Silicosis is one of the most serious occupational diseases in China. Radiologist information comes from chest radiographs, in which the most important parts are lung fields and ribs. It is necessary to distinguish lun...
详细信息
ISBN:
(纸本)9781605588407
Silicosis is one of the most serious occupational diseases in China. Radiologist information comes from chest radiographs, in which the most important parts are lung fields and ribs. It is necessary to distinguish lung fields and ribs from other organs. The anatomical knowledge-based lung segmentation can improve the accuracy of segmentation and solve the problems of opened region and lost clavicle region. The curve model-based rib segmentation can acquire more accurate rib location information, and provide more efficient orientation for latter diagnosis. These two methods are also deployed in grid environment to get higher efficiency when processing massive and distributed medical data for silicosis diagnosis. Experiments show that the two proposed algorithms can meet the latter medical requirements for chest radiograph with higher accuracy. Copyright 2009 ACM.
In order to achieve low delay services in VoIP, we can use application-layer routing scheme, which is to find proper relay nodes to intermediate voice packets from the source peer to the destination peer. The difficul...
详细信息
ISBN:
(纸本)9781605581279
In order to achieve low delay services in VoIP, we can use application-layer routing scheme, which is to find proper relay nodes to intermediate voice packets from the source peer to the destination peer. The difficulty of the scheme is how to find the proper relay nodes, which we call relay problem. This paper presents a new application-layer routing scheme, called DPLM, to resolve relay problem. We introduced the mechanism in detail, and evaluated our mechanism in NS2 network simulation environment and got a high relay node hit ratio result, which confirms the feasibility of a real system. Also we make a comparison with traditional schemes, and the results show that DPLM scheme has good performances. Copyright 2008 ACM.
Recent advance of virtualization technology provides a new approach to check-point/restart at the virtual machine(VM) *** contrast to traditional process-level checkpointing,checkpointing at the virtualization layer b...
详细信息
Recent advance of virtualization technology provides a new approach to check-point/restart at the virtual machine(VM) *** contrast to traditional process-level checkpointing,checkpointing at the virtualization layer brings up several advantages,such as compatibility,transparence,flexibility and ***,because the virtualization layer has little semantic knowledge about the operation system and the applications running atop,VM-layer checkpointing requires saving the entire operating system state rather than a single *** overhead may render the approach *** reduce the size of VM checkpoint,in this paper we propose a page eviction scheme and an incremental checkpointing mechanism to avoid saving unnecessary VM pages in the *** keep the system online transparently,we propose a live checkpointing mechanism by saving the memory image in a copy-on-write(COW) *** implement the performance optimization mechanisms in a prototype system,called *** results with a group of representative applications show that our page eviction scheme and incremental checkpointing can significantly reduce the checkpoint file size by up to 87% and shorten the total checkpointing/restart time by a factor of up to 71%,in comparison with the Xens default checkpointing *** observed application downtimes due to checkpointing can be reduced to as small as 300 ms.
Transactional memory (TM) is a parallel programming concept which reduces challenges in parallel programming. Existing distributed transactional memory system consumes too much bandwidth and brings high latency. In th...
详细信息
Temporal error concealment at the video communication receiver recovers damaged blocks using temporal information redundancy. To enhance the quality of reconstructed image, a multiple-reference temporal error concealm...
详细信息
Nowadays, Peer-to-Peer technology has been widely used in live streaming applications and many related systems are proposed. However, their single overlay design and unbalanced scheduling methods lead to some ineffici...
详细信息
ISBN:
(纸本)9781595937575
Nowadays, Peer-to-Peer technology has been widely used in live streaming applications and many related systems are proposed. However, their single overlay design and unbalanced scheduling methods lead to some inefficiency including high control overhead and bad playback experience. This paper mainly discusses how to address these certain problems. We introduce a hybrid architecture to solve the locality problem and reduce the control overhead. We also propose a scheduling method to achieve load balance. All solutions are implemented in Anysee2.
Summary The nonuniform memory access (NUMA) architecture has been used extensively in data centers. Most of the previous works used single-threaded multiprogrammed workloads to study the performance of NUMA systems, w...
详细信息
Bloom filters are widely used in databases and network areas. These filters facilitate efficient membership checking with a low false positive ratio. It is a way to improve the throughput of bloom filter by parallel p...
详细信息
Cryptographic functions, such as encryption/decryption libraries, are common and important tools for applications to enhance confidentiality of the data. However, these functions could be compromised by subtle attacks...
详细信息
Long-running stream applications usually share the same fundamental computational infrastructure. To improve the efficiency of data processing in stream processing systems, a data analysis operator could be partitione...
详细信息
暂无评论