With the increase of location-based services, Web contents are being geo-tagged, and spatial keyword queries that retrieve objects satisfying both spatial and keyword conditions are gaining in prevalence. Unfortunatel...
详细信息
A general hardware structure was proposed to accelerate variable data set management, which was designed to accept instructions flexibly and accomplish the commonly used functions and some more complicated functions o...
详细信息
A general hardware structure was proposed to accelerate variable data set management, which was designed to accept instructions flexibly and accomplish the commonly used functions and some more complicated functions of the linked-list data structure .The structure can access the data based on both pointer and address mechanism. In order to fully utilize the limited memory resources, we proposed a memory recycle scheme to reuse the memory space where the data have been deleted. Experimental results on FPGA show that our proposal can accelerate the variable data set management. Only few hardware resources were used and it consumed pretty low power. Compared with the software linked-list structure in PC, our proposal in FPGA achieved high speedups.
Nowadays, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually to...
详细信息
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual ne...
详细信息
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual networks to the substrate network with efficient utilization of infrastructure resources. The problem can be divided into two phases: node mapping phase and link mapping phase. In the node mapping phase, the existing algorithms usually map those virtual nodes with a complete greedy strategy, without considering the topology among these virtual nodes, resulting in too long substrate paths (with multiple hops). Addressing this problem, we propose a topology awareness mapping algorithm, which considers the topology among these virtual nodes. In the link mapping phase, the new algorithm adopts the k-shortest path algorithm. Simulation results show that the new algorithm greatly increases the long-term average revenue, the acceptance ratio, and the long-term revenue-to-cost ratio (R/C).
In recent WLAN standards (such as IEEE 802.11n), MIMO (Multiple Input Multiple Output) is deployed to provide high data transmission rate. It is however challenging to efficiently share the channel resources among dif...
详细信息
Gene expression microarray enables us to measure the gene expression levels for thousands of genes at the same time. Here, we constructed the non-negative matrix factorization analysis strategy (NMFAS) to dig the unde...
详细信息
Investor is a novel speculation scheme that targets at the open Internet. It makes use of standard HTTP and speculation by convention to fit into this environment. Investor is a runtime technique that doesn't modi...
详细信息
Investor is a novel speculation scheme that targets at the open Internet. It makes use of standard HTTP and speculation by convention to fit into this environment. Investor is a runtime technique that doesn't modify the languages, compilers or binary formats of the applications, so it is compatible well with existing programs or libraries. Investor can overcome some form of control dependency and data dependency. Preliminary experiments show that Investor can significantly improve the overall performance of the applications.
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To...
详细信息
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio...
详细信息
The paper proposes a scheme to improve the accuracy of tag estimation in the EBT algorithm in RFID system. In the proposed scheme, the mean value of the estimated tag number should be acquired before calculating the o...
详细信息
The paper proposes a scheme to improve the accuracy of tag estimation in the EBT algorithm in RFID system. In the proposed scheme, the mean value of the estimated tag number should be acquired before calculating the optimal prefix. And the circular queue is used to record the average tag number which has been acquired recently. Thought the computer simulation we proposed the optimal length of the queue and make an explanation why the circular queue should be used to store the average tag number. The proposed scheme makes a better system performance compared with the original EBT algorithm.
暂无评论