In this paper, we studied a SLAM method for vector-based road structure mapping using multi-beam LiDAR. We propose to use the polyline as the primary mapping element instead of grid cell or point cloud, because the ve...
详细信息
Detecting heavy hitters that constitute the majority of network traffic is a critical task in network measurement. However, the highly skewed network traffic and the size-limited on-chip memory pose great challenges f...
详细信息
Detecting heavy hitters that constitute the majority of network traffic is a critical task in network measurement. However, the highly skewed network traffic and the size-limited on-chip memory pose great challenges for heavy-hitter detection. The prior arts either use sketches to track all flows or maintain a fix-sized tracking list for recording elephant flows, resulting in limited detection precision or time-consuming tracking list exchanges. This paper presents HeavyTracker, an efficient algorithm that detects heavy hitters based on a count-with-threshold strategy. A two-dimensional tracker unit array is employed in our design to capture the heavy hitters, where each flow is randomly mapped to one unit in all rows. The tracker unit is designed to accept many flows and precisely report the largest two with frequencies that reach a predefined threshold. This design eliminates the frequent and time-consuming exchanges for maintaining the tracking list, allowing us to use a hash table to track the reported elephant flows. Experimental results based on real Internet traces show that HeavyTracker achieves a high $\mathbf{F}_{\beta}$-Score of threshold-t detection (0.97) and over 99% precision of top-k detection under a tight memory size. Besides, it reduces the frequency estimation error by 97.4% compared to the state-of-the-art.
Aimed to resist the infringement of software services in cloud environment, a software services protection security protocol based on software watermarking in cloud environment was presented. On the consideration of a...
详细信息
Aimed to resist the infringement of software services in cloud environment, a software services protection security protocol based on software watermarking in cloud environment was presented. On the consideration of actual needs in cloud computing, the protocol introduced the software watermarking as a service cloud which was responsible for software watermark embedding and extraction. The protocol not only met the basic requirements of software copyright protection, but also gived the detailed strategy to solve the infringement, and hardened the ability of the software watermarking to resist various attacks. The analysis shows that the proposed protocol has higher security.
TiEV is an autonomous driving platform implemented by the Tongji University of China. The vehicle is drive-by-wire and is fully powered by electricity. We devised the software system of TiEV from scratch, which is cap...
详细信息
A multi-cluster tool is composed of a number of single-cluster tools linked by buffering modules. The capacity of a buffering module can be one or two. Aiming at finding an optimal one-wafer cyclic schedule, this work...
详细信息
A multi-cluster tool is composed of a number of single-cluster tools linked by buffering modules. The capacity of a buffering module can be one or two. Aiming at finding an optimal one-wafer cyclic schedule, this work explores the effect of two-space buffering modules on the performance of a multi-cluster tool. The tool is modeled by a kind of Petri nets. The dynamic behavior of robot waiting and tasks, process modules, and buffers is well captured by the net model. With the model, this work shows that there is always a one-wafer cyclic schedule that reaches the lower bound of the cycle time of a process-dominant tool. Furthermore, a constant-time algorithm is revealed to find such a schedule for the first time for such multi-cluster tools. An illustrative example is given to show the application and power of this new method.
LiDAR-based place recognition is an essential and challenging task both in loop closure detection and global relocalization. We propose Deep Scan Context (DSC), a general and discriminative global descriptor that capt...
详细信息
Reachability is an important dynamic property of Petri nets. Its determination given an unbounded net and initial marking has remained an open problem since 1960s. Due to its extreme difficulty, a great deal of resear...
详细信息
ISBN:
(纸本)9781479969241
Reachability is an important dynamic property of Petri nets. Its determination given an unbounded net and initial marking has remained an open problem since 1960s. Due to its extreme difficulty, a great deal of research has been focused on some subclasses of unbounded nets. For arbitrary ones, this work intends to propose a new reachability tree (NRT), which consists of only but all reachable markings from its initial marking. Furthermore, an NRT-based method to decide deadlocks of unbounded nets is presented. An example is provided to show the new results.
Evolutionary multitasking algorithms use information exchange among individuals in a population to solve multiple optimization problems simultaneously. Negative transfer is a critical factor that affects the performan...
详细信息
By analyzing search algorithm on Gnutella networks protocol, combining its advantages both the Gossip distributed forward search and spanning tree algorithm, this paper realizes a kind of high-efficient route searches...
详细信息
By analyzing search algorithm on Gnutella networks protocol, combining its advantages both the Gossip distributed forward search and spanning tree algorithm, this paper realizes a kind of high-efficient route searches for algorithms: Light-Flooding, presents simulations of both Light-Flooding and Gossip search algorithm, the results show that Light-Flooding algorithm improves efficiently search about 63.4%, lower redundant information about 60%, average packet delay is 2.6 s. So as to make the whole comprehensive composite performance of the networks maintain a fine state.
暂无评论