Cloud computing is an emerging business computing model whose basic idea is to transmit all kinds of resources through the Internet such as storage resources, computing resources, bandwidth and so forth. So users do n...
详细信息
Cloud computing is an emerging business computing model whose basic idea is to transmit all kinds of resources through the Internet such as storage resources, computing resources, bandwidth and so forth. So users do not need to purchase a large of computingsystems to manage their business, on the contrary they only need to purchase the resources according to their needs in order to reduce the cost greatly. Due to the flexibility, convenience and low maintenance cost of cloud computing, more and more service providers choose to deploy their services to the cloud. However, under the influence of uncertain factors such as manufacturing technology, the price and delivery time of virtual machine also been changed. Because of these variations, it is difficult for users to select the appropriate cloud servers at a minimum cost, which will lead to a decline in user experience. To solve the problems above, this paper analyzes the performance of different Ali Cloud servers and proposes a server selection strategy according to the size of the whole instance and the required time of completing the workflow, so as to make the whole workflow instances execution costs as little as possible in the regulations. We also provide experimental results to demonstrate the effectiveness of our selection strategies.
Recovering the legibility features is key to reverse engineering as the legible software systems can ease developer's code navigation and comprehension. Landmarks are important legibility features that developers ...
详细信息
Recovering the legibility features is key to reverse engineering as the legible software systems can ease developer's code navigation and comprehension. Landmarks are important legibility features that developers use as reference points. In this paper, we leverage visual clustering to explore how landmarks can be identified via static dependencies. Besides organizing software entities with coherent patterns, visual clustering offers additional insights by rigorously rendering a holistic picture of the code base to the two-dimensional space. We contribute a couple of heuristics based on the cluster layout to identify the landmark files. Our visual exploration of Eclipse Mylyn open source Java project reveals developer's reliance on the landmarks during code navigation and shows the promise of using static dependencies to uncover the landmarks in the software space.
this paper extends the notion of information processing capacity for non-independent input signals in the context of reservoir computing (RC). the presence of input autocorrelation makes worthwhile the treatment of fo...
详细信息
this tutorial presents concepts and basics of distributedcomputing which are important (at least from the author's point of view!), and should be known and mastered by Master students, researchers, and engineers....
详细信息
ISBN:
(纸本)9781509014828
this tutorial presents concepts and basics of distributedcomputing which are important (at least from the author's point of view!), and should be known and mastered by Master students, researchers, and engineers. those include: (a) a characterization of distributedcomputing (which is too much often confused with parallel computing);(b) the notion of a synchronous system and its associated notions of a local algorithm and message adversaries;(c) the notion of an asynchronous shared memory system and its associated notions of universality and progress conditions;and (d) the notion of an asynchronous messagepassing system with its associated broadcast and agreement abstractions, its impossibility results, and approaches to circumvent them. Hence, the tutorial can be seen as a guided tour to key elements that constitute basics of distributedcomputing.
A spiking neuron and 3-terminal Resistive RAM (RRAM) model are proposed and simulated as a neural network. the system is analyzed as a complex network of spiking neurons connected by synapses to demonstrate a biologic...
详细信息
ISBN:
(纸本)9781509063895
A spiking neuron and 3-terminal Resistive RAM (RRAM) model are proposed and simulated as a neural network. the system is analyzed as a complex network of spiking neurons connected by synapses to demonstrate a biologically-inspired associative memory. In recent years, Machine Learning and Artificial Intelligence have become popular fields due to readily available high performance computingsystems such as GPUs. Contrary to CPU and GPU machines, biologically-inspired neuromorphic hardware systems represent a distributed, in-memory computing alternative to solving complex problems. In this paper, we describe and simulate a process of training a crossbar of generalized 3-terminal RRAM devices to store and classify digits represented by matrices of analog currents.
Approximate computing is gaining increasing interest among the VLSI design community due to its potential for enabling low power, high speed, and less area while delivering acceptably correct computation results for m...
详细信息
ISBN:
(纸本)9781509063895
Approximate computing is gaining increasing interest among the VLSI design community due to its potential for enabling low power, high speed, and less area while delivering acceptably correct computation results for many digital signal processing applications. In this context, this paper considers for the first time asynchronous quasi-delay-insensitive (QDI) realizations of approximate adders which are compared with some existing accurate asynchronous QDI adders based on a 32/28nm CMOS technology. the simulation results and analysis show that approximate asynchronous computing is preferable over accurate asynchronous computing when the accuracy may be traded-off to achieve optimizations in the design metrics.
Developing and deploying infrastructure-based indoor localization solutions face significant challenges in the need of specialized user devices, costly and elaborative installation, configuration and maintenance, and ...
详细信息
this work presents a platform for decentralized distributedcomputing called Resilient Information Architecture for the Smart Grid (RIAPS) through a transactional energy and a traffic application.
ISBN:
(纸本)9781450349659
this work presents a platform for decentralized distributedcomputing called Resilient Information Architecture for the Smart Grid (RIAPS) through a transactional energy and a traffic application.
Message exchange is a central activity in distributedcomputing frameworks. Nevertheless, past research has paid little attention on profiling techniques and tools for endpoint communication. In this paper, we fill th...
ISBN:
(纸本)9781509014828
Message exchange is a central activity in distributedcomputing frameworks. Nevertheless, past research has paid little attention on profiling techniques and tools for endpoint communication. In this paper, we fill this gap by introducing a new fine-grained profiler for endpoints and communication between them in distributedsystems. Our tool aids efficient analysis, optimization, and tuning of endpoint communication in distributed frameworks. the paper presents an overview of our profiler, discusses employed profiling techniques and collected metrics, and shows preliminary results in profiling a well-known distributedcomputing framework.
the proceedings contain 26 papers. the special focus in this conference is on Stabilization, Safety, and Security of distributedsystems. the topics include: Marginal games and characterizations of the shapley value i...
ISBN:
(纸本)9789811067525
the proceedings contain 26 papers. the special focus in this conference is on Stabilization, Safety, and Security of distributedsystems. the topics include: Marginal games and characterizations of the shapley value in TU games;computingthe shapley value of threshold cardinality matching games;matrix analysis for the shapley value and its inverse problem;the general nucleolus of n-person cooperative games;a cooperative game approach to author ranking in coauthorship networks;a reduced harsanyi power solution for cooperative games with a weight vector;an allocation method of provincial college enrollment plan based on bankruptcy model;edgeworth equilibria of economies and cores in multi-choice NTU games;a game theory approach for deploying medical resources in emergency department;two-phase nonlinear programming models and method for interval-valued multiobjective cooperative games;models and algorithms for least square interval-valued nucleoli of cooperative games with interval-valued payoffs;interval-valued least square prenucleolus of interval-valued cooperative games with fuzzy coalitions;quadratic programming models and method for interval-valued cooperative games with fuzzy coalitions;cooperative games withthe intuitionistic fuzzy coalitions and intuitionistic fuzzy characteristic functions;a profit allocation model of employee coalitions based on triangular fuzzy numbers in tacit knowledge sharing;non-cooperative monomino games;bargaining model of mutual deterrence among three players with incomplete information;stakeholders’ behavior analysis and enterprise management strategy selection in Chinese ancient village tourism development;two bargain game models of the second-hand housing commence;some relaxed solutions of minimax inequality for discontinuous game;dynamic games of firm social media disclosure.
暂无评论