The intricacy of real-time data service management increases mainly due to the emergence of applications operating in open and unpredictable environments, increases in software complexity, and need for performance gua...
详细信息
Concurrent accesses to a file frequently occur in a distributed computing environment where a few number of network-attached servers are designated as a data storage pool and the clients are physically connected to th...
详细信息
The GENERTIA red team uses a genetic algorithm to perform vulnerability analysis in an effort to discover holes in an intrusion detection system. This paper demonstrates how a GENERTIA blue team generates detectors to...
详细信息
ISBN:
(纸本)9781581139648
The GENERTIA red team uses a genetic algorithm to perform vulnerability analysis in an effort to discover holes in an intrusion detection system. This paper demonstrates how a GENERTIA blue team generates detectors to patch those holes discovered by the GRT, The GBT uses a novel approach to generate detectors that have different coverage in order to reduce the amount of overlap of detectors created by random generation and negative selection. Copyright 2005 ACM.
This article introduces XChange, a rule-based reactive language for the (Semantic) Web. Stressing application scenarios, it first argues that high-level reactive languages are needed for both Web and Semantic Web appl...
详细信息
over the last few years, Grid technologies have progressed towards a service-oriented paradigm that enables a new way of service provisioning based on utility computing models. Users consume these services based on th...
详细信息
Grid computing has emerged as a powerful extension of web for a request-response interaction between service providers and service consumers. Today, enterprises focus on their core competencies and hire support servic...
详细信息
The previous particle swarm optimizers lack direct mechanism to prevent particles beyond predefined search space, which results in invalid solutions in some special cases. A momentum factor is introduced into the orig...
详细信息
The previous particle swarm optimizers lack direct mechanism to prevent particles beyond predefined search space, which results in invalid solutions in some special cases. A momentum factor is introduced into the original particle swarm optimizer to resolve this problem. Furthermore, in order to accelerate convergence, a new strategy about updating velocities is given. The resulting approach is mromentum-PSO which guarantees that particles are never beyond predefined search space without checking boundary in every iteration. In addition, linearly decreasing wight PSO (LDW-PSO) equipped with a boundary checking strategy is also discussed, which is denoted as LDWBC-PSO. LDW-PSO, LDWBC-PSO and momentum-PSO are compared in optimization on five test functions. The experimental results show that in some special cases LDW-PSO finds invalid solutions and LDWBC-PSO has poor performance, while momentum-PSO not only exhibits good performance but also reduces computational cost for updating velocities.
In this paper we consider polynomial kernel representations for behaviors. For behaviors over fields it is well-known that minimal representations, i.e. representations with minimal row degrees, are exactly those repr...
详细信息
In this paper we consider polynomial kernel representations for behaviors. For behaviors over fields it is well-known that minimal representations, i.e. representations with minimal row degrees, are exactly those representations for which the polynomial matrix is row reduced. In this paper we consider behaviors over a particular type of ring, namely ℤ p r , where p is a prime number and r is a positive integer. As a starting point in this investigation we focus on minimal partial realizations. These are equivalent to shortest linear recurrence relations. We present an algorithm that computes a parametrization of all shortest linear recurrence relations for a finite sequence in ℤ p r . For this we extend well-known techniques developed by Reeds and Sloane in the 80's with methods from the theory of behavioral modeling.
Small electronic products for the mass market are increasing in complexity with the incorporation of programmable components. The software in these devices has constraints that are markedly different from software des...
详细信息
Real-time multimedia applications are usually played back many times. For those applications, the distribution of actual execution time is no longer unknown from the second playback. In this paper, we propose a novel ...
详细信息
暂无评论