156 Result(s)
-
Chapter and Conference Paper
SuperNBD: An Efficient Network Storage Software for Cluster
Networked storage has become an increasingly common and essential component for cluster. In this environment, the network storage software through which the client nodes can directly access remote network atta...
-
Chapter and Conference Paper
ALiCE: A Scalable Runtime Infrastructure for High Performance Grid Computing
This paper discusses a Java-based grid computing middleware, ALiCE, to facilitate the development and deployment of generic grid applications on heterogeneous shared computing resources. The ALiCE layered grid...
-
Chapter and Conference Paper
A Constant Time Optimal Routing Algorithm for Undirected Double-Loop Networks
Undirected double-loop networks G(n; ± s 1, ± s 2), where n is the number of its nodes, s 1 and s 2 are its steps, 1 ≤ s ...
-
Chapter and Conference Paper
Design and Implementation of a SAN Agent for Windows NT Architecture
In an out-of-band SAN virtualization system, the virtualization appliance maintains metadata, and the agents inside the kernel of servers use that data to supply virtual storage devices and to perform the mapp...
-
Chapter and Conference Paper
A Dynamic Face and Fingerprint Fusion System for Identity Authentication
This paper presents a novel dynamic face and fingerprint fusion system for identity authentication. To solve the face pose problem in dynamic authentication system, multi-route detection and parallel processin...
-
Chapter and Conference Paper
Using Verb Dependency Matching in a Reading Comprehension System
In this paper, we describe a reading comprehension system. This system can return a sentence in a given document as the answer to a given question. This system applies bag-of-words matching approach as the bas...
-
Chapter and Conference Paper
Applying Service Composition in Digital Museum Grid
Digital museum is an effective method of protecting and using resources stored in museums. Digital museum grid was present to efficiently and effectively organize, present and share the resources over heteroge...
-
Chapter and Conference Paper
An Authorization Framework Based on Constrained Delegation
In this paper, we distinguish between authorization problems at management level and request level in open decentralized systems, using delegation for flexible and scalable authorization management. The delega...
-
Chapter and Conference Paper
Study on Application Server Aging Prediction Based on Wavelet Network with Hybrid Genetic Algorithm
Software aging is an important factor that affects the software reliability. According to the characteristic of performance parameters of application sever middleware, a new model for software aging prediction...
-
Chapter and Conference Paper
A New Precomputation Scheme for MPLS Traffic Engineering Routing
This paper presents a new precomputation algorithm for Multi Protocol Label Switching (MPLS) traffic engineering routing. The prior MPLS routing algorithms try to minimize the interference between different so...
-
Chapter and Conference Paper
Evaluation of the Device Driver Availability in Dawning4000A
Device drivers were claimed to be the most error prone in kernel source. A lot of error tolerance or error prevention approaches have been developed or suggested after this claim. But after analyzing the event...
-
Chapter and Conference Paper
An Efficient K-Coverage Eligibility Algorithm on Sensor Networks
Wireless sensor networks are employed in many critical applications. The K-coverage configuration is usually adopted to guarantee the quality of surveillance. A sensor node can be determined to be ineligible to s...
-
Chapter and Conference Paper
A New Hybrid Traffic Engineering Routing Algorithm for Bandwidth Guaranteed Traffic
This paper presents a new hybrid traffic engineering routing algorithm for bandwidth guaranteed traffic. Former traffic engineering routing algorithms mainly optimize one of the three objectives: minimizing th...
-
Chapter and Conference Paper
A Centralized Network Design Problem with Genetic Algorithm Approach
A centralized network is a network where all communication is to and from a single site. In the combinatorial optimization literature, this problem is formulated as the capacitated minimum spanning tree proble...
-
Chapter and Conference Paper
A Multi-classification Method of Temporal Data Based on Support Vector Machine
This paper studies a multi-classification method based on support vector machine for temporal data. First, we give classic classification model of support vector machine. Then, we present a support vector mach...
-
Chapter and Conference Paper
Small-World Network Inspired Trustworthy Web Service Evaluation and Management Model
The trustworthiness between anonymous web service client and provider influences service stability and collaboration. Trustworthiness includes some aspects such as service’s security, controllability and survi...
-
Chapter and Conference Paper
Online Speed Profile Generation for Industrial Machine Tool Based on Neuro-fuzzy Approach
The paper presents the online smooth speed profile generator used in trajectory interpolation in milling machines. Smooth kinematics profile is obtained by imposing limit on the jerk - which is the first deriv...
-
Chapter and Conference Paper
Global Exponential Stability Analysis of a General Class of Hopfield Neural Networks with Distributed Delays
In this paper, based on contraction map** principle and differential inequality technique, we investigate global exponential stability of a general class of Hopfield neural networks with distributed delays. ...
-
Chapter and Conference Paper
A Non-dominated Sorting Bit Matrix Genetic Algorithm for P2P Relay Optimization
Cooperative caching and relaying content in ISPs can decrease the bandwidth costs and distribution time. The relay resources installed at ISP are limited and the upload rates of relay servers are various. Afte...
-
Chapter and Conference Paper
On Automatic Design of Neuro-fuzzy Systems
In this paper we propose a new approach for automatic design of neuro-fuzzy systems. We apply evolutionary strategy to determine the number of rules, number of antecedents, number of inputs, and number of disc...