The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article describes approaches to building a set of nodes and blocks that are sufficient to create the matching processor for the parallel dataflow computing system. Investigations of various sets of nodes and blocks of the matching processor have been carried out. As a result, some regularities were revealed characteristic for hardware-software solutions that implement the dataflow computing model...
A model of cloud services is emerging whereby a few trusted providers manage the underlying hardware and communications whereas many companies build on this infrastructure to offer higher level, cloud-hosted PaaS services and/or SaaS applications. From the start, strong isolation between cloud tenants was seen to be of paramount importance, provided first by virtual machines (VM) and later by containers,...
Temporal Pooling (TP) is a recent technique for processing temporal events by forming declarative representations of the complete sequences. In this paper, we examine and extend the functionality of the existing TP algorithm from the Hierarchical Temporal Memory (HTM) framework and introduce the Self-Organising Temporal Pooling (SOTP) architecture. The SOTP draws together the Merge Self-Organising...
We explore a reference monitor (RM) design which borrows from the Flask security architecture. Our RM design goal is to achieve complete mediation by checking and verifying the authority and authenticity of every access to every system object. Access decisions are administered by a security logic server implemented as an extension of the peripheral bus. Initial results show a minimal increase in resource...
Recent device shipment trends strongly indicate that the number of Web-enabled devices other than PCs and smart phones are growing rapidly. Marking the end of the dominant era of these two traditional device categories, people will soon commonly use various types of Internet-connected devices in their daily lives, where no single device will dominate. Since today's devices are mostly standalone and...
This paper covers one of the main disadvantages of data-flow computational model — high overhead costs associated with storing and processing large volumes of tag data. Overcoming this disadvantage using various ways of data compression comes with a number of problems described in this article. To solve given problems new recurrent data-flow computational model was created as well as architecture...
Cloud environment consists of many components playing different roles which need to interact with each other. Based on the context the nature of interaction may vary. Trust is an essential facet for confidence-based interactions among the various entities in cloud environment. This paper presents the taxonomy of trust models and classification of information sources for trust assessment in cloud paradigm...
A context model plays a significant role in developing context-aware architectures and consequently on realizing context-awareness, which is important in today's dynamic computing environments. These architectures monitor and analyse their environments to enable context-aware applications to effortlessly and appropriately respond to users' computing needs. These applications make the use of computing...
In mobile computing developers will need to develop applications that will interact with the end user. Context-aware applications notify or ask users what they want based on what they have sensed or on a user profile. Event-driven mobile computing detects conditions of interest to users and notifies them accordingly. In this paper we discuss the importance and challenges in designing event-driven...
To benefit from utility-driven and rule-based approaches to self-adaptation, we propose combining both by defining and linking the utility function and the adaptation rules in a pattern-based way at the architectural level.
Multi-simulation in the context of future smart electrical grids consists in associating components modeling different physical domains, but also their local or global control. Our DACCOSIM multi-simulation environment is based on the version 2.0 of the FMI-CS (Functional Mock-up Interface for Co-Simulation) standard maintained by the Modelica Association. It has been specifically designed to run...
To analyze and explore large textual corpus, we are generally limited by the available main memory. This may lead to a proliferation of processor load due to greedy computing. We propose to deal with this problem to compute document similarity. We propose upstream and downstream parallel computing related to data and processing according to three abstraction levels: document, sentences and words....
The correct execution of well-defined movements plays a crucial role in physical rehabilitation and sports. While there is an extensive number of well-established approaches for human action recognition, the task of assessing the quality of actions and providing feedback for correcting inaccurate movements has remained an open issue in the literature. We present a learning-based method for efficiently...
This paper describes the work involved in developing a script-based PBL environment in Moodle. PLATE-PBL is a Moodle plug-in based entirely on the meta-model of the PBL scripting language. The plug-in dynamically transforms lesson plans developed by a special visual script editor, it then interprets and instantiates equivalent lesson plans in the Moodle's runtime. Lesson plans can also be designed...
In this paper, the fundamental idea of Incremental Granular Models (IGM) introduced by Pedrycz and Kwak (2007) is followed and their comprehensive design framework is developed. In contrast to typical rule-based systems encountered in fuzzy modeling, the underlying principle of IGM is to consider a two-phase development. First, we build a Linear Regression (LR) model which could be treated as a global...
In the context of the dataflow process network mapping problem, we propose a parallel solutionmethod based on a semi-greedy heuristic to improve the solution quality of a greedy regret-based mapping algorithm (RBA). In this method, several executions of a randomized version of RBA are performed in parallel togenerate different solutions. We exploit a correlation between solution quality and execution...
Statistical language models are central to many applications that use semantics. Recurrent Neural Networks (RNN) are known to produce state of the art results for language modelling, outperforming their traditional n-gram counterparts in many cases. To generate a probability distribution across a vocabulary, these models require a softmax output layer that linearly increases in size with the size...
This paper presents a perspective on Modeling an Adaptive Hypermedia Instructional System, having sound footings on research findings in context of high quality technology enabled learning environment. We propose a framework that is primarily based on the concept of reusable learning objects, media worthiness of components and instructional ergonomics. The goal of the framework is to cater protocols...
Self-awareness has a long history in biology, psychology, medicine, and more recently in engineering and computing, where self-aware features are used to enable adaptivity to improve a system's functional value, performance and robustness. With complex many-core Systems-on-Chip (SoCs) facing the conflicting requirements of performance, resiliency, energy, heat, cost, security, etc. - in the face of...
In the last two decades, energy has become a crucial resource whose consumption must be minimized while designing computing systems. This has affected every aspect of computing ranging from large scale supercomputers and data centers to small scale (but high volume) embedded systems comprising filters, digital signal processors (DSPs), and accelerators. Energy constraints play a particularly crucial...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.