The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a GPU-accelerated parallel MAX-MIN Ant System (MMAS) algorithm based on an approach named grouped roulette wheel selection (G-Roulette). A data parallel model is adapted in the proposed approach with special consideration for GPU architecture. We propose a G-Roulette strategy to enhance the parallel computation of fitness-proportionate selection. The G-Roulette strategy includes...
Graph mining is widely used in fields like social network analysis. The synchronous vertex-centric frameworks strike better balance between the performance and ease-of-use, so they are widely used in realistic. However, traditional architectures of this type, like the vertex-based push architecture and GAS, are encumbered by high communication costs. In this paper we proposed a new replica-based push...
In this paper, we propose Marbor, a novel graph data processing framework to analyze the large-scale data in social network services. It develops an efficient graph organization model to minimize the costs of graph data accesses and reduce the memory consumption. In addition, we present a novel control message method in Marbor to improve the synchronization iterations performance. During the graph...
Graph data is the default data organization mechanism used in large-scale Social Network Service (SNS) applications. Traditional graph data computing models are used to dig out useful hidden information inside the data. However, the ever growing data volume is adding more and more pressures. To retrieve and discover the information, the system has to introduce a larger number of data iterations. This...
The paper analyzes the situation while the SAP HR system is running independently, its personal information, department information, and the relationship between them need to be referenced by multiple peripheral systems. So the target systems need to synchronize the HR data with SAP periodically. Currently, most databases are accessed directly by ODBC/JDBC, which are much more expensive, except oriented...
This paper presents a time synchronization method based on the COMPASS code measurements in combination with two-way transfer ranging, which results the clock offset between COMPASS GEO satellite and the ground station. The clock offset of COMPASS G3 satellite on board is computed by using the data observed on October 2010. In order to verify the accuracy of this method, the results are compared with...
Underwater wireless sensor network is a novel type of underwater networked system. Due to the characteristics of UWSN and underwater channel, UWSN are vulnerable to malicious attacks. The existing security solutions proposed for WSN cannot be used directly in UWSN. Moreover, most of these solutions are layer wise. In this paper, we studied the threat, attack, and security issues of UWSN. Subsequently,...
When the crypto-period is expired or the key is compromised, trusted third party (TTP) broadcasts the materials of key update. The method cannot guarantee that all the nodes access to key materials in time if nodes work on different spectrums in cognitive radio networks. This paper presents a new algorithm based on the logistic model (KULCR) which reduces the demand for network synchronization and...
Wireless distributed network is a distributed system based on wireless communication technology to achieve resource share and cooperation. With the gradual consummation of wireless communication network, wireless distributed network has played a more and more important role in distributed testing and controlling field. SMS is a simple text transfer protocol on GSM network. It has been widely used...
Most of attacks in video digital watermarking are synchronization attacks. They can be classified as temporal and spacial synchronization attacks after characteristics of video digital watermarking are analyzed. Then synchronization robustness can be divided into inter-frame robustness and intra-frame robustness according to classifications of synchronization attacks in video digital watermarking,...
Spontaneous firing play an important role in development of neuronal network. Activity-dependent modification of synaptic efficacy is widely recognized as a cellular basis of learning, memory, and development plasticity. Little is known of the activity-dependent modification of the synchronized spontaneous firing of the hippocampal networks. Long-term recording of spontaneous activity in cultured...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.