The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dynamic binary translation (DBT) is a commonly used technology in virtual machines. Most DBT systems, like Dynamo, can only translate programs statically linked but not ones dynamically linked. Statically linked programs will lead to expansion of binary codes, which is the indirect reason of loss on performance. In this paper, we propose an approach to implement dynamic linking on DBT systems. During...
For long-lived and sensitive secrets, it is insufficient to apply the classic cryptography as well as ( ) threshold cryptosystem. Only proactive secret sharing can properly protect them, where the shares are periodically renewed without changing the secret. Hence, the adversary willing to learn the secret needs to break up or more shareholders in the same time period. If the time period and the threshold...
The wire drawing machine is a kind of highly automated metallica machine controlled by microcontroller, and it's used mainly in fabrication of wire in metal industry. Based on the analysis of the structure and theory of wire drawing machine, a doable design is discussed. A 32-bit ARM microprocessor and FPGA were used to be master controller and sub-controller respectively, and the automatic control...
The power load forecasting precision being influenced by many factors, the traditional forecasting tools are not very taking the role. In fact, BP network has the characteristics of the applicable and self-learning, and grey method has the growth characteristics,this paper used the correcting coefficient to improved the grey method, so the grey BP network method can better reflect the increasing and...
Human resources of colleges and universities were the most important resource in higher education resources and important assurance of higher education development, and teachers of colleges and universities were the main force of college and university human resources. In this paper, computer data analysis on need hierarchical structure of part Heilongjiang colleges and universities and difference...
Octrees are attractive data structures for rendering of volumes, as they provide simultaneously uniform and hierarchical data encapsulation. We present a simple and efficient algorithm for interactive ray tracing on a hybrid architectures, which takes advantage of the parallelism present by heavily exploiting the hardware for the CPU and GPU, which has been observed to give superior performance in...
This paper describes a multi-seeds mesh growing and flat portions first growing algorithm that takes as input an unorganized set of points on an unknown manifold, and produces as output an approximate surface. A priority driven strategy for mesh growing is then used to sweep the advance front ahead in an effective way. The method makes no assumption regarding the points, and the main contributions...
To break through the traditional one-sided qualitative evaluation of English textbook, the authors put forward a new model of evaluation system which includes three parts: teacherpsilas evaluation, studentpsilas evaluation, and the objective evaluation based on the corpus linguistics. By the analysis of evaluation theory of English textbook, 70 evaluation criteria are set out of 127 items using Delphi...
A majority of engineering courses in the university have these characteristics such as much period, extensive content, very strong practice etc. The paper takes auto detecting and maintenance specialty as an example to analyze problems of engineering courses in the university in the practice teaching, and put forward many methods, means and new teaching mode to resolve these problems to improve further...
Universities in China are facing harsh competitions for their graduates' employment in a labor market which was lagging behind the development of the universities, and it's becoming important for specialties and courses to have their own unique features so as to win a competitive edge in a fierce market. Therefore, featured specialty construction and featured course construction have been given much...
As the application of concept map and collaborative learning in the teaching & learning is increasing, this paper discusses the application of keystone concept map in scientific research and teaching. Firstly, it introduces the signification of concept map and collaborative learning in the teaching-learning and the development of the current concept mapping software. Then it compares the functions...
Firstly, the typical architecture of embedded systems with multiple CPUs is introduced. Then, a method of the message-based inter-process communication (IPC) in the distributed operating system for such multi-CPU embedded systems is presented. At last, it compares this IPC method with other IPC methods in normal distributed operating systems.
Co-operative Air Traffic Flow Management (C-ATFM) is a research project for the air transport industry which will be deployed in the East China ATC center in 2009. The prime objectives are to contribute to improving safety, creating additional capacity, better management of uncertainty, and enhancing the efficiency of Air Traffic Flow Management processes. Flight Monitor System (FMS) is one of subsystems...
The model of city E-service with grid based on new growth theory will have the long-time life time according to the theory of endogenous growth, learning-by-doing and Knowledge spillovers theory. Learning by doing theory makes the model more efficiency. Knowledge spillovers theory makes the entourage organization grow up together. The grid computing theory gives the city platform more power. The grid...
Network violence can be divided into network symbol violence, the network trial, and group violence, the cause of which includes the hidden characteristics of networks, collective behavior and entertainment desire, the dislocation of freedom, and the deficiency of law and moral restriction. The prevention and cure strategies of network violence include intensifying network management, implementing...
Optimization functions are crucial to compiler design. Generally, compiler optimization divides into machine-independent optimization based on the intermediate language and machine-dependent optimization based on the object code. In order to make use of the characteristics of the target machine, this paper presents an optimization scheme about peephole optimization based on extensible template, and...
A new machine learning method-wavelet neutral network was introduced and some of its characteristics were discussed. Rough set and WNN are combined to establish a rough set-based data pre-processing wavelet network model. It effectively overcome the wavelet network does not distinguish importance of property of samples and slow defect in a large number of data processing operations. After linearly...
Unified process (UP) and extreme programming (XP) have been adopted widely in the software development world. The main concepts and practices of UP and XP are analyzed and the unreasonable or impracticable ones are figured out. A new software development process, the UniX process, is proposed. The new process model and its phases, releases, iterations and workflows are briefly analyzed in comparison...
Software automation can improve the productivity and quality of software to a great extend. In this paper we propose a methodology for automatic software development by putting automation into each step of software development process. This method covers from natural language requirement analysis to executable code generation. In which the correctness of software is taken into consideration. First...
This paper proposes a new authorization mechanism for keeping the consistency of security attributes of a file and its duplicates in coping or quoting. Like life with same lineage has same characteristics in propagating, security attributes of files with same lineage will be hold consistency in the same way. Learning from the lineage principle in the nature and the function of DNA in living creatures,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.