As open access market principles are applied to power systems, an increased emphasis is being placed on determining ways to price different auxiliary services. The present paper studies the incorporation of voltage se...
详细信息
ISBN:
(纸本)0780364201
As open access market principles are applied to power systems, an increased emphasis is being placed on determining ways to price different auxiliary services. The present paper studies the incorporation of voltage security into an optimal power flow formulation to analyze the aggregated costs associated with guaranteeing adequate voltage security levels in the system. Thus, several hybrid optimal power how formulations that both minimizes generation costs and maximize distance to collapse are proposed and used to compare operational costs of power systems at different loading and voltage security levels. Basic principles of electricity markets are then used to propose a method to determine appropriate adjustments of control parameters accounting for the voltage stability of a power network.
With the emergence of the Internet and distributed object technologies, naming and directory services have become key elements in distributed system architectures. A key benefit of naming services is to enable locatio...
详细信息
With the emergence of the Internet and distributed object technologies, naming and directory services have become key elements in distributed system architectures. A key benefit of naming services is to enable location-independent access to remote objects. In the Java environment, the Java Naming and Directory Interface (JNDI) is proposed as a common framework to provide an object-oriented view of naming and directory services, and to unify and federate different types of services. In the paper, we present a terminal infrastructure which relies on naming and directory services for accessing distributed objects. This infrastructure is based on the usage of a new component we have named Personal Naming and Directory Service (PNDS), which is embedded on a smart card. PNDS has been prototyped using a fully object-oriented Java card, and has been integrated as a new additional component in the JNDI framework. By leveraging the open Card Framework, the standardized framework and interface to access both the smart card reader and applications on the card, and the JNDI framework approach to naming and directory services, PNDS enables access to both smart card and network based services. The PNDS smart card provides the proposed terminal infrastructure with knowledge of user's personal services, and with means for accessing and securing the access.
The deployment for new Internet services is limited by existing service creation platforms which can be characterized as closed, vertical and best effort in nature. We believe there is a need to develop a programmable...
详细信息
ISBN:
(纸本)3540410244
The deployment for new Internet services is limited by existing service creation platforms which can be characterized as closed, vertical and best effort in nature. We believe there is a need to develop a programmable Internet built on a foundation of open service interfaces and middleware technologies. To help speed the introduction of value-added services, we propose a unified, programmable Quality of Service (QoS) API framework based on the ieee P1520 Reference Model fostering open, standard interfaces for networks. We argue that this is a necessary evolutionary step towards a QoS-flexible, Internet service platform. We propose the design of APIs for upper level network QoS be based on service-dependent and service-independent abstractions, supporting alternative styles of QoS specifications and provisioning. Additionally, we propose the design of low-level network element APIs be based on the notion of a building block hierarchy and the separation of service-specific and resource abstractions for the creation and deployment of network services.
A novel approach to defensive information warfare (DIW) is suggested that exploits the recent availability of low-cost symmetric multiprocessing systems and readily available COTS open source software. Pentium-based s...
详细信息
ISBN:
(纸本)0780365216
A novel approach to defensive information warfare (DIW) is suggested that exploits the recent availability of low-cost symmetric multiprocessing systems and readily available COTS open source software. Pentium-based systems are now available at consumer prices in which dual-processor functionality can he acquired for a few hundred dollars. Coupled with COTS Linux OS software, such systems call be extended to provide novel capabilities in support of defensive information warfare. The resulting platform can support COTS application-level software through standard exported Linux APIs. The described dual processor system architecture call provide autonomous monitoring and control of application processing as well as functional separation of security, critical components. One processor the oversight processor is dedicated to monitoring, evaluating, and controlling aspects of the behavior of the other processor, the application processor It runs a specialized kernel that performs low-level monitoring of the application kernel and dynamically injects intrusion detection and response functionality as required. The oversight processor call operate independently of a compromised application processor and can be largely immunized against intrusions of the application OS. By executing in parallel with the application processor the oversight processor call fulfill its monitoring and control responsibilities in real time, transparent To application processing. This allows the oversight kernel to transform the system to a higher level of readiness in real time utilizing a variety of techniques described in the paper. The described architecture reestablishes the OS as an integral component of defensive information warfare. It supports run-time, kernel-level adjustment to abnormal activity to allow the system to alter its INFOCON level as external alerts are received or an attack is detected. It provides a flexible and more comprehensive approach to operating-system-based intrusion
The model-based predictive control (MBPC) technologies are based on the prediction of future behaviour of the process to be controlled which is obtained by the model of the plant. Using the explicit process model and ...
详细信息
This paper presents the main concepts of the IST Project FAIN "Future Active IP networks" [10], a three-year collaborative research project, whose main task is to develop and validate an open, flexible, prog...
详细信息
This paper presents the SIMD Phase programming Model, a simple approach to solving asynchronous, irregular problems on massively parallel SIMD computers. The novelty of this model consists of a simple, clear method on...
详细信息
This paper presents the SIMD Phase programming Model, a simple approach to solving asynchronous, irregular problems on massively parallel SIMD computers. The novelty of this model consists of a simple, clear method on how to turn a general serial program into an explicitly parallel one for a SIMD machine, transferring a portion of the flow control into the single PEs. Three case studies (the Mandelbrot Set, the N-Queen problem, and a Hopfield neural network that approximates the maximum clique in a graph) will be presented, implemented on two different SIMD computers (the UCSC Kestrel and the MasPar MP-2). Our results so far show good performance with respect to conventional serial CPU computing time and in terms of the high parallel speedup and efficiency achieved.
The proceedings contain 179 papers. The special focus in this conference is on Personal Computer Based networks of Workstations, Advances in Parallel, Distributed Computational Models and Video Processing. The topics ...
ISBN:
(纸本)354067442X
The proceedings contain 179 papers. The special focus in this conference is on Personal Computer Based networks of Workstations, Advances in Parallel, Distributed Computational Models and Video Processing. The topics include: MPI collective operations over IP multicast;an open market-based architecture for distributed computing;the multicluster model to the integrated use of multiple workstation clusters;parallel information retrieval on an SCI-based pc-now;a pc-now based parallel extension for a sequential DBMS;the heterogeneous bulk synchronous parallel model;a new computation of shape moments via quadtree decomposition;a java applet to visualize algorithms on reconfigurable mesh;a hardware implementation of pram and its performance evaluation;a non-binary parallel arithmetic architecture;multithreaded parallel computer model with performance evaluation;a high performance microprocessor for multimedia computing;a novel superscalar architecture for fast DCT implementation;computing distance maps efficiently using an optical bus;advanced data layout optimization for multimedia applications;parallel parsing of mpeg video in a multi-threaded multiprocessor environment;parallelization techniques for spatial-temporal occupancy maps from multiple video streams;heuristic solutions for a mapping problem in a TV-anytime server network;a programming environment for real-time parallel vision;parallel low-level image processing on a distributed memory system;congestion-free routing of streaming multimedia content in BMIN-based parallel systems;performance of on-chip multiprocessors for vision tasks;specification techniques for automatic performance analysis tools and controlling distributed shared memory consistency from high level programming languages.
With N routers in a network running the open shortest path first (OSPF) routing protocol a network topology update can generate on the order of N/sup 2/ LSA packets. This phenomenon, known as the LSA N-squared problem...
详细信息
With N routers in a network running the open shortest path first (OSPF) routing protocol a network topology update can generate on the order of N/sup 2/ LSA packets. This phenomenon, known as the LSA N-squared problem, severely degrades network performance and scalability. Hierarchical OSPF networkarchitectures have been proposed to reduce the number of link state advertisements (LSA) that are generated by a network topology update. We show that equal-size areas minimize the number of LSAs. Then we derive the optimal number of areas and the size of areas to create the network producing the minimal number of LSAs. Finally we show that the optimal network architecture reduces the number of LSAs from O(N/sup 2/) to O(/sup 3//spl radic/(N/spl middot/N)).
Several systems for automatic gesture recognition have been developed using different strategies and approaches. In these systems the recognition engine is mainly based on three algorithms: dynamic pattern matching, s...
详细信息
Several systems for automatic gesture recognition have been developed using different strategies and approaches. In these systems the recognition engine is mainly based on three algorithms: dynamic pattern matching, statistical classification, and neural networks (NN). In this paper three architectures for the recognition of dynamic gestures using the above mentioned techniques or a hybrid combination of them are presented and compared. For all architectures a common preprocessor receives as input a sequence of color images, and produces as output a sequence of feature vectors of continuous parameters. The first two systems are hybrid architectures consisting of a combination of neural networks and hidden Markov models (HMM). NNs are used for the classification of single feature vectors while HMMs for the modeling of sequences of them with the aim to exploit the properties of both these tools. More precisely, in the first system a Kohonen feature map (SOM) clusters the input space. Further, each code-book is transformed into a symbol from a discrete alphabet and fed into a discrete HMM for classification. In the second approach a radial basis function (RBF) network is directly used to compute the HMM state observation probabilities. In the last system only dynamic programming techniques are employed. An input sequence of feature vectors is matched by some predefined templates by using the dynamic time warping (DTW) algorithm. Preliminary experiments with our baseline systems achieved a recognition accuracy up to 92%. All systems use input from a monocular color video camera, are user-independent but so far, they are not yet real-time.
暂无评论