A developed adaptive forecasting model for cloud resource allocation is presented. It employs principal component analysis on a sequence of virtual machine (VM) requests. Requests are processed to detect anomalies, an...
详细信息
This paper describes the development of an auto-active verification technique in the Frama-C framework. We outline the lemma functions method and present the corresponding ACSL extension, its implementation in Frama-C...
详细信息
ISBN:
(纸本)9781728112763;9781728112756
This paper describes the development of an auto-active verification technique in the Frama-C framework. We outline the lemma functions method and present the corresponding ACSL extension, its implementation in Frama-C, and evaluation on a set of string-manipulating functions from the Linux kernel. We illustrate the benefits our approach can bring concerning the effort required to prove lemmas, compared to the approach based on interactive provers such as Coq. Current limitations of the method and its implementation are discussed.
A numerical study on the flow over a square cylinder in the vicinity of a wall is conducted for different Couette-Poiseuille-based non-uniform flow with the non-dimensional pressure gradient P varying from 0 to 5. The...
详细信息
Selective laser melting (SLM) is a three dimensional (3D) printing process which can manufacture functional parts with complex geometries as an alternative to using traditional processes (i.e. via machining of wrought...
详细信息
OMG's (Object Management Group) CORBA (Common Object Request Broker Architecture) is becoming a common platform for distributed computing environment. However, it is yet to address CSCW (computer Supported Collabo...
详细信息
OMG's (Object Management Group) CORBA (Common Object Request Broker Architecture) is becoming a common platform for distributed computing environment. However, it is yet to address CSCW (computer Supported Collaborative Work) ftamework. This paper addresses the problem of building a framework for CSCW and proposes a new CSCW framework based on CORBA (CFC). CFC includes session, participant, mode, directory, stream, media and resource management. A desktop conference system and DSM-CC compliant video-on-demand system were built to demonstrate the usefulness of the framework. The performance of CORBA based CSCW applications is given. The strengths and weaknesses of using a CORBA framework are also discussed.
Currently, there is a need in Ukraine for the design and development of multidisciplinary decision support systems (DSSs) for the medical and other related spheres - for example, the medical law sector, in particular,...
ISBN:
(数字)9781728199573
ISBN:
(纸本)9781728199580
Currently, there is a need in Ukraine for the design and development of multidisciplinary decision support systems (DSSs) for the medical and other related spheres - for example, the medical law sector, in particular, the DSS for the surrogacy's legal regulation field. This DSS will be able to protect doctors from potentially wrong decisions by taking into account all available information when making the decisions. For design such DSS, it's necessary to conduct the modelling of the decision-making process on surrogacy's legal conducting, that is the goal of this research. In this paper, there are the theoretical foundations of using the ontologies for the decision-making process on surrogacy's legal conducting, a model of base ontology with the necessary requirements and recommendations for conducting the surrogate motherhood, and ontology-based model of the decision-making process on surrogacy's legal conducting. The conducted modelling is a theoretical basis for the development of methods and design of DSS in the field of legal regulation of surrogate motherhood.
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilev...
详细信息
The paper proposes the architecture of distributed multilevel detection system of malicious software in local area networks. Its feature is the synthesis of its requirements of distribution, decentralization, multilevel. This allows you to use it autonomously. In addition, the feature of autonomous program modules of the system is the same organization, which allows the exchange of knowledge in the middle of the system, which, unlike the known systems, allows you to use the knowledge gained by separate parts of the system in other parts. The developed system allows to fill it with subsystems of detection of various types of malicious software in local area networks.
Fog computing extends the capabilities of cloud computing by enabling computing at the edge of the network, involving devices such as mobile collaborative devices or fixed nodes with integrated storage, computing, and...
Fog computing extends the capabilities of cloud computing by enabling computing at the edge of the network, involving devices such as mobile collaborative devices or fixed nodes with integrated storage, computing, and communication capabilities. Fog computing offers benefits such as improved efficiency, increased security, savings in network bandwidth, and increased flexibility. In order to provide a complete understanding of Fog computing, this paper presents its salient features and highlights the differences from cloud computing research. Cloud computing is an emerging technology that offers computing resources on a pay-per-use basis. It provides three service models, and the cloud offers cost-effective centrally managed resources for reliable computing for specific tasks. This document presents a comparison between Fog computing and cloud computing, highlighting the differences in design, deployment, services, and tools available to organizations and users. By explicating the distinctiveness of fog computing and its contrast to cloud computing, we contribute to the field by shedding light on the unparalleled potential of fog computing in conserving resources while delivering robust computational solutions at the network periphery. Our study offers a new perspective that challenges the prevailing practices and extends the discourse on optimizing distributed computing architectures.
It is well known that extracting parallel loops plays a significant role in designing parallelizing compilers. The execution efficiency of a loop is enhanced when the loop can be executed in parallel or partial parall...
详细信息
ISBN:
(纸本)0818672676
It is well known that extracting parallel loops plays a significant role in designing parallelizing compilers. The execution efficiency of a loop is enhanced when the loop can be executed in parallel or partial parallel, like a DOALL or DOACROSS loop. This paper reports on the practical parallelism detector (PPD) that is implemented in PFPC (a portable FORTRAN parallelizing compiler running on OSF/1) at NCTU to concentrate on finding the parallelism available in loops. The PPD can extract the potential DOALL and DOACROSS loops in a program by invoking a combination of the ZIV test and the I test for verifying array subscripts. Furthermore, if DOACROSS loops are available, an optimization of synchronization statement is made. Experimental results show that PPD is more reliable and accurate than previous approaches.
The application of a distributed intelligent control system for a group of unmanned aerial vehicles is substantiated, a method for coordinating their interaction to maximize the target indicator is proposed and substa...
详细信息
暂无评论