Considering the Pc cluster system has strong computational ability and the slow communication between processors in network parallel environments ,we research a synchronous Jacobi iterative algorithm for solving linea...
详细信息
With the development of wireless technologies, wireless networking market is thriving. IEEE 802.16j mobile multi-hop relay (MMR) network is likely to achieve great market success because it provides an attractive solu...
详细信息
In this paper, we sought to understand the reasons causing failures and delays of message delivery in Delay Tolerant Networks (DTN), and to use this understanding for improving the network. By studying two real-world ...
详细信息
ISBN:
(纸本)9780984589333
In this paper, we sought to understand the reasons causing failures and delays of message delivery in Delay Tolerant Networks (DTN), and to use this understanding for improving the network. By studying two real-world datasets, we found that node isolation is prevalent, which largely accounts for the inefficiencies in DTN's message delivery. In addition, by analyzing nodes' contact-location relationship, we found that individual and system-wide key locations exist and their existence suggests potential improvements. Motivated by our observations, we designed a location aware routing scheme for DTN networks. With simulation-based experiments, we compared our proposal with other representative DTN routing schemes, and showed that with the awareness of the location information, our solution can deliver more messages within shorter delays, therefore improves the network intensively.
Data hiding in computersystem is an interesting and important research issue, which brings benefits for secret communication and watermarking. The development of virtual machine brings new potential for data hiding. ...
详细信息
Data hiding in computersystem is an interesting and important research issue, which brings benefits for secret communication and watermarking. The development of virtual machine brings new potential for data hiding. In this paper we explore the potential for data hiding in virtual machine disk images, and especially hiding schemes that can be used with copy-on-write images. Besides being considered as a way for valid uses such as secret communication and watermarking, these schemes can be a warning against malicious intentions as well. Furthermore, it lays the foundation for a more thorough analysis of the whole virtual machine system for data hiding.
A practical method for evaluating the three-dimensional(3D) position and velocity of a moving object used in the parabolic flight experiment is developed by using the binocular stereo vision measurement theory. The ...
详细信息
A practical method for evaluating the three-dimensional(3D) position and velocity of a moving object used in the parabolic flight experiment is developed by using the binocular stereo vision measurement theory. The camera calibration mathematic model without considering the lens distortion is *** direct linear transformation(DLT) algorithm is improved to accomplish the camera *** camera calibration result and optimization algorithm are used to calculate the object's world coordinate from image *** 3D position and the velocity of the moving object are *** standard uncertainty in estimating the velocity is 0.0024 m/s,which corresponds to 1%level of the velocity of the object in the *** results show that this method is very useful for the parabolic flight experiments.
Regular Expression (RE) is widely used in many aspects due to its high expressiveness, flexibility and compactness, which requires a high-performance and efficient matching method. A novel approach to accelerate RE pa...
详细信息
In panoramic videos, the object movement between adjacent side images leads to deformation and discontinuity, which makes the traditional video tracking approaches insufficient. An effective static object tracking alg...
详细信息
Warcraft III is one of the most popular Multiplayer Online Game (MOG) games, where users are designed to interact with support of a dedicated server. PKTown is a P2P-based third-party middleware developed to replace t...
详细信息
Warcraft III is one of the most popular Multiplayer Online Game (MOG) games, where users are designed to interact with support of a dedicated server. PKTown is a P2P-based third-party middleware developed to replace the dedicated servers. This paper presents the scalability and robustness of PKTown 2.0 architecture. The evaluation demonstrates the efficiency of the architecture.
Although biometrics technology has progressed substantially, its performance is still to be improved for real applications. This paper aims to improve the accuracy of personal identification, when only single sample i...
详细信息
We present the design of time parallel trace-driven cache simulation for the purpose of evaluating different cache architectures. Due to the long simulation cycles, traditional sequential simulation methods are no lon...
详细信息
暂无评论