共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
4.
5.
6.
7.
8.
9.
There have been proposed and used many programming concepts for realizing interprocess communication and synchronization, and two fundamental categories among them are variable sharing (e.g. semaphores) and message passing (signals, input/output in CSP and redezvous in Ada). The aim of this paper is to investigate the relationship between these two mechanisms, and in particular, program transformation between them. We here propose a transformation method between parallel programs written in each of these two, which uses transformation schemes named monitor transformations. We exhibit the method by showing through a chain of program transformations the equivalence of two versions of a parallel algorithm called dynamic sorting array. 相似文献
10.
11.
12.
Justice D. Hero A.O. III 《Information Forensics and Security, IEEE Transactions on》2006,1(3):374-385
We consider the problem of estimating the endpoints (source and destination) of a transmission in a network based on partial measurement of the transmission path. Possibly asynchronous sensors placed at various points within the network provide the basis for endpoint estimation by indicating that a specific transmission has been intercepted at their assigned locations. During a training phase, test transmissions are made between various pairs of endpoints in the network and the sensors they activate are noted. Sensor activations corresponding to transmissions with unknown endpoints are also observed in a monitoring phase. A semidefinite programming relaxation is used in conjunction with the measurements and linear prior information to produce likely sample topologies given the data. These samples are used to generate Monte Carlo approximations of the posterior distributions of source/destination pairs for measurements obtained in the monitoring phase. The posteriors allow for maximum a posteriori (MAP) estimation of the endpoints along with computation of some resolution measures. We illustrate the method using simulations of random topologies. 相似文献
14.
15.
Yuh-Min TsengAuthor Vitae Jinn-Ke JanAuthor VitaeHung-Yu ChienAuthor Vitae 《Computers & Electrical Engineering》2003,29(1):101-109
Two efficient authenticated encryption schemes with message linkages are proposed. One is a basic scheme, that it has the better performance in comparison with the all previously proposed schemes in terms of the communication and the computation costs. However, it has a property as same as the previously proposed schemes, that the message blocks can be recovered only after the entire signature blocks have been received. Therefore, the basic scheme is applicable to encrypt all-or-nothing flow. Thus, we improve the basic scheme and also propose a generalized scheme, which allows the receiver to recover the partial message blocks before receiving the entire signature blocks. That is, the receiver may perform the receiving and the recovering processes simultaneously. Therefore, the generalized scheme is applicable to message flows. The generalized scheme requires smaller bandwidth and computational time as compared to the previously proposed authenticated encryption schemes with message linkages for message flows. 相似文献
16.
R. T. Faizullin 《Pattern Recognition and Image Analysis》2014,24(2):226-233
An algorithm for generating a session key and a message start token is proposed. This algorithm is based on joint integration by subscribers of the N body problem. 相似文献
17.
OBJECTIVE: The authors sought to use biomechanical measures, including motion and pressure, to compare four office chairs. BACKGROUND: The fit of a person to a chair is related to the geometric and kinematic compatibility between the two. This geometric compatibility influences the motions that are allowed or prohibited and the support pressures at the body-chair interface. Thus, during evaluation, it is necessary to treat the chair and user as a system. METHOD: Four dynamic test conditions were evaluated with 14 participants of varying anthropometries. Test conditions were selected to compare the ability to accommodate primary and secondary motions (recline and spinal articulation) of seated occupants. The ability of a chair to allow recline, yet maintain head and hand positions, was compared across chairs. Also, the ability of each chair to allow and support spinal articulation was evaluated. Motion data for the chair, head, thorax, pelvis, and extremities were collected along with chair back pressures. Upon completion of testing, subjective assessments were also conducted. RESULTS: Statistically significant differences were found between chairs relative to head and hand motions. Also, significant differences were noted for the chairs' ability to move with the body during spinal articulation and the ability to provide support. Subjective assessments also yielded differences. CONCLUSIONS: Biomechanical analyses using motions and pressures can be conducted on office chairs with significant differences detected in their performance. APPLICATION: Biomechanical assessments can be used to compare and contrast office chairs in terms that are relatable to fatigue reduction as well as operator performance. 相似文献
18.
John Mead 《Computer Communications》1980,3(1):22-24
The UK Meteorological Office requires the rapid transmission of weather bulletins in a format suitable for direct insertion into the main message-switching computer of the British Meteorological Communication Network. Computer-assisted message preparation equipment is to be used that will provide store-and-forward switching, automatic formatting and automatic time-controlled release to line.System requirements are outlined and the control modules described. Examples of use of the system are given. 相似文献
19.
20.