Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Distributed power meters (also termed smart plugs) are embedded systems that measure the electric power consumption of individual appliances at a fine temporal resolution. They enable a wide range of novel smart services, e.g., accurately forecasting power consumption or making recommendations how to save energy. However, distributed power metering combines high sampling rates with a potentially large...
In this paper, we gather the weekly reports of an operational IP backbone network from January 2006 to January 2013, according to which, we can restore the truth and uncover the evolution of network configurations of the studied network. Our high-level analyses illustrate that rate limiting and launching routes for new customers are most frequently configured. We can identify and construct configuration...
Network virtualization provides a promising way to overcome the ossification of current Internet. One important issue in network virtualization is the problem of real-time monitoring of resource usage information. In this paper we investigate a novel method for clustering virtual resources inspired by the nonlinear dimensionality reduction method. Then a clustering algorithm extending the k-means...
This paper presents a new approach to improve the accuracy of power amplifier or transmitter characterisation. Compared to traditional characterisation, an iterative characterisation approach using realistic excitation signals is introduced. Based upon this approach, more accurate nonlinear behaviour for AM/AM and AM/PM can be measured. A memoryless piecewise digital predistortion (DPD) model using...
Companies increasingly rely on Internet for effective and efficient business communication. As Information Technology (IT) provides the infrastructure backbone for business activities, a corporate network connects the company to Internet and enables it to perform its activities globally. The corporate carries data packets generated by the users' while performing their business tasks. Traditionally,...
Co-location pattern mining aims at finding subsets of spatial features frequently located together in spatial proximity. The underlying motivation is to model the spatial correlation structure between the features. This allows to discover interesting co-location rules (feature interactions) for spatial analysis and prediction tasks. As in association rule mining, a major problem is the huge amount...
With the rapid development of microblog technology, many interesting research issues on microblog have aroused growing attention. Data fetching from microblog is the groundwork of these researches. In this paper we take Sina microblog (also called Weibo) as the crawling site, designing and implementing a high efficient incremental microblog crawler based on the classic multi-producers and multi-consumers...
Data flows is a type of dynamic data. After the detection of anomaly data flows, the next problem is how to control these anomaly data flows effectively and prevent network jam. Router queue management is an effective method of controlling anomaly data flows. When network is busy router can prevent it by active droppings. The characters of unresponsive of network congestion control and high-bandwidth...
Nowadays, location-based services are widely utilized, including identifying user locations, offering traffic status, providing point of interest (POI) information, and guiding routes. At present, users always make use of location-based services via smart phones, and can obtain information anywhere and anytime. However, users easily receive information in which they were not interested. This kind...
Due to the relatively low bandwidth of WAN (Wide Area Network) that supports cloud backup services, both the backup time and restore time in the cloud backup environment are in desperate need for reduction to make cloud backup a practical and affordable service for small businesses and telecommuters alike. Existing solutions that employ the deduplication technology for cloud backup services only focus...
With the growing and improving network services, diverse interests of users have been satisfied, and the same resources have been visited repeatedly becomes a common phenomenon. Thus, in the process of data transmission, the duplicate transfer in the large-scale network topology will inevitably lead to a huge waste of resources, which commonly exists in the campus network similar topology environment...
H.264/SVC has been widely adopted to smart CE devices for network-adaptive video transmission. However, current H.264/SVC does not support sufficiently high subjective QoS (Quality of Service) because its scalability methods provide only coarse-grained network adaptivity. To address this problem, we propose Scalable ROI (SROI) algorithm that applies ROI (Region of Interests) concept to SVC (Scalable...
The properties found in complex networks (e.g., small-world, scale-free) have been used to characterize the behaviour of several processes such as epidemics or oscillators. We analyze the impact of such properties on the quality of a routing process. Using a Mixed Integer/Linear Program, the routing minimizes the number of ports installed in a previously designed network. Ports are network components...
This paper presents an analysis of the parameters used to construct 2D log-Gabor filters to encode iris patterns. This filter is a band-pass complex filter composed by four parameters that are used to extract information direct in the 2D domain. An iris recognition system, composed by segmentation, normalization, encoding and matching is also described. The segmentation module combines the Pulling...
The secure sum protocol is a well-known protocol for computing the sum of private inputs from distributed entities such that the inputs remain private. In this paper we present protocols for computing reputation in a privacy preserving manner that are inspired by the secure sum protocol. We provide a protocol that is secure under the semi-honest adversarial model as well as one that is secure under...
Memory Wall is a bottleneck of enhancing the performance of computer system, and appearance of multiprocessors (CMPs) makes it more. How to reduce Memory Access Latency is a critical issue we have to deal with. Memory controller is difficult to optimize, the controller needs to obey all DRAM timing constraints to provide correct functionality. State-of -the-art DDR2 SDRAM chips often have a large...
A recommendation system is a software system to predict customers' unknown preferences from known preferences. In a recommendation system, customers' preferences are encoded into vectors, and finding the nearest vectors to each vector is an essential part. This vector-searching part of the problem is called a k-nearest neighbor problem. We give an effective algorithm to solve this problem on multiple...
During last two decades, Mobile Ad hoc Networks (MANETs) has been in widespread use. However, in some critical applications such as in battlefield or area sensing, due to the node mobility, limited power and sparse deployment density, MANETs may suffer network partitioning. Without a stable end to end path, these challenged scenarios could cause most existing ad hoc networks protocols to fail. In...
The amount of information in real-time video monitoring is very large. So, the disk space is used largely, and the network congestion is easy to caused. In order to reduce the network congestion, save storage space, take out noneffective information in video, video key-frames are extracted in sending end and video is resumed in receiving end. A real-time video monitoring system is implemented. A kind...
In this paper, we propose several strategies for communication scheduling that can help increase the speed of parallel data mining algorithm. The proposed method based on the smart scheduling that enable parallel data mining application to fully utilize the interconnection infrastructure for communication. We compare the proposed strategies with a non communication scheduling algorithm on 2 to 32...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.