Large scale Chip-Multiprocessors (CMPs) generally employ Network-on-Chip (NoC) to connect the last level cache (LLC), which is generally organized as distributed NUCA (non-uniform cache access) arrays for scalability ...
详细信息
This paper deals with the problem of task allocation (i.e,;to which processor should each task of an application be assigned) in heterogeneous distributed computingsystems with the goal of maximizing the system relia...
详细信息
service-oriented computing is a new software development paradigm that allows application developers to select available services from the Internet and to form new web services. A main problem is how to efficiently de...
详细信息
With the introduction of mobile Ad hoc networks (MANETs), nodes are able to participate in a dynamic network which lacks an underlying infrastructure. Before two nodes agree to interact, they must trust that each will...
详细信息
With the introduction of mobile Ad hoc networks (MANETs), nodes are able to participate in a dynamic network which lacks an underlying infrastructure. Before two nodes agree to interact, they must trust that each will satisfy the security and privacy requirements of the other. In this paper, using the cognition inspired method from the brain informatics (BI), we present a novel approach to improving the search efficiency and scalability of MANETs by clustering nodes based on cognitive trust mechanism. The trust relationship is formed by evaluating the level of trust using Bayesian statistic analysis, and clusters can be formed and maintained autonomously by nodes with only partial knowledge. Simulation experiments show that each node can form and join proper clusters, which improve the interaction performance of the entire network. The essence of the underlying reason is analyzed through the theory of complex networks, revealing great scalability of this method.
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm ...
详细信息
ISBN:
(纸本)9780955529337
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm and tbe algorithm used by DDT, tbe traditional single finger-table witch be maintained by each node in the ring will be changed into double finger-table: the Neigbbor-Finger-Table and Long-distance Finger-Table. The structure of the Neighbor-Finger-Table is the same as the traditional single finger-table's. The Long-distance Finger-Table can construct small-world network. Some similar algorithm uses random method to select remote access node, the new strategy is different from that, tbrough tbe calculation of the local node, it can ensure the scope of service can cover tbe entire network. The simulation shows the algorithm can effectively reduce the path length of service discovery, improve the service success rate, and control the path length of magnitude.
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ...
详细信息
ISBN:
(纸本)9780955529337
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on fuzzy neural network has presented in this paper. It can fuse massive data from the multi-sensor image. Here, fuzzy neural network is a paraDel information processing model, there are more adaptive and self-organization, and can accomplish the complexity of real-time computing and mass data retrieval, it demonstrate its unique superiority of image understanding, pattern recognition and the handling of incomplete information. The fuzzy neural network system developed by us can be used in multi- sensor image fusion. Based on our experiments, it has been proved that the fusion is fast, effective, and can meet the real-time requirements of pervasive computing.
As the development of mobile communication technology becomes gradual mature, the short message service which sends messages from the information platform to the mobile phone users has been a method for the most users...
详细信息
ISBN:
(纸本)9788988678251
As the development of mobile communication technology becomes gradual mature, the short message service which sends messages from the information platform to the mobile phone users has been a method for the most users to obtain information timely and conveniently. This thesis collates the short message servicesystem exploited for the mobile phone users and the service platform for the network users to elaborate the function of the platform and the system structure of the short message platform briefly, and state the keytechnology of its design and operation minutely. The short message platform is consisted of a web server based on the database, a sending server and interface server. This platform employs three-level control tactics, the user, role and administrator to regulate the user's authority and guarantee the security of the system. So the system has a certain referent value for the design of such kind of short message platform.
In this paper, we present a Godson-T Verification Engine (GVE) to rapidly prototype and debug our Godson-T many-core processor design. GVE adopts the state-of-the-art hardware platform which contains 6 Xilinx Virtex-5...
详细信息
Statistical timing models have been proposed to describe delay variations in very deep sub-micro process technologies, which have increasingly significant influence on circuit performance. Under a statistical timing m...
详细信息
In this paper, an automatic test instruction generation (ATIG) technique using expanded instructions is presented for software-based selftesting (SBST) of processors. First, mappings between expanded instructions and ...
详细信息
In this paper, an automatic test instruction generation (ATIG) technique using expanded instructions is presented for software-based selftesting (SBST) of processors. First, mappings between expanded instructions and signals are obtained through data mining, and they are used to impose value ranges of expanded instructions on component signals and generate instruction-level constraints. Second, virtual circuits are established based on the instruction-level constraints, and test patterns are generated for the constrained components. Third, test patterns are translated into test instructions according to the values of controlling signals and constraints for their mappings to instructions, and an SBST program is produced after assembling the test instructions. Experimental results on the Parwan processor show that the proposed ATIG technique can achieve 94.8% stuck-at fault coverage, which is close to that of the full-scan test generation method. In addition, it can cut down 57% test volume of the previous random pattern generation based SBST technique, while the test time reduces to one thirteenth of the previous SBST technique.
暂无评论