The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Alert monitoring of psychological health for web text is to evaluate and forecast the unhealthy psychological status of web users by the technology of web text mining. Based on the idea of “Service Distributed and Management Centralized”, this paper proposes a cloud architecture for psychological health analysis and describes the service component representation, workflow customization and workflow...
We propose a novel cyberinfrastructure for an emerging class of Internet-based real-time online interactive applications (ROIA). The most challenging representative of this application class are massively multi-player online games. We present the results of the European project Edutain@Grid on the development of efficient cyberinfrastructure and scalable applications. We report experimental results...
The coexistence of multimedia services in e-communication systems, with varying bandwidth utilization characteristics, impedes the efficiency of rate control and thereby impacts on the Quality of Service (QoS), in terms of low throughput. As such, the rate control for multimedia flows remains an open problem. This paper proposes a memetic optimization approach to rate allocation of multiclass services...
This paper addresses the issue of allocating tasks in multi-robot systems and evaluates the strategies that various ant colonies display in carrying out tasks and proposes four different task allocation strategies within the realms of multi-robot systems. The paper also introduces the concept of cost-benefit ratio as a measure of performance index for the task allocation strategies identified. Experimental...
Fast recovery from failures and efficient allocation of link capacities in a network for guaranteeing seamless communication services are two primary goals of network survivability design. Shared backup path protection (SBPP) technique has been shown to be a promising solution to tackle these problems, due to sharing capacity among protection paths. The level of capacity sharing that can be achieved...
Free-riding phenomenon is overwhelming in nowadays P2P network which causes researchers to investigate and develop many approaches to combat it. However, almost all the studies neglect the role of relative contribution of peers, namely willingness of contribution (WoC) in our paper. The ignorant to the ratio of peer's actually contribution to its physical capability would undoubtedly lead to unfairly...
Management of resource and application scheduling in a highly distributed heterogeneous Grid environment is a complex and challenging task. Processing jobs at the grid resources in a fine grained form results in a low computation - communication ratio. This necessitates the dynamic assembly of fine grained jobs into groups of jobs before dispatching them to the resources. Recent advances in computer...
Grid has evolved dramatically into the era of service-oriented grid, which facilitates building of large-scale systems in standard fashions, reusability of essential functions, and interoperability among components. However, grid resource allocation is still a challenging problem for which a grid scheduler has to be operating in a dynamic and uncertain environment. Conventional scheduling algorithms...
Most of grid applications require a large amount of memory resources. If there is not enough memory supplied during execution, the program performance will be significantly degraded by page swapping. To address this problem, we propose a remote paging system called Grid Remote Pager (GRP) for grid computing in this paper. Compared with other remote paging systems, GRP keeps high portability and transparency...
The task is to analyze, how different services can be designed for the SegBus multiprocessor platform and observe the improvement in system performance. In this paper, we utilize the concept of broadcasting and multicasting service from standard data bus for multiprocessor systems to enhance the performance of SegBus platform. The running example is represented by the H.264 encoder. The SegBus platform...
As the ubiquitous society matures, mobile phones are equipped with agents, which support users in selecting the appropriate course of actions, for example, by giving guidance on where to change trains. However, since human society becomes more and more complex and sophisticated, agents capable of understanding the situation of each user (action plan, preferences, location, etc.) and providing support...
Because of the dynamic nature and an instability of grid computing environment, system behavior in terms of QoS depends crucially on the selection of appropriate subset of the available resources. Thus, a well-defined system model that provides high system availability using a scheduling mechanism is required. In this paper, we propose the SLA based Policy Administrator (SPA) with QoS constraints...
This paper addresses a cooperative jamming resource allocation problem in electronic warfare and presents a resource allocation model of cooperative jamming (CJRA). Besides the capabilities and number of available jamming resources, the model also takes many constrains into account. Then an improved immune genetic algorithm (IIGA) is presented to solve the problem. In order to prevent the algorithm...
Recently, flash memory is becoming a popular data storage device in most of the electronic consumer devices. It has lots of attractive features such as small size and light weight nature, zero noise, solid-state reliability, low power consumption, and better shock resistant. However, its two hardware characteristics, namely, i) out-place updating and ii) garbage collection process are affecting flash...
Workflow is the most widespread modeling technique application in the field of business and office information systems. In the previous paper introduced P-graph-based workflow modeling extended by the introduction of resource management is a systematic, fast method of optimal workflow model generation based on network synthesis with correct mathematical background. In this paper a further extension,...
The fading cognitive multiple-access channel with confidential messages (MAC-CM) is investigated, in which two users attempt to transmit common information to a destination and user 1 also has confidential information intended for the destination. User 1 views user 2 as an eavesdropper and wishes to keep its confidential information as secret as possible from user 2. The multiple-access channel (both...
We study a problem where wireless service providers compete for heterogenous and atomic (non-infinitesimal) wireless users. The users differ in their utility functions as well as in the perceived quality of service of individual providers. We model the interaction of an arbitrary number of providers and users as a two-stage multi-leader-follower game, and prove existence and uniqueness of the subgame...
As the number of mobile users increases, and cell phones become more powerful, delivering multimedia content to them using a centralized infrastructure becomes both expensive and inadequate. Here we study an alternative solution, which leverages local dedicated caches on these devices to opportunistically fulfill other user requests, in a peer-to-peer manner. The problem we study is that of choosing...
This paper develops a diversity-multiplexing tradeoff (DMT) over a bidirectional random relay set in a wireless network where the distribution of all nodes is a stationary Poisson point process. This is a nontrivial extension of the DMT because it requires consideration of the cooperation (or lack thereof) of relay nodes, the traffic pattern and the time allocation between the forward and reverse...
We consider the decentralized bandwidth/rate allocation problem in unicast service provisioning with strategic users. We present a mechanism/game form that has the following desirable features. (1) It implements in Nash equilibria the solution of the corresponding centralized rate allocation problem in unicast service provisioning. (2) It is individually rational. (3) It is budget-balanced at all...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.