In distributed computing systems, load balancing is one of the mostimportant factors that affect the system performance. This paper presentsa sender-mitiated dynamic load balancing policies in a distributedcomputing s...
详细信息
In distributed computing systems, load balancing is one of the mostimportant factors that affect the system performance. This paper presentsa sender-mitiated dynamic load balancing policies in a distributedcomputing system. There are four policies consisted in the proposedExtenics-based Load Balancing Mechanism (ELBM). For the transferpolicy, instead of defining a fixed threshold value in the traditional loadbalancing policies, we are applying the extension set theory and usingthe average response time of jobs as a factor to create an adaptivethreshold value which is calculated by relational function of averageresponse time, for determining that a new arriving job should bemigrated or not In addition to the transfer policy, bypass-transfer methodis used in the location *** that need to be migrated do not needto be transferred to central node first, but are transferred to destinationnode directly, so as to reduce the communication costs. In order to makethe system more reliable, a template queue is added at the master node ofthe system to reduce the job arrival failure. A simulation model has beenbuilt for evaluating the performance of the system. Comparing with otherload balancing mechanisms, such as RT and ALBCII algorithms, thesimulation results show that a better performance can be achieved by theproposed mechanism.
This paper presents the performance characterization and optimization of micromachined acoustic ejectors (MACE) and their application in micro propulsion and gas pumping. The MACE array utilizes forced Helmholtz reson...
详细信息
ISBN:
(纸本)0780371852
This paper presents the performance characterization and optimization of micromachined acoustic ejectors (MACE) and their application in micro propulsion and gas pumping. The MACE array utilizes forced Helmholtz resonators coupled with an acoustic ejector to produce high-speed micro-jets at resonance. A micro-jet with "near-field" velocity of /spl sim/0.8 m/sec is measured by hot-wire anemometry. An average thrust of 1.35/spl mu/N per ejector has been obtained consistent with the prediction by theory. A visualized air column longer than 10cm is also demonstrated with an equivalent pumping rate of 54 ml/min per ejector (/spl sim/1600/spl mu/m/spl times/1600/spl mu/m). The resonators have been consistently operating for more than 6,000,000,000 cycles without failure.
Fault-tolerant computer systems are being used increasingly in such applications as e-commerce, banking, and stock trading, where privacy and integrity of data are as important as the uninterrupted operation of the se...
详细信息
ISBN:
(纸本)0769514146
Fault-tolerant computer systems are being used increasingly in such applications as e-commerce, banking, and stock trading, where privacy and integrity of data are as important as the uninterrupted operation of the service provided. While much attention has been paid to the protection of data explicitly communicated over the Internet, there are also other sources of information leakage that must be addressed. This paper addresses one such source of information leakage caused by checkpointing, which is a common method used to provide continued operation in the presence of faults. Checkpointing requires communication of memory state information, which may contain sensitive data, over the network to a reliable backing store. Although the method of encrypting all of this memory state information can protect the data, such a simplistic method is an overkill that can result in a significant slowdown of the target application. This paper examines ways to combine the operations required to perform incremental checkpointing with those required to encrypt this memory state data. Analysis and experimentation on an actual system are used to show that the proposed secure checkpointing schemes are feasible and require a relatively low level of overhead.
This paper describes a strategy to extract accurate Digital Elevation Models (DEMs) from satellite image pairs. In general, extracting DEMs consists of camera modeling, stereo matching, editing and interpolation. Beca...
详细信息
This paper reports our study of a novel motion estimation technique based on structure segmentation and homogeneity *** this proposed method,the frames are first segmented into four macroblock types corresponding to s...
详细信息
This paper reports our study of a novel motion estimation technique based on structure segmentation and homogeneity *** this proposed method,the frames are first segmented into four macroblock types corresponding to stationary background,uncovered background(or new objects),moving objects and edges among *** the following motion estimation is only performed on the compensable macroblocks according to motion homogeneous
For problem solving in the artificial intelligence, this paper presents a new hyper-distributed hyper-parallel approach based on the bifurcations and synchronizations of the hierarchical distributed chaotic dynamic sy...
详细信息
For problem solving in the artificial intelligence, this paper presents a new hyper-distributed hyper-parallel approach based on the bifurcations and synchronizations of the hierarchical distributed chaotic dynamic systems. By using Chua's circuits arrays, the realization of the hyper-distributed hyper-parallel heuristic algorithms for real-time search of any implicit AND/OR graph is discussed. The approach not only combines the advantages of both the traditional sequential symbolic logic and the conventional neural network approaches, but also overcomes their drawbacks in many respects.< >
This paper describes an approach for structuring ideas during software *** design an ad hoc conversational model, which based on Issue-Based Information System(IBIS) model,to capture the ideas in the phases of object-...
详细信息
ISBN:
(纸本)0780312333
This paper describes an approach for structuring ideas during software *** design an ad hoc conversational model, which based on Issue-Based Information System(IBIS) model,to capture the ideas in the phases of object-oriented analysis and object-oriented design(OOA/OOD).Issue based system has been developed for collaborating on complex design problems,and object oriented approach is considered as the new methodology for fighting against the challenges of developing complex software *** propose a new approach that is combining IBIS model and object-oriented method for idea processing in computer-aided software design.
A geometric approach for deriving a consistent joint solution of a six-point PUMA1 robot is presented. The approach calls for the definition of various possible arm configurations based on the link coordinate systems ...
详细信息
A geometric approach for deriving a consistent joint solution of a six-point PUMA1 robot is presented. The approach calls for the definition of various possible arm configurations based on the link coordinate systems and human arm geometry. These arm configurations are then expressed in an exact mathematical way to allow the construction of arm configuration indicators and their corresponding decision equations. The arm configuration indicators are prespecified by a user for finding the joint solution. These indicators enable one to find a solution from the possible four solutions for the first three joints, a solution from the possible two solutions for the last three joints. The solution is calculated in two stages. First a position vector pointing from the shoulder to the wrist is derived. This is used to derive the solution of the first three joints by looking at the projection of the position vector onto the xi-1-yi-1(i = 1,2,3) plane. The last three joints are solved using the calculated joint solution from the first three joints, the orientation matrices, and the projection of the link coordinate frames onto the xi-1-yi-1 (i = 4,5,6) plane. From the geometry, one can easily find the arm solution consistently. A computer simulation study conducted on a VAX-11/780 computer demonstrated the validity of the arm solution.
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012.;The 12 revised full papers presented were carefully reviewed and selected...
详细信息
ISBN:
(数字)9783642328732
ISBN:
(纸本)9783642328725
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, in August 27, 2012.;The 12 revised full papers presented were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on privacy protection, access control, secure storage on the cloud, and trust on the Web.
暂无评论