Generalized Jacobi polynomials with indexes α,β∈ R are introduced and some basic properties are established. As examples of applications,the second- and fourth-order elliptic boundary value problems with Dirichlet ...
详细信息
Generalized Jacobi polynomials with indexes α,β∈ R are introduced and some basic properties are established. As examples of applications,the second- and fourth-order elliptic boundary value problems with Dirichlet or Robin boundary conditions are considered,and the generalized Jacobi spectral schemes are proposed. For the diagonalization of discrete systems,the Jacobi-Sobolev orthogonal basis functions are constructed,which allow the exact solutions and the approximate solutions to be represented in the forms of infinite and truncated Jacobi series. Error estimates are obtained and numerical results are provided to illustrate the effectiveness and the spectral accuracy.
P2P systems can benefit from reputation mechanisms to promote cooperation and help peers to identify good service providers. However, in spite of a large number of proposed reputation mechanisms, few have been investi...
详细信息
The scale of global data center market has been explosive in recent years. As the market grows, the demand for fast provisioning of the virtual resources to support elas- tic, manageable, and economical computing over...
详细信息
The scale of global data center market has been explosive in recent years. As the market grows, the demand for fast provisioning of the virtual resources to support elas- tic, manageable, and economical computing over the cloud becomes high. Fast provisioning of large-scale virtual ma- chines (VMs), in particular, is critical to guarantee quality of service (QoS). In this paper, we systematically review the existing VM provisioning schemes and classify them in three main categories. We discuss the features and research status of each category, and introduce two recent solutions, VMThunder and VMThunder+, both of which can provision hundreds of VMs in seconds.
A fast algorithm for constructing Neighbor-Joining phylogenetic trees has been developed. The CPU time is drastically reduced as compared with Saitou and Nei's algorithm (SN) [4] and Studier and Kepler's algor...
详细信息
ISBN:
(纸本)9789972611001
A fast algorithm for constructing Neighbor-Joining phylogenetic trees has been developed. The CPU time is drastically reduced as compared with Saitou and Nei's algorithm (SN) [4] and Studier and Kepler's algorithm (SK) [5]. The new algorithm includes three techniques: Firstly, a linear array A[N] is introduced to store the sum of every row of the distance matrix (the same as SK), which can eliminate many repeated (redundancy) computations. Secondly, the value of A[i] are computed only once at the beginning of the algorithm, and are updated by three elements in the iteration. Thirdly, a very compact formula for the sum of all the branch lengths of OTUs (Operational Taxonomic Units) i and j has been designed. The results show that our algorithm is from tens to hundreds times faster than SN and about two times faster than SK when N increases, constructing the tree with 2000 OTUs in 3 minutes on our desktop computer (CPU: Intel Celeron 2.4GHz, RAM: 256MB and OS: Windows 2000 Professional).
Dear editor,Docker1), as a de-facto industry standard [1], enables the packaging of an application with all its dependencies and execution environment in a light-weight, self-contained unit, i.e., *** launching the co...
详细信息
Dear editor,Docker1), as a de-facto industry standard [1], enables the packaging of an application with all its dependencies and execution environment in a light-weight, self-contained unit, i.e., *** launching the container from Docker image, developers can easily share the same operating system, libraries, and binaries [2]. As the configuration file, the dockerfile plays an important role,
Enhancing reciprocity has been one of the primary motivations for the design of incentive policies in BitTorrent-like P2P systems. Reciprocity implies that peers need to contribute their bandwidth to other peers if th...
详细信息
Searching in large-scale unstructured peer-to-peer networks is challenging due to the lack of effective hint information to guide queries. In this paper, we propose POP, a parallel, cOllaborative and Probabilistic sea...
详细信息
Six orderings of Walsh function are derived evolutionally by means of "row copy" and "block copy". Two (Walsh-and Paley-ordering) are generated by row copy and other four (Hadamard-, X-, XT- and G-...
详细信息
ISBN:
(纸本)9789972611001
Six orderings of Walsh function are derived evolutionally by means of "row copy" and "block copy". Two (Walsh-and Paley-ordering) are generated by row copy and other four (Hadamard-, X-, XT- and G-ordering) are generated by block copy. XT- and G-ordering are deduced by extending the concept of up-down shift symmetry to that of up-down mirror image symmetry. XT-ordering is the transposed X-ordering, which is not symmetric as X-ordering;G-ordering is symmetric as the three known ones (Walsh- and Paley- and Hadamard-ordering). The four symmetric orderings construct an exactly symmetric Walsh function system. At last, two fast algorithms are proposed for G-ordering Walsh transform. The approaches introduced are applicable to other orderings Walsh transforms. Both algorithms have a regular recursive structure and are easy to be implemented on parallel computers. Furthermore, the method serves as a frame to design fast algorithms for discrete transforms.
In many applications of mobile sensor networks, such as water flow monitoring and disaster rescue, the nodes in the network can move together or separate temporarily. The dynamic network topology makes traditional spa...
详细信息
In many applications of mobile sensor networks, such as water flow monitoring and disaster rescue, the nodes in the network can move together or separate temporarily. The dynamic network topology makes traditional spanning-tree-based aggregation algorithms invalid in mobile sensor networks. In this paper, we first present a distributed clustering algorithm which divides mobile sensor nodes into several groups, and then propose two distributed aggregation algorithms, Distance-AGG (Aggregation based on Distance), and Probability-AGG (Aggregation based on Probability). Both of these two algorithms conduct an aggregation query in three phases: query dissemination, intra-group aggregation, and inter-group aggregation. These two algorithms are efficient especially in mobile networks. We evaluate the performance of the proposed algorithms in terms of aggregation accuracy, energy efficiency, and query delay through ns-2 simulations. The results show that Distance-AGG and Probability-AGG can obtain higher accuracy with lower transmission and query delay than the existing aggregation algorithms.
Semi-supervised learning (SSL) utilizes plenty of unlabeled examples to boost the performance of learning from limited labeled examples. Due to its great discriminant power, SSL has been widely applied to various real...
详细信息
暂无评论