The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a peer to peer self-stabilizing message passing system, every single node in the network operates independently with independent resources. In order to self-stabilize to a correct state, messages are passed as a distributed system collectively, messages are passed through out the network among each of the member of the network to inform other nodes about their own states which is later to be used...
The paper presents the investigation of wave occurrences of two geometrically non-linear elastic coaxial cylindrical shells model of Kirchhoff-Love type, containing viscous incompressible liquid between them, as well as inside. The difference schemes of Crank-Nicholson type are obtained for the considered equations system by taking into account liquid impact and with the help of Gröbner bases construction...
Soft errors are increasing in modern computers. These faults can corrupt the results of scientific simulations. This work studies error propagation by a bit flip in conjugate gradient (CG) methods. We will also introduce adaptivity to selective reliable fault-tolerant (SRFT) solvers. Our study reduces the compute-intensive reliability steps in SRFT solvers.
Methods of Computer Algebra have shown to be useful when formally verifying data-centric hardware designs. This has been demonstrated especially for cases where complex arithmetic computations are tightly coupled with the system's control structures at the bit level. As a consequence of current design trends, however, more and more functionality that was traditionally implemented in hardware is now...
This work focuses on the issue of a high performance computing education based on systems such as grid, cloud, HPC cluster or systems with hybrid environments. The goal is based on the analysis of the High Performance Computing Strategic Research Agenda in Europe and the published findings in USA in context of needs for education and training specifically in HPC and Compute Intensive Science. In order...
In the paper we interpret the Church Turing thesis of Computation Algorithm and how it differs from the strong Church Turing thesis in the field of computation. Church Turing thesis can be classified as Strong Church Turing thesis and Normal Church Turing thesis. Church Turing hypothesis says “that a computing problem can be solved in any computer if and only if it can be solved on a very simple ‘machine’,...
In this paper, we present a new model to describe and program a parallel clusters using graphic processing unit, multi agent and distributed systems. The model are based physically on a multitude of computer nodes arranged and coupled according to the paradigm and topology of multi agent system. Basing on the agent modelling technique and on the java and C/C++ language, we develop a framework to build...
Online social media networks play important roles for people to share opinions, communicate with others. One of important features behind these activities is trust. This paper investigates the trust model in Online social media networks. Considering the interaction between two users and the reputation in the social networks, this trust model gives a definition about the trust value between two users...
Role-based access control is widely used in information system of internal network, but there are still many limitations when there is a large number of roles and objects in the system, such as to achieve fine-grained access controls may lead to role-permission explosion problem, and the users in the network can easily evade the existing access control mechanism to gain access to the system by altering...
This paper builds on the authors' previous work with Augmented Reality (AR) technology as a tool to enhance traditional visualizations and facilitate the understanding of complex information. In this paper, we expand our previous work with AR technology by focusing on the process of creating custom content. Based on users' feedback, we describe and compare various strategies to create 3D models from...
Computational Thinking was an important way to study computer science and it explained the relationships between human, calculation and computer in terms of thinking. The computer science was raised from the theory of tools to the height of thinking. This paper introduced three levels of Computational Thinking: Computational Thinking in computer science, Computational Thinking in computing science...
Computer science is becoming ever increasingly important to our society. Computer science content has, however, not traditionally been considered a natural part of curricula for primary and secondary education. Computer science has traditionally been primarily a university level discipline and there are no widely accepted general standards for what computer science at K-12 level entails. Also, as...
In this paper, an Aggregation-Division Model (ADM) is proposed to simulate the clustering characteristics of nodes in cyberspace and to describe the dynamic evolution process of the community system structure. Based on Cluster-Cluster Aggregation (CCA) model, using the random walk and collision of discrete single particle to simulate the communication and relationship establishment of nodes in social...
Risk analysis of security threats in computer networks is one of the most challenging fields in network management. Security risk analysis is usually done by security experts. Although they utilize analysis tools such as scanners and analyzers, the need for expert is still inevitable. To reduce the need of security expertise for network administrator, yet performing security risk management, this...
Software as a Service (SaaS) is one of the major service models of cloud computing and a new software delivery model, in this software delivery model, software is hosted centrally, is licensed to users on subscription basis, and typically is accessed by users through a Web browser. Before SaaS was introduced, the traditional software delivery model was Software as a Product (SaaP): software was sold...
The ABET engineering criteria was first formulated and introduced to the American education system in the middle 1990s. The ABET accreditation system defines an engineering graduate according to Blooms Taxonomy. As a part of the continuing curriculum improvement at Bucknell University, a new junior-level design course has been recently introduced into the curriculum. The course title is ECEG 301:...
The Problem-Based Learning method has become an alternative to develop problem solving skills and abilities strongly required by the current labor market. However, studies indicate that due to the subjectivity of PBL concepts and the lack effective instruments for its implementation, the PBL teaching planning is compromised and strongly dependent on the teacher's ability. In addition, related studies...
First-year engineering students enter our university with differing experiences using computers and technology. This affects the classroom dynamic especially with large differences between students. With this in mind, faculty must address the following questions when planning their course: Where should the faculty focus their time? Do they focus on bringing everyone to a specific level? Do they teach...
as the deceleration of processor scaling due to Moore's law accelerates research in new types of computing structures, the need arises for rethinking operating systems paradigms. Traditionally, an operating system is a layer between hardware and applications and its primary function is in managing hardware resources and providing a common abstraction to applications. How does this function apply,...
The significance of computer architecture simulators in advancing computer architecture research is widely acknowledged. Computer architects have developed numerous simulators in the past few decades and their number continues to rise. This paper explores different simulation techniques and surveys many ×86 simulators. Comparing simulators with each other and validating their correctness has been...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.