Connectors are used to realize component interactions in component systems. Apart from their primary function, which is mediating the communication, their implementation can also support additional features that, whil...
详细信息
We propose a waveband grooming strategy for optical burst switching. We show that by grouping bursts into wavebands, a large reduction in network equipment costs can be effected. This makes burst switching attractive ...
详细信息
ISBN:
(纸本)1557528020
We propose a waveband grooming strategy for optical burst switching. We show that by grouping bursts into wavebands, a large reduction in network equipment costs can be effected. This makes burst switching attractive for use in high capacity core networks.
Accounting of service usage is one of the main tasks of service providers in their operation and management processes, providing the necessary information for the subsequent charging process. Because of the increasing...
详细信息
Accounting of service usage is one of the main tasks of service providers in their operation and management processes, providing the necessary information for the subsequent charging process. Because of the increasing number and diversity of services in IP-based networks, accounting has to provide flexible and extensible means supporting different service specific accounting attributes in order to meet the providers' requirements. Furthermore, users typically access services of different providers, resulting in a service composition in a multi-provider environment. After identifying key players in this scenario, this paper presents a service model, classifying different service types, and proposes an architecture (SMArch) for a common accounting scheme, which is implemented based on the IPDR framework and reference code
Within MDA framework, system models can be built up on an abstract level that is independent from the platform. Later on, this abstract model can be transmitted into service description, which is related to specific p...
详细信息
Within MDA framework, system models can be built up on an abstract level that is independent from the platform. Later on, this abstract model can be transmitted into service description, which is related to specific platform on the implementation level. In Web services applications, this transition has a great advantage. Because, while the model of implementation changes from one case to another to fit the different platforms, the model of whole system, on a higher abstract level, stays the same. Thus, the efficiency is promoted. This paper firstly discusses the extension of UML for Web services, and then it presents the modeling process of WSDL. Finally, it gives the rules and arithmetic of transition from models to WSDL documents in detail
In this paper, we propose a new term weighting scheme called term frequency-inverse corpus frequency (TF-ICF). It does not require term frequency information from other documents within the document collection and thu...
详细信息
In this paper, we propose a new term weighting scheme called term frequency-inverse corpus frequency (TF-ICF). It does not require term frequency information from other documents within the document collection and thus, it enables us to generate the document vectors of N streaming documents in linear time. In the context of a machine learning application, unsupervised document clustering, we evaluated the effectiveness of the proposed approach in comparison to five widely used term weighting schemes through extensive experimentation. Our results show that TF-ICF can produce document clusters that are of comparable quality as those generated by the widely recognized term weighting schemes and it is significantly faster than those methods
The growing computational and storage needs of several scientific applications mandate the deployment of extreme-scale parallel machines, such as IBM's BlueGene/L which can accommodate as many as 128 K processors....
详细信息
The growing computational and storage needs of several scientific applications mandate the deployment of extreme-scale parallel machines, such as IBM's BlueGene/L which can accommodate as many as 128 K processors. One of the challenges when designing and deploying these systems in a production setting is the need to take failure occurrences, whether it be in the hardware or in the software, into account. Earlier work has shown that conventional runtime fault-tolerant techniques such as periodic checkpointing are not effective to the emerging systems. Instead, the ability to predict failure occurrences can help develop more effective checkpointing strategies. Failure prediction has long been regarded as a challenging research problem, mainly due to the lack of realistic failure data from actual production systems. In this study, we have collected RAS event logs from BlueGene/L over a period of more than 100 days. We have investigated the characteristics of fatal failure events, as well as the correlation between fatal events and non-fatal events. Based on the observations, we have developed three simple yet effective failure prediction methods, which can predict around 80% of the memory and network failures, and 47% of the application I/O failures
This paper proposes a new call quality measure based on mobile signal strength measurements to evaluate performance of handoff algorithms in wireless cellular networks. The proposed measure allows the quantification o...
详细信息
This paper proposes a new call quality measure based on mobile signal strength measurements to evaluate performance of handoff algorithms in wireless cellular networks. The proposed measure allows the quantification of the impact of the handoff algorithms of performance. Using the proposed measure we compare existing handoff algorithms to identify the trade-off between signal quality and required number of handoffs. Our results indicate that a handoff method based on a threshold with 2 dB hysteresis provides better performance compared to the conventional wisdom of 3 dB hysteresis. We provide a benchmark value for handoff algorithms based on an off-line heuristic method using the new measure. Our benchmark shows that there is substantial room for improvement of the existing handoff algorithm
The paper recasts the problem of feature location in source code as a decision-making problem in the presence of uncertainty. The main contribution consists in the combination of two existing techniques for feature lo...
详细信息
The paper recasts the problem of feature location in source code as a decision-making problem in the presence of uncertainty. The main contribution consists in the combination of two existing techniques for feature location in source code. Both techniques provide a set of ranked facts from the software, as result to the feature identification problem. One of the techniques is based on a scenario based probabilistic ranking of events observed while executing a program under given scenarios. The other technique is defined as an information retrieval task, based on the latent semantic indexing of the source code. We show the viability and effectiveness of the combined technique with two case studies. A first case study is a replication of feature identification in Mozilla, which allows us to directly compare the results with previously published data. The other case study is a bug location problem in Mozilla. The results show that the combined technique improves feature identification significantly with respect to each technique used independently
This paper proposes a SOM-based hierarchical neural model to the problem of short-term load forecasting. The neural model is made up of two self-organizing map nets - one on top of the other. It has been successfully ...
详细信息
ISBN:
(纸本)9781424418749
This paper proposes a SOM-based hierarchical neural model to the problem of short-term load forecasting. The neural model is made up of two self-organizing map nets - one on top of the other. It has been successfully applied to domains which require time series analysis. The model was trained and assessed on load data extracted from a Brazilian electric utility. It was required to predict once every hour the electric load during the next 24 hours. The paper presents the results, and evaluates them.
暂无评论