Recently, model transformation approaches are becoming increasingly popular;therefore their efficiency and usability are key factors and require further investigation. These approaches are regularly used in software e...
详细信息
ISBN:
(纸本)9780889869431
Recently, model transformation approaches are becoming increasingly popular;therefore their efficiency and usability are key factors and require further investigation. These approaches are regularly used in software engineering, most often as part of the model-driven development methodology. In the case of the graph rewritingbased model transformation approaches, the applied graph matching algorithm greatly determines the efficiency of the transformation approach. The matching algorithm is used to identify sub-graph isomorphism between the transformation rules and the host graph. A widely applied graph matching algorithm is the VF2 algorithm. In this paper we briefly introduce the original VF2 algorithm - specifically, its method - which manages the next possible node pairs. We present a new approach, which increases the efficiency of choosing these node pairs. We also introduce an ordering function, which increases the performance even further. Finally, the effects of these new approaches are presented based on our experimental results.
The aim of obfuscation in general is to prevent malicious users from disclosing properties of the original source program. This goal can be achieved by an intermediate level obfuscation that deals with a target platfo...
详细信息
One of the most important problems in data mining is frequent itemset mining. It requires very large computation and I/O traffic capacity. For that reason several parallel and distributed mining algorithms were develo...
详细信息
Robustness in scheduling addresses the capability of devising schedules which are not sensitive – to a certain extent – to the disruptive effects of unexpected events. The paper presents a novel approach for protect...
详细信息
Robustness in scheduling addresses the capability of devising schedules which are not sensitive – to a certain extent – to the disruptive effects of unexpected events. The paper presents a novel approach for protecting the quality of a schedule by taking into account the rare occurrence of very unfavourable events causing heavy losses. This calls for assessing the risk associated to the different scheduling decisions. In this paper we consider a stochastic scheduling problem with a set of jobs to be sequenced on a single machine. The release dates and processing times of the jobs are generally distributed independent random variables, while the due dates are deterministic. We present a branch-and-bound approach to minimize the Value-at-Risk of the distribution of the maximum lateness and demonstrate the viability of the approach through a series of computational experiments.
Mobile computer technology has greatly evolved in the recent years. Mobile computer technology has greatly evolved in the recent years. Cloud computing is recognized to be a new area for solving performance issues. Mo...
详细信息
Mobile computer technology has greatly evolved in the recent years. Mobile computer technology has greatly evolved in the recent years. Cloud computing is recognized to be a new area for solving performance issues. Mo- bile terminal can take advantage from cloud computing. To cope with these new resources and fulll new quality and performance requirements a more sophisticated architecture and resource management is necessary. The ba- sis of efective resource management is a precise knowledge of the hardware and software capabilities. Performance metrics serve as an input for resource management. This study will resent architecture of mobile resource man- agement using cloud resources. The main task of such resource management is to decide which application where to run;on the mobile terminal or in the cloud. This paper identies key components of resource management, settles the tasks and relationships between them.
Model processing programs are regularly used when working with models or synthetizing the code from them;therefore, their verification has become an essential component of constructing reliable software in model-based...
详细信息
Computational tasks involving intelligent agents often need to process complex structured information. The way of describing this information greatly influences the performance of the agent. Therefore, a big issue is ...
详细信息
Computational tasks involving intelligent agents often need to process complex structured information. The way of describing this information greatly influences the performance of the agent. Therefore, a big issue is how the complex data describing that valuable information is not lose while it can also be processed in tractable time. Fuzzy signatures and their multidimensional geometric extension, fuzzy situational maps, are used to describe such complex structured data. These problems are examined in the context of a cooperative mobile robot task and a new method is developed for the simplified describing and processing of the complex inner relations in fuzzy situational maps. This paper mainly deals with the fundamentals of this method.
This paper deals with corner detection of simple geometric objects in quantized range images. Low depth resolution and noise introduce challenges in edge and corner detection. Corner detection and classification is ba...
详细信息
This paper deals with corner detection of simple geometric objects in quantized range images. Low depth resolution and noise introduce challenges in edge and corner detection. Corner detection and classification is based on layer by layer depth data extraction and morphologic operations. Appearance based heuristics are applied to identify different corner types defined in this paper. Both computer generated and captured range images are dealt with. Synthetic range images have arbitrary range resolution while captured images are based on the sensor used. Real world data is collected using a structured light based sensor to provide dense range map.
Widespread use of multi-core systems demand highly parallel applications and algorithms in everyday computing. Parallel data structures, which are basic building blocks of concurrent algorithms, are hard to design in ...
详细信息
Widespread use of multi-core systems demand highly parallel applications and algorithms in everyday computing. Parallel data structures, which are basic building blocks of concurrent algorithms, are hard to design in a way that they remain both fast and simple. By using mutual exclusion they can be implemented with little effort, but blocking synchronization has many unfavorable properties, such as delays, performance bottleneck and being prone to programming errors. Non-blocking synchronization, on the other hand, promises solutions to the aforementioned drawbacks, but often requires complete redesign of the algorithm and the underlying data structure to accommodate the needs of atomic instructions. Implementations of parallel data structures satisfy different progress conditions: lock based algorithms can be deadlock-free or starvation free, while non-blocking solutions can be lock-free or wait-free. These properties guarantee different levels of progress, either system-wise or for all threads. We present several parallel hash table implementations, satisfying different types of progress conditions and having various levels of implementation complexity, and discuss their behavior. The performance of different blocking and non-blocking implementations will be evaluated on a multi-core machine.
Performance evaluation of wire pairs of telecommunications access networks is a great challenge for telecommunications service providers. Although there are existing methods and systems for it, these are expensive or ...
详细信息
Performance evaluation of wire pairs of telecommunications access networks is a great challenge for telecommunications service providers. Although there are existing methods and systems for it, these are expensive or unpunctual. This paper presents a novel, hierarchical fuzzy inference based performance evaluation method for wire pairs of access networks, which is based on measurements of the pairs. The set of antecedent (input) parameters and their role in the evaluation, the consequent (output) states and the type of the used fuzzy rule bases are presented. In addition, the behavior and the role of the noise that can be measured in the wire pairs are detailed.
暂无评论