The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Soft errors are increasing in modern computers. These faults can corrupt the results of scientific simulations. This work studies error propagation by a bit flip in conjugate gradient (CG) methods. We will also introduce adaptivity to selective reliable fault-tolerant (SRFT) solvers. Our study reduces the compute-intensive reliability steps in SRFT solvers.
In this paper, we present a method to evaluate and optimize traffic patrol based on the generalized maximal covering model. We first build a criterion to evaluate how well a traffic patrol deployment is, and then we formulate an optimization problem for selecting optimal patrol centers from candidates. We show that the optimal patrol centers can be found by an algorithm derived from the method of...
In this paper, an adaptive sampling algorithm is proposed for reconstruction of a complex weld geometry based on the obtained 3D point cloud. Several pivotal samples for reconstructing the weld geometry are selected from the point cloud using a randomized strategy in the initial stage of the iterative algorithm. Based on the pivotal samples, the model is incrementally refined in the second stage by...
We present a novel general framework for distributed anomaly detection. In the framework, normal behavior is first learned from data from individual data sites using standard anomaly detection algorithms and then these models are combined when predicting anomalies from a new data set. We have investigated seven semi-supervised anomaly detection algorithms for learning normal behavior, as well as proposed...
In this paper we use software engineering methods and Shannon's communication model to investigate computer network architecture. We get a new type of computer network architecture and some significant conclusions. At the first phase of the life cycle of software engineering, that is, requirement analysis, we get a series of unexpected conclusions. For example, a variety of computer network architectures...
In this paper, we propose a group-based trust model named F-PKI (Freely organized one level Public Key Infrastructure) in P2P system based on Trusted Computing (TC) technology which is used to enhance PC security by incorporating hardware platform. In this model, peers are organized freely by group, each of which is a one level PKI. Preliminary evaluation results show that the proposed model is realistic...
Outlier detection over data streams has attracted attention for many emerging applications, such as network intrusion detection, web click stream and aircraft health anomaly detection. Since the data stream is likely to change over time, it is important to be able to modify the outlier detection model appropriately with the evolution of the stream. Most existing approaches were using incremental or...
In this paper, we propose a trust model for the open Grid market. Our trust model emphasizes the importance of both direct trust and indirect trust/reputation when evaluating the trustworthiness of a Grid service provider. Since many factors contribute to the direct and indirect trust, we propose a novel method based on multiple attribute decision making (MADM) theory to determine the objective weights...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.