Conventional project management techniques have been provided an effective tool to develop the optimal project schedule in the planning stage. However, in real world cases, very often projects are executed with high u...
详细信息
Data encryption process can easily be quite complicated and usually requires significant computation time and power despite significant simplifications. this paper discusses about pipelined and non-pipelined implement...
详细信息
the proceedings contain 32 papers. the special focus in this conference is on Soft computing Models in Industrial Applications. the topics include: Hybrid Dynamic Planning Mechanism for Virtual Organizations;a Multiob...
ISBN:
(纸本)9783642131608
the proceedings contain 32 papers. the special focus in this conference is on Soft computing Models in Industrial Applications. the topics include: Hybrid Dynamic Planning Mechanism for Virtual Organizations;a Multiobjective Variable Neighborhood Search for Solving the Motif Discovery Problem;Combinatorial Auctions for Coordination and Control of Manufacturing MAS: Updating Prices Methods;Solving the Routing and Wavelength Assignment Problem inWDM Networks by Using a Multiobjective Variable Neighborhood Search Algorithm;a Software Tool for Harmonic Distortion Simulation Caused by Non-linear Household Loads;Scalable Intelligence and Adaptation in Scheduling DSS;optimization of Parallel Manipulators Using Evolutionary algorithms;iGenda: An Event Scheduler for Common Users and Centralised systems;a Parallel Cooperative Evolutionary Strategy for Solving the Reporting Cells Problem;multi-criteria Manipulator Trajectory Optimization Based on Evolutionary algorithms;a Decision Support System for Logistics Operations;combining Heuristics Backtracking and Genetic Algorithm to Solve the Container Loading Problem withWeight Distribution;greenhouse Heat Load Prediction Using a Support Vector Regression Model;evaluating the Low Quality Measurements in Lighting Control systems;GRASP Algorithm for Optimization of Grids for Multiple Classifier System;soft computing Models for an Environmental Application;a Scatter Search Based Approach to Solve the Reporting Cells Problem;fuzzy Optimization of Start-Up Operations for Combined Cycle Power Plants;multi-Network-Feedback-Error-Learning with Automatic Insertion;catalog Segmentation by Implementing Fuzzy Clustering and Mathematical Programming Model;an Optimized 3D Surface Reconstruction Method Using Spatial Kalman Filtering of Projected Line Patterns;the Gene Expression Programming Applied to Demand Forecast;decision Making and Quality-of-Information;brain Magnetic Resonance Spectroscopy Classifiers.
A man walks into a men's room and observes n empty urinals. Which urinal should he pick so as to maximize his chances of maintaining privacy, i.e., minimize the chance that someone will occupy a urinal beside him?...
详细信息
ISBN:
(纸本)9783642131219
A man walks into a men's room and observes n empty urinals. Which urinal should he pick so as to maximize his chances of maintaining privacy, i.e., minimize the chance that someone will occupy a urinal beside him? in this paper, we attempt to answer this question under a variety of models for standard men's room behavior. Our results suggest that for the most part one should probably choose the urinal furthest from the door (with some interesting exceptions). We also suggest a number of variations on the problem that lead to many open problems.
the development of accurate models to describe and predict pressure inactivation kinetics of microorganisms is very beneficial to the food industry for optimization of process conditions. the need for "intelligen...
详细信息
the scientific field of mobility management receives greater attention as traffic congestion and its severe effects cannot be dealt in an effective way. this mainly occurs in urban areas. How are these issues handled ...
详细信息
COPD is a spreading respiratory disease claiming more and more deaths. the aim of this study was to develop a method, which enables the computerized recognition of COPD in the course of pulmonary screening. At pulmona...
详细信息
the proceedings contain 17 papers. the topics discussed include: the physical basis of RFID security;still and silent: motion detection for enhanced RFID security and privacy without changing the usage model;cryptanal...
ISBN:
(纸本)3642168213
the proceedings contain 17 papers. the topics discussed include: the physical basis of RFID security;still and silent: motion detection for enhanced RFID security and privacy without changing the usage model;cryptanalysis of the David-Prasad RFID ultralightweight authentication protocol;practical NFC peer-to-peer relay attack using mobile phones;strong authentication and strong integrity (SASI) is not that strong;privacy models for RFID schemes;on the claimed privacy of EC-RAC III;anonymous RFID authentication using trusted computing technologies;tree-based RFID authentication protocols are definitively not privacy-friendly;hardware intrinsic security;privacy-preserving pattern matching for anomaly detection in RFID anti-counterfeiting;time measurement threatens privacy-friendly RFID authentication protocols;anonymous authentication for RFID systems;and leakage-resilient RFID authentication with forward-privacy.
Controlling power consumption and temperature is of major concern for modern computingsystems. In this work we characterize thermal behavior and power consumption of an IBM POWER6 (TM)-based system. We perform the ch...
详细信息
ISBN:
(纸本)9781450301787
Controlling power consumption and temperature is of major concern for modern computingsystems. In this work we characterize thermal behavior and power consumption of an IBM POWER6 (TM)-based system. We perform the characterization at several levels: application, operating system, and hardware level, both when the system is idle, and under load. At hardware level, we report a 25% reduction in total system power consumption by using the processor low power mode. We also study the effect of the hardware thread prioritization mechanism provided by POWER6 on different workloads and how this mechanism can be used to limit power consumption. At OS level, we analyze the power reduction techniques implemented in the Linux kernel, such as the tickless kernel and the CPU idle power manager. At application level, we characterize the power consumption and the temperature of two sets of benchmarks (METbench and SPEC CPU2006) and we study the effect of workload characteristics on power consumption and core temperature. From this characterization we derive a model based on performance counters that allows us to predict the total power consumption of the POWER6 system with an average error under 3% for CMP and 5% for SMT. To the best of our knowledge, this is the first power model of a system including CMP+SMT processors. Finally, we show that the static decision on whether to consolidate tasks into the same core/chip, as it is currently done in Linux, can be improved by dynamically considering the low-power capabilities of the underlying architecture and the characteristics of the application (up to 5X improvement in (EDP)-P-2).
the proceedings contain 35 papers. the topics discussed include: the Nornir run-time system for parallel programs using Kahn process networks;network performance of pruned hierarchical Torus network;super-peer availab...
ISBN:
(纸本)9780769538372
the proceedings contain 35 papers. the topics discussed include: the Nornir run-time system for parallel programs using Kahn process networks;network performance of pruned hierarchical Torus network;super-peer availability prediction strategy in unstructured P2P network;VirtualNet: mapping distributed communication on a single node;DPM: a demand-driven virtual disk prefetch mechanism for mobile personal computing environments;explorations of honeycomb topologies for network-on-chip;adaptive energy-efficient packet transmission for voice delivering in wireless sensor networks;sleep scheduling and gradient query in sensor networks for target monitoring;re-exploring the potential of using tree structure in P2P live streaming networks;reliable downloading algorithms for BitTorrent-like systems;a theoretical model of lock-keeper data exchange and its practical verification;and system level speedup oriented cache partitioning for multi-programmed systems.
暂无评论