The diffusion of epigraphic data has evolved in the last years from printed catalogues to indexed digital databases shared through the Web. Recently, the open EpiDoc specifications have resulted in an XML-based schema...
详细信息
DDoS attacks to servers cause the dysfunctional condition and finally bring the server to be stopped. Previous researches to detect and defense for DDoS attacks have shown that the entropy for the source IP address or...
详细信息
An ultrafast electrically-pumped VECSEL design requires an acceptable trade-off in cw output power. Validating our design guidelines and simulations 120 mW cw output power are generated. Homogenous current injection i...
详细信息
ISBN:
(纸本)9781557528896
An ultrafast electrically-pumped VECSEL design requires an acceptable trade-off in cw output power. Validating our design guidelines and simulations 120 mW cw output power are generated. Homogenous current injection is even achieved for large devices.
Under the fast-developing carbon trading market, the construction industry needs to mitigate carbon emissions from construction processes. Among various construction processes, tunnel construction produces a significa...
详细信息
ISBN:
(纸本)9780784411094
Under the fast-developing carbon trading market, the construction industry needs to mitigate carbon emissions from construction processes. Among various construction processes, tunnel construction produces a significant amount of carbon emissions, since it utilizes various types of high energy-consuming equipment. In order to identify and mitigate such carbon emissions of a tunneling project, it is required to reliably estimate carbon footprints of a tunneling project in the pre-planning phase. This paper presents the methodology for estimating the carbon footprints generated during tunnel construction processes using the collaborative tunneling simulation. A case study using this methodology shows that carbon footprints from a utility tunnel construction are significant compared with those from a building construction. In addition, the assessment of carbon footprints of the case study identifies the opportunities to mitigate such impact by supporting decision-making on equipment and operation plans in the planning phase and providing a control target level of carbon footprints in the execution phase. Copyright ASCE 2010.
This paper is to study the object coverage problem in visual sensor networks. When sensors equipped camera with rotating capability in the monitoring environment are dep.oyed randomly, the images of target object with...
详细信息
This paper presents the logic programming concept of thread-based competitive or-parallelism, which combines the original idea of competitive or-parallelism with committed-choice nondeterminism and speculative threadi...
详细信息
ISBN:
(纸本)9783540929949
This paper presents the logic programming concept of thread-based competitive or-parallelism, which combines the original idea of competitive or-parallelism with committed-choice nondeterminism and speculative threading. In thread-based competitive or-parallelism, an explicit;disjunction of subgoals is interpreted as a set of concurrent alternatives, each running in its own thread. The individual subgoals usually correspond to predicates implementing different procedures that, dep.nding on the problem specifics, are expected to either fail or succeed with different performance levels. The subgoals compete for providing an answer and the first successful subgoal leads to the termination of the remaining ones. We discuss the implementation of thread-based competitive or-parallelism in the context of Logtalk, an object-oriented logic programming language, and present experimental results.
This paper presents a new six-transistor static random access memory (6T SRAM) cell with significantly reduced power consumption that achieves high read and write performance. Unlike traditional 6T SRAMs, this study p...
详细信息
This paper identifies potential security loopholes in the implementation of support for meta-predicates Closing these loopholes dep.nds on three conditions: a clear distinction between closures and goals, support for ...
详细信息
ISBN:
(纸本)9783540929949
This paper identifies potential security loopholes in the implementation of support for meta-predicates Closing these loopholes dep.nds on three conditions: a clear distinction between closures and goals, support for an extended meta-predicate directive that allows the specification of closures, and the availability of the call/2-N family of built-in meta-predicates. These conditions provide the basis for a set of simple safety rules that allows meta-predicates to be securely supported. These safety rules are currently implemented by Logtalk, all object-oriented logic programming language, and may also be applied in the context of Prolog predicate-based module systems. Experimental results illustrate how these rules can prevent several security problems, including accidental or malicious changes to the original meta-predicate arguments and bypassing of predicate scope rules and predicate scope directives.
暂无评论