The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Malicious softwares or malwares for short have become a major security threat. While originating in criminal behavior, their impact are also influenced by the decisions of legitimate end users. Getting agents in the Internet, and in networks in general, to invest in and deploy security features and protocols is a challenge, in particular because of economic reasons arising from the presence of network...
The video game Thief: The Dark Projecttrade is themed as a game of stealth, in which the player (the thief) avoids being detected by computer-simulated guards. Essentially, the player exploits the, possibly false, beliefs of the guard regarding the thief's presence. Due to the simplicity of the guard's control program, the guard's beliefs are in practice perceived as either believing that the thief...
Vertex normal in triangular meshes is an essential surface attribute for point-based smoothing, mesh simplification and feature detection in fields as machine vision, virtual reality and reverse engineering. In order to investigate how weights of the algorithms for vertex normal estimation influence the vertex normal accuracy, theoretically analyses and experiments for algorithms by comparison are...
In this paper, swarm intelligence is introduced into the scheduling of a heterogeneous computing system and a novel dynamic task-scheduling model is proposed. The model describes the interaction between a wasp colony and the environment. Contesting for resources is addressed by dynamically allocating processors in sequence. Experimental results show the effectiveness of the proposed method.
Design problems are often solved by a group of designers with different expertise and background knowledge. These various concerns may cause conflicts among the designers. Thus, resolution of these conflicts frequently relies on some form of negotiation. This paper proposes a general framework for modeling collaborative design via fuzzy constraint-based agent negotiation. In this framework the individuals...
Parallel and distributed computing has been adapted to many scientific applications for aggregate computational power and memory capacity. To utilize resources efficiently and speed up application execution, tasks are split and dispatched across multiple computing elements. The ideal case is that all subtasks can finish roughly at the same time. However, this is not always achievable due to different...
A new model of triangular Ball surface is proposed with its quadratic complexity. It can be constructed from the idea of Wang-Ball univaritate functions and Wang algorithm. The new bivariate basis functions look analogous to the Wang-Ball polynomials. Evaluating points on a curve can be calculated from the new recursive algorithm that is proved to be quadratic, O(n2). Thus, the calculation time is...
A recent proposed model for triangular DP surfaces provided in has been found that there is an inappropriate property in its recurrence formulae. It is lack of convexity, i.e., the summation of blending functions is not equal to one. This paper presents a new triangular DP surfaces that possesses the convexity property and quadratic evaluation complexity. These two characteristics are realized to...
A new model of bivariate bases on triangular patches is proposed by applying the univariate bases proposed by Dejdumrong. In this paper, some geometric properties and its efficient recursive formulae are provided. Its fast recursive evaluation algorithm is also obtained in terms of a quadratic time complexity. Thus, it is shown that this type of surfaces is obviously more efficient than the traditional...
Optimal path planning is the critical technology for public transit system. In this paper, we propose a new transit path planning model- 3-layers heterogeneous road network model (3-LHRN). Based on this model, we can generate optimal path results, making a good match with real life. Some approaches have been explored in the past to tackle the optimal path planning issues. Taking aim at the least transfers,...
In order to solve the problem of trust in C2C e-commerce better, a history and future information based trust model is proposed in this paper. In this model the historical evaluation and future information are all considered. Thus, the entitiespsila historical behaviors are reflected in the trust value, and the starvation effect is prevented effectively. Based on the research achievements of trust...
Community-driven Question Answering services are gaining increasing attention with tens of millions of users and hundreds of millions of posts in recent years. Due to its size, there is a need for users to be able to search these large question answer archives and retrieve high quality content. Research work shows that user reputation modeling makes a contribution when incorporated with relevance...
Defending computer virus attacks needs to consume a large amount of various types of resources. In order to achieve the minimum input of resources and the optimized allocation, administrators need to determine and compare the anti-virus ability of various nodes in the network environment. In addition, determining the anti-virus ability of the network nodes also has very important significance for...
We seek to achieve characterization or application signature from a parallel application that will allow us, through the execution of this signature, to evaluate its performance in different computers. Sequential applications behavior can be understood by means of tools such as SimPoint. This tool can identify and select significant phases describing the applications behavior. Our proposal is to extend...
Integrity is one of essential properties of information security. It is necessary to analyze integrity of system quantitatively in order to protect the system security. For the purpose, we present formal definitions of integrity based on probabilistic computation tree logic (PCTL) and quantitative evaluation model of integrity. In the model, we model interoperations of system and environment by probabilistic...
Ceremonies are a useful tool to establish trust in scenarios where protocols operate. They describe a greater range of issues not taken into account by protocol designers. We take an already-designed protocol and ceremony for a key management protocol operating in a Public-Key Infrastructure environment and test it using a formal method. The ceremonies were analysed to test human peerspsila cognition...
Currently computer based systems are used by most of the universities around the world however, these systems are still paper based which involve physical paper existence. At present most of the universities are suffering obstacles in document management due to using paper based or semi automated systems. The objective of this paper is to present a paperless model for the university management system...
Many parallel computer systems installed in computing centers worldwide, which adopts backfilling based job scheduling policies, require that users should provide estimated job execution time when submitting a job to the system. This paper presents an approach, taking advantage of the estimated job execution time, to effectively allocating processors to jobs submitted to a heterogeneous computing...
A 4 KB page size has been used for Virtual Memory since the sixties. In fact, today, the most common page size is still 4 KB. Choosing a page size is finding the middle ground between several factors. On the one hand, a smaller page will reduce fragmentation; thus saving memory space. On the other hand, a larger page will increase TLB coverage; thus eliminating the need to access memory resident page...
As the Web application is world wide used, system' s performance, especially reliability, becomes more significant. Traditional performance testing tools such as QA Load and LoadRunner will generate the stress data with the fixed scale. But in the real time, network traffic is model-based. We focus on generating test data to simulate network traffic accurately for Web application reliability testing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.