The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Now there are trillions of web applications and the number is still increasing quickly. These web applications contain large amounts of data and functions which are useful. However, the data and functions cannot be shared and reused because these web applications do not provide proper APIs. We can encapsulate the data and function API through recording Web browser events and replaying these operations...
We consider the scenario where a cloud service provider (CSP) operates multiple geo-distributed datacenters to provide Internet-scale service. Our objective is to minimize the total electricity and bandwidth cost by jointly optimizing electricity procurement from wholesale markets and geographical load balancing (GLB), i.e., dynamically routing workloads to locations with cheaper electricity. Under...
Clustering routing algorithms have been widely used in Wireless Sensor Networks (WSNs) recently. However, relaying node with closer distance to cluster head will involve in higher data traffic and consume energy more quickly than the farther nodes, which may result in bad influence on load balancing in network system. Therefore, we proposed a fuzzy Logic based distributed energy-efficient clustering...
In this paper, we study the problem of set containment join. Given two collections R and S of records, the set containment join R./S retrieves all record pairs f(r, s)g 2 R S such that r s. This problem has been extensively studied in the literature and has many important applications in commercial and scientific fields. Recent research focuses on the in-memory set containment join algorithms, and...
Network middleboxes are difficult to manage and troubleshoot, due to their proprietary monolithic design. Moving towards Network Functions Virtualization (NFV), virtualized middlebox appliances can be more flexibly instantiated and dynamically chained, making troubleshooting even more difficult. To guarantee carrier-grade availability and minimize outages, operators need ways to automatically verify...
Flying robots have many applications in constrained environments. But they are facing difficulties when they cannot take off again without human intervention if they are not in upright position after a fall. This paper presents a method to design a self-recovery mechanism for the quadrotor to protect itself and recover autonomously after accidental falls. The presented quadrotor with a self-recovery...
Snake-like robots are developed for searching and rescuing applications. The digital cameras are commonly installed on the head of the snake-like robots which are used to provide a visual feedback for the operators. However, the swing motion of the head has great impacts on the visual feedback when the snake-like robots perform lateral undulating locomotion. To solve this problem, a control method...
In this paper, we proposed a biased support vector machine (Biased-SVM) with self-constructed Universum (termed as U-BSVM) to solve the PU learning problem. We first treat the PU problem as an imbalanced binary classification problem by labeling all the unlabeled inputs as negative with noise, then inspired by the Universum-SVM (U-SVM), introduce the Universum data set which is constructed from the...
Understanding the user mobility is essential to resource optimization and algorithm evaluation in mobile networks, such as network planning, content distribution, and evaluation of hand-over mechanisms. Existing human mobility models focus on extracting mobility patterns from Call Detail Records (CDRs) or WiFi traces. While the former only captures movements during phone calls, the latter does not...
Managing computation resources in a cost-effective way has become the core competence for a Cloud provider to win over the market because of the "pay-as-you-go" business model. Therefore, VM placement has become more and more important in the research and practices of VM management by determining at what condition and on which physical server a VM should be placed so that the SLA can be...
In the movement of multiple robots, the robot formation is one of the important attributes of colony activities. It has an important significance to recognize robot formations for evaluating the spot situation and making decisions. A new algorithm is proposed in this paper for recognition of robot linear formations. On the basis of pre-processing, (that is, each robot is segmented from the spot and...
It proposes a SIFT-RANSAC algorithm for the object recognition of moving vehicles combining the SIFT image matching theory and RANSAC algorithm. The paper designs a detection system, the Intelligent Traffic Management, which is used to solve the difficulties, such as traffic lanes changes, large body sizes and mutual interference between vehicles and so on, in the previous frame and the update frame...
Factor analysis is a statistical method used to uncover relationships among many variables. Factor analysis could be used to separate the information gained about the interdependencies variables, helping reduce a large number of variables to a smaller number of factors for modeling purposes. It is becoming more and more popular in socio-economics statistics. This paper, based on mathematical statistics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.