Orthogonalization consumes much of the run time of many iterative methods for solving sparse linear systems and eigenvalue problems. Commonly used algorithms, such as variants of Gram-Schmidt or Householder QR, have p...
详细信息
This paper discusses the challenges in searching imposed by the burgeoning field of Internet of Things (IoT). It first overviews the evolution of the new field to its predecessors: searching in the mobile computing, u...
详细信息
The development of multi-core processor makes the parallelization of traditional sequential algorithms increasingly important. Meanwhile, transactional memory serves a good parallel programming model. This paper takes...
详细信息
The proceedings contain 33 papers. The topics discussed include: static average case analysis fork-join framework programs based on MOQA method;parallelizing a coarse grain graph search problem based upon LDPC codes o...
ISBN:
(纸本)9780769543970
The proceedings contain 33 papers. The topics discussed include: static average case analysis fork-join framework programs based on MOQA method;parallelizing a coarse grain graph search problem based upon LDPC codes on a supercomputer;an approach towards automation firmware modeling for an exploration and evaluation of efficient parallelization alternatives;communication on the fly for hierarchical systems of chip multi-processors;optimizing heterogeneous 3D networks-on-chip;a dynamic core grouping approach to improve raw architecture many-core processor performance;event-driven scheduling for parallel stream processing;optimal placement of the wind generators in the medium voltage power grid;potential of general purpose graphic processing unit for energy management system;goal-oriented adaptive workload management for irregular applications;and distributed program control flow and behavior governed by global states monitoring.
The BOINC toolkit is a very successful software infrastructure for the development of "volunteer computing" projects. For data distribution, the standard BOINC architecture provides uses a centralized server...
详细信息
Particle filters (or PFs) are widely used for the tracking problem in dynamic systems. Despite their remarkable tracking performance and flexibility, PFs require intensive computation and communication, which are stri...
详细信息
The next generation of advanced mechatronic systems is expected to enhance their functionality and improve their performance by context-dependent behavior. Therefore, these systems require to represent information abo...
详细信息
ISBN:
(纸本)9780769540375
The next generation of advanced mechatronic systems is expected to enhance their functionality and improve their performance by context-dependent behavior. Therefore, these systems require to represent information about their complex environment and changing sets of collaboration partners internally. This requirement is in contrast to the usually assumed static structures of embedded systems. In this paper, we present a model-driven approach which overcomes this situation by supporting dynamic data structures while still guaranteeing that valid worst-case execution times can be derived. It supports a flexible resource manager which avoids to operate with the prohibitive coarse worst-case boundaries but instead supports to run applications in different profiles which guarantee different resource requirements and put unused resources in a profile at other applications' disposal. By supporting the proper estimation of worst case execution time (WCET) and worst case number of iteration (WCNI) at runtime, we can further support to create new profiles, add or remove them at runtime in order to minimize the over-approximation of the resource consumption resulting from the dynamic data structures required for the outlined class of advanced systems.
The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distributed but actually aggregated services, such as e...
详细信息
ISBN:
(纸本)9783642191244
The security requirements of complex multi-tier web applications have shifted from simple localized needs, such as authentication or authorization, to physically distributed but actually aggregated services, such as end-to-end data protection, non-repudiation or patient consent management. Currently, there is no support for integrating complex security services in web architectures, nor are approaches from other architectural models easily portable. In this paper we present the architecture of a security middleware, aimed at providing a reusable solution bringing support for complex security requirements into the application architecture, while addressing typical web architecture challenges, such as the tiered model or the lack of sophisticated client-side logic. We both evaluate the security of the middleware and present a case study and prototype implementation, which show how the complexities of a web architecture can be dealt with while limiting the integration effort.
Formal methods are mathematically-based techniques for specifying, developing and verifying a component or system, in order to increase the confidence regarding to the reliability and robustness of the target. Formal ...
详细信息
Clustering in wireless sensor networks (WSNs) is an important technique to prolong lifetime of a WSN. This paper proposes energy efficient multi-level clustering scheme called Power Aware Multi-level Clustering (PAMC)...
详细信息
ISBN:
(纸本)9789604742776
Clustering in wireless sensor networks (WSNs) is an important technique to prolong lifetime of a WSN. This paper proposes energy efficient multi-level clustering scheme called Power Aware Multi-level Clustering (PAMC) for homogeneous wireless sensor networks. Further, we also apply the proposed multi-level clustering scheme for heterogeneous wireless sensor networks. Due to large area of deployment, the network needs to have a multi-level clustering protocol that will enable far-off nodes to communicate with the base station. Simulation is used to analyze the proposed protocols and compare the performance with existing protocol EEMC. Simulation results demonstrate that our proposed protocols are effective in prolonging the network lifetime.
暂无评论