The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To support the various services quickly and flexibly, intelligence and automation are the key characters for future network resource management. How to build a big data based Telco cloud resource management framework is very important currently, which can leverages the power of Network Function Virtualization (NFV) and enhances telecom operators' availability of service, efficiency of resource, and...
Byzantine fault is the fault that can make the components behave arbitrary and may cause disastrous results. With the increasing malicious attacks and software errors, Byzantine fault tolerance has begun to draw more attention it deserves. Previous Byzantine fault tolerant algorithms have strong assumption that all the replicas is synchronous and do not support replicated calling services, which make...
Due to the critical security threats imposed by email-based malware in recent years, modeling the propagation dynamics of email malware becomes a fundamental technique for predicting its potential damages and developing effective countermeasures. Compared to earlier versions of email malware, modern email malware exhibits two new features, reinfection and self-start. Reinfection refers to the malware...
Nonlinear backstepping adaptive controller is proposed for the design of three-phase PWM voltage source rectifier with uncertainties of the harmonic disturbance of the power, the additional resistance of the inductor and the load current. In the course of design, the procedure of the robust controller design is developed via improved backstepping. The adaptive controller with high robustness can restrain...
Ubiquitous learning (u-learning) makes anybody get any information at any time or in anywhere with any devices available. However, u-learning practices are mainly limited to small-scale applications in certain professional courses at universities. We addressed a u-learning environment design for computer fundamental course which has large scale of learners. The paper first introduced u-learning in...
The construction of computer Chinese chess game platform creates favorable conditions for the development of discrete event dynamic system theory and provides a good research platform for solving dynamic countermeasure problems in discrete system. This paper analyses the existing problems of computer Chinese chess game, the structure and performance of computer Chinese chess game platform and the...
Solving the main problems of the disconnect between computer application talent cultivation and real world marketplace demands and the existing deficiency in engineering and innovation ability of higher education programs. This paper gives an analysis of current engineering programs, the reengineering effort of computer engineering programs and the CDIO Model, describes a new refined program based...
The static evaluation used in Chinese chess computer game currently could neither reflect the strength trend of game players objectively nor accomplish the strategic purpose of game players, so a situation-evaluating matrix is defined and the dynamic character of the situation-evaluating strategy is analysed based on game situation's influence. Furthermore, a high-class evaluation method based on...
The paper begins with introduction on the xen-based secure computer, the common data sharing methods and virtual disk access control. It puts forward a data sharing method based on virtual disk between guest OSs of Full-Virtualization in order to deal with the shortages of data sharing between virtual guest OSs based on Xen secure computer. It induces further analysis on the Xen driver split mechanism...
The static evaluation method used in Chinese chess game on computer currently could not reflect the strength trend of game players objectively and accomplish the strategic purpose of directional search of game players, so a method of revaluation based upon situation is described. According to the strategy of attack, defense and adjustment of game players, this method could take the initiative through...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.