Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This work proposes an approach based on Steiner trees to efficiently support multipoint communications in a multi-domain context, where each domain exposes a synthetic and aggregated view of its network. The approach that we propose is based on two pillars: The adoption of a topology aggregation of each domain's network as a Steiner tree and the use of a shortest path heuristic for the calculation...
A social health care system, and palliative care in particular, can be viewed as a social network of interacting patients and care providers. Each patient in the network has a set of capabilities to perform his or her intended daily tasks. However, some patients may not have the required capabilities to carry out their desired tasks. Consequently, different groups of care providers offer the patients...
Models are the cornerstone of Model-Driven Engineering (MDE). Their size is constantly growing, becoming one of the main problems when it comes to manipulating them, via model-to-model transformations, model-to-text transformations or simply parsing them. In this paper we propose a way of distributing Ecore models representing them as JSON and URLs as identifiers, since HTTP is one of the most successful...
We present a development environment that proactively and interactively assists the software engineer in modeling complex reactive systems. Our framework repeatedly analyzes models of the system under development at various levels of abstraction, and then reasons about these models in order to detect possible errors and to derive emergent properties of interest. Upon request, the environment can then...
The Model-Driven Architecture (MDA) is based on an understanding of a hierarchy of levels that are placed on top of each other and that are connected with instantiation. For practical MDA use, it is important to be clear about the kinds of objects that reside on the different levels and the relations between them as well as relations to objects outside of the MDA domain. This article aims at enhancing...
Network simulation is an important technique for designing interconnection networks and communication libraries. Also network simulations are useful for the analysis of internal communication behavior in parallel applications. This paper introduces a new interconnection network simulator NSIM-ACE. This simulator enables us to evaluate RDMA directly while existing simulators do not have such capability...
The Internet of Things (IoT) refers to the network of objects, devices, machines, vehicles, buildings, and other physical systems with embedded sensing, computing, and communication capabilities, that sense and share and act on real-time information about the physical world. These objects, through standard communication protocols and unique addressing schemes provide services to the final users or...
The amount of computer viruses has grown significantly and antivirus software becomes inefficient when analyzing new threats. At the same time, artificial intelligence has become more cost effective to implement in projects due to the low amount of hardware costs. This paper is intended to document the process of modelling data gathered from the programs that are running on a computer with a Windows...
In the classical approaches of model checking (explicit and symbolic), the tools encode the state space, as well as the transition relation between the states. This way, when the predecessor of a state is needed, as in the case of CTL formulas evaluation, it can be extracted from the state space in a straightforward manner. Practical experience indicates that renouncing at encoding the transition...
Machine learning has been widely used and achieved considerable results in various research areas. On the other hand, machine learning becomes a big threat when malicious attackers make use it for the wrong purpose. As such a threat, self-evolving botnets have been considered in the past. The self-evolving botnets autonomously predict vulnerabilities by implementing machine learning with computing...
The paper is introducing an adoption of Industry 4.0 Concept on Smart City theoretic model. Cities are upgraded with latest computing and ICT technologies throughout all systems and infrastructure. New data are collected in big amounts and ability to use them is changing how city subsystems can communicate together, to make cities work better and serve better to their users. Smart Cities are convoluted...
When employed in educational settings, cloud computing applications enable users to create, store, organize, and share divergent artefacts with their peers. As an outcome, they have a large number of users worldwide which makes them vulnerable to a variety of security and privacy related threats. With an aim to examine the extent of the perceived security and privacy in the context of cloud computing...
This study presents a two-course sequence of graduate instructional design courses that were developed and implemented using a flipped classroom model for both online and face-to-face contexts. This model is an instructional strategy that reverses what is traditionally done at home and what is done at school, such as watching video lectures at home and working authentic problems in class. The presentation...
The paper deals with the modeling of computer subsystems, such as the input-output, direct memory access controller, memory of multiprocessor, multicore processor. For each model the input and output data sets are given. The modes of operation and functions of simulation models are described. The screen forms samples for the simulation models are shown.
We give efficient algorithms to solve fundamental data movement problems on mesh-connected computers augmented with limited global bandwidth. Adding a small amount of global bandwidth makes a practical design that combines aspects of mesh and fully connected models to achieve the benefits of each. We give algorithms for sorting, finding the median, finding a spanning tree, and determining various...
Science and technology are progressing with the speed which seems to be unfamiliar to us. What seems to be science-fiction some 30 years ago is now becoming our everyday reality. 3-D printing, O-led technology, modern communication, smart materials, mind recognition etc. How to follow the progress and all novelties and what is more, how to integrate them into the educational systems of high schools...
Mathematical dependencies for calculation of main parameters of vacuum gripping devices have been derived with the purpose of increasing efficiency of devices developed for handling of flexible containers during filling with free-flowing products. Computer modelling of the process of gripping and holding of flexible containers made with air-penetrating materials with the help of vacuum gripping devices...
Nowadays, the total power consumed by data centers is increasing more and more. In particular, the power consumed by data center facilities accounts for about half of total input power. In this paper, a hierarchical control structure is proposed for efficient management of an indirect adiabatic cooling system, which utilizes fresh air. Data center cooling needs can be met with various combinations...
This paper aims to propose and discuss concepts of how users can recognise information seeking behaviour automatically and what implications such an automatic recognition can have. The authors develop the discussion around variables proposed in Wilson's second model of information behaviour and state how they can collect data necessary to recognise information behaviour automatically. The authors...
The models of functioning of distributed computer systems with group and full restorations of failed machines are considered. The models are formalized in the form of a system of differential equations, in which are unknown probabilities of the states. To assess the effectiveness of CS functioning in we used the expectation and variance of the number of working and fault machines in the models. Analytical...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.