The three dimensional stratum modeling provides important basis of analysis and policy-making in areas such as Geophysics, Petroleum, Minerals, Urban construction and so on. In this paper, we firstly propose a general...
详细信息
By researching Voronoi diagram, parallel algorithm, and divide-and-conquer method, we present a special data structure(change doubly-connected list little) for Voronoi diagram generation in parallel. In this paper we ...
详细信息
A modified physics-based method is adopted to control the water waves, and the discretization of the governing 2D N-S equation is taken as the interaction between the variables in spaces, based on the idea of spreadin...
详细信息
A modified physics-based method is adopted to control the water waves, and the discretization of the governing 2D N-S equation is taken as the interaction between the variables in spaces, based on the idea of spreading though the neighboring regions. Meshing model of the water surface is based on a terrain LOD scheme called Tiled Quad-tree. With that the region of water surface can be extended unboundedly. A new controlling strategy is used, that the driving parameters of the water movement is taken separately, so it's easy to change parameters in real time while generating various water waves. Reflection and refraction of rays in water is simulated to improve the visual impression. It is shown that these methods can efficiently produce realistic movement of various water waves in real-time.
This paper proposes an approach to generate emotional music using Interactive Genetic Algorithm. Performance rules are described by the KTH rule system. Different emotional expressions can be modeled by using selectio...
详细信息
This paper studied the relationships between color attributes and emotional dimensions by classification based on associations. First psychological experiments were designed to gather users' emotional response to ...
详细信息
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper pres...
详细信息
The attack graph, a typical model-based method, is widely used in the field of network security evaluation. The biggest disadvantage of attack graph method is its exponential growth of the state space. This paper presents an efficient algorithm based on the malefactor's access level vector in every host of the network to generate a reduced attack graph in polynomial compute complexity. In this algorithm, the state space is reduced to O(nm) , where n is the number of nodes and m is the whole number of vulnerabilities in the network. We also present a standard method to generate attack templates from the vulnerabilities.
In this paper,the state-of-the-art parallel computational model research is *** will introduce various models that were developed during the past *** to their targeting architecture features,especially memory organiza...
详细信息
In this paper,the state-of-the-art parallel computational model research is *** will introduce various models that were developed during the past *** to their targeting architecture features,especially memory organization,we classify these parallel computational models into three *** models and their characteristics are discussed based on three generations *** believe that with the ever increasing speed gap between the CPU and memory systems,incorporating non-uniform memory hierarchy into computational models will become *** the emergence of multi-core CPUs,the parallelism hierarchy of current computing platforms becomes more and more *** this complicated parallelism hierarchy in future computational models becomes more and more important.A semi-automatic toolkit that can extract model parameters and their values on real computers can reduce the model analysis complexity,thus allowing more complicated models with more parameters to be *** memory and hierarchical parallelism will be two very important features that should be considered in future model design and research.
This paper extended the set-covering model for single-skill call centers, proposed by Dantzig, to handle multi-skill cases. First is solves the staffing level of each period for each skill, using the classical formula...
详细信息
This paper extended the set-covering model for single-skill call centers, proposed by Dantzig, to handle multi-skill cases. First is solves the staffing level of each period for each skill, using the classical formulas in queueing system theory;second, it decomposes a multi-skill agent to a combination of single-skill agents in every period;and then it models the shift scheduling problem in a linear programming framework. The new model makes the most use of the flexibility of multi-skill agents. The experiments show that by the proposed model, solutions of high performance can be found stably in a short period of time, which are acceptable in practice. The solutions provide informative guidance for overall planning of the call center. The solutions also provide a new way to deal with the call routing problem.
In this paper, we present a general survey on parallel computing. The main contents include parallel computer system which is the hardware platform of parallel computing, parallel algorithm which is the theoretical ba...
详细信息
In this paper, we present a general survey on parallel computing. The main contents include parallel computer system which is the hardware platform of parallel computing, parallel algorithm which is the theoretical base of parallel computing, parallel programming which is the software support of parallel computing. After that, we also introduce some parallel applications and enabling technologies. We argue that parallel computing research should form an integrated methodology of "architecture algorithm programming application". Only in this way, parallel computing research becomes continuous development and more realistic.
暂无评论