As an effective tool for knowledge discovery, concept lattice has been successfully applied to various fields. One of the key problems of knowledge discovery is knowledge reduction. This paper studies attribute reduct...
详细信息
The paper presents a survey of deployable structural systems found in some biological organisms. Four biological systems are presented and analysed in terms of their morphology, kinematics and structural characteristi...
详细信息
The paper presents a survey of deployable structural systems found in some biological organisms. Four biological systems are presented and analysed in terms of their morphology, kinematics and structural characteristics. This presentation is followed by an evaluation of the similarity of the biological systems with existing deployable structures and of potential applications. The four biological systems surveyed are two types of insect wings - Coleoptera (beetles) and locust;locomotion of the earthworm;and the jaw of the egg eater snake (Dasypeltis). These systems represent a diversity of deployable mechanisms. The paper concludes by associating the surveyed and other biological systems with known deployable structural systems such as: folded plates, tensioned membrane, pneumatic tubes (pneus) and structures composed of articulated rigid members.
JASIAC (Java-based Active-network Secure Inter Active Application Communication) provides a mechanism to solve the security problem for active application communication for active networks. JASIAC can work against &qu...
详细信息
JASIAC (Java-based Active-network Secure Inter Active Application Communication) provides a mechanism to solve the security problem for active application communication for active networks. JASIAC can work against "un-authorization access" and "masquerading" quite well and work efficiently with "malicious access " and "direct DoS attack". It stores the variables and methods to be published in a public variable pool and public method pool respectively, so it makes the security manageable and efficient; it also provides multilevel security mechanisms such as timed variable, hiding inner name, parameter by value and read-only parameter to make the security reliable and flexible.
Load balancing technique may improve the performance and scalability of the Internet greatly. Many researchers focus on intra-domain load balancing which distributes traffic over multiple paths or server farms in a si...
详细信息
ISBN:
(纸本)0780390156
Load balancing technique may improve the performance and scalability of the Internet greatly. Many researchers focus on intra-domain load balancing which distributes traffic over multiple paths or server farms in a single domain. However, there is little research on interdomain (such as inter-AS or inter-PoP) load balancing due to the loose relationship and complex policies among domains. It is important to study inter-domain load balancing under the trend toward a denser mesh of inter-domain connectivity within the Internet. In this paper, we propose a distributed and dynamic load balancing mechanism using a hashing-based algorithm to distribute traffic between domains which preserves per-flow packet ordering and supports unequal weighted distribution when dynamic adaptation is used. We also evaluate the performance of the mechanism.
The variable, uncertain nature of climate imposes risk in using solar and building technologies, such as natural ventilation (NV). To maximize the potential benefit from NV while reducing risk, a building could be des...
详细信息
Mobile networks differ from their wireline counterparts mainly by the high costs for air transmissions and by the mobility of the users. A new entity, denoted as the crawling peer, is suggested in order to optimize th...
详细信息
Mobile networks differ from their wireline counterparts mainly by the high costs for air transmissions and by the mobility of the users. A new entity, denoted as the crawling peer, is suggested in order to optimize the resource mediation mechanism for a mobile P2P file sharing application. The crawling peer locates content on behalf of mobile peers. It is placed in the wireline part of the mobile network and thus, does not suffer from the above mentioned restrictions. The crawling peer is part of a comprehensive mobile P2P file sharing architecture [1] which is based on the popular eDonkey file sharing application. The performance of three querying strategies of the crawling peer is investigated with respect to banning at the index servers and the response time of requests, i.e. the time to find a file. The results show that the selection of an appropriate request strategy for the crawling peer maximizes the probabihty of locating a file while the probability to be banned by an eDonkey index server is minimized.
Instruction queues consume a significant amount of power in a high-performance processor. The wakeup logic delay is also a critical timing parameter. This paper compares a commonly used CAM-based instruction queue org...
详细信息
Instruction queues consume a significant amount of power in a high-performance processor. The wakeup logic delay is also a critical timing parameter. This paper compares a commonly used CAM-based instruction queue organization with a new pointer-based design for delay and energy efficiency. A design and pre-layout of all critical structures in 70nm technology is performed for both organizations. The pointer-based design is shown to use 10 to 15 times less power than the CAM-based design, depending on queue size, for a 4-wide issue, 5GHz processor. The results also demonstrate the importance of evaluating all steps of instruction queue access: allocation, issue and wakeup rather than wakeup alone, especially for power consumption.
Software is no longer developed and discussed only by computerscience majors. Software development and engineering is a professional concentration area in architecture, engineering and construction (AEC) fields, amon...
详细信息
ISBN:
(纸本)0784407940
Software is no longer developed and discussed only by computerscience majors. Software development and engineering is a professional concentration area in architecture, engineering and construction (AEC) fields, among many others. Graduates of AEC related fields, who are motivated by problems which can be addressed better with computation or with better computation, often return to school to pursue graduate studies devoted to understanding computation of the professional problems they encounter. These students understand discipline specific issues in their fields well. However, in contrast to computerscience majors, they lack techniques that can help them formulate solutions in software engineering terms. Asking such students to take classes from computerscience curricula fosters interdisciplinary thinking;however, this practice fails to address the specialized computational needs of the AEC fields. An in depth understanding of how to use software development as a problem analysis approach can provide AEC students, both in the graduate and undergraduate levels, with problem classification techniques that they need. Here, we will describe our experience in introducing graduate AEC students to software requirement elicitation and development process techniques.
The main functionality of the domain name system (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, many improvements have been proposed f...
详细信息
The main functionality of the domain name system (DNS) is to translate symbolic names into IP addresses. Due to the criticality of DNS for the proper functioning of the Internet, many improvements have been proposed for DNS in terms of security and dependability. However, the current secure DNS (DNSSEC) standard has still several problems that need further consideration. For example, online updates and denial of service attacks are not sufficiently addressed. These problems are serious obstacles that might prevent DNSSEC from replacing the traditional DNS. In this paper we discuss several of these technical and economic problems. To address these issues, we propose a simple extension to the existing DNS. It is SSL based and individual domains can decide independently of each other if and when to adopt the extensions. We show how to implement these extensions with the help of a simple proxy DNS server.
We propose a simulation-based method in the verification of SoC bus system. By the method, constrained-random vector is used to make simulation first;then a coverage analysis is made in the simulation process until a ...
详细信息
We propose a simulation-based method in the verification of SoC bus system. By the method, constrained-random vector is used to make simulation first;then a coverage analysis is made in the simulation process until a certain coverage statistics is obtained. Finally, the test vector is manually generated. We use this method to verify a SoC system and get a satisfactory result by reducing the time of simulation effectively.
暂无评论