Device-to-Device (D2D) communication is mainly launched by the transmission requirements between devices for specific applications such as Proximity Services in Long-Term Evolution Advanced (LTE-A) networks, and each ...
详细信息
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model(MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electric...
详细信息
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model(MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electricity bill and valley electricity bill in the time dimension to model the single-user demand response. Second based on the single-user demand response model, combined with the overall users' electricity distribution density function, we build an all-users demand response model. The proposed model has two objectives: minimize energy consumption and maximize residents' satisfaction. Simulation results confirm that the proposed model can optimize the ladder-pricing scheme.
Software-Defined Networking (SDN) has great potentials in changing the fragile and complex enterprise networks. One operational challenge to SDN deployment is the settlement of legacy switches. A hybrid SDN consisting...
详细信息
ISBN:
(纸本)9781509026357
Software-Defined Networking (SDN) has great potentials in changing the fragile and complex enterprise networks. One operational challenge to SDN deployment is the settlement of legacy switches. A hybrid SDN consisting of both SDN and legacy switches may be a tradeoff. Nevertheless most of the current SDN control planes can not handle legacy switches. To overcome this problem, we present HybridFlow, a lightweight control plane for hybrid SDN. HybridFlow can abstract a hybrid network into a logical SDN network and existing SDN control applications can run on it transparently.
A transfer function is a mathematical function relating the output or response of a system to the input or stimulus. It is a concise mathematical model representing the input/output behavior of a system and is widely ...
详细信息
ISBN:
(纸本)9781479953424
A transfer function is a mathematical function relating the output or response of a system to the input or stimulus. It is a concise mathematical model representing the input/output behavior of a system and is widely used in many areas of engineering including system theory and signal analysis. Binary Decision Diagrams (BDDs) are a canonical representation of Boolean functions. We implement a framework to build transfer function models of digital switching functions using BDDs and demonstrate their application on simulation and implication.
Teaching Test-Driven Development (TDD) to the students is challenging. TDD is best learned when it is actually performed rather than read about. Especially when the students are novice to TDD, starting by writing a te...
Teaching Test-Driven Development (TDD) to the students is challenging. TDD is best learned when it is actually performed rather than read about. Especially when the students are novice to TDD, starting by writing a test first seems to be extremely hard, and proceeding with the small steps that the TDD cycle requires often demands explicit guidance. Coding Dojo is a dynamic and collaborative activity where people can practice programming, especially techniques related to agile methods. This paper discusses the two experiments conducted to find out how Coding Dojo methodology improves the code coverage of students programming and how it improves motivation in students to learn TDD.
Shortest-path queries on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks (SDN), since SDN contr...
详细信息
ISBN:
(纸本)9781509032822
Shortest-path queries on weighted graphs are an essential operation in computer networks. The performance of such algorithms has become a critical challenge in emerging software-defined networks (SDN), since SDN controllers need to perform a shortest-path query for every flow. Unlike classic solutions (e.g., Dijkstra's algorithm), high-performance shortest-path query algorithms include two stages: preprocessing and query answering. Despite the improved query answering time, existing two-stage algorithms are still extremely time-consuming in preprocessing large-scale graphs. In this paper, we propose an efficient shortest-path query algorithm, called BBQ, which reduces the running time of both stages via tree decomposition. BBQ constructs a distance oracle in a bottom-top-bottom manner, which significantly reduces preprocessing time over existing algorithms. In addition, BBQ can answer batch queries in bulk by traversing the decomposed tree instead of executing separate queries. Our experimental results show that BBQ outperforms state-of-the-art approaches by orders of magnitude for the running time of the preprocessing stage. Meanwhile, BBQ also offers remarkable acceleration for answering batches of queries. As a result, SDN controllers that use BBQ can sustain 1.1-27.9 times higher connection request rates.
Photo Response Non-Uniformity (PRNU) noise based source attribution is a well known technique to verify the source camera of an anonymous image or video. Researchers have proposed various counter measures to PRNU base...
详细信息
Photo Response Non-Uniformity (PRNU) noise based source attribution is a well known technique to verify the source camera of an anonymous image or video. Researchers have proposed various counter measures to PRNU based source camera attribution. Forced seam-carving is a recently proposed counter forensics measure that was proposed to defeat PRNU based source attribution by disturbing the alignment of PRNU noise patterns. This paper shows that given a multiple number of seam-carved images, source attribution can still be reliably made even if the size of a non-carved image block is less than the recommended size of 50×50.
Dynamic symbolic execution (DSE) is a well-known program test technology which can generate test cases automatically through collecting constraints of the paths represented by symbolic value. Automated test based on D...
详细信息
Dynamic symbolic execution (DSE) is a well-known program test technology which can generate test cases automatically through collecting constraints of the paths represented by symbolic value. Automated test based on DSE targets at covering all paths and branches in a limited time. Although DSE has been investigated for a few years, several challenges still exist which hinder the actual usage. Path explosion is one of the greatest challenges to solve, which decreases the test performance. Analyzing complexity of the execution paths of different test programs, and investigating the factors associated with the test efficiency become very important in the software testing life cycle.
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model (MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electri...
详细信息
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model (MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electricity bill and valley electricity bill in the time dimension to model the single-user demand response. Second based on the single-user demand response model, combined with the overall users’ electricity distribution density function, we build an all-users demand response model. The proposed model has two objectives: minimize energy consumption and maximize residents’ satisfaction. Simulation results confirm that the proposed model can optimize the ladder-pricing scheme.
Although PRNU (Photo Response Non-Uniformity)-based methods have been proposed to verify the source camera of a non-stabilized video, these methods may not be adequate for stabilized videos. The use of video stabiliza...
详细信息
ISBN:
(纸本)9781509011391
Although PRNU (Photo Response Non-Uniformity)-based methods have been proposed to verify the source camera of a non-stabilized video, these methods may not be adequate for stabilized videos. The use of video stabilization has been increasing in recent years with the development of novel stabilization software and the availability of stabilization in smart-phone cameras. This paper presents a PRNU-based source camera attribution method for out-of-camera stabilized video (i.e., stabilization applied after the video is captured). The scheme can (i) automatically determine if a given video is stabilized, (ii) calculate the fingerprint from a stabilized video, and (iii) effectively correlate the fingerprint computed from a stabilized video (i.e., anonymous video) with a fingerprint computed from another stabilized or non-stabilized video (i.e., a known video). Furthermore, experimental results show that the source camera of an anonymous non-stabilized video can be verified using a fingerprint computed from a set of images.
暂无评论