Hill to optimize Pedagogical paths;an agent model for fault-tolerant systems;reliability analysis of mobile agent-ba...
详细信息
The proceedings contain 317 papers. The topics discussed include: experimenting with a real-size Man-Hill to optimize Pedagogical paths;an agent model for fault-tolerant systems;reliability analysis of mobile agent-based systems;an approximation algorithm for haplotype inference by maximum parsimony;tree-based clustering for gene expression data;multilure active contours;sequence modeling for sentence classification in a legal summarisation system;estimating manifold dimension by inversion error;a comparison on information fusion methods for air target identification;cleaning microarray expression data using Markov random fields based on profile similarity;and the intensity level reduction in radiation therapy.
The proceedings contain 317 papers. The topics discussed include: experimenting with a real-size Man-Hill to optimize Pedagogical paths;an agent model for fault-tolerant systems;reliability analysis of mobile agent-ba...
详细信息
The proceedings contain 317 papers. The topics discussed include: experimenting with a real-size Man-Hill to optimize Pedagogical paths;an agent model for fault-tolerant systems;reliability analysis of mobile agent-based systems;an approximation algorithm for haplotype inference by maximum parsimony;tree-based clustering for gene expression data;multilure active contours;sequence modeling for sentence classification in a legal summarisation system;estimating manifold dimension by inversion error;a comparison on information fusion methods for air target identification;cleaning microarray expression data using Markov random fields based on profile similarity;and the intensity level reduction in radiation therapy.
This paper contains the results of computer simulations performed for several realistic scenarios of electromagnetic (EM) field evaluation near the cellular base station (CBS) and some analysis of obtained results. Th...
详细信息
This paper contains the results of computer simulations performed for several realistic scenarios of electromagnetic (EM) field evaluation near the cellular base station (CBS) and some analysis of obtained results. The motivation of this study is exposure assessment of EM energy on biological objects. There are scenarios of field distribution indoors, near the hill, obstacle like a wall and finally the field distribution inside the human body is computed. These scenarios are general and frequently encountering in practice inside space covered by wireless networks. Using the reasonable computational resources and keeping the accuracy of the solution acceptable for problems involving the electrically large objects the method of auxiliary sources (MAS) (R. Zaridze et al., 2002) (D. Kakulia et al., 2004) is used to simulate the EM field for the cases mentioned above
The Trusted computing Group (TCG) is an industry consortium which has invested in the design of a small piece of hardware (roughly a smartcard), called a Trusted Platform Module (TPM), and associated APIs and protocol...
详细信息
ISBN:
(纸本)9781595931085
The Trusted computing Group (TCG) is an industry consortium which has invested in the design of a small piece of hardware (roughly a smartcard), called a Trusted Platform Module (TPM), and associated APIs and protocols which are supposed to help increase the reliability of TPM-endowed computing platforms (trusted platforms). The TCG envisions that boot loaders, OSes and applications programs on trusted platforms will all collaborate in building a cryptographic hash chain which represents the current execution state of the platform, and which resides on the TPM. Remote sites can then verify that the platform in question is "in a trusted state" by requesting the TPM to produce a signed data blob containing the value of this hash chain, which can then be compared against a library of recognized ("trusted") values; this process is called remote attestation, and the whole picture is sometimes referred to as integrity-based computing (IBC).We argue that there is a fundamental gap between the stated goals of the TCG's IBC and the central technology that is intended to achieve these goals, which gap is simply that remote attestation asks the attesting platform to answer the wrong question - the platform is not attesting to its security state, but rather to its execution state, and this underlies all of the troublesome use cases, as well as a number of the practical difficulties, of the TCG world-view. One response to this is to replace standard TCG attestation with property-based attestation (PBA), which places the emphasis on deriving security properties from (potentially) elaborate trust models and conditional statements of security property dependencies. Herein the central rôle for IBC of trust and deriving consequences from precise trust models becomes ***, we claim that the TCG's own remote attestation is most properly viewed in fact as a form of PBA, with a certain simple trust model and database of security properties. From this point of view, it becomes cl
The proceedings of the 11th GAMM-IMACS International symposium on Scientific computing, Computer Arithmetic, and Validated Numerics (SCAN), held in Fukuoka, Japan, from October 4th to 8th, 2004 were discussed. The top...
详细信息
The proceedings of the 11th GAMM-IMACS International symposium on Scientific computing, Computer Arithmetic, and Validated Numerics (SCAN), held in Fukuoka, Japan, from October 4th to 8th, 2004 were discussed. The topics discussed include: hardware and software support for validation tools;theory, algorithms and arithmetic for numerical validation and dynamical systems and validation. More than 80 contributed presentations were included in the final program as two parallel sessions and they were presented after the following 8 invited plenary lectures. The refereed papers of conference proceedings will be published in 2005 in the special issue of Jounal of Computational and applied Mathematics.
Jinni 2004 [1, 2, 3] (available from http ://***/Jinni) expresses various agent programming constructs in terms of an Object Oriented Logic Programming layer implemented on top of a Java-based Prolog compiler. The arc...
详细信息
ISBN:
(纸本)9781581139648
Jinni 2004 [1, 2, 3] (available from http ://***/Jinni) expresses various agent programming constructs in terms of an Object Oriented Logic Programming layer implemented on top of a Java-based Prolog compiler. The architecture provides a high degree of compositionality through the use of a small set of orthogonal programming language constructs. Copyright 2005 acm.
暂无评论