This paper presents a novel method on coloring the grayscale images. For this purpose, a combination of artificial neural networks and some image processing algorithms was developed to transfer colors from a user-sele...
详细信息
This paper presents a novel method on coloring the grayscale images. For this purpose, a combination of artificial neural networks and some image processing algorithms was developed to transfer colors from a user-selected source image to a target grayscale image. According to the results of this combining method, a survey where volunteers were asked to rate the plausibility of the colorings generated automatically was performed for individual images. In most cases automatically-colored images were rated either as totally or mostly acceptable.
For understanding the performance differences caused by different computer architectures and optimization technologies, the paper characterizes performance of SPEC CPU2006 benchmarks both on Intel and AMD platform. Us...
详细信息
For understanding the performance differences caused by different computer architectures and optimization technologies, the paper characterizes performance of SPEC CPU2006 benchmarks both on Intel and AMD platform. Using the performance events collected by Performance Monitor Unit, we compare their performance differences and analyze the causes from the features of architectures and the optimization technologies. Our results and analysis help the programmers better understand the memory performance and branch prediction performance which are caused by architectures and guide them in the optimization. The analysis also help the processor architects better balance among the key architecture factors such as memory disambiguation and hardware prefetch when doing architecture design decision.
Pervasive computing in mobile ad hoc networks requires that applications query their network environment for services and react to a plethora of events fired by other devices in that network responding to such queries...
详细信息
ISBN:
(纸本)9781605583648
Pervasive computing in mobile ad hoc networks requires that applications query their network environment for services and react to a plethora of events fired by other devices in that network responding to such queries. Current context-aware and event-driven architectures require the programmer to react to these events via a carefully crafted network of observers and event handlers, while inherently introducing complex concurrency issues. This paper proposes the integration of two techniques to solve these problems: ambient references and reactive programming. Ambient references are object-oriented communication abstractions that represent nearby remote objects in the mobile network and that make it possible to generate the events mentioned above. The reactive programming paradigm provides an abstraction over events such that the application can be written in a conventional programming style with explicit control flow. Copyright 2008 ACM.
Extensions to the actor model have been proposed to ease the development of mobile ad hoc applications. However, programming in the actor model is still difficult as it does not provide abstractions to synchronously c...
详细信息
ISBN:
(纸本)9781605583648
Extensions to the actor model have been proposed to ease the development of mobile ad hoc applications. However, programming in the actor model is still difficult as it does not provide abstractions to synchronously coordinate multiple actors. Thus, when programmers want to coordinate two or more actors they have to do it by hand. Additionally, programmers need to write failure recovery code for failures caused by the concurrent access to the actors they are using. Coding this manually is error prone and might even be not feasible. We propose a language abstraction based on software transactional memory to coordinate actors. We show that the integration of software transactional memory with the actor model makes writing failure recovery code superuous. Moreover, we show that our system even handles those cases where manually writing the failure recovery code is not feasible. Copyright 2008 ACM.
This paper proposes a new interworking scheme for Mobile IP and the Session Initiation Protocol being the most popular solutions for mobility management at the network and application layers respectively. The goal is ...
详细信息
ISBN:
(纸本)9781605581927
This paper proposes a new interworking scheme for Mobile IP and the Session Initiation Protocol being the most popular solutions for mobility management at the network and application layers respectively. The goal is to deliver seamless mobility for both TCP-based and UDP-based applications taking the best features from each mobility management scheme. In short, this paper proposes that TCP connections are handled through Mobile IP while UDP-based connection-less applications may use the Session Initiation Protocol for handling mobility. The two mobility management solutions are integrated into one common solution. Copyright 2008 ACM.
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time ...
详细信息
ISBN:
(纸本)9780980326727
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time and the high cost in renting a fixed number of servers. We present its system architecture and describe its implementation in details. An experimental high-definition movie streaming site was setup using our content delivery grid system to demonstrate its capabilities with performance analysis.
We propose a novel execution model for the implicitly parallel execution of data parallel programs in the presence of general I/O operations. This model is called hybrid because it combines the advantages of the stand...
详细信息
Network Intrusion Detection Systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be re...
详细信息
ISBN:
(纸本)1601320752
Network Intrusion Detection Systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be regarded as classification problem, we use Artificial Neural networks for detection. Using a benchmark study and set from the KDD (Knowledge Data Discovery and Data Mining) competition designed by DARPA and Multi-layered perceptron neural network, this Paper will aim to solve a multi class problem using MLP in to distinguish the attack records from normal ones, and also identify the attack type. In addition, it shows how to use Tikhonov regularization parameter to optimize the optimal network architecture in order to increase the system performance. The results show that the designed system is capable of classifying records with 98.34% accuracy with two hidden layers of neuron. Finally, the performance of the benchmark study is compared with our results.
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected err...
详细信息
This paper is dealing with redundant optoelectronic data transmission with special respect to laser channels. The concept of the generalized erasure channel (GEC) is used to determine the probability of undetected error for some binary symmetric and non-symmetric channels protected by appropriate codes. In detail, communication via different binary symmetric channels (BSCs), generalized erasure channels and symmetrized binary non symmetric channels (BNSCs) is investigated. Simple upper bounds are given, relating the new formulas to that one of the BSC Finally the results in connection with an inequality for proper codes are applied to multi wavelength optical transmission through channels generated by semiconductor lasers.
暂无评论