The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Provisioning strategies relying on CPU load may be suboptimal for many applications, because the relation between CPU load and application performance can be non-linear and complex. With the knowledge of the relation between CPU load and application performance, resource provisioning strategies could be tuned to a particular application, but the required knowledge is difficut to obtain, because classic...
On deploying a good agent simulation, it is important to be able to handle detailed behaviors of agents in a simulation as well as scaling up the simulation to cover important phenomenon that could be produced. There are strong demand to utilize multi-core computing resources effectively for such simulations. However, it is not easy task for developers to set the sufficient compilation and execution...
A method for eliciting user requirements in affect-laden applications is described. The method extends personal RE where requirements are for individual users and their needs. Theories from psychology of emotion and motivation are introduced and applied in a top-down pathway motivated by system goals to influence users, and a bottom-up scenario-based path to analyse affective situations which might...
Equivalence checking is a powerful formal technique to improve the quality of computer and software systems. It is usually employed to verify the correctness in a model-based design. Notwithstanding, a detailed and precise specification is required in order to apply equivalence checking to a given domain. Unfortunately, certain fields of application like business process management lack of such adequate...
An advance in technology unlocks new opportunities for organizations to increase their productivity, efficiency and process automation while reducing the cost of doing business as well. The emergence of cloud computing addresses these prospects through the provision of agile systems that are scalable, flexible and reliable as well as cost effective. Cloud computing has made hosting and deployment...
The knowledge acquisition of basic logical forms (term, statement, conclusion, and proof) is a prerequisite of the acquisition of any other knowledge and skills. Therefore, the knowledge acquisition of basic logical forms needs to be addressed in the earlier stages of education. In order to support the acquisition of knowledge and skills in the domain of logical forms, the authors of this paper propose...
This paper tried to examine the students' acceptances for the use of Blackboard Learning System using Technology Acceptance Model (TAM) as an analysis approach. Four factors of TAM namely Perceived Ease of Use, Perceived Usefulness, Attitude, Behavior Intention, and Perceived Interactivity as an additional factor were used as the evaluation model factors to measure the students' technology acceptance...
In the process of collaborative design, a large number of versions are produced. Storing and accessing versions is very frequent, so version storage in the process of collaborative design has become the core issue of version management. In recent years, how to reduce the storage space and improve the retrieval efficiency has become a research hotspot, however the research of version security is still...
As software and hardware have grown in functionality and complexity, the existing computer systems are confronting serious challenges with safety, dependability and reliability. Being one of the primary causes with responsibility for these challenges, the software-hardware interaction is advanced and widely studied in recent years. Unfortunately, none of the state-of-art researches has achieved widespread...
For predictable application performance or fairness in network sharing in clouds, many bandwidth allocation policies have been proposed. However, with these policies, tenants are not incentivized to use idle bandwidth or prevent link congestion, and may even take advantage of the policies to gain unfair bandwidth allocation. Increasing network utilization while avoiding congestion not only benefits...
Topology Control (TC) algorithms for multi-hop wireless networks create a connected communication subgraph that satisfies some topological properties by assigning appropriate transmission power to each node. A topology is said to be minimum-energy path-preserving if it preserves minimum energy paths between every pair of nodes. Creating minimum-energy path-preserving sparse topologies is a fundamental...
We study the effect of external infection sources on phase transitions in epidemic processes. In particular, we consider an epidemic spreading on a network via the SIS/SIR dynamics, which in addition is aided by external agents — sources unconstrained by the graph, but possessing a limited infection rate or virulence. Such a model captures many existing models of externally aided epidemics, and finds...
We propose a unified methodology to analyse the performance of caches (both isolated and interconnected), by extending and generalizing a decoupling technique originally known as Che's approximation, which provides very accurate results at low computational cost. We consider several caching policies, taking into account the effects of temporal locality. In the case of interconnected caches, our approach...
This paper presents an algorithm for evaluating the probability that connectivity can be maintained between two given nodes in a physical network affected by a disaster. Nodes and links in a disaster area are probabilistically broken, and the disaster area is modeled using a half plane. This paper also proves that this probability of connectivity increases for a generic network topology when the perimeter...
We consider line outages in the transmission network of the power grid, and specifically those caused by natural disasters or large-scale physical attacks. In such networks, an outage of a line may lead to overload on other lines, thereby leading to their outage. Such a cascade may have devastating effects not only on the power grid but also on the interconnected communication networks. We study a...
Small satellite missions are becoming increasingly complex as scientists and engineers propose to utilize them to accomplish more ambitious science and technology goals. Small satellites such as CubeSats are challenging to design because they have limited resources, coupled subsystems, and must operate in dynamic environments.
Authors suggest a resolution to validate metamodels using a formal description language and analyzer Alloy. A MDA meta-hierarchy divides a model into three layers. Therefore this approach is able to validate partial models using Alloy. Validating partial models reduce execution time. For an example of realistic validation, this paper shows application to the specification of an information control...
In the gaming environment, building natural looking avatar is a challenging task. An avatar represents a human character which includes speech, action, and eye movement in a virtual world. The movement and the expression of eye modeling is cognitive function. In order to assess virtual agent's eye gaze behavior on the basis of cognitive and emotional characteristics, this paper presents an experimental...
With the increasing popularity of hand held devices for accessing internet services wireless mesh network has become an attractive option to internet service providers. The objective of the network is to provide seamless internet connectivity to the mobile internet users. To fulfill the objective, mobility management of the mesh clients (MC) is necessary. This paper focuses on three mobility management...
The concept of using negative refractive media for a perfect lens was theorized by Veselago in 1968 (Sov. Phys. Usp., 10, 509–514). Recent developments in metamaterials (Shelby et al., Science 292, 77, 2001) allowed researchers to physically demonstrate that artificial composite media can be engineered to exhibit exotic properties, including negative refractive index, by exploiting features in arrays...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.