Big data analysis is a main challenge we meet recently. Cloud computing is attracting more and more big data analysis applications, due to its well scalability and fault-tolerance. Some aggregation functions, like SUM...
详细信息
Big data analysis is a main challenge we meet recently. Cloud computing is attracting more and more big data analysis applications, due to its well scalability and fault-tolerance. Some aggregation functions, like SUM, can be computed in parallel, because they satisfy distributive law of addition. Unfortunately, some of statistical functions are not naturally parallelizable. That means they do not satisfy distributive law of addition. In this paper, we focus on percentile computing problem. We proposed an iterative-style prediction-based parallel algorithm in a distributed system. Prediction is done through a sampling technique. Experiment results verify the efficiency of our algorithm.
More and more literature has been written on electronic records management (ERM) in e-government in recent three years, however, much is limited to experiences of one country with more focus on electronic records mana...
详细信息
More and more literature has been written on electronic records management (ERM) in e-government in recent three years, however, much is limited to experiences of one country with more focus on electronic records management systems (ERMS). This paper aims to investigate current trends and future directions of ERM including ERMS in e-government with more focus on comprehensive approaches internationally. Representative shows current ERMS have limitations either from IT perspectives or records and archives management perspectives managing records as data. Future research is called for more concerns of e-government and more involvement in efficient civil service. Case studies of representative policies, regulations, best practices guidelines from Australia, Canada, New Zealand, UK and U.S show challenges of ERM in e-government are getting more and more recognized in information risk, data governance and efficient civil service. Current trends of ERM in e-government are toward multidisciplinary and collaborative approaches to ERM managing records as information resources and business asset. Findings indicate that future directions of ERM in e-government would be toward meta-synthesis management at both organizational and national level, with integration concerns of collaboration, optimization and innovation of both ERM and e-government for civil service. The findings may have implications to be of use to both ERM and e-government professions internationally.
A decomposition method to solve the large-scale scheduling problems is proposed in this paper. Focused on large-scale scheduling problems, introducing cellular manufacturing technology to decompose scheduling problems...
详细信息
A decomposition method to solve the large-scale scheduling problems is proposed in this paper. Focused on large-scale scheduling problems, introducing cellular manufacturing technology to decompose scheduling problems, a collaborative scheduling process based on manufacturing cells is designed. Moreover, focused on the coupling problem in scheduling process in the context of cellular manufacturing, a decomposition method is suggested to achieve the decomposition of cross-cell jobs. Finally, the whole scheduling process is simplified through redefining the environment of cellular manufacturing.
A decomposition method to solve the large-scale scheduling problems is proposed in this paper. Focused on largescale scheduling problems, introducing cellular manufacturing technology to decompose scheduling problems,...
详细信息
In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is...
详细信息
In RFID application systems with multiple packaging layers, labeling packaging relationship of objects in different packaging layers by encoding methods is a important technology field. Prefix-based labeling scheme is a method by which the packaging relationship of objects amounts to testing whether one object is an prefix of the other, whereas the region numbering scheme is a method by which an ancestor query amount to an interval containment test on the labels. This paper first presents a mixed-encoding scheme based on Huffman algorithm, then propose a variant of this encoding scheme in which new "virtual nodes" are involved in order to improve the stability of encoding. Our experiments prove that the mixed-based encoding scheme is effective due to the enhancement of update performance and query efficiency.
Visualization technique is a powerful method used by science and technology intelligence analysis experts to identify technical competitor groups. Common visualization methods tend to create graphs meeting the aesthet...
详细信息
Visualization technique is a powerful method used by science and technology intelligence analysis experts to identify technical competitor groups. Common visualization methods tend to create graphs meeting the aesthetic criteria instead of finding better clusters, and their analysis results may provide misleading information. A process model of technical group identification method was presented using LinLog graph clustering algorithm to find better competitor groups. In the model, technical similarity value of each pair of competitors is measured based on their R&D output in sub-fields, and two competitors have a link when they have high similarity value; LinLog algorithm, which is aimed at producing better clusters, was employed to layout graph with competitors as nodes, their links as edges and technology similarity values as weights of edges. Experiment results show the efficiency of presented method.
LS 2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system....
详细信息
LS 2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system. With the support of changed LS 2 , we model three types of isolation. Moreover, we formally analyze the integrity measurement property of TrustVisor proposed recently which provides the isolated execution environment for security-sensitive code.
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation re...
详细信息
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation requirement frequently, the massive delay is inevitable. Without the modification to TPM, we propose Batch Integrity Report Protocol (BIRP) to overcome the performance bottleneck. B-IRP bundles these requirements in interval as a batch requirement, and creates the response messages for these requirements with one expensive TPM operation. Discussion shows that B-IRP has improved the performance without loss of security.
In this paper, we use strict mathematics reasoning to discover the relation between the threshold and reduction in Fuzzy Variable Precision Rough Sets (FVPRS), i.e., the reductions act as a nested structure with the m...
详细信息
In this paper, we use strict mathematics reasoning to discover the relation between the threshold and reduction in Fuzzy Variable Precision Rough Sets (FVPRS), i.e., the reductions act as a nested structure with the monotonously increasing threshold. By using the nested structure of reductions, we could design algorithms to quickly find different reductions when a reduction is required. Here `different' means the reductions obtained using different thresholds.
暂无评论