As the energy consumption of embedded multiprocessor systems becomes increasingly prominent, it becomes an urgent problem of real-time energy-efficient scheduling in multiprocessor systems to reduce system energy cons...
详细信息
Compensating CSP (cCSP) models long-running transactions. It can be used to specify service orchestrations written in programming languages like WS-BPEL. However, the original cCSP does not allow to model internal (no...
详细信息
With the increase of location-based services, Web contents are being geo-tagged, and spatial keyword queries that retrieve objects satisfying both spatial and keyword conditions are gaining in prevalence. Unfortunatel...
详细信息
Nowadays, more and more scientific applications are moving to cloud computing. The optimal deployment of scientific applications is critical for providing good services to users. Scientific applications are usually to...
详细信息
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual ne...
详细信息
Network virtualization is recognized as an effective way to overcome the ossification of the Internet. However, the virtual network mapping problem (VNMP) is a critical challenge, focusing on how to map the virtual networks to the substrate network with efficient utilization of infrastructure resources. The problem can be divided into two phases: node mapping phase and link mapping phase. In the node mapping phase, the existing algorithms usually map those virtual nodes with a complete greedy strategy, without considering the topology among these virtual nodes, resulting in too long substrate paths (with multiple hops). Addressing this problem, we propose a topology awareness mapping algorithm, which considers the topology among these virtual nodes. In the link mapping phase, the new algorithm adopts the k-shortest path algorithm. Simulation results show that the new algorithm greatly increases the long-term average revenue, the acceptance ratio, and the long-term revenue-to-cost ratio (R/C).
In recent WLAN standards (such as IEEE 802.11n), MIMO (Multiple Input Multiple Output) is deployed to provide high data transmission rate. It is however challenging to efficiently share the channel resources among dif...
详细信息
Gene expression microarray enables us to measure the gene expression levels for thousands of genes at the same time. Here, we constructed the non-negative matrix factorization analysis strategy (NMFAS) to dig the unde...
详细信息
Investor is a novel speculation scheme that targets at the open Internet. It makes use of standard HTTP and speculation by convention to fit into this environment. Investor is a runtime technique that doesn't modi...
详细信息
Investor is a novel speculation scheme that targets at the open Internet. It makes use of standard HTTP and speculation by convention to fit into this environment. Investor is a runtime technique that doesn't modify the languages, compilers or binary formats of the applications, so it is compatible well with existing programs or libraries. Investor can overcome some form of control dependency and data dependency. Preliminary experiments show that Investor can significantly improve the overall performance of the applications.
The malicious code detection based on behaviors has proved effective. But there are high false positives and high false negatives when using this method. Because the behaviors are always out-of-order and redundant. To...
详细信息
Malicious code detection based on behaviors is the development direction of anti-virus techniques. However, the current detection methods based on this theory expose several problems such as the unclearness of behavio...
详细信息
暂无评论