首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Multimedia Tools and Applications - Recommending similar-interest users’ groups in multimedia services is the problem of detecting for each registered user his/her membership to one...  相似文献   

2.
本文提出了一种基于幂域理论的信誉系统,通过分布式排列机制,在系统运行过程中动态地选择最有信誉的关键节点,如果其表现出不可接受的行为,这些节点将被动态更换,最后在不断交易的过程中,据其在本地的行为形成该节点在整个系统的信誉评价。  相似文献   

3.
4.
Web caching is a widely deployed technique to reduce the load to web servers and to reduce the latency for web browsers. Peer-to-Peer (P2P) web caching has been a hot research topic in recent years as it can create scalable and robust designs for decentralized internet-scale applications. However, many P2P web caching systems suffer expensive overheads such as lookup and publish messages, and lack locality awareness. In this paper, we present the development of a locality aware cache diffusion system that makes use of routing table locality, aggregation, and soft state to overcome these limitations. The analysis and experiments show that our cache diffusion system reduces the amount of information processed by nodes, reduces the number of index messages sent by nodes, and improves the locality of cache pointers.  相似文献   

5.
6.
随着城市规模越来越复杂,全国各级政府都在进行城市物联网和信息化建设,目前虽然搭建了互联骨干网和部署了大量的传感器,收集了众多的城市行为数据,但落后的信息管理模式难以体现信息价值,将信息体现在服务提升之中,造成信息资源的极大浪费。因此,将情境感知技术引入到智慧城市服务的应用之中,构建了一个基于情境感知的城市服务系统,并通过情境信息采集、情境信息推理和服务配置模型等关键技术,实时感知城市内的情境需求,从而提供智能化的业务服务组合。最后通过一社区智慧街道管理系统来验证本文所设计的系统效果。  相似文献   

7.
The notion of service level agreements (SLA) has been proposed to capture qualitatively and quantitatively defined performance contracts between service providers and their customers. How to provision satisfiable connections for customers according to their SLA parameters to avoid penalty as well as minimizing cost is one of the main concerns for a service provider. Connection reliability and restoration time are two important SLA parameters for a customer, and should be carefully considered in survivable wavelength-division-multiplexing (WDM) networks. A sound scheme should guarantee customers’ reliability and reduce restoration time while benefiting a service provider in resource efficiency. Under the SLA constraints and the assumption of single link failure, we first investigate a partial link-disjoint protection (PLDP) and analyze its availability and average restoration time. We then propose a dynamic constraint shared path protection (DCSP) algorithm in WDM mesh networks. Based on the basic ideas of the K-shortest path algorithm and PLDP, DCSP can provide differentiated services for customers according to their SLA parameters while being favorable for reducing average restoration time and optimizing resource utilization. Simulation results show that DCSP can efficiently guarantee the specific SLA requirements of customers with a slight increase in the blocking probability while still achieving spare resource sharing and restoration time optimizations.  相似文献   

8.
Battery modeling for energy aware system design   总被引:1,自引:0,他引:1  
Rao  R. Vrudhula  S. Rakhmatov  D.N. 《Computer》2003,36(12):77-87
Advances in battery technology have not kept pace with rapidly growing energy demands. Most laptops, handheld PCs, and cell phones use batteries that take anywhere from 1.5 to 4 hours to fully charge but can run on this charge for only a few hours. The battery has thus become a key control parameter in the energy management of portables. To meet the stringent power budget of these devices, researchers have explored various architectural, hardware, software, and system-level optimizations to minimize the energy consumed per useful computation. Research in battery-aware optimization is now moving from stand-alone devices to networks of wireless devices, specifically, ad hoc and distributed sensor networks. Computationally feasible mathematical models are now available that capture battery discharge characteristics in sufficient detail to let designers develop an optimization strategy that extracts maximum charge.  相似文献   

9.
针对基于信任模型的推荐系统认为所有项目对所有用户具有相同重要性的问题,提出一种基于重要性的信任感知推荐方法.基于项目重要性对所有用户不一样的假设提出了新的信任度量,利用相对于用户的人口统计上下文来测量项目对于用户的重要性,计算活动用户和每个集群的人口统计特征的相似性,将最相似集群中的用户视为候选邻居,根据活动用户的信任...  相似文献   

10.
由于知识的异构性和动态性,在网上查找知识需要花费大量的时间和精力。为了提高效率和准确性,我们提出了面向语义网的上下文知晓模型。在分析上下文、上下文知晓和TAP的概念的基础上,构建了基于TAP的上下文知晓系统的体系结构,重点阐述了上下文知晓模型。  相似文献   

11.
赵中灿  王培康 《计算机应用》2006,26(5):1144-1145
提出了一种基于按需距离矢量路由(Ad-hoc On-Demand Distance Vector routing, AODV)的邻域自意识路由协议(Neighborhood Aware Routing Protocol based on AODV , NA-AODV),它充分考虑并利用了邻居信息,使故障路由具有快速修复的功能。仿真结果表明,NA-AODV较AODV在系统吞吐量和平均端到端延时方面,都有了明显的改善。  相似文献   

12.
基于位置社交网络的服务层出不穷,而地点推荐系统是其最主要的应用之一。目前地点推荐算法均致力于提高用户对地点的兴趣度预测,没有考虑时间因素对推荐结果的影响。事实上人们是否访问某一地点,与其所处的时间是紧密相关的。因此提出了一种概率模型,在统一的框架下将用户的兴趣度、用户所处时间和地点自身的流行度三个因素综合考虑,并在真实的数据集Foursquare上进行了测试。实验表明,与其他的方法相比,本方法能够获得更好的推荐效果,增强了用户体验。  相似文献   

13.
The large scale emergence in the last decade of various cloud solutions, ranging from software-as-a-service (SaaS) based solutions for business process management and implementation to very sophisticated private cloud solutions capable of high performance computing (HPC) and efficient virtualization, constitute the building blocks for engineering the next generation of flexible enterprise systems that can respond with great agility to changes in their environment. These new technologies are adopted at a certain level by manufacturing enterprises in order to advance in a new era of mass customization where flexibility, scalability and agility are the differentiating factors. In this context, this paper introduces the virtualized manufacturing execution system (vMES), an intermediate layer in the manufacturing stack, and discusses the advantages and limitations offered by this approach for manufacturing enterprises. A classification of MES workloads based on the ISA-95 function model is presented, focusing on the virtualization techniques suitable for each workload, considering the algorithms and technologies used and the virtualization overhead. A pilot vMES implementation using a parallel process for smart resource provisioning and automatic scaling is also presented. The pilot implementation using six Adept robots and one IBM CloudBurst 2.1 private cloud and an ISA-95 based MES is described; the virtualization sequence is analyzed in several scenarios of resource workload collocation on physical cloud blades with and without perturbations.  相似文献   

14.
We introduce a capability-based access control model integrated into a linguistic formalism for modeling network aware systems and applications. Our access control model enables specification and dynamic modification of policies for controlling process activities (mobility of code and access to resources). We exploit a combination of static and dynamic checking and of in-lined reference monitoring to guarantee absence of run-time errors due to lack of capabilities. We illustrate the usefulness of our framework by using it for implementing a simplified but realistic scenario. Finally, we show how the model can be easily tailored for dealing with different forms of capability acquisition and loss, thus enabling different possible variations of access control policies.  相似文献   

15.
针对目前基于IPSec的虚拟专用网应用在网络规模较大时配置复杂、难以管理的问题,提出了一种动态星型网对网VPN系统,该系统定叉VPN集中器与子网网关间的消息交换机制以支持子网网关动态加入/退出VPN,引入组的概念提供各子网间的访问控制管理,并进一步介绍了在Linux下实现谊系统的方法。  相似文献   

16.
目标跟踪一直是计算机视觉领域研究的热点和难点,受自然场景中复杂干扰因素影响,现有方法的速度和精度尚待改善。本文首先对基于颜色属性的目标跟踪算法改进,使之更为鲁棒且速度达到实时。接下来,针对被跟踪目标发生遮挡时,采用基于颜色属性的跟踪算法导致错误累积进而产生漂移甚至跟踪失败的问题,引入运算量较大但对遮挡有较强抵抗能力的稀疏协作表观模型。为了同时保证算法的速度和准确性,本文构建了一套基于跟踪结果置信度评量的策略选择机制,将两种算法有机整合。在多个公开数据集下的对比实验显示,与现有跟踪算法相比,本文方法在跟踪效果和速度上具有较显著优势,并在目标存在严重遮挡、光照变化、运动模糊等情况时,均可以取得较好的跟踪效果。  相似文献   

17.
随着科技革新与能源革命的深度融合,国家电网作为世界一流企业,提出了"推进电网向能源互联网转型升级"的口号;电网是由发电、输电、配电、用电等各类品种繁多的挂网设备组成的复杂系统,明晰挂网产品的拓扑网络,提高电网的智能化感知能力,及时消除安全隐患,确保电网健康、稳定运行成为当前最为迫切的任务;在对电网拓扑结构的研究过程中,提出了基于N线的拓扑感知技术,依据电流沿阻抗最小回路传输原理,采用现代微机处理与控制技术;经实验测试实现了针对电力N线的特征电流信号注入、检测和识别,降低了对挂网设备的影响;可以方便、快捷地接入台区变压器及各级分支箱侧,实现挂网设备的智能化拓扑识别,方便故障点的锁定,第一时间切断故障点电能供给,及时维修故障,确保电力正常、高效的供应。  相似文献   

18.
In social environments, humans mostly stay in social interactive groups with their daily activities. A mobile service robot must be aware of not only human individuals but also social interactive groups, and then behave safely and socially (politely and, respectively) in human interactive environments. In this paper, we propose a social reactive control (SRC) that enables a mobile service robot to navigate safely and socially in the human interactive environments. The SRC is derived by incorporating both states of individuals (position, orientation, motion, and human field of view) and social interactive groups (group’s types, group’s centre, group’s radius, and group’s velocity) into the conventional social force model . The SRC can be combined with a conventional path planning technique to generate a socially aware robot navigation system that is capable of controlling mobile service robots to traverse with socially acceptable behaviours. We validate the effectiveness of the proposed social reactive control through a series of real-world experiments.  相似文献   

19.
毛光灿  景旭 《计算机工程与设计》2007,28(17):4122-4123,4314
通过研究基于口令的身份认证系统,设计了基于手机短信平台的一次一用动态口令系统方案.系统由控制中心、用户数据库、口令生成模块、短信模块和应用服务模块等5个部分构成.论述了方案的组成原理、工作流程,分析了系统的安全性.分析表明,方案具有安全性高、适用面广、用户使用方便和实现成本低的特点.  相似文献   

20.
基于气体传感器阵列的动态检测系统   总被引:3,自引:0,他引:3  
描述了一个基于传感器阵列的气体检测系统,其阵列由6只气体传感器组成。系统采用较以往静态加热所不同的动态加热方式,重点介绍了该系统的硬件结构。通过分析系统的气体响应特性实验得出:该系统具有静态测试所不具备的许多优点,如,信号特征多、容易识别等。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号