In this paper, we discuss performance of partition algorithms for parallel solution of large-scale nonlinear systems of equations. We describe first a block Broyden algorithm for solving a nonlinear system in which a ...
详细信息
ISBN:
(纸本)0780378407
In this paper, we discuss performance of partition algorithms for parallel solution of large-scale nonlinear systems of equations. We describe first a block Broyden algorithm for solving a nonlinear system in which a diagonal matrix is used as an iterative matrix. Then, we analyze the parallelism of the algorithm and discuss in details different partitioning schemes. Finally, we give some numerical results and analyze performance of the partitioning schemes. The numerical results show that the algorithms combining block Broyden method with partitioning techniques are effective, and that they can be used in the large-scale problems arising from scientific and engineering computing.
H.26L is an emerging video encoding standard proposed by ITU, which goal is for video communication and multicast in low bit rate conditions. This paper gives detailed analysis and performance tests for the parallelis...
详细信息
ISBN:
(纸本)0780378407
H.26L is an emerging video encoding standard proposed by ITU, which goal is for video communication and multicast in low bit rate conditions. This paper gives detailed analysis and performance tests for the parallelism of the H.26L video encoder test model long-term (TML8.0). Based on these tests, several parallel schedule strategies are discussed in different aspects, and the optimal one is selected and implemented by using MPI. At last, experiment results on Dawning-2000 MPP machines with different processors are given. The analysis and simulation results show that the H.26L has a good parallel performance and scalability on slice layer, and parallelcomputing can greatly speed up the processing of H.26L encoder. The experiment methods and results can be applied to many parallel systems for H.26L video processing.
Chord is a classical peer-to-peer document routing model. In this paper, we firstly present an improved Chord model, in which the nodes are organized into groups, to enhance the lookup efficiency and decrease the impa...
详细信息
ISBN:
(纸本)0769524052
Chord is a classical peer-to-peer document routing model. In this paper, we firstly present an improved Chord model, in which the nodes are organized into groups, to enhance the lookup efficiency and decrease the impact of dynamic environment. In addition, we propose a file storage strategy in the improved Chord model. With the strategy, shared file can be transmitted from multiple nodes simultaneously that could speed up the download, and at the same time the strategy can guarantee data security by means of introduction of a special metadata file.
A new mathematical morphology-based algorithm is proposed to achieve automatic center location of non-eye typhoon. The center of a non-eye typhoon is near the geometric center of the cloud system and has higher temper...
详细信息
ISBN:
(纸本)0780378407
A new mathematical morphology-based algorithm is proposed to achieve automatic center location of non-eye typhoon. The center of a non-eye typhoon is near the geometric center of the cloud system and has higher temperature. For each infrared satellite cloud image, the locating procedures are as follows: a) noises filtering, b) main cloud systems segmenting, c) center locating and d) multispectral image verification. The algorithms are based on operations of mathematical morphology, and designed in IBM SP2 massively parallel computer. The experiment results show that the algorithm locates the centers of most non-eye typhoons successfully and achieves faster, more precise and non-human interactive non-eye typhoon center positioning.
In a distributed web server system where tasks are not preemptible, the most important issue for improving quality of service (QoS) is how to realize fairness and reduce average slow down. In this paper, we analyze TA...
详细信息
ISBN:
(纸本)0780378407
In a distributed web server system where tasks are not preemptible, the most important issue for improving quality of service (QoS) is how to realize fairness and reduce average slow down. In this paper, we analyze TAGS (Task Assignment by Guessing Size) algorithm and put forward an algorithm named Extended TAGS by integrating Central Queue algorithm and TAGS, together with its performance analysis, system parameter setting algorithm subject to fairness requirement, and optimal grouping method.
The paper presents the pricing strategies for automatic agent, which is design for e-commerce in the reality. Given the characters of e-commerce in reality, the paper firstly model the bargaining process;Secondly clas...
详细信息
ISBN:
(纸本)0769524052
The paper presents the pricing strategies for automatic agent, which is design for e-commerce in the reality. Given the characters of e-commerce in reality, the paper firstly model the bargaining process;Secondly classify the bargaining scenarios and present the optimal bargaining strategy under sub-incomplete information for corresponding bargaining scenarios;then extend them to the optimal pricing strategies under incomplete information condition;Thirdly, discuss the conditions for convergence of optimal strategy;Finally, the analysis shows that the bargaining strategic profiles form the sequential equilibrium and the agreement is unique under certain conditions.
Optimal scheduling of tasks of a directed acyclic graph (DAG) onto a set of processors is a strong NP-hard problem. Because list scheduling has shown good performance and is less difficult to design, it has been studi...
详细信息
ISBN:
(纸本)0780378407
Optimal scheduling of tasks of a directed acyclic graph (DAG) onto a set of processors is a strong NP-hard problem. Because list scheduling has shown good performance and is less difficult to design, it has been studied and used widely. In this paper we present a new list scheduling scheme to schedule tasks of a DAG onto a homogeneous multi-processors system. The primary objective of this scheme is to minimize schedule length and scheduling time itself. We analyzed three typical list scheduling algorithms-MCP algorithm, ETF algorithm and BDCP algorithm, and find that they all can not guarantee the earliest schedules of the CPNs. In this paper, we propose a better list scheduling algorithm based on critical path, and its time-complexity is O(pv(2)). This algorithm always it is the most important purpose that schedule CPN as soon as it is a ready task, which makes the nodes that have the greatest influence to the scheduling length of the task graph be scheduled first. This greatly shortens the scheduling length of the task graph. We compare the performance of this algorithm with existing scheduling scheme through analysis and the result of experiments. The scheduling length generated by this algorithm is shorter than that of other scheduling algorithm.
Mobile computers and devices may operate in a variety of environments with different security schemes. In this paper, we present a Mobile Agent-Based Security Model, which supports flexible and specific security measu...
详细信息
ISBN:
(纸本)0780378407
Mobile computers and devices may operate in a variety of environments with different security schemes. In this paper, we present a Mobile Agent-Based Security Model, which supports flexible and specific security measures required by mobile computers and devices in distributed systems. We give a full description of Mobile Agent and its migration modes. After discussing possible security threats, our model is explained in detail and security analysis is also given.
Flexible intrusion detection and response system (ID&R) needs to maximize security while minimizing cost and making response automatically. (CID)-D-2&R, the Cost-based Intelligent Intrusion Detection and Respo...
详细信息
ISBN:
(纸本)0780378407
Flexible intrusion detection and response system (ID&R) needs to maximize security while minimizing cost and making response automatically. (CID)-D-2&R, the Cost-based Intelligent Intrusion Detection and Response System, is proposed in the paper, which is originally developed as a facility to deal with network-based attacks and to make effective response automatically and intelligently. The networking environment deployed with the (CID)-D-2&R consists of two major parts: Guard, which runs on the specific Guarded Host (GH), and Spy, which runs in Guarded Network (GN). The components of the (CID)-D-2&R are introduced, which include intrusion detection, attack classification, damage analysis, attack path rebuilding, resources automatically safeguarding, calamity recovery, and security Officer. The several kinds of data flow in (CID)-D-2&R are discussed, too. While (CID)-D-2&R is only a prototype, some experimental results are also presented.
This paper proposes a method to integrate the multi-data sources through the use of the Data Engine based on OPC (OLE for Process Control) specification. It introduces the generic architecture of the distributed data ...
详细信息
ISBN:
(纸本)0780378407
This paper proposes a method to integrate the multi-data sources through the use of the Data Engine based on OPC (OLE for Process Control) specification. It introduces the generic architecture of the distributed data integration. Then the Data Engine based on OPC specification is designed and the performance evaluation is done. The results show that a good performance and throughput could be achieved using the standard OPC data exchange mechanisms, and the data integration based on OPC specification has the characteristics of flexibility, upgradeability, openness and interoperability.
暂无评论