The paper presents the study of the human body, as a mechanical system, seated inside an autovehicle and exposed under the vertical harmonic vibration action during the auto vehicle motion time. The human body may be ...
A DSM protocol ensures that a thread can access data allocated on another machine using some consistency protocol. The consistency protocol can either replicate the data and unify replica changes periodically or the t...
详细信息
ISBN:
(纸本)9780889867741
A DSM protocol ensures that a thread can access data allocated on another machine using some consistency protocol. The consistency protocol can either replicate the data and unify replica changes periodically or the thread, upon remote access, can migrate to the machine that hosts the data and access the data there. There is a performance tradeoff between these extremes. Data replication suffers from a high memory overhead as every replicated object or page consumes memory on each machine. On the other hand, it is as bad to migrate threads upon each remote access since repeated accesses to the same distributed data set will cause repeated network communication whereas replication will incur this only once (at the cost of increased administration overhead to manage the replicas). We propose a hybrid protocol that uses selective replication with thread migration as its default. Even in the presence of extreme memory pressure and thread-migrations, our protocol reaches or exceeds the performance that can be achieved by means of manual replication and explicit changes of the application's code.
Longitudinal elasticity modulus, E, is a material specific feature, which,. in general, is establish on the pieces by longitudinal stress. This procedure is possible to apply to the compact material but not to the sin...
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time ...
详细信息
ISBN:
(纸本)9780980326727
In this paper, we propose an On-Demand Content Delivery Grid system that supplements the traditional content delivery network to deal with problems such as the huge influx of network traffic in a short period of time and the high cost in renting a fixed number of servers. We present its system architecture and describe its implementation in details. An experimental high-definition movie streaming site was setup using our content delivery grid system to demonstrate its capabilities with performance analysis.
As memory transactions have been proposed as a language-level replacement for locks, there is growing need for well-defined semantics. In contrast to database transactions, transaction memory (TM) semantics are compli...
详细信息
ISBN:
(纸本)9781595939739
As memory transactions have been proposed as a language-level replacement for locks, there is growing need for well-defined semantics. In contrast to database transactions, transaction memory (TM) semantics are complicated by the fact that programs may access the same memory locations both inside and outside transactions. Strongly atomic semantics, where non-transactional accesses are treated as implicit single-operation transactions, remain difficult to provide without specialized hardware support or significant performance overhead. As an alternative, many in the community have informally proposed that a single global lock semantics [18, 10], where transaction semantics are mapped to those of regions protected by a single global lock, provide an intuitive and efficiently implementable model for programmers. In this paper, we explore the implementation and performance implications of single global lock semantics in a weakly atomic STM from the perspective of Java, and we discuss why even recent STM implementations fall short of these semantics. We describe a new weakly atomic Java STM implementation that provides single global lock semantics while permitting concurrent execution, but we show that this comes at a significant performance cost. We also propose and implement various alternative semantics that loosen single lock requirements while still providing strong guarantees. We compare our new implementations to previous ones, including a strongly atomic STM. [24] Copyright 2008 ACM.
The authors present their latest research results and developments of a code generator for Matlab / Simulink block diagrams and to download the generated code onto safety related systems such as a safety PLC (Programm...
详细信息
The paper presents the on-going EC-funded Tempus project "MSc and PhD studies in Aerospace Critical Computing" executed by the National Aerospace University, Kharkiv, Ukraine with the support of Newcastle Un...
详细信息
ISBN:
(纸本)9781605580760
The paper presents the on-going EC-funded Tempus project "MSc and PhD studies in Aerospace Critical Computing" executed by the National Aerospace University, Kharkiv, Ukraine with the support of Newcastle University and City University of London, UK and Åbo Akademi University, Turku, Finland. The state-of-the-art, completed work as well as the next steps of the development of master and doctoral courses for the specialty in critical software engineering, computer systems and networks are described. The inputs from each of the European consortium members are presented. Copyright 2008 ACM.
Network Intrusion Detection Systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be re...
详细信息
ISBN:
(纸本)1601320752
Network Intrusion Detection Systems (NIDS) require the ability to generalize from previously observed attacks to detect even new or slight variation records of known attacks. As an intrusion detection system can be regarded as classification problem, we use Artificial Neural networks for detection. Using a benchmark study and set from the KDD (Knowledge Data Discovery and Data Mining) competition designed by DARPA and Multi-layered perceptron neural network, this Paper will aim to solve a multi class problem using MLP in to distinguish the attack records from normal ones, and also identify the attack type. In addition, it shows how to use Tikhonov regularization parameter to optimize the optimal network architecture in order to increase the system performance. The results show that the designed system is capable of classifying records with 98.34% accuracy with two hidden layers of neuron. Finally, the performance of the benchmark study is compared with our results.
We propose a novel execution model for the implicitly parallel execution of data parallel programs in the presence of general I/O operations. This model is called hybrid because it combines the advantages of the stand...
详细信息
暂无评论