The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of cloud computing, thousands of servers and various cloud applications are involved in data center. These changes result in more and more complex flows in data center, which motivates the need for faster, lower overhead, more scalable large flow detection technology. This paper firstly shows the shortcomings of the traditional large flow detection technologies. Then it...
In recent years, web services have become an indispensable part of our life. By use of personal computers, smart phones and wearable smart devices, people can enjoy the convenience brought by these web services and use them to not only enrich our daily life but also solve life issues. Thus, to more appropriately realize the performance of a web service, it is necessary to perform an overall and credible...
In order to compute the natural constant, three calculation methods were designed by Excel. The result can be accurate to 9 or 13 digits after the decimal point which is computed by limit or series. But the one computed by Excel according to human method can be accurate to more than 50,000 digits after the decimal point.
In this letter, a modified domain decomposition finite-difference time-domain method based on weighted Laguerre polynomials (DD-WLP-FDTD) is proposed for nonuniform subdomain interfaces in TEz case with perfectly matched layer (PML) absorbing boundary condition (ABC). The feasibility and accuracy of this modified DD-WLP-FDTD method are confirmed by two numerical examples. The maximum of the error...
Spectrum-based fault localization aims to find the program statements that contain faults, according to the dynamic information of executing program. We propose a spectra-based fault localization method with test case reduction, which removes redundant test cases in fault localization. Experiments show that new method requires fewer test cases to obtain the better fault localization results.
With the technology growing, traditional communication way is insufficient to meet everyone needs. Video chatting is gradually become more and more popular. There are many mature and free video chatting tools to use on the internet. However, for senior citizens, learning news is much more difficult, none of them are design for senior citizens, so that it is too hard for elder to use it, it is result...
Sensing falsification is a key security problem in cooperative spectrum sensing for cognitive radio networks. Most previous approaches assume that malicious users only cheat in their sensing reports following a predefined rule. However, some malicious users usually act intelligently to strategically adjust their malicious behavior according to their objectives and the network's defense schemes. The...
With the evolution of computer science technology the concept of clouds are kept booming. The management of a large number of computer and peripheral equipment becomes an important issue. For centrally managing such a large number of computers and peripheral equipment scattered in many longdistance locations, the IP-based peripheral equipment is presented in the market today. The smart automatic management...
Currently, the main threats of network security are coming from hacker intrusion, deny of service (DoS), computer virus, worm, spam, malicious code and sniffer because there are many weaknesses in the original design of IPv4. One is that attackers could send IP spoofing packets which is he wants to attack. That is the attackers modify the IP from the true one to another on the IP field. However, it...
Our work focuses on the analysis of the course education of the Basics of Computer Applications and promotes some instructive recommendations to address the uneven basic and application ability showed in the process of learning. In practice, the teaching ideas mentioned here acts as an effective role in the enhancement of students' sense of innovation as well as the manipulative ability of computer...
Small-scale industrial computer control system considers applications of medium and small industrial production as objects, using embedded technology, Can bus technology and optimized real-time online control strategy, open intelligent I/O modules, which has advantages of reliability, scalability and human-machine interfaces easy to program. In the paper, the design and implementation of this system...
Low-rate denial-of-service attack is a novel category of attacks that are based on exploiting the adaptive behavior exhibited by several network and system protocols. This attack through periodically non-suspicious low-rate attack pulsing, to reduce the performance of the victims. Based on the simulation of low-rate denial-of-service on NS2 platform, we analyze the defense performance of queue management...
CEP(complex event processing) over RFID (radio frequency identification) data streams has become a new paradigm recently. Existing NFA (non-deterministic finite automata) based RFID event detection techniques assume single granularity RFID data (e.g., only item-level RFID readings) in the stream. In this paper, we consider CEP problems over multiple granularities RFID data streams (e.g., item-level,...
The protein threading problem (PTP) is to determine the three-dimensional structure of a given protein sequence. Currently its serial resolutions are time-consuming and data-intensive. Nevertheless, the parallel and distributed systems offer opportunities to improve the efficiency of PTP by releasing its computational bottleneck. Therefore, a 1-level-core parallel threading algorithm is proposed and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.