Matrix multiplication is one of the most common and vital numerical operations in the field of scientific computing, which is the kernel routine of Level 3 BLAS. The STI CELL processor is a heterogeneous multiprocesso...
详细信息
With the precision of data acquisition increases, large images that may occupy terabytes, become common in research and industry fields. Since multi-projector display wall systems can provide higher resolution, they b...
详细信息
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved p...
详细信息
To improve the agility, dynamics, composability, reusability, and development efficiency restricted by monolithic federation object model (FOM), a modular FOM is proposed by high level architecture (HLA) evolved product development group. This paper reviews the state-of-the-art of HLA evolved modular FOM. In particular, related concepts, the overall impact on HLA standards, extension principles, and merging processes are discussed. Also permitted and restricted combinations, and merging rules are provided, and the influence on HLA interface specification is given. The comparison between modular FOM and base object model (BOM) is performed to illustrate the importance of their combination. The applications of modular FOM are summarized. Finally, the significance to facilitate compoable simulation both in academia and practice is presented and future directions are pointed out.
This paper we extend the standard Z refinement relation for maltiple viewpoints oriented requirements method (MVORM). The original motivation is that we found the standard Z refinement is not adequate or correct when ...
详细信息
This paper we extend the standard Z refinement relation for maltiple viewpoints oriented requirements method (MVORM). The original motivation is that we found the standard Z refinement is not adequate or correct when considering specifications that have temporal relationships of operations. We do our work under a generic framework of MVORM. The concept of temporal state variables is introduced into Z. Then new implementation relations are defined and new refinement relations are deduced, mainly for temporal state variables to process temporal relationships of operations. We use state transition system to abstract temporal state transitions. A simple example is used to show the usage of MVORM.
Gesture inputs on multi-touch tabletops usually involve multiple fingers (more than two) and casual touchdowns or liftoffs of fingers. This flexibility of touch gestures allows more natural user interaction, but also ...
详细信息
Ant colony optimization (ACO), an intelligential optimization algorithm, has been widely used to solve combinational optimization problems. One of the obstacles in applying ACO is that its search process is sometimes ...
详细信息
In Delay Tolerant Networks (DTNs), the connections between mobile nodes are intermittent and constant end-to-end paths rarely exist. In order to achieve high delivery ratio, most existing DTN routing algorithms favor ...
详细信息
Rationale and rationale management have been playing an increasingly prominent role in softwaresystem development mainly due to the knowledge demand during system evaluation, maintenance, and evolution, especially fo...
详细信息
The (t, n) threshold RSA algorithm enables the system to keep the security and availab.lity of the private key without a trusted dealer when parts of system are already under attack. In the traditional threshold RSA s...
详细信息
ISBN:
(纸本)1581139551
The (t, n) threshold RSA algorithm enables the system to keep the security and availab.lity of the private key without a trusted dealer when parts of system are already under attack. In the traditional threshold RSA sub key distribution scheme, each party that shares the private key must keeps C nt sub keys secretly in order to enable the whole system to reconstruct the original private key by any t out of n parties. This paper presents a scalab.e searching algorithm, which can find out the optimized sub key distribution scheme that can significantly decrease the number of sub keys that should be held by each party without weakening the system's security. Thus it can reduce the complexity of key management and related operations. Copyright 2004 ACM.
The current P2P application protocols are usually constructed over the application-level overlay network. However, because the users in the P2P systems always follow a very dynamic mode, the overlay network with poor ...
详细信息
暂无评论