The author has designed a framework for building web sites using Microsoft'sNET technologyThe framework employs a design approach based upon the Model View Controller(MVC) design patternA framework in an object or...
详细信息
The author has designed a framework for building web sites using Microsoft'sNET technologyThe framework employs a design approach based upon the Model View Controller(MVC) design patternA framework in an object oriented system is a collection of classes that provide an abstract approach to solving a given problem
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing...
详细信息
Currently, with the evolution of virtualization technology, cloud computing mode has become more and more popular. However, people still concern the issues of the runtime integrity and data security of cloud computing platform, as well as the service efficiency on such computing platform. At the same time, according to our knowledge, the design theory of the trusted virtual computing environment and its core system software for such network-based computing platform is at the exploratory stage. In this paper, we believe that efficiency and isolation are the two key proprieties of the trusted virtual computing environment. To guarantee these two proprieties, based on the design principle of splitting, customizing, reconstructing, and isolation-based enhancing to the platform, we introduce TRainbow, a novel trusted virtual computing platform developing by our research *** the two creative mechanisms, that is, capacity flowing amongst VMs and VM-based kernel reconstructing, TRainbow provides great improvements (up to 42%) in service performance and isolated reliable computing environment for Internet-oriented, large-scale, concurrent services.
We address the optimal sink scheduling problem in wireless sensor networks (WSNs). The problem is inherently difficult since sink scheduling and data routing are tightly coupled. Previous approaches either have questi...
详细信息
We address the optimal sink scheduling problem in wireless sensor networks (WSNs). The problem is inherently difficult since sink scheduling and data routing are tightly coupled. Previous approaches either have questionable performance due to no joint considerations, or are based on relaxed constraints. Our aim is to fill in this blank in the research. First, by discretizing continuous time, we develop a novel bound technique to connect time-varying routes with the placement of sinks. This bounding technique transforms time-related constraints into pattern-based ones and allows us to mathematically formulate this optimization in a pattern-based way. The complexity of directly solving this optimization is intractable; therefore, on the basis of column generation (CG), a computationally efficient algorithm is developed to reduce the complexity by decomposing the problem into sub-problems and iteratively solving them to approach optimality. Simulations demonstrate the efficiency of the algorithm and substantiate the importance of sink mobility in energy-constrained sensor networks.
Effective exploitation of the application-specific parallel patterns and computation operations through their direct implementation in hardware is the base for construction of high-quality application-specific (re-)co...
详细信息
Effective exploitation of the application-specific parallel patterns and computation operations through their direct implementation in hardware is the base for construction of high-quality application-specific (re-)configurable application specific instruction set processors (ASIPs) and hardware accelerators for modern highly-demanding applications. Although it receives a lot of attention from the researchers and practitioners, a very important problem of hardware reuse in ASIP and accelerator synthesis is clearly underestimated and does not get enough attention in the published research. This paper is an effect of an industry and academic collaborative research. It analyses the problem of hardware sharing, shows its high practical relevance, as well as a big influence of hardware sharing on the major circuit and system parameters, and its importance for the multi-objective optimization and tradeoff exploitation. It also demonstrates that the state-of-the-art synthesis tools do not sufficiently address this problem and gives several guidelines related to enhancement of the hardware reuse.
E-health and e-monitoring have become an increasingly important area during recent years, being the recognition of motion, postures and physical exercises one of the main topics. In this kind of problem is common to w...
详细信息
The development of ubiquitous sensing strategies in home environments underpins the promise of adaptive architectural design, assistive robotics, and services which would support a person's ability to live indepen...
详细信息
The development of ubiquitous sensing strategies in home environments underpins the promise of adaptive architectural design, assistive robotics, and services which would support a person's ability to live independently as they age. In particular, the ability to infer the actions and behavioral patterns of an individual from sensor data is key to effective design of such components for aging in place. Frequently, activity recognition is accomplished using vision based sensors. The method employed in this paper makes use of self similarities in a video motion sequence to construct a descriptor of the activity in the form of a Histogram of Oriented Gradients (HOG). Descriptors are used as exemplars for classification and are shown to accurately identify motion video recorded from other views. Three candidate motions were performed using a PUMA robot (for repeatability). Video of each motion was recorded from an array of vantage points on the surface of a virtual sphere surrounding the workspace of the robot. This method is then extended to non-video motion sensor data collected from the same set of points. Results show that mean HOGs generated from Self Similarity Matrices may serve as effective exemplars to classify motions in both video and non-video formats. Video data provides superior classification results. However, motion sensor data offers a less intrusive option with promising accuracy especially when multiple sensors outputs are fused to form aggregate readings.
When evolutionary algorithm (EA) applications are being developed it is very important to know which parameters have the greatest influence on the behavior and performance of the algorithm. This paper proposes using t...
详细信息
Aggregating the capacity and bandwidth of the commodity disks in the nodes of a cluster provides cost effective and high performance storage systems. Nevertheless, this strategy could be a feasible approach only if th...
详细信息
Engineering and scientific applications usually require to manage large quantities of data with different programs. The I/O demands of these applications get higher as they get larger because processor and memory spee...
详细信息
暂无评论