The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The computation time required for the modelling of wavefront distortions over finite aperture has always been an important issue for applications like prediction of performance of laser designators and simulation of infrared scenes in the presence of atmospheric turbulence. In this paper, we show that the computation performance of the best previous algorithm that models this phenomenon can be substantially...
Distributed virtual environments tend to become a de facto solution for large-scale networked virtual environments. One of the key issues and problems that need to be handled in the design of a scalable and effective distributed virtual environment system is the partitioning problem, which refers to the efficient assignment of the system's workload to the available resources of the system. This paper...
Continued growth in peer-to-peer (P2P) networking is introducing new challenges for network designers and administrators. P2P communication is no longer the sole domain of the home-based, technically savvy user. Instead, corporations are now starting to investigate the use of P2P communication as a valid technology for distributing data to a large user base. Existing network protocols that support...
Ubiquitous computing environment has become more popular as a highly open, heterogeneous and service-rich domain, which makes it essential and important for end-users to build a reasonable service provision model. The critical issue for service provision is how to sense context information and provide personalized services according to current context and user's requirement. This paper presents a...
Given a set of tasks with certain characteristics, e.g., data size, estimated execution time and a set of processing nodes with their own parameters, the goal of task scheduling is to allocate tasks at nodes so that the total makespan is minimized. The problem has been studied under various assumptions concerning task and node parameters with the resulting problem statements usually being NP-complete...
This paper first defines a format for capturing and distributing contributed resources called an eContract and then proposes an agreement protocol along with a simple distributed algorithm for negotiating the eContract in the context of dynamic collaborations. The insights gained from the analysis of the proposed negotiation algorithm lead us to the development of an efficient "message piggybacking"...
In this paper, a new graph product, called Edge Graph Product (EGP) is proposed by replacing each edge in the multiplicand graph by a copy of the multiplier graph via two candidate nodes. The edge product, unlike other products already proposed, results in a graph whose number of edges is numerical product of the number of the edges in the multiplicand and multiplier graphs, and the number of vertices...
This paper presents an innovative email categorization using a serialized multi-stage classification ensembles technique. Many approaches are used in practice for email categorization to control the menace of spam emails in different ways. Content-based email categorization employs filtering techniques using classification algorithms to learn to predict spam e-mails given a corpus of training e-mails...
The identification of network applications is essential to numerous network activities. Unfortunately, traditional port-based classification and packet payload-based analysis exhibit a number of shortfalls. An alternative is to use Machine Learning (ML) techniques and identify network applications based on per-flow features. Since a lot of flow features can be used for flow classification and there...
The previous works in the area of checking integrity constraints in distributed databases have suggested that sufficient tests should be explored as these tests are cheaper than the complete tests and the initial constraints due to their characteristics which can be executed at the local (target) site. This paper presents the various types of integrity tests as reported in previous works and discusses...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.