The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we present a novel iris recognition method based on learned ordinal features.Firstly, taking full advantages of the properties of iris textures, a new iris representation method based on regional ordinal measure encoding is presented, which provides an over-complete iris feature set for learning. Secondly, a novel Similarity Oriented Boosting (SOBoost) algorithm is proposed to train...
Understanding server capacity is crucial for system capacity planning, configuration, and QoS-aware resource management. Conventional stress testing approaches measure the server capacity in terms of application-level performance metrics like response time and throughput. They are limited in measurement accuracy and timeliness. In a multitier website, resource bottleneck often shifts between tiers...
Agent-mediated knowledge management is believed to be an efficient solution for knowledge sharing among different software systems. In this paradigm, diverse systems can exchange information while keeping their own individual ontology to represent their domain knowledge. However, overcoming semantic heterogeneity among diverse ontologies becomes a key issue. We propose a new concept learning method...
We study online energy-efficient packet scheduling in a multi-user AWGN channel. The objective is to minimize the overall energy consumption in both transmission and circuit by adapting packet transmission rates with individual packet delay constraints. The scheduling is online in the sense that the transmission rates are determined without any assumption about future packet arrivals. We consider...
Website capacity determination is crucial to measurement-based access control, because it determines when to turn away excessive client requests to guarantee consistent service quality under overloaded conditions. Conventional capacity measurement approaches based on high-level performance metrics like response time and throughput may result in either resource over-provisioning or lack of responsiveness...
Peer-to-peer (P2P) networks based on consistent hashing functions have an inherent load uneven distribution problem. Things are even worse in unstructured P2P systems. The objective of load balancing in P2P networks is to balance the workload of the network nodes in proportion to their capacity so as to eliminate traffic bottleneck. It is challenging because of the dynamic nature of overlay networks...
End-to-end quality of Web service is determined by both network delays and server response time with respect to web pages. A Web page often contains an HTML base and multiple static or dynamic objects that are embedded in the base. This paper presents an overview of our recent research experience with server resource management for client-perceived pageview response time assurance and adaptation....
A contour map is a useful data representation schema that can be used for monitoring tasks involving wireless sensor networks . This paper reports the development of an algorithm (CCM) for continuous contour mapping that is more energy-efficient than straightforward spatial or temporal suppression algorithms. A subset of contour nodes is chosen to report to the sink, such that no significant contour...
Resource management is critical to the usability and accessibility of grid computing systems. Conventional approaches to grid resource discovery are either centralized or hierarchical, and these prove to be inefficient as the size of the grid system increases. The peer-to-peer (P2P) paradigm has been applied to grid systems as a mechanism for providing scalable range- query and multi-attribute resource...
Based on the fundamental theory of spatial information multi-grid (SIMG), a four-layer model to construct a Self- adaptive Spatial Information Multi-grid (SSIMG) is put forward, which includes 4 layers, i.e. the basic grid layer, the multi-level subdivided grid layer, the visualization grid layer and the bottom cell grid layer. In the next part, the algorithm to construct Self-adaptive Spatial Information...
Networked computing systems continue to grow in scale and in the complexity of their components and interactions. Component failures become norms instead of exceptions in these environments. Moreover, failure events exhibit strong correlations in time and space domain. In this paper, we develop a spherical covariance model with an adjustable timescale parameter to quantify the temporal correlation...
Many studies have examined the relationship between managerial ownership and firm performance. However, the actual form of relationship differs across these studies. This paper examines how firm performance is affected by managerial stock incentive based on the class of control shareholding using data more than 3947 samples during 1999-2005. I find that the link between incentives to top-manager and...
A perfect hash function for processing string is constructed by applying the Chinese remainder theorem, and a fast string matching algorithm, which is suited to process the successive sequences like the network traffic data, is presented. The theoretical analysis shows that this algorithm not only obtains the determinate match results but also holds a linear time complexity in the worst case. The...
Today's Internet services are largely vulnerable to flash crowds-like DDoS attacks because the visits in such attacks often bear much resemblance to normal accesses and most of them cannot be detected with certainty. Current same-service-to-all models can hardly protect the interests of legitimate clients from the interference of suspicious traffic. Application-level quality control in edge servers...
In this paper, we propose a novel learned visual code-book (LVC) for 3D face recognition. In our method, we first extract intrinsic discriminative information embedded in 3D faces using Gabor filters, then K-means clustering is adopted to learn the centers from the filter response vectors. We construct LVC by these learned centers. Finally we represent 3D faces based on LVC and achieve recognition...
VANETs (vehicle ad hoc networks) are highly mobile wireless ad hoc networks targeted to support vehicular safety and other commercial applications. Conventional routing protocols in MANETs (mobile ad hoc networks) are unable to fully address the unique characteristics in vehicular networks. On the other hand, some characteristics in VANETs, like mobility constraints and predicable mobility, can benefit...
Recent advances of DSP, microprocessor (MPU), micro-electronics and the antenna in miniature, makes it possible to employ smart antennas (SA) in a mobile station (MS) in next generation mobile communications (3G). Because the processing capacity of MS is relatively weak, to guarantee the smart antenna performance, its algorithm complexity of the smart antenna is very important. In the paper, we propose...
In large-scale networked computing systems, component failures become norms instead of exceptions. Failure prediction is a crucial technique for self-managing resource burdens. Failure events in coalition systems exhibit strong correlations in time and space domain. In this paper, we develop a spherical covariance model with an adjustable timescale parameter to quantify the temporal correlation and...
The paper considers linear systems on a Hilbert space with a skew-adjoint generator. The output space is assumed to be another Hilbert space and the system is exactly observable. We propose a Kalman type observer. We prove exponential stability of the proposed observer under the assumption of some system regularity and we estimate its decay rate. We demonstrate the applicability of our observer by...
We study a class of dynamical systems described by symmetric hyperbolic partial differential equations (abbreviated to PDE). We prove some exponential stability result for this class of systems by constructing Lyapunov functionals. Moreover we apply this classical result for a chemical engineering system - heat exchangers to prove its exponential stability. Through concrete example we show how the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.