The layer3 switch enables us to fast transmit IP datagrams using the cut-through technique. The current layer3 router would become a bottleneck in terms of delay performance, as the amount of traffic injected into hig...
详细信息
We present improved algorithms for testing monotonicity of functions. Namely, given the ability to query an unknown function f: Σn ↦ Ξ where Σ and Ξ are finite ordered sets, the test always accepts a monotone f, a...
详细信息
The layer3 switch enables us to fast transmit IP datagrams using the cut-through technique. The current layer3 router would become a bottleneck in terms of delay performance, as the amount of traffic injected into hig...
详细信息
The layer3 switch enables us to fast transmit IP datagrams using the cut-through technique. The current layer3 router would become a bottleneck in terms of delay performance, as the amount of traffic injected into high speed networks gets relatively large. Thus, the layer3 switch should be an important element in constructing the next generation Internet backbone. We analyze the cut-through rate, the datagram waiting time and the mis-ordered rate of a layer3 switch in case of flow-driven connection setup. In the analysis, by using a 3-state Markov modulated Bernoulli process (MMBP), we model the arrival process of IP flow and IP datagram from each source. Furthermore, we investigate impacts of the arrival rate and the average datagram length on performance.
In this paper we compare efficiency of three versions of a parallel algorithm for finite element compressible fluid flow simulations on unstructured grids. The first version is based on the explicit model of parallel ...
详细信息
Time optimal control under bounded input has been studied. This paper presents a computational strategy to obtain the time optimal control for nonlinear systems, and discrete time control under input bound is consider...
详细信息
Time optimal control under bounded input has been studied. This paper presents a computational strategy to obtain the time optimal control for nonlinear systems, and discrete time control under input bound is considered. The swing up control of a single pendulum from pendant stable equilibrium to upright unstable equilibrium is used to illustrate our approaches. For a simplified model of the single pendulum, which is a second-order system, an approach based on the linear programming method is introduced, while for the actual single pendulum, an approach based on nonlinear optimization is introduced. Simulation results show that our computational approaches are feasible.
In the recent years, VOD (Video-On-Demand) systems have been extensively proposed, researched and developed because of their great marketable value. In this paper, we propose a total solution to construct and implemen...
详细信息
ISBN:
(纸本)0818672250
In the recent years, VOD (Video-On-Demand) systems have been extensively proposed, researched and developed because of their great marketable value. In this paper, we propose a total solution to construct and implement a practical PC-based VOD system. From the viewpoint of implementation, we separate our VOD system into three separate modules, including storage management module, communication module and playback module. We propose some special design, such as disk modeling and scheduling, lightweight transmission protocol and some playback mechanisms for these modules to meet the requirements of a VOD system.
Exact inference in densely connected Bayes an networks is computationally intractable, and so there is considerable interest in developing effective approximation schemes. One approach which has been adopted is to bou...
详细信息
ISBN:
(纸本)0262100762
Exact inference in densely connected Bayes an networks is computationally intractable, and so there is considerable interest in developing effective approximation schemes. One approach which has been adopted is to bound the log likelihood using a mean-field approximating distribution. While this leads to a tractable algorithm, the mean field distribution is assumed to be factorial and hence unimodal. In this paper we demonstrate the feasibility of using a richer class of approximating distributions based on mixtures of mean field distributions. We derive an efficient algorithm for updating the mixture parameters and apply it to the problem of learning in sigmoid belief networks. Our results demonstrate a systematic improvement over simple mean field theory as the number of mixture components is increased.
Garbage collection is especially useful for long running server applications in network environments since sustained memory leaks continuously degrade performance and eventually result in application failure. We demon...
详细信息
ISBN:
(纸本)0818690143
Garbage collection is especially useful for long running server applications in network environments since sustained memory leaks continuously degrade performance and eventually result in application failure. We demonstrate the benefits of a garbage collection technique that effectively mitigates performance degeneration due to memory leaks in applications when source code or object code are not available. Our technique is an extension of the garbage collection method known as conservative garbage collection. We refer to this as autonomous garbage collection. Our prototype demonstrates that this garbage collection technique is indeed feasible. Furthermore, our experimental results show that this technique is more general and easier to use than many of the previous garbage collection proposals targeted at resolving memory leaks in non-cooperative server applications.
There is much discussion about the undergraduate computer science curriculum. With the rapid changes in computer science, the need to stay current is mandatory while the ability to develop and implement a contemporary...
详细信息
There is much discussion about the undergraduate computer science curriculum. With the rapid changes in computer science, the need to stay current is mandatory while the ability to develop and implement a contemporary undergraduate curriculum is extremely time-consuming and costly. Four schools have each developed a different model to undergraduate computer science education. Each school believes the work done has been successfully implemented at the respective institutions. They also believe that these works can be successfully adapted by others. An overview is given of the laboratory models and topics developed for a laboratory activity.
暂无评论