As a new stage in the development of the cloud computing paradigm, serverless computing has the high-level abstraction characteristic of shielding underlying details. This makes it extremely challenging for users to c...
As a new stage in the development of the cloud computing paradigm, serverless computing has the high-level abstraction characteristic of shielding underlying details. This makes it extremely challenging for users to choose a suitable serverless platform. To address this, targeting the jointcloud computing scenario of heterogeneous serverless platforms across multiple clouds, this paper presents a jointcloud collaborative mechanism called FCloudless with cross-cloud detection of the full lifecycle performance of serverless platforms. Based on the benchmark metrics set that probe performance critical stages of the full lifecycle, this paper proposes a performance optimization algorithm based on detected performance data that takes into account all key stages that affect the performance during the lifecycle of a function and predicts the overall performance by combining the scores of local stages and dynamic weights. We evaluate FCloudless on AWS, AliYun, and Azure. The experimental results show that FCloudless can detect the underlying performance of serverless platforms hidden in the black box and its optimization algorithm can select the optimal scheduling strategy for various applications in a jointcloud environment. FCloudless reduces the runtime by 23.3% and 24.7% for cold and warm invocations respectively under cost constraints.
Punctuation restoration in speech recognition has a wide range of application scenarios. Despite the widespread success of neural networks methods at performing punctuation restoration for English, there have been onl...
详细信息
Sorting and searching are critical processes for effecttive data analysis. In this paper, we evaluate the performance of various sorting and searching algorithms and compare their time and space complexities on both s...
Sorting and searching are critical processes for effecttive data analysis. In this paper, we evaluate the performance of various sorting and searching algorithms and compare their time and space complexities on both sorted and unsorted data. The algorithms we analyzed include six common sorting algorithms (insertion, radix, bucket, merge, bubble, and quick sort) and three search algorithms (linear, binary, and jump search). The results of our study provide insights into the best algorithms to use for different input sizes and types of data. It was found that for small input sizes, all algorithms perform similarly, but for larger input sizes, insertion and radix sorts are better for time complexity while bubble sort is better for space complexity. Additionally, jump search outperformed linear and binary search algorithms in both time and space complexity. Besides, difference between time and space complexity of sorted and unsorted data was significant.
Spread-Spectrum Steganography (SSS) technology is used to hide information messages in image containers. For this purpose, propagating discrete signals are used, in specially formed pseudo-random sequences (PRS) with ...
详细信息
作者:
Wang, ZhongZhang, LinWang, HeshengShanghai Jiao Tong University
State Key Laboratory of Avionics Integration and Aviation System-of-Systems Synthesis Department of Automation Key Laboratory of System Control and Information Processing of Ministry of Education Shanghai200240 China Tongji University
School of Computer Science and Technology National Pilot Software Engineering School with Chinese Characteristics Shanghai201804 China
Traditional LiDAR SLAM approaches prioritize localization over mapping, yet high-precision dense maps are essential for numerous applications involving intelligent agents. Recent advancements have introduced methods l...
详细信息
Context: Most software companies strive to have high-performing teams and mitigate withdrawal behaviors like being present but unproductive. In this context, psychological safety and developers’ perceived impact are ...
详细信息
This paper presents an innovative approach to DevOps security education, addressing the dynamic landscape of cybersecurity threats. We propose a student-centered learning methodology by developing comprehensive hands-...
详细信息
ISBN:
(数字)9798350376968
ISBN:
(纸本)9798350376975
This paper presents an innovative approach to DevOps security education, addressing the dynamic landscape of cybersecurity threats. We propose a student-centered learning methodology by developing comprehensive hands-on learning modules. Specifically, we introduce labware modules designed to automate static security analysis, empowering learners to identify known vulnerabilities efficiently. These modules offer a structured learning experience with pre-lab, hands-on, and post-lab sections, guiding students through DevOps concepts and security challenges. In this paper, we introduce hands-on learning modules that familiarize students with recognizing known security flaws through the application of Git Hooks. Through prac-tical exercises with real-world code examples containing security flaws, students gain proficiency in detecting vulnerabilities using relevant tools. Initial evaluations conducted across educational institutions indicate that these hands-on modules foster student interest in software security and cybersecurity and equip them with practical skills to address DevOps security vulnerabilities.
This paper reports an analysis of aspects of the project planning stage. The object of research is the decision-making processes that take place at this stage. This work considers the problem of building a hierarchy o...
详细信息
The technological process of the churning process in continuous butter manufacture were considered. The qualitative indicator of the water content of butter was modeled on the basis of a set of industrial data using a...
详细信息
ISBN:
(纸本)9781665492768
The technological process of the churning process in continuous butter manufacture were considered. The qualitative indicator of the water content of butter was modeled on the basis of a set of industrial data using an artificial neural network (ANN). The prototype of an intelligent system for predicting of the water content of butter allows to increase the information support of the operator-technologist. The proposed model predicts the water content of butter with an error of less than 2%. The input variables of the forecast model prototype are cream fat content, cream ripening temperature, cream supply temperature, frequency of revolutions of the stirrer of the whipping device, and consumption of the normalizing component. Further research is aimed at the development of a decision support information system for dairy manufacture and should be integrated into the subsystem of automated control of the technological process to ensure proper functioning in real time.
Remote driving serves as a viable solution in situations where fully autonomous vehicles encounter critical events, such as sensor failures. However, implementing remote driving poses certain technical challenges, inc...
Remote driving serves as a viable solution in situations where fully autonomous vehicles encounter critical events, such as sensor failures. However, implementing remote driving poses certain technical challenges, including the need to ensure high-quality video transmission to the remote driver. Additionally, in scenarios involving poor road conditions, multiple autonomous vehicles may simultaneously require remote driving assistance at specific locations, straining the communication infrastructure. To address these challenges, we propose a novel approach that involves compression of the driving video using a driving safety model. This model intelligently prioritizes key objects within the frame, resulting in improved compression quality. An initial experiment demonstrated that 60% of the required bitrate can be reduced while retaining 90% of the perceived quality.
暂无评论