InfiniBand is an emerging HPC interconnect being deployed in very large scale clusters, with even larger InfiniBand-based clusters expected to be deployed in the near future. The Message Passing Interface (MPI) is the...
详细信息
Message Passing Interface (MPI) is a popular parallel programming model for scientific applications. Most high-performance MPI implementations use Rendezvous Protocol for efficient transfer of large messages. This pro...
详细信息
Since the instructional activities are implemented on Cyberspace, how to control behaviors of students and to increase the degree of communication awareness has been a challenging issue. This paper presents an advance...
详细信息
ISBN:
(纸本)9078677015
Since the instructional activities are implemented on Cyberspace, how to control behaviors of students and to increase the degree of communication awareness has been a challenging issue. This paper presents an advanced Petri Net model to analyze and supervise of the web-based multiple participants in virtual environment. We proposed a system based on the scaffolding theory. Behaviors of students are supervised by an intelligent control system, which is programmed by the instructor under our generic interface. Problems of providing the multi-user interaction on the Web and the solutions proposed by the Petri Net model are fully elaborated here. This paper can be used as a basic/fundamental research framework and tools to study and understand the characteristics of e-learning and to explore its optimal education application.
One stumbling block to the establishment of distance learning programs is on the time consuming tasks to create high quality digital contents that can be used in instruction. In the literature, reusability of learning...
详细信息
One stumbling block to the establishment of distance learning programs is on the time consuming tasks to create high quality digital contents that can be used in instruction. In the literature, reusability of learning objects is addressed as a potential solution toward the sharing of high quality contents. To find suitable contents while one is designing the course material, the IEEE LOM provides a generic and standard mechanism to enable a common representation and vocabulary for the description of learning objects. However, it is unlikely that an individual will fill out the 77 items of metadata defined by the IEEE LOM. Nevertheless, it is possible to compute the relationship among these 77 items, and to provide an automatic metadata generation mechanism to reduce the load of a content creator. This paper proposed such a mechanism, by means of using user profiles, system extracted information, interactive questions, and influence rules. We present the mechanism, as well as a developed system, called the MINE Metadata Wizard, which is integrated with a SCORM-compliant authoring tool that we have developed. Interested readers are welcome to download the tool under http://***. ***/.
The distributed nature and complexity of computernetworks and various services provided via them, makes the networks vulnerable to numerous attacks. The TCP/IP presumptions which are based on using this protocol to p...
详细信息
Ubiquitous Computing applications have resource constraints and conventional block ciphers are infeasible to meet their requirements. This paper presents a hardware design and implementation of lightweight block ciphe...
详细信息
This paper presents a novel model for dynamic bandwidth allocation and rate coordination based on DiffServ and a bandwidth broker(BB). In this model, assignment of bandwidth was made according to a periodic trace of...
详细信息
This paper presents a novel model for dynamic bandwidth allocation and rate coordination based on DiffServ and a bandwidth broker(BB). In this model, assignment of bandwidth was made according to a periodic trace of network characteristics per application. And adjustment of transfer rate was accomplished through negotiation with applications by a bandwidth agent. This model was evaluated using network simulator 2 (NS-2), and distinct improvements were found in respects of delay and packet loss of overall network and single flow. Finally, the model was suggested to be leveraged to multimedia applications with properties of lower delay and lower packet loss.
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their ...
详细信息
Security issues are always difficult to deal with in mobile ad hoe networks. People seldom studied the costs of those security schemes respectively and for some security methods designed and adopted beforehand, their effects are often investigated one by one. In fact, when facing certain attacks, different methods would respond individually and result in waste of resources. Making use of the cost management idea, we analyze the costs of security measures in mobile ad hoc networks and introduce a security framework based on security mechanisms cost management. Under the framework, the network system's own tasks can be finished in time and the whole network's security costs can be decreased. We discuss the process of security costs computation at each mobile node and in certain nodes groups. To show how to use the proposed security framework in certain applications, we give examples of DoS attacks and costs computation of defense methods. The results showed that more secure environment can be achieved based on the security framework in mobile ad hoc networks.
Clusters of several thousand nodes interconnected with InfiniBand, an emerging high-performance interconnect, have already appeared in the Top 500 list. The next-generation InfiniBand clusters are expected to be even ...
详细信息
Enterprises need to automate manual and routine aspects of IT infrastructure management. In this paper a new concept that integrates different autonomous and management level applications through Instant Messaging pro...
详细信息
ISBN:
(纸本)9728865627
Enterprises need to automate manual and routine aspects of IT infrastructure management. In this paper a new concept that integrates different autonomous and management level applications through Instant Messaging protocol (XMPP) is introduced. This is achieved by means of a common management information model implemented in LDAP. A content language implemented in XML is also described, allowing autonomous application integration to carry out management tasks dynamically.
暂无评论