The intersection test of polygons is a basic problem in many fields, and most of existing methods focused on intersection test of convex polygons. This paper proposes MCPI, a Monte Carlo intersection test method, whic...
详细信息
We propose a new fractional-order chaotic complex system and study its dynamical properties including symmetry, equilibria and their stability, and chaotic attractors. Chaotic behavior is verified with phase portraits...
详细信息
Topic modeling on information networks is important for data analysis. Although there are many advanced techniques for this task, few methods either consider it into heterogeneous information networks or the readabili...
详细信息
For SaaS applications which share tables in storage, how to effectively manage multi-tenant cloud data has been one of the crucial issues. In SaaS delivery platform multi-tenant data migration strategy, put whole data...
详细信息
Branching morphology is a crucial factor in phenotype of soybeans and the primary tissue to transport nutrients. After the acquirement of an empirical model and distribution interval for soybeans height by nonlinear r...
详细信息
In recent years, cloud computing has emerged as an enabling technology, in which virtual machine migration and dynamic resource allocation is one of the hot issues. During the migration of virtual machine, access requ...
详细信息
Stencils are finite-difference algorithms for solving large-scale and high-dimension partial differential equations. Due to the data dependences among the iterative statements in Stencils, traditional Stencil computat...
详细信息
Stencils are finite-difference algorithms for solving large-scale and high-dimension partial differential equations. Due to the data dependences among the iterative statements in Stencils, traditional Stencil computations are be executed serially, rather than in parallel. It's challenging to design an effective and scalable Stencil parallelized method. To address the issue of 3D data space computing, we present a serial execution model based on multi-layers symmetric Stencil method and time skewing techniques. Within this model, the iteration space is divided to multiple tiles based on time skewing, where the executive process is ordered by the sequence of tiles, and the nodes in each individual tile can be swept repeatedly to improve the data locality. In addition, we propose a novel 3D iterative space alternate tiling Stencil parallel method, which subdivides the iteration space along high dimension, and changes the execution sequence of tiles to reduce the data dependency and communication cost, where the partial order of tiles is still guaranteed. Experimental results demonstrate our proposed alternative tiling parallel method achieves better parallel efficiency and scalability compared with the domain-decomposition methods.
Data deduplication is an attractive technology to reduce storage space and upload bandwidth for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate cop...
详细信息
ISBN:
(纸本)9781479936311
Data deduplication is an attractive technology to reduce storage space and upload bandwidth for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate copies of data will be eliminated and only one copy will be kept in the storage. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. However, the issue of keyword search over encrypted data in deduplication storage system has to be addressed for efficient data utilization. This paper firstly proposes two constructions which support secure keyword search in this scenario. In these constructions, the integrity of the data can be realized by just checking the convergent key, without other traditional integrity auditing mechanisms. Security analysis demonstrates that our keyword search schemes are secure in terms of the definitions specified in the proposed security model.
As a latest immune algorithm, dendritic cell algorithm (DCA) has been successfully applied into the abnormal detection. First, this paper reviewed the research progress of DCA from the following aspects: signal extrac...
详细信息
Network management is the necessary means to ensure that large-scale heterogeneous network running smoothly , the core idea of College social network management based LDAP is to use LDAP to store and access the networ...
详细信息
暂无评论