Case Based Reasoning (CBR) is the process of solving new problem based on the solutions of similar previous problems. XML is a markup language that allows document owners describe their data in their own formats. Ther...
详细信息
ISBN:
(纸本)9781424474226;9780769540887
Case Based Reasoning (CBR) is the process of solving new problem based on the solutions of similar previous problems. XML is a markup language that allows document owners describe their data in their own formats. There might be the same information has been described in various ways. This makes searching those information from different formats difficult. CXDR (CBR for XML Document Recommendation) is an idea to make searching XML documents easier. CXDR applies CBR framework to collect the mostly use XML document and recommend it to its user. CBR in CXDR consists of two parts, cases and knowledge. The case is XML documents and the knowledge is an XML document recommendation. The recommendation from CXDR is the most use XML element names and structure.
With the advance of semiconductor, multi-core architecture is inevitable in today's embedded system design. Nested loops are usually the most critical part in multimedia and high performance DSP (Digital Signal Pr...
详细信息
With the advance of semiconductor, multi-core architecture is inevitable in today's embedded system design. Nested loops are usually the most critical part in multimedia and high performance DSP (Digital Signal Processing) systems. Hence, maximizing loop parallelism is an important issue to improve the performance of a modern compiler. This paper studies how to maximize the system performance with the consideration of energy reduction for applications with multidimensional nested loops on multi-core DSP architectures. An algorithm, EALPM (Energy-Aware Loop Parallelism Maximization), is proposed in this paper. We implemented a two phase strategy. First, the strategy uses retiming and loop transformation to parallelize nested loops. Then the strategy employs a novel voltage assignment algorithm to reduce total energy consumption. The experimental results show that on average, both performance and energy-saving can be significantly improved using the EALPM algorithm.
Timed failure propagation graph (TFPG) is a directed graph model that represents temporal progression of failure effects in physical systems. In this paper, a distributed diagnosis approach for complex systems is intr...
详细信息
Timed failure propagation graph (TFPG) is a directed graph model that represents temporal progression of failure effects in physical systems. In this paper, a distributed diagnosis approach for complex systems is introduced based on the TFPG model settings. In this approach, the system is partitioned into a set of local subsystems each represented by a subgraph of the global system TFPG model. Information flow between subsystems is achieved through special input and output nodes. A high level diagnoser integrates the diagnosis results of the local subsystems using an abstract high level model to obtain a globally consistent diagnosis of the system.
Cloud computing environments facilitate applications by providing virtualized resources that can be provisioned dynamically. However, users are charged on a pay-per-use basis. User applications may incur large data re...
详细信息
ISBN:
(纸本)9781424466955;9780769540184
Cloud computing environments facilitate applications by providing virtualized resources that can be provisioned dynamically. However, users are charged on a pay-per-use basis. User applications may incur large data retrieval and execution costs when they are scheduled taking into account only the `execution time'. In addition to optimizing execution time, the cost arising from data transfers between resources as well as execution costs must also be taken into account. In this paper, we present a particle swarm optimization (PSO) based heuristic to schedule applications to cloud resources that takes into account both computation cost and data transmission cost. We experiment with a workflow application by varying its computation and communication costs. We compare the cost savings when using PSO and existing `Best Resource Selection' (BRS) algorithm. Our results show that PSO can achieve: (a) as much as 3 times cost savings as compared to BRS, and (b) good distribution of workload onto resources.
Verlhust logistic map f(x) = r x (1 - x) is a widely studied and applicable model in discrete dynamical system. Its behavior has been, extensively, studied in Picard orbit and recently studied in superior orbit. Rani ...
Verlhust logistic map f(x) = r x (1 - x) is a widely studied and applicable model in discrete dynamical system. Its behavior has been, extensively, studied in Picard orbit and recently studied in superior orbit. Rani et. al. [22] and [25] has shown that in superior orbit, logistic map is stable for larger values of r than that of Picard orbit. In this paper, we have attempted to make the map stable for further larger values of r via I-superior iterates.
In this paper, we consider the behavior of a wireless sensor network for TwoRayGround and Shadowing radio models for the case of mobile event. By means of simulations, we analyse the performance of AODV protocol. In t...
详细信息
ISBN:
(纸本)9781424459179;9780769539676
In this paper, we consider the behavior of a wireless sensor network for TwoRayGround and Shadowing radio models for the case of mobile event. By means of simulations, we analyse the performance of AODV protocol. In the previous work, we considered that the event node is stationary in the observation field. In this work, we want to investigate how the sensor network performs in the case when the event node moves. The simulation results show that the shadowing phenomena, by destroying the regularity of the network, reduce the mean distance among nodes and at the same time increase the interference level and the latency of packet transmission. We found that for mobile event, the Goodput and routing efficiency of TwoRayGround is better than Shadowing, but the Depletion of Shadowing is better than TwoRayGround.
In this paper, we propose a taxonomy that characterizes and classifies different components of autonomic application management in Grids. We also survey several representative Grid systems developed by various project...
详细信息
In this paper, we propose a taxonomy that characterizes and classifies different components of autonomic application management in Grids. We also survey several representative Grid systems developed by various projects world-wide to demonstrate the comprehensiveness of the taxonomy. The taxonomy not only highlights the similarities and differences of state-of-the-art technologies utilized in autonomic application management from the perspective of Grid computing, but also identifies the areas that require further research initiatives.
Data storage technologies have been recognized as one of the major dimensions of information management along with the network infrastructure and applications. The prosperity of cloud computing requires the migration ...
详细信息
Data storage technologies have been recognized as one of the major dimensions of information management along with the network infrastructure and applications. The prosperity of cloud computing requires the migration from server-attached storage to network-based distributed storage. Along with variant advantages, distributed storage also poses new challenges in creating a secure and reliable data storage and access facility. The data security in cloud is one of the challenges to be addressed before the novel pay-as-you-go business model can be accepted and applied widely. Concerns are raised from both insecure/unreliable service providers and potential malicious users. In this article, we analyze the integrity vulnerability existing in the current cloud storage platforms and show the problem of repudiation. A novel non-repudiation (NR) protocol specifically designed in the context of cloud computing environment is proposed. We have also discussed the robustness of the NR protocol against typical attacks in the network environments.
This paper describes different proposals made at UNED, for post-graduated students, at the area of IT Services Management and specially trying to fill the gap, of paramount importance, of the treatment due in ITIL ...
详细信息
This paper describes different proposals made at UNED, for post-graduated students, at the area of IT Services Management and specially trying to fill the gap, of paramount importance, of the treatment due in ITIL ® (Information Technology Infrastructure Library) to Information Security Management. We analyze the treatment given to Information Security Management in ITIL, both versions 2 and 3, and describe the different at distance post-graduated courses we offer that fill these methodologies and discuss the opinions and evaluations of our students.
Effective and meaningful visualization techniques are quite important for multidimensional DNA microarray gene expression data analysis. Elucidating the cluster properties of these multidimensional data are often comp...
详细信息
Effective and meaningful visualization techniques are quite important for multidimensional DNA microarray gene expression data analysis. Elucidating the cluster properties of these multidimensional data are often complex. Patterns, hypotheses on the relationships, and ultimately of the function of the gene can be analyzed and visualized by non-linear reduction of the multidimensional data to a lower dimension. In this paper, an improved SOM visualization technique named Improved Side Intensity Modulated (ISIM) Self-Organizing Map (SOM) has been proposed and compared with other SOM based visualization techniques. On different datasets, ISIM-SOM is found to offer better cluster boundary, simplicity and clarity.
暂无评论