This paper presents a new method that solves a mixed constraints problem by transforming it into a mixed integer programming problem. The method builds the connection between the feasibility of a mixed constraint prob...
详细信息
Thermal management is critical for clusters because of the increasing power consumption of modern processors, compact server architectures and growing server density in data centers. Thermal balancing mitigates hot sp...
详细信息
ISBN:
(纸本)9781424464425
Thermal management is critical for clusters because of the increasing power consumption of modern processors, compact server architectures and growing server density in data centers. Thermal balancing mitigates hot spots in a cluster through dynamic load distribution among servers. This paper presents two Control-theoretical Thermal Balancing (CTB) algorithms that dynamically balance the temperatures of different servers based on online measurements. CTB features controllers rigorously designed based on optimal control theory and a difference equation model that approximates the thermal dynamics of clusters. Control analysis and simulation results demonstrate that CTB achieves robust thermal balancing under a wide range of uncertainties: (1) when different tasks incur different power consumptions on the CPUs, (2) when servers experience different ambient temperatures, and (3) when servers experience thermal faults.
In this article, a recent metaheuristic method, cat swarm optimization, is introduced to find the proper clustering of data sets. Two clustering approaches based on cat swarm optimization called Cat Swarm Optimization...
详细信息
In this article, a recent metaheuristic method, cat swarm optimization, is introduced to find the proper clustering of data sets. Two clustering approaches based on cat swarm optimization called Cat Swarm Optimization Clustering (CSOC) and K-harmonic means Cat Swarm Optimization Clustering (KCSOC) are proposed. In the proposed methods, seeking mode and tracing mode are adopted to exploit and explore the solution space. In addition, K-Harmonic Means (KHM) operation is designed to refine the population and accelerate the convergence of the clustering algorithm. Experimental results on six real life data sets are given to illustrate the effectiveness of the proposed algorithms.
Combinatorial testing is an important approach to detecting interaction errors for a system with several parameters. Existing research in this area assumes that all parameters of the system under test are always effec...
详细信息
Combinatorial testing is an important approach to detecting interaction errors for a system with several parameters. Existing research in this area assumes that all parameters of the system under test are always effective. However, in many realistic applications, there may exist some parameters that can disable other parameters in certain conditions. These parameters are called shielding parameters. Shielding parameters make test cases generated by the existing test model, which uses the Mixed Covering Array (MCA), fail in exposing some potential errors that should be detected. In this paper, the Mixed Covering Array with Shielding parameters (MCAS) is proposed to describe such problems. Then test cases can be generated by constructing MCAS's in three different approaches. According to the experimental results, our test model can generate satisfactory test cases for combinatorial testing with shielding parameters.
The Informedia group participated in four tasks this year, including Semantic indexing, Known-item search, Surveillance event detection and Event detection in Internet multimedia pilot. For semantic indexing, except f...
详细信息
The Informedia group participated in four tasks this year, including Semantic indexing, Known-item search, Surveillance event detection and Event detection in Internet multimedia pilot. For semantic indexing, except for training traditional SVM classifiers for each high level feature by using different low level features, a kind of cascade classifier was trained which including four layers with different visual features respectively. For Known Item Search task, we built a text-based video retrieval and a visual-based video retrieval system, and then query-class dependent late fusion was used to combine the runs from these two systems. For surveillance event detection, we especially put our focus on analyzing motions and human in videos. We detected the events by three channels. Firstly, we adopted a robust new descriptor called MoSIFT, which explicitly encodes appearance features together with motion information. And then we trained event classifiers in sliding windows using a bag-of-video-word approach. Secondly, we used the human detection and tracking algorithms to detect and track the regions of human, and then just focus on the MoSIFT points in the human regions. Thirdly, after getting the decision, we also borrow the results of human detection to filter the decision. In addition, to reduce the number of false alarms further, we aggregated short positive windows to favor long segmentation and applied a cascade classifier approach. The performance shows dramatic improvement over last year on the event detection task. For event detection in internet multimedia pilot, our system is purely based on textual information in the form of Automatic Speech Recognition (ASR) and Optical Character Recognition (OCR).We submitted three runs;a run based on a simple combination of three different ASR transcripts, a run based on OCR only and a run that combines ASR and OCR. We noticed that both ASR and OCR contribute to the goals of this task. However the video collection is ver
The Joint Task Force Global Network Operations (JTF-GNO) center is a subset of the Defense Information Systems Agency that is directly in charge of the security and architecture of the Department of Defense Global Inf...
详细信息
The Joint Task Force Global Network Operations (JTF-GNO) center is a subset of the Defense Information Systems Agency that is directly in charge of the security and architecture of the Department of Defense Global Information Grid. Since the inception of the JTF-GNO, the architecture has continually changed due to technical advances and increasing security concerns. Although many new systems have been added to increase efficiency, ad-hoc processes remain that should be automated and added to the overall architecture. Many new software technologies can be utilized in order to streamline current processes. The first part of this paper will lay out the architecture that is currently in place. This will include the systems in place that process machine and human generated reports from all subordinate units and agencies, and the systems used to present this data and report it to the Strategic Command. Once this architecture is presented, pieces found that are manual or ad-hoc will be examined to determine if they can be automated. Finally, an architecture will be presented as a “way ahead” for the JTF-GNO that will aid in increasing the efficiency and effectiveness of the JTF-GNO center.
Recently, cluster synchronization has attracted an increasing interest in various disciplines, includingmathematics, physics, and engineeringsciences. This paper further investigates the cluster synchronization of a ...
详细信息
According to the application requirements of granary environment, short-range wireless transmission method is employed to design a temperature and humidity monitoring system of granary, which is based on Atmega128 mic...
详细信息
The changes in dynamic workflows are various, such as role-based dynamic workflows, resource based dynamic workflows and so on. A routing-based dynamic workflow is proposed in this study and Agent technology is introd...
详细信息
暂无评论