We prove that the function of normalization in base , which maps any -representation of a real number onto its -development, obtained by a greedy algorithm, is a function computable by a finite automaton over any alphabet if and only if is a Pisot number.Christiane Frougny was supported in part by the PRC Mathématiques et Informatique of the Ministère de la Recherche et de l'Espace. 相似文献
The objective of this paper is to propose an architecture for aCAble TeleVision (CATV) network, capable of supporting two-way transmission. This evolution is necessary for the survival of the CATV industry in an era of deregulation and of the development of the B-ISDN by the telecommunications companies. A communication transactional service is then considered and performance analysis is done under realistic assumptions. 相似文献
The main problem of interval computations is as follows:given sets of possible valuesXi for variablesxi, and an algorithmf:Rn→ R, to.estimate the rangef(X1, ..,Xn) of the possible values off(x1, ...,xn). In many real-life, situations setsXi are not intervals. To handle such problems, it is desirable to add set data type and operations with sets to a programming language. it is well known that the entire mathematics can be formulated in terms of sets. So, if we already have a set as a data type, why have anything else. The main reason, is that expression in terms of sets is often clumsy. To avoid this clumsiness, it has been suggested to use not only sets, but alsobags (multisets), in which an element can have multiple occurrences. Bags are used in many areas of Computer Science, and recently, several languages have appeared that use the bag as a basic data type. In this paper, we explain the main ideas behind bag languages, and we also show:
· that bag languages are naturally parallelizable, thus leading to a parallelization of the coresponding generalized interval computations;
· and that bag languages can be also helpfully applied to traditional interval computations (where setsXi are intervals).
Due to the increase and complexity of computer systems, reducing the overhead of fault tolerance techniques has become important in recent years. One technique in fault tolerance is checkpointing, which saves a snapshot with the information that has been computed up to a specific moment, suspending the execution of the application, consuming I/O resources and network bandwidth. Characterizing the files that are generated when performing the checkpoint of a parallel application is useful to determine the resources consumed and their impact on the I/O system. It is also important to characterize the application that performs checkpoints, and one of these characteristics is whether the application does I/O. In this paper, we present a model of checkpoint behavior for parallel applications that performs I/O; this depends on the application and on other factors such as the number of processes, the mapping of processes and the type of I/O used. These characteristics will also influence scalability, the resources consumed and their impact on the IO system. Our model describes the behavior of the checkpoint size based on the characteristics of the system and the type (or model) of I/O used, such as the number I/O aggregator processes, the buffering size utilized by the two-phase I/O optimization technique and components of collective file I/O operations. The BT benchmark and FLASH I/O are analyzed under different configurations of aggregator processes and buffer size to explain our approach. The model can be useful when selecting what type of checkpoint configuration is more appropriate according to the applications’ characteristics and resources available. Thus, the user will be able to know how much storage space the checkpoint consumes and how much the application consumes, in order to establish policies that help improve the distribution of resources.
Ribonucleic acids (RNAs) possess great therapeutic potential and can be used to treat a variety of diseases. The unique biophysical properties of RNAs, such as high molecular weight, negative charge, hydrophilicity, low stability, and potential immunogenicity, require chemical modification and development of carriers to enable intracellular delivery of RNAs for clinical use. A variety of nanomaterials have been developed for the effective in vivo delivery of short/ small RNAs, messenger RNAs, and RNAs required for gene editing technologies including clustered regularly interspaced palindromic repeat (CRISPR)/Cas. This review outlines the challenges of delivering RNA therapeutics, explores the chemical synthesis of RNA modifications and carriers, and describes the efforts to design nanomaterials that can be used for a variety of clinical indications. 相似文献
The Body-Centered Cubic (BCC) and Face-Centered Cubic (FCC) lattices have been analytically shown to be more efficient sampling lattices than the traditional Cartesian Cubic (CC) lattice, but there has been no estimate of their visual comparability. Two perceptual studies (each with N = 12 participants) compared the visual quality of images rendered from BCC and FCC lattices to images rendered from the CC lattice. Images were generated from two signals: the commonly used Marschner-Lobb synthetic function and a computed tomography scan of a fish tail. Observers found that BCC and FCC could produce images of comparable visual quality to CC, using 30-35 percent fewer samples. For the images used in our studies, the L(2) error metric shows high correlation with the judgement of human observers. Using the L(2) metric as a proxy, the results of the experiments appear to extend across a wide range of images and parameter choices. 相似文献
Many times, even if a crowd simulation looks good in general, there could be some specific individual behaviors which do not seem correct. Spotting such problems manually can become tedious, but ignoring them may harm the simulation's credibility. In this paper we present a data‐driven approach for evaluating the behaviors of individuals within a simulated crowd. Based on video‐footage of a real crowd, a database of behavior examples is generated. Given a simulation of a crowd, an analog analysis is performed on it, defining a set of queries, which are matched by a similarity function to the database examples. The results offer a possible objective answer to the question of how similar are the simulated individual behaviors to real observed behaviors. Moreover, by changing the video input one can change the context of evaluation. We show several examples of evaluating simulated crowds produced using different techniques and comprising of dense crowds, sparse crowds and flocks. 相似文献
We consider the on-line version of the maximum vertex disjoint path problem when the underlying network is a tree. In this
problem, a sequence of requests arrives in an on-line fashion, where every request is a path in the tree. The on-line algorithm
may accept a request only if it does not share a vertex with a previously accepted request. The goal is to maximize the number
of accepted requests. It is known that no on-line algorithm can have a competitive ratio better than Ω(log n) for this problem, even if the algorithm is randomized and the tree is simply a line. Obviously, it is desirable to beat
the logarithmic lower bound. Adler and Azar (Proc. of the 10th ACM-SIAM Symposium on Discrete Algorithm, pp. 1–10, 1999) showed that if preemption is allowed (namely, previously accepted requests may be discarded, but once a request is discarded
it can no longer be accepted), then there is a randomized on-line algorithm that achieves constant competitive ratio on the
line. In the current work we present a randomized on-line algorithm with preemption that has constant competitive ratio on
any tree. Our results carry over to the related problem of maximizing the number of accepted paths subject to a capacity constraint
on vertices (in the disjoint path problem this capacity is 1). Moreover, if the available capacity is at least 4, randomization
is not needed and our on-line algorithm becomes deterministic. 相似文献
Instructors in higher education are disseminating instructional content via podcasting, as many rally behind the technology’s potential benefits. Others have expressed concern about the risks of deleterious effects that might accompany the adoption of podcasting, such as lower class attendance. Yet, relatively few studies have investigated students’ perceptions of podcasting for educational purposes, especially in relation to different podcasting forms: repetitive and supplemental. The present study explored students’ readiness and attitudes towards these two forms of podcasting to provide fundamental information for future researchers and educators. The results indicated that students may not be as ready or eager to use podcasting for repetitive or supplemental educational purposes as much as we think they are, but they could be persuaded. 相似文献
Modern large-scale grid computing systems for processing advanced science and engineering applications rely on geographically
distributed clusters. In such highly distributed environments, estimating the available bandwidth between clusters is a key
issue for efficient task scheduling. We analyze the performance of two well known available bandwidth estimation tools, pathload and abget, with the aim of using them in grid environments. Differently than previous investigations (Jain et al., ; Shriram et al., in Passive and active network measurement: 6th international workshop, PAM 2005. Springer, Berlin, 2005), our experiments consider a series of relevant metrics such as accuracy of the estimation, convergence time, degree of intrusion
in the grid links, and ability to handle multiple simultaneous estimations. No previous work has analyzed the use of available
bandwidth tools for the derivation of efficient grid scheduling. 相似文献