The paper describes a methodology for supporting computationally all phases of an energy-conscious design and evaluation process, by combining procedural simulation and knowledge-based heuristic methods in one integra...
详细信息
This paper shows the design and implementation of ser- vices for Evolutionary Computation following the Service Oriented architecture paradigm. This paradigm allows in- dependence over language and distribution mechan...
详细信息
ISBN:
(纸本)9781450319645
This paper shows the design and implementation of ser- vices for Evolutionary Computation following the Service Oriented architecture paradigm. This paradigm allows in- dependence over language and distribution mechanism. This development is challenging because some technological and design issues, such as abstract design or unordered execu- tion. To solve them, OSGiLiath, an implementation of an abstract Service Oriented architecture for Evolutionary Al- gorithms, is used to develop new interoperable services tak- ing into account these restrictions.
In order to build a fault-tolerant network, heterogeneous facilities are arranged in the network to prevent homogeneous faults from causing serious damage. This paper uses edge-colored graph to investigate the feature...
详细信息
In order to build a fault-tolerant network, heterogeneous facilities are arranged in the network to prevent homogeneous faults from causing serious damage. This paper uses edge-colored graph to investigate the features of a network topology which is survivable after a set of homogeneous devices malfunction. We propose an approach to designing such networks under arbitrary parameters. We also show that the proposed approach can be used to optimize inter-router connections in network-on-chip to reduce the additional consum!otion of energy and time delay.
With the explosive growth of information, more and more organizations are deploying private cloud systems or renting public cloud systems to process big data. However, there is no existing benchmark suite for evaluati...
详细信息
With the explosive growth of information, more and more organizations are deploying private cloud systems or renting public cloud systems to process big data. However, there is no existing benchmark suite for evaluating cloud performance on the whole system level. To the best of our knowledge, this paper proposes the first benchmark suite CloudRank-D to benchmark and rank cloud computing sys- tems that are shared for running big data applications. We an- alyze the limitations of previous metrics, e.g., floating point operations, for evaluating a cloud computing system, and propose two simple metrics: data processed per second and data processed per Joule as two complementary metrics for evaluating cloud computing systems. We detail the design of CloudRank-D that considers representative applications, di- versity of data characteristics, and dynamic behaviors of both applications and system software platforms. Through experi- ments, we demonstrate the advantages of our proposed met- tics. In several case studies, we evaluate two small-scale de- ployments of cloud computing systems using CloudRank-D.
State Key Laboratory for GeoMechanics and Deep Underground Engineering, Deep-Lab for short, has been committed to the study of rock burst. Deep-Lab accumulated a large number of rock-burst data. With the deepening of ...
详细信息
Image processing in digital computer systems usually considers the visual information as a sequence of frames. These frames are from cameras that capture reality for a short period of time. They are renewed and transm...
详细信息
ISBN:
(纸本)9789898425720
Image processing in digital computer systems usually considers the visual information as a sequence of frames. These frames are from cameras that capture reality for a short period of time. They are renewed and transmitted at a rate of 25-30 fps (typical real-time scenario). Digital video processing has to process each frame in order to obtain a filter result or detect a feature on the input. In stereo vision, existing algorithms use frames from two digital cameras and process them pixel by pixel until it is found a pattern match in a section of both stereo frames. Spike-based processing is a relatively new approach that implements the processing by manipulating spikes one by one at the time they are transmitted, like a human brain. The mammal nervous system is able to solve much more complex problems, such as visual recognition by manipulating neuron's spikes. The spike-based philosophy for visual information processing based on the neuro-inspired Address-Event- Representation (AER) is achieving nowadays very high performances. In this work we study the existing digital stereo matching algorithms and how do they work. After that, we propose an AER stereo matching algorithm using some of the principles shown in digital stereo methods.
The paper presents a solution and a tool for automatic, fast and easy adaptation of legacy Unix applications into services in BeesyCluster. The latter is a middleware that allows users to access distributed servers an...
详细信息
ISBN:
(纸本)9788360779026
The paper presents a solution and a tool for automatic, fast and easy adaptation of legacy Unix applications into services in BeesyCluster. The latter is a middleware that allows users to access distributed servers and clusters via WWW/Web services. Each BeesyCluster user can publish own applications as services and define access policies to such services to make them available to others. Such services can be composed into scientific or business workflows. To offer a wider selection of services, our solution retrieves information from Linux packages such as deb and rpm to automatically register applications as services in BeesyCluster making it a platform with a large registry containing thousands of services. Furthermore, we show a mechanism for searching for services based on a text query formulated by the user.
The paper presents a workflow application aimed at detection of unwanted and potentially dangerous events observed by multimedia cameras installed at public facilities, such as universities. The detection of unwanted ...
详细信息
ISBN:
(纸本)9788360779026
The paper presents a workflow application aimed at detection of unwanted and potentially dangerous events observed by multimedia cameras installed at public facilities, such as universities. The detection of unwanted events launches alarms, causes notifications to be sent to respective forces and videos to be recorded. The proposed application model consists of several stages: nodes with camera(s) attached to them, node(s) for fetching data streams, node(s) for data processing and nodes used for notification and data storage. The already implemented testbed application fetches either a stream of data from a camera attached to a computer or reads a video file. The stream is decoded and data are processed by parallel processes on a cluster. The implemented testbed application detects a movement in the stream and can be applied for monitoring the university during the night.
The use of simulation tools in the development of new Wireless Sensor Networks protocols and applications should be accompanied by minimisation of redundant code and work, making it possible to seamlessly run the same...
详细信息
ISBN:
(纸本)9789898425690
The use of simulation tools in the development of new Wireless Sensor Networks protocols and applications should be accompanied by minimisation of redundant code and work, making it possible to seamlessly run the same code on simulated and real platforms. This work proposes an architecture for a WSN testing platform that integrates simulation tools in an application-transparent way. The platform will be focused on testing the WSN sink node and providing it with both real and simulated data. The novelty of this approach lies in the use of a flexible network simulation tool not focused on a specific network technology, and the use of generic hardware and open source tools.
With regard to the fundamental problem of the MANET routing protocols,this paper according to the campus mobile node behaviour,aims to establish a campus wireless mobile model based on AOC *** NS-2 simulation platform...
详细信息
ISBN:
(纸本)9780863419256
With regard to the fundamental problem of the MANET routing protocols,this paper according to the campus mobile node behaviour,aims to establish a campus wireless mobile model based on AOC *** NS-2 simulation platform extensive simulate result and analysis of different mobile fashion which effect on the MANET routing protocol performance:in the aspect of Packet Delivery Ratio,DSR and AODV both surpass 95%,were not greatly affected by the changes of node mobile rate;DSDV and DSR closed to the Path Optimality.
暂无评论