Automatic image annotation is an important but highly challenging problem in content-based image retrieval. This paper introduces a new procedure for providing images with semantic keywords. To bridge the semantic gap...
详细信息
The current P2P application protocols are usually constructed over the application-level overlay network. However, because the users in the P2P systems always follow a very dynamic mode, the overlay network with poor ...
详细信息
We report our work on evaluating performance of several MPI Allgather algorithms on Fast Ethernet. These algorithms are ring, recursive doubling, Bruck, and neighbor exchange. The first three algorithms are widely use...
详细信息
ISBN:
(纸本)0769524869
We report our work on evaluating performance of several MPI Allgather algorithms on Fast Ethernet. These algorithms are ring, recursive doubling, Bruck, and neighbor exchange. The first three algorithms are widely used today. The neighbor exchange algorithm which was recently proposed by the authors incorporates pair-wise exchange, and is expected to perform better with certain configurations, mainly when using TCP/IP over Ethernet. We tested the four algorithms on terascale Linux clusters DeepComp 6800 and DAWNING 4000A using TCP/IP over Fast Ethernet. Results show that our neighbor exchange algorithm performs the best for long messages, the ring algorithm performs the best for medium-size messages and the recursive doubling algorithm performs the best for short messages.
Document classification is one of important steps in document mining. In this paper, we present a new kind of document classification method based on generalized learning model (GLM for short). GLM is an extensible ma...
详细信息
Document classification is one of important steps in document mining. In this paper, we present a new kind of document classification method based on generalized learning model (GLM for short). GLM is an extensible machine learning model with great flexibility. It may fuses symbolic learning, fuzzy learning, statistical learning, and neural learning together. If necessary, new learning model can be incorporated. To describe and represent documents more reasonably, we develop a approach to extract membership vector as features of documents. In view of the characteristics of document classification, two kinds of document classification methods are employed under GLM frame. One is based on fuzzy set theory, the other is based on support vector machine (SVM). These two kinds of methods can supplement each other to achieve better performance.
This paper discusses the problems of control design and stability analysis of the networked control systems(NCSs) with random delays. The network-induced delays of the NCS are considered as interval variables governed...
详细信息
This paper analyzes the inner mechanism of basic methods for high-voltage transmission line (HTL) fault diagnosis, and proposes the new SVM based HTL diagnosis models, which has the characteristic of good generalizati...
详细信息
As many approaches have been suggested recently to address the problem of distributed denial-of-service (DDoS) attacks, yet few of them pay enough attention to the quality of service (QoS) requirements of the communic...
详细信息
ISBN:
(纸本)1932415823
As many approaches have been suggested recently to address the problem of distributed denial-of-service (DDoS) attacks, yet few of them pay enough attention to the quality of service (QoS) requirements of the communication processes running on the victim-end systems, especially when they are under DDoS attacks. By employing a novel communication service surveillance algorithm called "Shepherd", we present in this paper a DDoS detection architecture named Baseline - a passive approach due to its different perspective with respect to many other DDoS detection methods. Baseline can be installed on any host in the Internet communication environment with trivial effort and the running system consists only of a low weight daemon that efficiently performs Shepherd algorithm on the registered communication processes. Through adding plug-able modules to the actuator of the daemon, Baseline can be easily integrated with intrusion detection systems (IDS). While compared with previous work, our approach does not require traffic analysis or packets content filtering, which entails an always-running process with high CPU overhead;nor does it require any modification to the existing router systems, which is simply considered impractical economically. Moreover, Baseline achieves zero false positive to some extent, as we show in the paper.
This paper addresses a fundamental problem that arises in data streaming scenarios, namely, today's data mining is ill-equipped to handle data streams effectively, and pays little attention to the network stabilit...
详细信息
Earlier, hardware-accelerated stenciled shadow volume (SSV) techniques had not been widely adopted by 3D games and applications due in large part to the lack of robustness of described techniques. This situation persi...
详细信息
ISBN:
(纸本)0780394291
Earlier, hardware-accelerated stenciled shadow volume (SSV) techniques had not been widely adopted by 3D games and applications due in large part to the lack of robustness of described techniques. This situation persisted despite widely availab.e hardware support. Since perception being changed, our aims are at providing an exhaustive study. In particular we discuss the advantages, limitations, rendering quality and cost of each algorithm. Stencil Shadow Volumes (SSVs) are still popular for their simplicity, adaptability to different approaches, hybrid nature, robustness, being powered by graphic hardware compatibilities and real time physical based rendering capabilities, making it highly demanding in graphics and gaming industries. We also addressed the rendering quality and cost of recent algorithms. Finally, we indicate that recent methods can be efficiently exploited and, with such a drastic improvement, how to make the physical based method more practically adopted methods for 3D games and in animation industries discussing optimizations, workflow, and scene management employed in commercial 3D engines.
Meta modeling is an effective approach to implement interoperability among distributed and heterogeneous information sources on Web. MMFI (Framework for Metamodel Interoperability) is a set of meta objects and Metamod...
详细信息
暂无评论