The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The human immune system is incredibly efficient at identifying self- and non-self entities in our bodies. A non-self entity (malicious), once identified, is attacked by particular types of cells to remove the intruder before it can cause damage. Our immune system has components that identify not only non-self entities but also recall old entities that may not have been encountered for a very long...
Simulation represents the major research method in all knowledge domains and a scientifically valid method of estimating the characteristics of complex systems used for decision making in different areas of engineering. The existing and projected systems can be explored effectively using mathematical models (analytical and simulation) implemented on high-performance computers, which act in this case...
A structured overlay running as the base of a DHT or ALM occasionally receives a large number of messages collectively. Those cases are opportunities for an overlay to bundle multiple different messages into a single message and achieve extraordinarily effective message deliveries. Such message bundling reduces the number packet transmissions on an underlay network such as an IP network. This paper...
Modern enterprises collect, process, and analyze security data from various system and network logs. Previous studies show that, handling large security datasets and detecting anomalies from those are key challenges faced by most of todays' enterprises. Unfortunately most security professionals are inexperienced at performing data analysis. In this paper, we study published works analyzing one publicly...
To address the challenges raised by the Internet usage evolution over the last years, the Content-Centric Networking (CCN) has been proposed. One key feature provided by CCN to improve the efficiency of content delivery is the in-network caching, which has major impact on the system performance. In order to improve caching effectiveness in such systems, studying the functioning of CCN in-network storage...
In this paper, a transfer function that models Molecular Communication via Diffusion (MCvD) between a point transmitter and a fully absorbing circular receiver in an unbounded 2-D environment is analytically derived. The analytical derivation of the transfer function of the 2-D channel in MCvD is proposed for the first time in the literature. The transfer function is obtained by solving the molecule...
We present a development environment that proactively and interactively assists the software engineer in modeling complex reactive systems. Our framework repeatedly analyzes models of the system under development at various levels of abstraction, and then reasons about these models in order to detect possible errors and to derive emergent properties of interest. Upon request, the environment can then...
Growing attention is being paid to the use of game-based learning in education, due to the rapid progress of information technology Internet. Students need to cultivate not only their own abilities, but also the ability of collaboration after graduation. However, collaboration must be directed by appropriate guidance in order to demonstrate the expected results, the rules of the game guide can be...
In this paper, we present recent progress in the first-principles modeling and quantitative statistical analysis of complex electronics systems. The scientific contributions are twofold: (i) high-performance and scalable algorithms to conquer the computational complexity of extreme-scale simulations on massively parallel computing platforms; (ii) hybrid deterministic and stochastic formulations for...
By taking both CMF (Common Mode Failure) and middle states into account, numerical analysis of availability of cluster system is analyzed. Firstly, a CTMC (Continuous Time Markov Chain) model of cluster system containing three cluster nodes is constructed with failure rate (λ), repair rate (μ), CMF rate (7), reconfiguration rate (β) and reset rate (á) etc. Then the steady state solution of the CMTC...
Caches are often employed to better manage the ever-growing amount of global Internet traffic. Particularly, reverse proxies are often used to free up congested peering links and reduce inter-domain traffic. In addition, caches place content close to the edge, leading to lower latency which can be beneficial for many applications. In an effort to bring content even closer to end devices, home routers...
Unigram is a fundamental element of n-gram in natural language processing. However, unigrams collected from a natural language corpus are unsuitable for solving problems in the domain of computer programming languages. In this paper, we analyze the properties of unigrams collected from an ultra-large source code repository. Specifically, we have collected 1.01 billion unigrams from 0.7 million open...
Authentication is one of the essential mechanism of a typical security model. It identifies the user legitimacy accessing any service over the network. Authentication can usually be done by a simple single-factor authentication method such as a password. Unfortunately, it is inadequate to ensure security when accessing variant resources and services across the Internet. Therefore, for users to authenticate...
The extracted product aspects (like “battery life”, “zoom”) from online customer reviews are dissimilar in their significances, some of these aspects have a great influence on the potential customer's decision likewise on the businesses' strategies for product enhancements. Supporting the probable customers with a list of the most representative product aspects will assist their purchasing decision...
SkillsRec recommender (Skills based Recommender) is a novel Latent Semantic Analysis model driven recommendation system for online Personal Learning Environments that develops skill-similarity based user-user recommendations through semantically analyzing teacher-competencies and learner-interests. The recommender provides a solution to the inherent, massive and exponentially increasing information-overload...
To aggregate opinions on aspects of entities mentioned in large-scale online reviews, it is important to automatically extract aspects of different granularities, identify associated opinions, especially aspect-specific opinions, and classify sentiment polarity. Recently, various topic models are proposed to process some of these tasks, but there is little work available to do all simultaneously....
Building program analysis tools is hard. A recurring development task is the implementation of the meta-model around which a tool is usually constructed. The XCORE prototype supports this task by generating the implementation of the meta-model. For this purpose, developers will add directly into the source code of the tool under construction some meta-information describing the desired meta-model...
Exploring the design space of the memory hierarchy requires the use of effective methodologies, tools, and models to evaluate different parameter values. Reuse distance is of one of the locality models used in the design exploration and permits analytical cache miss estimation, program characterization, and synthetic trace generation. Unfortunately, the reuse distance is limited to a single locality...
We developed a parallel computation method for the electromagnetic field analysis of rotating machines with the 3-D finite element method with prismatic edge elements. We clarified the usefulness of the method through the dynamic characteristics analysis of an IPM motor.
Cloud federation has emerged as a new paradigm in which different service providers collaborate to overcome limitation of cloud resource during sudden spikes in demand and improve quality of service (QoS) for delivered cloud services. The growing number of cloud federation to provide cloud services has made service selection a complex task due to varied nature of parameters like price, QoS and trust...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.