In this paper, we describe a comprehensive study conducted to understand the methodologies which are being used to design Intelligent Decision Support systems (IDSSs) and to identify the key methodological problems an...
详细信息
In this paper, we describe a comprehensive study conducted to understand the methodologies which are being used to design Intelligent Decision Support systems (IDSSs) and to identify the key methodological problems and benefits with using these methodologies. This comprehensive study consists of two parts. The first part is two surveys which together identify the design methodologies being used by a group of IDSS developers and how acceptable they believe their methodologies were for designing their IDSSs. The second part is a comparison of six major formal IDSS design methodologies recently published in the literature and which are not yet known to many developers. This paper is presented to assist IDSS developers in understanding what support can be gained from using existing design methodologies and hence choose the correct one for their project. Furthermore, the paper may be used by IDSS developers to compare the way that they work with the approach proposed by other developers. (C) 1997 Elsevier Science B.V.
This paper presents a case study for veri- fying a carry look-ahead adder using the axiom system of Propositional projection temporal logic (PPTL). To this end, the syntax, semantics and axiom system of PPTL are brief...
详细信息
This paper presents a case study for veri- fying a carry look-ahead adder using the axiom system of Propositional projection temporal logic (PPTL). To this end, the syntax, semantics and axiom system of PPTL are briefly introduced. Further, functions and architectures of the carry look-ahead adder are presented. In addition, four lemmas are proved with the axiom system of PPTL. Fi- nally, the correctness of the adder is verified based on the lemmas and the axiom system of PPTL. The case study shows that the axiom system for PPTL is workable.
As semiconductor technology advances, there will be billions of transistors on a single chip. Chip many-core processors are emerging to take advantage of these greater transistor densities to deliver greater performan...
详细信息
As semiconductor technology advances, there will be billions of transistors on a single chip. Chip many-core processors are emerging to take advantage of these greater transistor densities to deliver greater performance. Effective fault tolerance techniques are essential to improve the yield of such complex chips. In this paper, a core-level redundancy scheme called N+M is proposed to improve N-core processors’ yield by providing M spare cores. In such architecture, topology is an important factor because it greatly affects the processors’ performance. The concept of logical topology and a topology reconfiguration problem are introduced, which is able to transparently provide target topology with lowest performance degradation as the presence of faulty cores on-chip. A row rippling and column stealing (RRCS) algorithm is also proposed. Results show that PRCS can give solutions with average 13.8% degradation with negligible computing time.
ETL (Extract-Transform-Load) usually includes three phases: extraction, transformation, and loading. In building data warehouse, it plays the role of data injection and is the most time-consuming activity. Thus it ...
详细信息
ETL (Extract-Transform-Load) usually includes three phases: extraction, transformation, and loading. In building data warehouse, it plays the role of data injection and is the most time-consuming activity. Thus it is necessary to improve the performance of ETL. In this paper, a new ETL approach, TEL (Transform-Extract-Load) is proposed. The TEL approach applies virtual tables to realize the transformation stage before extraction stage and loading stage, without data staging area or staging database which stores raw data extracted from each of the disparate source data systems. The TEL approach reduces the data transmission load, and improves the performance of query from access layers. Experimental results based on our proposed benchmarks show that the TEL approach is feasible and practical.
Genomic sequence comparison algorithms represent the basic toolbox for processing large volume of DNA or protein sequences. They are involved both in the systematic scan of databases, mostly for detecting similarities...
详细信息
As an important branch of information security algorithms,the efficient and flexible implementation of stream ciphers is *** implementation methods,such as FPGA,GPP and ASIC,provide a good support,but they could not a...
详细信息
As an important branch of information security algorithms,the efficient and flexible implementation of stream ciphers is *** implementation methods,such as FPGA,GPP and ASIC,provide a good support,but they could not achieve a better tradeoff between high speed processing and high *** has fast processing speed,but its flexibility is poor,GPP has high flexibility,but the processing speed is slow,FPGA has high flexibility and processing speed,but the resource utilization is very *** paper studies a stream cryptographic processor which can efficiently and flexibly implement a variety of stream cipher *** analyzing the structure model,processing characteristics and storage characteristics of stream ciphers,a reconfigurable stream cryptographic processor with special instructions based on VLIW is presented,which has separate/cluster storage structure and is oriented to stream cipher *** proposed instruction structure can effectively support stream cipher processing with multiple data bit widths,parallelism among stream cipher processing with different data bit widths,and parallelism among branch control and stream cipher processing with high instruction level parallelism;the designed separate/clustered special bit registers and general register heaps,key register heaps can satisfy cryptographic *** the proposed processor not only flexibly accomplishes the combination of multiple basic stream cipher operations to finish stream cipher *** has been implemented with 0.18μm CMOS technology,the test results show that the frequency can reach 200 MHz,and power consumption is 310 *** kinds of stream ciphers were realized in the *** key stream generation throughput of Grain-80,W7,MICkey,ACHTERBAHN and Shrink algorithm is 100 Mbps,66.67 Mbps,66.67 Mbps,50 Mbps and 800 Mbps,*** test result shows that the processor presented can achieve good tradeoff between high performance and flexibili
Liveness is a basic property of a system and the liveness issue of unbounded Petri nets remains one of the most difficult problems in this *** work proposes a novel method to decide the liveness of a class of unbounde...
详细信息
Liveness is a basic property of a system and the liveness issue of unbounded Petri nets remains one of the most difficult problems in this *** work proposes a novel method to decide the liveness of a class of unbounded generalized Petri nets calledω-independent unbounded nets,breaking the existing limits to one-place-unbounded *** algorithm to construct a macro liveness graph(MLG)is developed and a critical condition based on MLG deciding the liveness ofω-independent unbounded nets is *** are provided to demonstrate its effectiveness.
In this paper, we consider a general and practical complex network model, in which there exist couplings with and without time delays, and the coupled functions among nodes are also nonlinear. For this network model, ...
详细信息
ISBN:
(纸本)9789881563910
In this paper, we consider a general and practical complex network model, in which there exist couplings with and without time delays, and the coupled functions among nodes are also nonlinear. For this network model, we investigate its finite-time synchronization by designing some general static and adaptive controllers respectively. Using the finite-time stability theory, some useful finite-time synchronization criteria are derived. Finally, numerical simulations are given to demonstrate the correctness of our theoretical results.
In this paper, we investigate the synchronization problem for nonlinearly coupled networks under periodically intermittent pinning control, where the coupling matrix denoting network topology is assumed to be symmetri...
详细信息
ISBN:
(纸本)9781467355339
In this paper, we investigate the synchronization problem for nonlinearly coupled networks under periodically intermittent pinning control, where the coupling matrix denoting network topology is assumed to be symmetric. A sufficient condition to guarantee global synchronization is presented. Moreover, a centralized adaptive intermittent control is designed and its validity is rigorously proved. Finally, some numerical examples are presented to demonstrate the correctness of obtained theoretical results.
In this paper,the cluster synchronization problem for nonlinearly coupled networks under periodically intermittent pinning control is *** first,a sufficient condition to guarantee cluster synchronization is ***,an ada...
详细信息
ISBN:
(纸本)9781479900305
In this paper,the cluster synchronization problem for nonlinearly coupled networks under periodically intermittent pinning control is *** first,a sufficient condition to guarantee cluster synchronization is ***,an adaptive intermittent control algorithm is designed to the control strength and its validity is rigorously ***,some numerical examples are presented to demonstrate the correctness of obtained theoretical results.
暂无评论