New developments in the field of theoretical chemistry require the computation of numerous Molecular Potential Energy Surfaces (PESs) to generate adequate quantum force field parameters. Because workstations alone can...
详细信息
ISBN:
(纸本)0769523153
New developments in the field of theoretical chemistry require the computation of numerous Molecular Potential Energy Surfaces (PESs) to generate adequate quantum force field parameters. Because workstations alone cannot fulfill the requirements of these modem chemical advances, we present in this paper how we have tackled this problem using several up-to-date computer science technology such as grid-computing middleware, molecular databases, script interfacing, etc. An example on the optimization of semiempirical parameters for water shows the potential power of our approach and the benefit theoretical chemistry can gain with it.
Resource Brokers on the Grid consult a number of distributed information services to select the best data source and/or computational resource based on user requirements. The consultation task increases the design com...
详细信息
ISBN:
(纸本)0769523153
Resource Brokers on the Grid consult a number of distributed information services to select the best data source and/or computational resource based on user requirements. The consultation task increases the design complexity of Resource Brokers. This work is the first attempt to unify the distributed grid information services in one framework. The Grid Query Service (GQS) is composed of information services layered on OGSA-DAI Grid services, which are generic data access and integration services. Grid Resource Brokers can consult just one service, the GQS service, to obtain indexed information about grid resources.
This paper proposes a new multiple description coding technique that uses different data transforms to generate multiple descriptions of a given signal. A linear fusion is employed to reconstruct the signal as the out...
详细信息
ISBN:
(纸本)0769523153
This paper proposes a new multiple description coding technique that uses different data transforms to generate multiple descriptions of a given signal. A linear fusion is employed to reconstruct the signal as the output of a central decoder. This new method exhibits the advantages of multiple description vector quantization while having the complexity of multiple description scalar quantization. Another technique called "forced errors in channels" is then introduced to reduce the distortion in the central decoder output allowing some increase in the side distortions. When applied to images, the new techniques yield results, which are competitive compared with the results from current state-of-the-art coders.
In recent years, amphibian populations in many parts of the world have experienced an apparent widespread, yet poorly understood decline. One of the obstacles comes from the difficulties in rapidly collecting and anal...
详细信息
ISBN:
(纸本)0769523153
In recent years, amphibian populations in many parts of the world have experienced an apparent widespread, yet poorly understood decline. One of the obstacles comes from the difficulties in rapidly collecting and analyzing amphibian population data from the field sites. In this paper, we will investigate how to apply wireless network and mobile computing technologies to build a Mobile Amphibian Population information System (MAPIS). This system will not only enhance communication between field biologists in different locations, but also speed on-site data entry and analysis. Thus, the field biologists can optimize collection efforts and better exploit narrow windows of ecologically relevant population behaviors.
Today Geographic information Systems (GIS) provide several tools for studying and analyzing varied human and natural phenomena, therefore GIS and geospatial data has grown so much in both public and private organizati...
详细信息
ISBN:
(纸本)0769523153
Today Geographic information Systems (GIS) provide several tools for studying and analyzing varied human and natural phenomena, therefore GIS and geospatial data has grown so much in both public and private organizations. A Challenge is the integration of these data to get innovative and exhaustive knowledge about topics of interest. In this paper we describe the design of a Web Map Service (WMS) OGC-compliant, through the use of grid computingtechnology and demonstrate how this approach can improve, w.r.t. security, performance, efficiency and scalability, the integration of geospatial multi-source data. End users, with a single sign-on, securely and transparently, gets maps whose data are distributed on heterogeneous data sources belonging to one o more Virtual Organizations via distributed queries in a grid computing environment.
The goal of this paper is to promote application Of logic synthesis methods and tools in different tasks of modern digital designing The paper discusses functional decomposition methods, which are currently being inve...
详细信息
ISBN:
(纸本)0769523153
The goal of this paper is to promote application Of logic synthesis methods and tools in different tasks of modern digital designing The paper discusses functional decomposition methods, which are currently being investigated, with special attention to balanced decomposition. Since technological and computer experiments with application of these methods produce promising results, this kind of logic synthesis will probably dominate the development of digital circuits for FPGA structures. Many examples confirming effectiveness of decomposition method in technology mapping in digital circuits design for cryptography and DSP applications are presented.
Protecting sensitive information (credit card information, social security number... etc) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupulo...
详细信息
ISBN:
(纸本)0769523153
Protecting sensitive information (credit card information, social security number... etc) from being captured is of utmost importance as it can lead to serious repercussions if the collected data lands into unscrupulous hands. Despite tremendous advances in security, plenty of security problems still afflict systems. Existing security approaches do not prevent processes running in the background from capturing sensitive information on the screen. This paper proposes a no-capture hardware security feature that prevents capturing of sensitive data by users that have administration privileges.
Based on Utility and Mechanism Design theory, this paper describes grid resources trade and allocation mechanism in Decentralized Computational Market, focusing on the design of double auction and aggregate market mec...
详细信息
ISBN:
(纸本)0769523153
Based on Utility and Mechanism Design theory, this paper describes grid resources trade and allocation mechanism in Decentralized Computational Market, focusing on the design of double auction and aggregate market mechanism. Double auction mechanism employs decentralized architecture in decision making. The price fluctuates according to the wave of supply & demand of the market and the participants' bid strategy. Comparatively, there has little participants' influence in aggregate market mechanism;the price is determined by the central price setup system. Although presenting higher performance, aggregate market mechanism sacrifices interest of the bargainers. The simulations of single type commodity (CPU slices) market illustrate validity of the two kinds of trade mechanism. Comparing analysis is explicated from the view of transaction price, deal amount and the utility increment.
Although individual node cooperation is necessary for the correct execution of network protocols in Mobile Ad-hoc Networks, it is not always guaranteed Therefore, misbehavior defection and reputation mechanisms need t...
详细信息
ISBN:
(纸本)0769523153
Although individual node cooperation is necessary for the correct execution of network protocols in Mobile Ad-hoc Networks, it is not always guaranteed Therefore, misbehavior defection and reputation mechanisms need to be implemented in order to reinforce node cooperation. In this paper, we address the issue of detecting non-cooperative behavior during packet forwarding in clustered mobile Ad-hoc networks which operate under the coordination and supervision of a central entity. The proposed solution uses end-to-end authenticated acknowledgments for every transmitted packet. Low computational overhead is achieved by employing an adapted version of the TESLA symmetric key broadcast authentication protocol.
It is important to predict and analyze user acceptance of informationtechnology in order to address success and failures of technological products. The Theory of Reasoned Action (TRA) has been used for two decades in...
详细信息
ISBN:
(纸本)0769523153
It is important to predict and analyze user acceptance of informationtechnology in order to address success and failures of technological products. The Theory of Reasoned Action (TRA) has been used for two decades in empirical studies to predict user acceptance of informationtechnology. Agent-based modeling (ABM) is well suited for studying user acceptance of informationtechnology, which is an instance of contingent behavior. In this paper we extend our research on ABM of the TRA by comparing technology adoption rates across varied sections of a population. We discuss intention variations among laggards, innovators and the undecided sections of employees in an organization. Our implementation is cost effective and easy to use in contrast to the empirical method The results we produced corroborate the results obtained from the last few decades of empirical research in this field.
暂无评论