The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The bidirectional model transformation (BX) comprises a forward transformation get and a backward transformation put. Given that get may be an information-loss transformation, the behavior of put may be uncertain. An uncertain put produces many valid outputs that fit different application scenarios. This paper proposes an approach to variability management in BX to enable put to generate an output...
Evacuation management related problems involves multidisciplinary response tasks. Integrate decision support demands for intelligent management, collaboration and visualization of multiple model and data resources in distributed and heterogeneous environment. In this paper, a service-oriented distributed architecture is developed for integrated decision support in emergency evacuation management....
Image denoising is a typically ill-conditioned inverse problem, which has attracted much attention in the fields of image processing and computer vision. In order to overcome the ill-conditioned nature of this inverse problem, a nonconvex total generalized variation (NTGV)-regularized variational model was proposed in this paper for edge-preserving image denoising. The introduced NTGV regularizer...
Influence maximization aims to find a set of highly influential nodes in a social network to maximize the spread of influence. The most difficult part of the problem is to estimate the influence spread of any seed set, which has been proved to be #P-hard. There is no efficient method to estimate the influence spread of any seed set till now. Thus, the most common way to obtain the approximate influence...
This paper proposes a novel Shift with Importance Sampling (SIS) scheme to improve the efficiency in pedestrian detection but maintain its high accuracy. For fast and efficient object detection, the cascade-Adaboost structure is the commonly-used approach in the literature. However, its detection performance is quite lower due to non-robust features and a fully-scanning on image especially when deformable...
Non-uniform memory access (NUMA) architecture is widely used in high-end servers and computing systems due to its scalability. In recent years, the number of processor cores in NUMA systems increases rapidly with the development of multi-core processors. Along with the growing of system scales, simulation of NUMA systems becomes a challenge to traditional general-purpose simulators by reason of their...
In this paper, by considering uncertainty of benefits in location, a stochastic programming model is presented. The concept of a synthesizing effect location (SEL) model is proposed. The SEL model is a crisp programming model and obtained from a class of stochastic programming problems by constructing a class of synthesis effect functions. Using SEL model and genetic algorithm the solution of stochastic...
Analyzing non-functional requirements (NFRs) and integrating their solutions into the design model is an important part of enforcing NFRs in the software development process. It is challenging to do this not only because the variety of basic non-functional requirement concepts and their corresponding solutions, but also the gap between the stage of requirement analysis and software design. In this...
We propose a non-delegatable identity based strong designated verifier signature scheme. It combines an identity based Schnorr signature and an identification method. An OR proof technique glues the two parts. It is the second scheme secure in a strict model proposed by Huang et al. And it saves about half the communication and computation costs comparing to the first scheme.
Higher performance of digital earth system is still demanded in order to always guarantee high quality service especially while large-scale network users request intensive data such as 3d city model with fine texture in large scene. This paper aims at extracting information from user's behavior to guide prefetch which can help enhance service capacity of digital earth platform. We put forward three...
A two-dimensional dam-break flood simulation model using unstructured meshes has been developed to study the hydrodynamics of flooding processes. The model employs the finite volume method to solve the conservation form of the shallow water equations. The HLLC approximate Riemann solver is used for computing the fluxes at cell interfaces because of its easiness to implement and suitability to wet/dry...
This paper describes the design and application of an execution-driven parallel simulator for predicting performance of Large-Scale Parallel Computers. The simulator can be used in hardware validation and software development for large-scale parallel computers. It simulates processors of each node, network components and disk I/O components. To illustrate the capabilities of our simulator, we describe...
Model Driven Development views application development as a continuous transformation of models of the target system. However, non-functional requirements, which are important for building user-satisfied software systems and have impacts on the software design, are not sufficiently considered in current MDD methods. This paper proposes an approach to modeling non-functional requirements, analyzing...
Recently years research on wireless sensor networks (WSN) paid more attention to solve the localization of the wireless sensors, different algorithms had been applied, one of them is DV-Hop, which still need to be improved to obtained better position accuracy. In this paper, we propose a strategy to get accurate location from the unknown sensor using the average hopsize and average error reducing...
This paper is concerned with modeling the time-varying UWA channel in Stratified Ocean. The time-varying multipath characteristic of underwater channel imposes strong limitations on acoustic communication transmission. To analyze the characteristic of underwater acoustic channel, a method is proposed based on Rayleigh distribution. Eigen-rays are searched on the basis of the ray theory, that is, eigen-rays...
A practical predictive control algorithm which can be designed for embedded systems is proposed suitable to temperature control of heating furnaces. The control algorithm is implemented by establishing the model of heating furnaces and calculating its model parameters online. The computational load of this algorithm is very small since the complex matrix computing can be avoided. Besides, the temperature...
We propose a Petri-net-based approach for reliability prediction of composite service built on WS-CDL. To quantitatively investigate the reliability of composite services, we first give a set of translation rules to map WS-CDL elements into generalized-stochastic-petri-nets (GSPN). Based on the GSPN representation, we introduce the prediction algorithm to calculate the process-normal-completion probability...
To shorten the design period of airplane, improve the design quality and reduce the manufacture cost, the computer supported cooperative design has become one of the effective methods. In order to organize the airplane design coordination tasks reasonably and improve the group collaborative efficiency in CSCD, an airplane cooperative design model based on task-related work breakdown structure was...
With the rapid development of supercomputers, the power consumption by large scale computer systems has become a big concern. How to reduce the power consumption is now a critical issue in designing high performance computers. Energy-aware scheduling for large scale clusters, especially the high performance heterogeneous ones, is one of the strategies for energy saving. Proposed in this paper is a...
In this paper, by analyzing the essential characteristic of stochastic programming and the deficiencies of the existing methods, we propose the concept of synthesizing effect function for the comparison of the objective function value, give an axiomatic system for stochastic synthesizing effect function, establish objective evaluation principles based on synthesizing effect; for the satisfaction of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.