Emerging 64 bitOSpsilas supply a huge amount of memory address space that is essential for new applications using very large data. It is expected that the memory in connected nodes can be used to store swapped pages e...
详细信息
Emerging 64 bitOSpsilas supply a huge amount of memory address space that is essential for new applications using very large data. It is expected that the memory in connected nodes can be used to store swapped pages efficiently, especially in a dedicated cluster which has a high-speed network such as 10 GbE and Infiniband. In this paper, we propose the distributed large memory system (DLM), which provides very large virtual memory by using remote memory distributed over the nodes in a cluster. The performance of DLM programs using remote memory is compared to ordinary programs using local memory. The results of STREAM, NPB and Himeno benchmarks show that the DLM achieves better performance than other remote paging schemes using a block swap device to access remote memory. In addition to performance, DLM offers the advantages of easy availability and high portability, because it is a user-level software without the need for special hardware. To obtain high performance, the DLM can tune its parameters independently from kernel swap parameters. We also found that DLMpsilas independence of kernel swapping provides more stable behavior.
Ethernet-based Passive Optical Network(EPON) is considered a very promising solution for the first mile problem of the next generation *** to its particular characteristic of shared media structure,EPON suffers many s...
详细信息
Ethernet-based Passive Optical Network(EPON) is considered a very promising solution for the first mile problem of the next generation *** to its particular characteristic of shared media structure,EPON suffers many security vulnerabilities. Communication security must be guaranteed when EPON is applied in *** paper gives a general introduction to the EPON system,analyzes the potential threats and attacks pertaining to the EPON system,and presents effective countermea-sures against these threats and attacks with emphasis on the authentication protocols and key distribution.
HER-2/neu (HER2) has been shown to be a valuable biomarker for breast cancer. However, inter-observer variability has been reported in the evaluation of HER2 with immunohistochemistry. It has been suggested that autom...
详细信息
HER-2/neu (HER2) has been shown to be a valuable biomarker for breast cancer. However, inter-observer variability has been reported in the evaluation of HER2 with immunohistochemistry. It has been suggested that automated computer-based evaluation can provide a consistent and objective measure of HER2 expression. In this manuscript, we present an automated method for the quantitative assessment of HER2 using digital microscopy. The method employs imaging algorithms on whole slide images of tissue specimens for the extraction of two features describing HER2 membrane staining, namely membrane staining completeness and membrane staining intensity. A classifier was trained to merge the extracted features into an overall slide assessment score. Preliminary results showed good agreement with the provided truth. The developed automated method has the potential to be used as a computer aid for the immunohistochemical evaluation of HER2 expression with the objective of increasing observer reproducibility.
In Optical Burst Switched (OBS) networks, packets are assembled into bursts at ingress edge routers and disassembled at egress edge routers. This letter presents an analytical model to quantify the burstification late...
详细信息
Optical Burst Switching (OBS) allows variable size data bursts to be transported directly over DWDM links without encountering O/E/O conversion. This paper identifies potential threats to security in OBS networks. To ...
详细信息
ISBN:
(纸本)9780889866591
Optical Burst Switching (OBS) allows variable size data bursts to be transported directly over DWDM links without encountering O/E/O conversion. This paper identifies potential threats to security in OBS networks. To alleviate the security threats, we propose a Secured Optical Burst Switching (S-OBS) framework that, for the first time, brings security measures to the OBS networks. The contributions of the paper are summarized as follows: 1) This is the first paper that identifies the potential security problems in OBS networks;2) We have proposed a security framework for OBS networks;3) We have proposed two levels of security measures to be incorporated into OBS networks, namely, authentication of burst headers and confidentiality of data bursts;4) We have examined the candidate solutions in each category, and suggested the solutions that are well suited to OBS networks.
Including concepts of entrepreneurship in an engineering education is nothing new. It would be difficult to find a university that does not offer several courses or specific programs in entrepreneurship. However, find...
详细信息
Since October 2005, the business and engineering faculties of the Milwaukee School of engineering (MSOE) have been working on a novel effort to integrate entrepreneurship into the engineering curricula. Our methods br...
详细信息
In this paper, we first provide a new theoretical understanding of the Evidence Pre-propagated Importance Sampling algorithm (EPIS-BN) (Yuan & Druzdzel 2003;2006b) and show that its importance function minimizes t...
详细信息
Some real problems are more naturally modeled by hybrid Bayesian networks that consist of mixtures of continuous and discrete variables with their interactions described by equations and continuous probability distrib...
详细信息
Some real problems are more naturally modeled by hybrid Bayesian networks that consist of mixtures of continuous and discrete variables with their interactions described by equations and continuous probability distributions. However, inference in such general hybrid models is hard. Therefore, existing approaches either only deal with special instances, such as Conditional Linear Gaussians (CLGs), or approximate a general model with a restricted version and then perform inference on the simpler model. However, results thus obtained highly depend on the quality of the approximations. This paper describes an importance sampling-based algorithm that directly deals with hybrid Bayesian networks constructed in the most general settings and guarantees to converge to the correct answers given enough time.
暂无评论