Congestion in DTN is a prominent problem due to constrained resource, intermittent link and long propagation delay. Traditional congestion control mechanisms based on end-to-end feedback and rate control fail to work ...
详细信息
More and more enterprises are moving beyond server virtualization to desktop virtualization in recent years. In virtualization environments, centralized shared storage systems are generally used to take advantage of v...
详细信息
Multiple-desktop environment system (MPDS) based on virtualization technology focuses on improving user experiences of desktop applications. However, the current graphic performance of MPDS cannot satisfy the various ...
详细信息
With wafer revisit, it is complicated to schedule cluster tools in semiconductor fabrication. In wafer fabrication processes, such as atomic layer deposition (ALD), the wafers need to visit some process modules for a ...
详细信息
With wafer revisit, it is complicated to schedule cluster tools in semiconductor fabrication. In wafer fabrication processes, such as atomic layer deposition (ALD), the wafers need to visit some process modules for a number of times. The existing swap-based strategy can be used to operate a dual-arm cluster tool for such a process. It results in a 3-wafer cyclic schedule. However, it is not optimal in the sense of cycle time. Thus, to search for a better schedule, a Petri net model is developed for a dual-arm cluster tool with wafer revisit. With it, the properties of the 3-wafer schedule are analyzed. It is found that, to improve the performance, it is necessary to reduce the number of wafers completed in a cycle. Thus, a 1-wafer schedule is developed by using a new swap-based strategy.
The maintenance of unstructured data for a large data-related system is still a hard nut to crack, especially in the multi-disciplined virtual experiment platform (MDVEP), where lots of unstructured data are produced,...
详细信息
Mobile devices such as PDAs and cellphones, limited to its' computing and storage capability, are not capable to run ordinary PC applications. But virtualization technology gives us another choice: the software ca...
详细信息
Virtualization as a powerful and convenient technique has been widely used recently. Inserting the VMM between the hardware and operation system enables multiple virtual machines simultaneously running on hardware. Ho...
详细信息
With the development of computerscience, desktop virtualization technology is more and more popular. In virtualized desktop, it is a very significant research to share periphery devices in the client-end computer sea...
详细信息
Biometric system has been actively emerging in various industries for the past few years, and it is continuing to roll to provide higher security features for access control system. In the recent years, hand based bio...
详细信息
Biometric system has been actively emerging in various industries for the past few years, and it is continuing to roll to provide higher security features for access control system. In the recent years, hand based biometrics is extensively used for personal recognition. In this paper a new biometric system based on texture of the hand knuckles, namely Finger-Knuckle-Print (FKP), is proposed. To extract the image local texture information and represent the FKPs features, the 2D Block based Discrete Cosine Transform (2D-BDCT), is employed. Finally, performance of all finger types is determined individually and a min rule fusion is applied to develop a multimodal system. Experimental results show that 2D-DCT-mod2 yields the best performance for identifying FKPs and it is able to provide an excellent recognition rate and provide more security.
This paper present a geometric method to reconstruct human motion pose from 2D point correspondences obtained from uncalibrated monocular images. The proposed algorithm can handle images with very strong perspective e...
详细信息
暂无评论