The photoionization by two elliptically polarized, time delayed attosecond pulses is investigated to display a momentum distribution having the helical vortex or ring structuresi The results are obtained by the strong...
详细信息
The photoionization by two elliptically polarized, time delayed attosecond pulses is investigated to display a momentum distribution having the helical vortex or ring structuresi The results are obtained by the strong field approximation method and analyzed by the pulse decomposition. The ellipticities and time delay of the two attosecond pulses are found to determine the rotational symmetry and the number of vortex arms. For observing these vortex patterns, the energy bandwidth and temnoral duration of the attosecond pulses are ideal.
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime plat...
详细信息
This paper introduced the optimization and deoptimization technologies for Escape analysis in open world. These technologies are used in a novel Escape analysis framework that has been implemented in Open runtime platform, Intel's open-source Java virtual machine. We introduced the optimization technologies for synchronization removal and object stack allocation, as well as the runtime deoptimization and compensation work. The deoptimization and compensation technologies are crucial for a practical Escape analysis in open world. We evaluated the runtime efficiency of the deoptimization and compensation work on benchmarks like SPECjbb2000 and SPECjvm98.
This paper provides an experience report on the use of aspect-oriented technology as a means to modularize the implementation of business rules in an object-oriented, large scale case study. The goal of this refactori...
详细信息
This paper provides an experience report on the use of aspect-oriented technology as a means to modularize the implementation of business rules in an object-oriented, large scale case study. The goal of this refactoring of the system was to provide a proof-of-concept implementation of how such an aspect-oriented solution can improve the modularity and the extensibility of the business rule implementation. This paper focusses on the approach taken in refactoring the system and the difficulties of integrating the aspect solution into the build process.
This paper proposes a notion, the 'ambit' of an action, that allows the degree of distribution of an action in a multiagent system to be quantified without regard to its functionality. It demonstrates the use ...
详细信息
ISBN:
(纸本)9780769528564
This paper proposes a notion, the 'ambit' of an action, that allows the degree of distribution of an action in a multiagent system to be quantified without regard to its functionality. It demonstrates the use of that notion in the design, analysis and implementation of dynamically-reconfigurable multi-agent systems. It distinguishes between the extensional (or system) view and intensional (or agent-based) view of such a system and shows how, using the notion of ambit, the step-wise derivation paradigm of Formal Methods can be used to derive the latter from the former In closing it addresses the manner in which these ideas inform studies in the ethics of systems of artificial agents.
The first implementation of the programming language FX-87, a polymorphic typed functional language based on a system for static program analysis, is described. This polymorphic effect system integrates type checking ...
详细信息
The first implementation of the programming language FX-87, a polymorphic typed functional language based on a system for static program analysis, is described. This polymorphic effect system integrates type checking and side-effect analysis into a single framework and allows the automatic detection of parallelizable expressions at compile-time. In FX-87, every expression has two static properties: a type and an effect. Type and effect polymorphism permits the behavior of first-class procedures to be statically modeled. The integration of type and effect analysis has resulted in the first system that is able (by accurate modeling of the side-effects of procedure values and masking of unobservable effects in the heap) to detect a compile-time, parallelizable constructs in both functional and imperative programs.< >
Finding a document that is similar to a specified query document within a large document database is one of important issues in the Big Data era, as most data available is in the form of unstructured texts. Our testin...
详细信息
Networking technology, undoubtedly, plays a vital role in modern warfare especially in Network Centric Operations (NCOs) and Global Information Grid (GIG) concept. However, the current popular network infrastructure, ...
详细信息
Networking technology, undoubtedly, plays a vital role in modern warfare especially in Network Centric Operations (NCOs) and Global Information Grid (GIG) concept. However, the current popular network infrastructure, mainly TCP/IP architecture, is in fact unsuitable with advanced military communication especially in tactical operation networks. The key characteristics of military communications are classified as delay/disruption/disconnection tolerant networks (DTNs) which are long and variable delays, high error rates and greatly heterogeneous. As a result a call for new type of network architecture emerges to support such peculiar characteristics of military communication network. This paper reviews the current approaches in network technology of military communication and proposes the conceptual design of Virtualization Network (VN) for military communication to address the limitation of current network infrastructure. The implementation of Military Network Virtualization Environment (MVNE) introduces the crucial two new key features of military tactical network: information classification and movable nodes. These features along with essential research challenges must be analyzed to realize a viable virtualization network for military communications.
Considering the important role AMDB takes in the future air traffic management system, an AMDB data modeling method has been proposed, which is followed by a display technique. In this paper, first,the UML and XML sch...
详细信息
Considering the important role AMDB takes in the future air traffic management system, an AMDB data modeling method has been proposed, which is followed by a display technique. In this paper, first,the UML and XML schema model of AMDB data are constructed on which the aerodrome mapping database is based. Secon, the electronic airport map is drawn by the Auto CAD according to the AIP, NAIP, and airport design chart, which is then be rendered by 3ds MAX and checked by GLClayer. Finally, Qt is used to link the aerodrome mapping database and electronic airport map that aims to visualize the aerodrome mapping *** program presented in this paper can be used as a prototype system of commercial AMDB product.
暂无评论