A construction is described which takes an arbitrary set of machines, an arbitray set of tests, and an arbitrary relation on machines and tests defining which machines pass which tests. It produces a domain of specifi...
详细信息
A DSM protocol ensures that a thread can access data allocated on another machine using some consistency protocol. The consistency protocol can either replicate the data and unify replica changes periodically or the t...
详细信息
ISBN:
(纸本)9780889867741
A DSM protocol ensures that a thread can access data allocated on another machine using some consistency protocol. The consistency protocol can either replicate the data and unify replica changes periodically or the thread, upon remote access, can migrate to the machine that hosts the data and access the data there. There is a performance tradeoff between these extremes. Data replication suffers from a high memory overhead as every replicated object or page consumes memory on each machine. On the other hand, it is as bad to migrate threads upon each remote access since repeated accesses to the same distributed data set will cause repeated network communication whereas replication will incur this only once (at the cost of increased administration overhead to manage the replicas). We propose a hybrid protocol that uses selective replication with thread migration as its default. Even in the presence of extreme memory pressure and thread-migrations, our protocol reaches or exceeds the performance that can be achieved by means of manual replication and explicit changes of the application's code.
Nested datatypes generalise regular datatypes in much the same way that context-free languages generalise regular ones. Although the categorical semantics of nested types turns out to be similar to the regular case, t...
详细信息
Nested datatypes generalise regular datatypes in much the same way that context-free languages generalise regular ones. Although the categorical semantics of nested types turns out to be similar to the regular case, the fold functions are more limited because they can only describe natural transformations. Practical considerations therefore dictate the introduction of a generalised fold function in which this limitation can be overcome. In the paper we show how to construct generalised folds systematically for each nested datatype, and show that they possess a uniqueness property analogous to that of ordinary folds. As a consequence, generalised folds satisfy fusion properties similar to those developed for regular datatypes. Such properties form the core of an effective calculational theory of inductive datatypes.
The principle of multiplicity is introduced for the components of the investment planning process. Some algorithms are given that ensure the process of investment planning at the regional level: the formation of integ...
详细信息
In this paper, we investigate the effects on prey of two predators which are also related in terms of prey-predator relationship. Different types of functional responses are con- sidered to formulate the mathematical ...
详细信息
In this paper, we investigate the effects on prey of two predators which are also related in terms of prey-predator relationship. Different types of functional responses are con- sidered to formulate the mathematical model for predator and generalist predator of our proposed model. Harvesting effort for the generalist predator is considered and the density-dependent mortality rate for predator and generalist predator is incorporated in our proposed model. Local stability as well as global stability for the system is dis- cussed. We analyze the different bifurcation parameters to evaluate Hopf bifurcation in the neighborhood of interior equilibrium point. Finally, some numerical simulations and graphical figures are provided to verify our analytical results with the help of different sets of parameters.
Current interface descriptions are poor in describing components, because they only provide an external view on a component and they do not lay down how components interact with each other. Suggestions to improve comp...
详细信息
This paper proposes a new system for feature- based modelling- ISFBM with built in strategy for defining details by their features, realizing design process over the computational model of rule- based systems paradigm...
详细信息
Interpretation of the truth degrees. Suitable extension of the two-valued logical operations as conjunction, disjunction, implication, negation. Main directions (Post, Kleene, Lukasiewicz, Bochvar). Notion of assertab...
详细信息
ISBN:
(纸本)9789634639251
Interpretation of the truth degrees. Suitable extension of the two-valued logical operations as conjunction, disjunction, implication, negation. Main directions (Post, Kleene, Lukasiewicz, Bochvar). Notion of assertability. Designated values. Functional completeness via two valued negation, conjunction, disjunction. Normal forms as tools in theorem proving.
Three different methods for automated geometry theorem proving-a generalized version of Dixon resultants, Gröbner bases and characteristic sets--axe reviewed. The main focus is, however, on the use of the general...
详细信息
暂无评论