The concept of multicovering radius was introduced by A. Klapper (see IEEE Trans. Inform. Theory, vol.43, p.1372-7, 1997) in the context of studying the security of stream ciphers. The purpose of this paper is to deri...
详细信息
The concept of multicovering radius was introduced by A. Klapper (see IEEE Trans. Inform. Theory, vol.43, p.1372-7, 1997) in the context of studying the security of stream ciphers. The purpose of this paper is to derive new bounds by relating the multicovering radii of a code to a relative notion of covering radius. For generality, we define this notion for multicovering radii, although we only use the ordinary covering radius version.
A simple approach is developed to use semantics as defined by virtual actions to guide the construction of manipulable symbol representations for objects and actions, in particular to obtain a model of syntactic proce...
详细信息
A simple approach is developed to use semantics as defined by virtual actions to guide the construction of manipulable symbol representations for objects and actions, in particular to obtain a model of syntactic processing in the developing infant. This uses a simplified model of the frontal lobes, and in particular the various sets of neurons involved in the process of chunking of temporal sequences observed in monkeys. The manner in which such neurons play a role in phrase structure grammar is elucidated at a simple level.
An FPGA switch box is said to be hyper-universal if it is routable for all possible surrounding multi-pin net topologies satisfying the routing resource constraints. It is desirable to design hyper-universal switch bo...
详细信息
ISBN:
(纸本)0780364457
An FPGA switch box is said to be hyper-universal if it is routable for all possible surrounding multi-pin net topologies satisfying the routing resource constraints. It is desirable to design hyper-universal switch boxes with the minimum number of switches. A previous work, Universal Switch Module, considered such a design problem concerning 2-pin net routings around a single FPGA switch box. However, as most nets are multi-pin nets in practice, it is imperative to study the problem that involves multi-pin nets. In this paper, we provide a new view of global routings and formulate the most general k-sided switch box design problem into an optimum k-partite graph design problem. Applying a powerful decomposition theorem of global routings, we prove that, for a fixed k, the number of switches in an optimum k-sided switch box with W terminals on each side is O (W), by constructing some hyper-universal switch boxes with O(W) switches. Furthermore, we obtain optimum, hyper-universal 2-sided and 3-sided switch boxes, and propose hyper-universal 4-sided switch boxes with less than 6.7 W switches, which is very close to the lower bound 6 W obtained for pure 2-pin net models.
Two-dimensional Navier-Stokes simulations of heat and momentum transport in an intermittently grooved passage are performed using the spectral element technique for the Reynolds number range 600 [less-than or equal to...
Two-dimensional Navier-Stokes simulations of heat and momentum transport in an intermittently grooved passage are performed using the spectral element technique for the Reynolds number range 600 [less-than or equal to] Re [less-than or equal to] 1800. The computational domain has seven contiguous transverse grooves cut symmetrically into opposite walls, followed by a flat section with the same length. Periodic inflow/outflow boundary conditions are employed. The development and decay of unsteady flow is observed in the grooved and flat sections, respectively. The axial variation of the unsteady component of velocity is compared to the local heat transfer, shear stress and pressure gradient. The results suggest that intermittently grooved passages may offer even higher heat transfer for a given pumping power than the levels observed in fully grooved passages.
Computational complexity of algorithms for solving problems has been at the heart of theoretical computerscience. Traditionally, the computational cost of an algorithm is estimated by "counting" operations ...
详细信息
Computational complexity of algorithms for solving problems has been at the heart of theoretical computerscience. Traditionally, the computational cost of an algorithm is estimated by "counting" operations combinatorially depending on the algorithm. We present a very different method for estimating cost of solving problem, incorporating ideas from information theory. Algorithms can be viewed as "search" procedures on the input (output) space. This naturally makes computational cost of algorithm as function of "entropy" of input (output) distribution. The relation of computational complexity and "entropy" of distribution depends on the particular "operations" used by algorithm to solve problem. This particular mapping between computational scale and "entropy" scale is independent of problem. We demonstrate the use of this method in classical "searching" and "sorting" problems. We work out many different searching and sorting algorithms' complexity using this method. In process, we also come up with new algorithms to solve some cases of searching and sorting that are aware of input distribution.
BizViz (Business Visualization) is a rapidly growing phenomenon in the realm of visualization and information visualization. The main goal of BizViz is to support managers in their daily work of understanding forces w...
详细信息
BizViz (Business Visualization) is a rapidly growing phenomenon in the realm of visualization and information visualization. The main goal of BizViz is to support managers in their daily work of understanding forces within business processes and making decisions to control these forces. The case study presented in this paper illustrates the added value of visualization at a social security institution (Gak) in the Netherlands. The prototype built, integrates both databases and simulation as information sources. This way managers can study the past and present as well as experiment with possible future situations. The intended contribution of this paper is twofold. First, it presents how visualization can (successfully) be applied in practice. It illustrates the added value of BizViz in the social security domain. As a second contribution, the paper derives and discusses requirements that play an important role in visualization application development intended for decision-making support.
There has been active research on quality of service (QoS) multicasting. Very few, however, addresses QoS inter-domain multicasting. We present a QoS extension to BGMP (border gateway multicast protocol) which, propos...
详细信息
There has been active research on quality of service (QoS) multicasting. Very few, however, addresses QoS inter-domain multicasting. We present a QoS extension to BGMP (border gateway multicast protocol) which, proposed by Kumar, et al., is currently one of the most promising inter-domain multicasting proposals. With limited modification to the current BGMP, we extend it to support the so called two-bit differentiated service (including the classes of premium, assured, and best-effort services) proposed by Nichols, Jacobson, and Zhang. Detailed mechanisms of the QoS extension are described. Performance is evaluated through extensive simulation of real-network scenarios, supporting CBR, VBR, and best-effort traffic flows with the three classes of services. We believe that the work presented here is significant to the advancement of the next-generation Internet supporting QoS communications.
We define an ant algorithm for solving random binary constraint satisfaction problems (CSPs). We empirically investigate the behavior of the algorithm on this type of problems and establish the parameter settings unde...
详细信息
We define an ant algorithm for solving random binary constraint satisfaction problems (CSPs). We empirically investigate the behavior of the algorithm on this type of problems and establish the parameter settings under which the ant algorithm performs best for a specific class of CSPs. The ant algorithm is compared to six other state-of-the-art stochastic algorithms from the field of evolutionary computing. It turns out that the ant algorithm outperforms all other algorithms and that bivariate distribution algorithms perform worse than the univariate ones, the latter largely due to the fact that they cannot model the randomly generated instances.
We present a survey of confluence properties of (acyclic) term graph rewriting. Results and counterexamples are given for different kinds of term graph rewriting;besides plain applications of rewrite rules, extensions...
详细信息
Rollback recovery is a well-known technique to recover the system from failures for fault-tolerant properties. There may be a domino effect when this method is applied to multiprocessor systems. In this paper, we disc...
详细信息
Rollback recovery is a well-known technique to recover the system from failures for fault-tolerant properties. There may be a domino effect when this method is applied to multiprocessor systems. In this paper, we discuss the method that restarts from consistent checkpoints without message loss in the whole system, when failure occurs under the assumption that the processors are connected with reliable communication. Furthermore, we present a method to obtain checkpoints by using temporal logic to roll back rapidly in each processor from the current renewal check-points and communication.
暂无评论