Microarray data are expected to be useful for cancer classification. The main problem that needs to be addressed is the selection of a smaller subset of genes from the thousands of genes in the data that contributes t...
详细信息
A pragmatic and straightforward approach to semantic service discovery is to match inputs and outputs of user requests with the input and output requirements of registered service descriptions. This approach can be ex...
详细信息
Moving and resizing desktop windows are frequently performed but largely unexplored interaction tasks. The standard title bar and border dragging techniques used for window manipulation have not changed much over the ...
详细信息
The delay of a circuit implemented in a Lookup table (LUT) based Field-Programmable Gate Arrays (FPGAs) is a combination of routing delays, and logic block delays. However most of an FPGA's area is devoted to prog...
详细信息
Field Programmable Gate Arrays (FPGAs) are becoming increasingly popular for use in high-integrity safety related and safety critical systems. FPGAs offer a number of potential benefits over traditional microprocessor...
详细信息
Field Programmable Gate Arrays (FPGAs) are becoming increasingly popular for use in high-integrity safety related and safety critical systems. FPGAs offer a number of potential benefits over traditional microprocessor based softwaresystems, such as predictable timing performance, the ability to perform highly parallel calculations, predictable emulation of obsolete components, and (in the case of SRAM based FPGAs) the ability to reconfigure to avoid hardware failures. However these abilities do not come for free and often designers are forced to make pessimistic safety and reliability assumptions leading to conservative overall system designs. In this paper a modular, and hence more scalable approach, to performing FPGA safety analysis is presented.
After more than a decade of research in Model-Driven engineering(MDE), the state-of-the-art and the state-of-the-practice in MDEhas significantly progressed. Therefore, during this workshop we raised the question of h...
详细信息
ISBN:
(纸本)9783642016479
After more than a decade of research in Model-Driven engineering(MDE), the state-of-the-art and the state-of-the-practice in MDEhas significantly progressed. Therefore, during this workshop we raised the question of how to proceed next, and we identified a number of future challenges in the field of MDE. The objective of the workshop was to provide a forum for discussing the future of MDE research and practice. Seven presenters shared their vision on the future challenges in the field of MDE. Four breakout groups discussed scalability, consistency and co-evolution, formal foundations, and industrial adoption, respectively. These themes were identified as major categories of challenges by the *** report summarises the different presentations, the MDE challenges identified by the workshop participants, and the discussions of the breakout groups.
Requirements are critical to system validation as they guide all subsequent stages of systems development. Inadequately specified requirements generate systems that require major revisions or cause system failure enti...
详细信息
In this paper, we consider the detection problem with intermittent observations, due to the unreliable shared communication link between local sensors and the fusion center. Detection performance is analyzed using Ney...
详细信息
In this paper, we consider the detection problem with intermittent observations, due to the unreliable shared communication link between local sensors and the fusion center. Detection performance is analyzed using Neyman-Pearson criterion of maximizing the probability of detection, for a given probability of false alarm. The detector performance is compared, with and without intermittent observations, and a formal approach is presented to restore the original detector performance.
In this work, we are developing the computer aided composition system. This system aids a person, which knows cellphone or background music of home page or software. This system is implemented with the interactive sel...
详细信息
In this work, we are developing the computer aided composition system. This system aids a person, which knows cellphone or background music of home page or software. This system is implemented with the interactive selective population climbing. We suppose that it is appropriate to fetch the favorite melody by hill climbing, because we believe that the function about favor in the human can express the proximate single-peak function for acceleration. However, the user's favorite melodies are sometimes changed, as the user's favor becomes clear. Thus, the system selects a real parent from many parents in proportion of these evaluation values in order to fetch the favorite melody during keeping variety interatively, whenever the system generates neibour solutions of the real parent. If the value of neibour solution is higher than one of the real parent, the system exchanges the neibour solution from the real parent. The composing model generates the neibour solutions with randomwalk or most likelihood method in order to change the image of the real parent a little. In the experiment, the melody of 8 measures were composed by evaluating about 30 melodies and improving about 20 melodies. We assume that my system can compose the melody by less burden than other systems.
The ability to recover from failures and maintain an acceptable level of service degradation despite failures is a crucial aspect in the design of multi-hop wireless networks. This paper investigates routing restorati...
详细信息
The ability to recover from failures and maintain an acceptable level of service degradation despite failures is a crucial aspect in the design of multi-hop wireless networks. This paper investigates routing restoration solutions in the event of node failures. In particular, we consider three strategies, namely global restoration, end-to-end restoration and local restoration, which can support a range of tradeoffs between the restoration latency and network throughput after restoration. To quantitatively evaluate the impact of node failures during and after routing restoration, we define two performance degradation indices, transient disruption index (TDI) and throughput degradation index (THI). We formulate the optimal routing restoration schemes under these three strategies as linear programming problems and implement their solutions in the ns-2 simulator. Extensive performance evaluations are performed to study the impact of node failures in multi-hop wireless network under these three routing restoration strategies. To the best of our knowledge, this is the first work that quantitatively compares the optimal route restoration strategies in multi-hop wireless networks in terms of performance degradation during and after restoration.
暂无评论