In this paper, we propose a taxonomy that characterizes and classifies different components of autonomic application management in Grids. We also survey several representative Grid systems developed by various project...
详细信息
In this paper, a reputation-based Grid workflow scheduling algorithm is proposed to counter the effect of inherent unreliability and temporal characteristics of computing resources in large scale, decentralized Grid o...
详细信息
As more and more clusters with thousands of nodes are being deployed for high performance computing (HPC), fault tolerance in cluster environments has become a critical requirement. Checkpointing and rollback recovery...
详细信息
By using a powerful criterion for permutation polynomials, we give several classes of complete permutation polynomials over finite fields. First, two classes of complete permutation monomials whose exponents are of Ni...
详细信息
By using a powerful criterion for permutation polynomials, we give several classes of complete permutation polynomials over finite fields. First, two classes of complete permutation monomials whose exponents are of Niho type are presented. Second, for any odd prime p, we give a sufficient and necessary condition for a-1xdto be a complete permutation polynomial over Fp4 k, where d =(p4k-1)/(pk-1)+ 1 and a ∈ F*p4k. Finally, we present a class of complete permutation multinomials, which is a generalization of recent work.
Recent studies have applied different approaches for summarizing software artifacts, and yet very few efforts have been made in summarizing the source code fragments available on web. This paper investigates the feasi...
详细信息
Recent studies have applied different approaches for summarizing software artifacts, and yet very few efforts have been made in summarizing the source code fragments available on web. This paper investigates the feasibility of generating code fragment summaries by using supervised learning algorithms. We hire a crowd of ten individuals from the same work place to extract source code features on a cor- pus of 127 code fragments retrieved from Eclipse and Net- Beans Official frequently asked questions (FAQs). Human an- notators suggest summary lines. Our machine learning algo- rithms produce better results with the precision of 82% and perform statistically better than existing code fragment classi- fiers. Evaluation of algorithms on several statistical measures endorses our result. This result is promising when employing mechanisms such as data-driven crowd enlistment improve the efficacy of existing code fragment classifiers.
Continuous advances in the areas of sensor networks have made wireless sensor networks (WSNs) attractive for a wide variety of applications, with vastly varying requirements and characteristics. As the data sensed by ...
详细信息
Recent advancements in speech recognition technology and the widespread availability of inexpensive computers mean that real-time transcription in the classroom is becoming practical. This paper reports on the accurac...
详细信息
ISBN:
(纸本)9780889867406
Recent advancements in speech recognition technology and the widespread availability of inexpensive computers mean that real-time transcription in the classroom is becoming practical. This paper reports on the accuracy and readability achieved using a low-cost speech transcription system that assists deaf and hard-of-hearing students with note-taking. The design is presented for a system that attempts to balance issues of availability and cost with usability and accuracy to provide a viable and fully automatic alternative to a human signer or note taker. While this study focuses on empirical measures of design choices and accuracy, anecdotal results are also presented, with particular attention paid to the practical trade-offs between cost, accuracy and readability of a real-time transcription system.
In vehicular networks, onboard devices face the challenge of limited storage, and computational resources constrain their processing and storage capabilities. This limitation is particularly significant for applicatio...
详细信息
In this paper, we introduce a rigorous punishment mechanism into the prisoners’ dilemma game. In our model, the punisher punishes the defector with fine β at the cost of γ. Monte-Carlo simulations show the evolutio...
详细信息
The need for supporting variety of hard and soft real-time, as well as best effort applications in a multimedia computing environment requires an operating system framework that: (1) enables different schedulers to be...
详细信息
The need for supporting variety of hard and soft real-time, as well as best effort applications in a multimedia computing environment requires an operating system framework that: (1) enables different schedulers to be employed for different application classes, and (2) provides protection between the various classes of applications. We argue that these objectives can be achieved by hierarchical partitioning of CPU bandwidth, in which an operating system partitions the CPU bandwidth among various application classes, and each application class, in turn, partitions its allocation (potentially using a different scheduling algo-rithm) among its sub-classes or applications. We present Start-time Fair Queuing (SFQ) algorithm, which enables such hierarchical partitioning. We have implemented a hierarchical scheduler in Solaris 2.4. We describe our implementation, and demonstrate its suitability for mul-timedia operating systems.
暂无评论