In the design flow of integrated circuits, chip-level verification is an important step that sanity checks the performance is as expected. Power grid verification is one of the most expensive and time-consuming steps ...
详细信息
The cover image, by Wei Wang et al., is based on the Article Surface shapes and surrounding environment analysis of single- and double-stranded DNAbinding proteins in protein-DNA interface, DOI: .
The cover image, by Wei Wang et al., is based on the Article Surface shapes and surrounding environment analysis of single- and double-stranded DNAbinding proteins in protein-DNA interface, DOI: .
In this paper, we investigate a typical clustering technology, namely, Gaussian mixture model (GMM)-based approach, for user interest prediction in social networks. The establishment of the model follows the following...
详细信息
In this paper, we investigate a typical clustering technology, namely, Gaussian mixture model (GMM)-based approach, for user interest prediction in social networks. The establishment of the model follows the following process: collect dataset from 4613 users and more than 16 million messages from Sina Weibo, obtain each user's interest eigenvalue sequence and establish GMM model to clustering users. In theory and experiment, this approach is feasible. The GMM-based approach considers the prediction accuracy and consuming time. A series of experiments are conducted to validate the feasibility and efficiency of the proposed solution and whether it can achieve a higher accuracy of prediction compared with other approaches, such as SVM and K-means. Further experiments show that GMM-based approach could produce higher prediction accuracy of 93.9%, thus leveraging computation complexity.
In this paper, we partly determine the cycle structure of two types of Nonlinear feedback shift registers(NFSRs). Based on these results, the cycle structure of a class of NFSRs with symmetric feedback functions can b...
详细信息
In this paper, we partly determine the cycle structure of two types of Nonlinear feedback shift registers(NFSRs). Based on these results, the cycle structure of a class of NFSRs with symmetric feedback functions can be completely characterized. Furthermore, an alternative proof of Kjeldsen’s results is presented. Compared with the original proof based on abstract algebra theory, ours is straightforward and easy to understand.
Models of quantum systems on curved space-times lack sufficient experimental verification. Some speculative theories suggest that quantum properties, such as entanglement, may exhibit entirely different behavior to pu...
详细信息
In RFID systems, the grouping problem is to efficiently group all tags according to a given partition such that tags in the same group will have the same group ID. Unlike previous research on the unicast transmission ...
详细信息
In RFID systems, the grouping problem is to efficiently group all tags according to a given partition such that tags in the same group will have the same group ID. Unlike previous research on the unicast transmission from a reader to a tag, grouping provides a fundamental mechanism for efficient multicast transmissions and aggregate queries in large RFID-enabled applications. A message can be transmitted to a group of m tags simultaneously in multicast, which improves the efficiency by m times when comparing with unicast. We study fast grouping protocols in large RFID systems. To the best of our knowledge, it is the first attempt to tackle this practically important yet uninvestigated problem. We start with a straightforward solution called the Enhanced Polling Grouping (EPG) protocol. We then propose a time-efficient FIltering Grouping (FIG) protocol that uses Bloom filters to remove the costly ID transmissions. We point out the limitation of the Bloom-filter based solution due to its intrinsic false positive problem, which leads to our final ConCurrent Grouping (CCG) protocol. With a drastically different design, CCG is able to outperform FIG by exploiting collisions to inform multiple tags of their group ID simultaneously and by removing any wasteful slots in its frame-based execution. Simulation results demonstrate that our best protocol CCG can reduce the execution time by a factor of 11 when comparing with a baseline polling protocol.
Mobile virtualization introduces extra layers in software stacks, which leads to performance degradation. Especially, each I/O operation has to pass through several software layers to reach the NAND-flash-based storag...
详细信息
ISBN:
(纸本)9781479989386
Mobile virtualization introduces extra layers in software stacks, which leads to performance degradation. Especially, each I/O operation has to pass through several software layers to reach the NAND-flash-based storage systems. This paper targets at optimizing I/O for mobile virtualization, since I/O becomes one of major performance bottlenecks that seriously affects the performance of mobile devices. Among all the I/O operations, a large percentage is updating metadata. Frequent updating metadata not only degrades overall I/O performance but also severely reduces flash memory lifetime. In this paper, we propose a novel I/O optimization technique to identify the metadata of a guest file system which is stored in a VM (Virtual Machine) image file and frequently updated. Then, these metadata are stored in a small additional NVM (Non-Volatile Memory) which is faster and more endurable to greatly improve flash memory's performance and lifetime. To the best of our knowledge, this is the first work to identify the file system metadata from regular data in a guest OS VM image file under mobile virtualization. The proposed scheme is evaluated on a real hardware embedded platform. The experimental results show that the proposed techniques can improve write performance to 45.21% in mobile devices with virtualization.
Adding to societal changes today, are the miscellaneous big data produced in different fields. Coupled with these data is the appearance of risk management. Admittedly, to predict future trend by using these data is c...
详细信息
Adding to societal changes today, are the miscellaneous big data produced in different fields. Coupled with these data is the appearance of risk management. Admittedly, to predict future trend by using these data is conducive to make everything more efficient and easy. Now, no matter companies or individuals, they increasingly focus on identifying risks and managing them before risks. Effective risk management will lead them to deal with potential problems. This thesis focuses on risk management of flight delay area using big real time data. It proposes two different prediction models, one is called General Long Term Departure Prediction Model and the other is named as Improved Real Time Arrival Prediction Model. By studying the main factors lead to flight delay, this thesis takes weather, carrier, National Aviation System, security and previous late aircraft as analysis factors. By utilizing our models can do not only long time but also short term flight delay predictions. The results demonstrate goodness of fit. Besides the theory part, it also presents a practical and beautiful web application for real time flight arrival prediction based on our second model.
With the increasingly rapid developments in e-commerce, schemes for digital gift certificates have become prevalent electronic payment systems due to their practicality and simplicity. In 2002, Chan and Chang introduc...
详细信息
Chip multiprocessor presents brand new opportunities for holistic on-chip data and coherence management solutions. An intelligent protocol should be adaptive to the fine-grain accessing behavior. And in terms of stora...
详细信息
Chip multiprocessor presents brand new opportunities for holistic on-chip data and coherence management solutions. An intelligent protocol should be adaptive to the fine-grain accessing behavior. And in terms of storage of metadata, the size of conventional directory grows as the square of the number of processors, making it very expensive in large-scale systems. In this paper, we propose a metadata cache framework to achieve three goals: 1) reducing the latency of data access and coherence activities, 2) saving the storage of metadata, and 3) providing support for other optimization techniques. The metm:lata is implemented with compact structures and tracks the dynamically changing access pattern. The pattern information is used to guide the delegation and replication of decoupled data and metadata to allow fast access. We also use our metadata cache as a building block to enhance stream prefetching. Using detailed execution-driven simulation, we demonstrate that our protocol achieves an average speedup of 1.12X compared with a shared cache protocol with 1/5 of the storage of metadata.
暂无评论