The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] ACH(1072hit)

721-740hit(1072hit)

  • DCLUE: A Distributed Cluster Emulator

    Krishna KANT  Amit SAHOO  Nrupal JANI  

     
    PAPER-Parallel/Distributed Programming Models, Paradigms and Tools

      Vol:
    E89-D No:2
      Page(s):
    433-440

    Given the availability of high-speed Ethernet and HW based protocol offload, clustered systems using a commodity network fabric (e.g., TCP/IP over Ethernet) are expected to become more attractive for a range of e-business and data center applications. In this paper, we describe a comprehensive simulation to study the performance of clustered database systems using such a fabric. The simulation model currently supports both TCP and SCTP as the transport protocol and models an Oracle 9i like clustered DBMS running a TPC-C like workload. The model can be used to study a wide variety of issues regarding the performance of clustered DBMS systems including the impact of enhancements to network layers (transport, IP, MAC), QoS mechanisms or latency improvements, and cluster-wide power control issues.

  • Geometrical Properties of Lifting-Up in the Nu Support Vector Machines

    Kazushi IKEDA  

     
    PAPER-Biocybernetics, Neurocomputing

      Vol:
    E89-D No:2
      Page(s):
    847-852

    Geometrical properties of the lifting-up technique in support vector machines (SVMs) are discussed here. In many applications, an SVM finds the optimal inhomogeneous separating hyperplane in terms of margins while some of the theoretical analyses on SVMs have treated only homogeneous hyperplanes for simplicity. Although they seem equivalent due to the so-called lifting-up technique, they differ in fact and the solution of the homogeneous SVM with lifting-up strongly depends on the parameter of lifting-up. It is also shown that the solution approaches that of the inhomogeneous SVM in the asymptotic case that the parameter goes to infinity.

  • A Top-Down Approach to Quality Driven Architectural Engineering of Software Systems

    Kwanwoo LEE  

     
    PAPER-Software Engineering

      Vol:
    E88-D No:12
      Page(s):
    2757-2766

    Designing a software architecture that satisfies multiple quality requirements is a difficult undertaking. This is mainly due to the fact that architects must be able to explore a broad range of architectural choices and analyze tradeoffs among them in light of multiple quality requirements. As the size and complexity of the system increase, architectural design space to be explored and analyzed becomes more complex. In order to systematically manage the complexity, this paper proposes a method that guides architects to explore and analyze architectural decisions in a top-down manner. In the method, architectural decisions that have global impacts on given quality requirements are first explored and analyzed and those that have local impacts are then taken into account in the context of the decisions made in the previous step. This approach can cope with the complexity of large-scale architectural design systematically, as architectural decisions are analyzed and made following the abstraction hierarchy of quality requirements. To illustrate the concepts and applicability of the proposed method, we have applied this method to the architectural design of the computer used for the continuous casting process by an iron and steel manufacturer.

  • CIGMA: Active Inventory Service in Global E-Market Based on Efficient Catalog Management

    Su Myeon KIM  Seungwoo KANG  Heung-Kyu LEE  Junehwa SONG  

     
    PAPER

      Vol:
    E88-D No:12
      Page(s):
    2651-2663

    A fully Internet-connected business environment is subject to frequent changes. To ordinary customers, online shopping under such a dynamic environment can be frustrating. We propose a new E-commerce service called the CIGMA to assist online customers under such an environment. The CIGMA provides catalog comparison and purchase mediation services over multiple shopping sites for ordinary online customers. The service is based on up-to-date information by reflecting the frequent changes in catalog information instantaneously. It also matches the desire of online customers for fast response. This paper describes the CIGMA along with its architecture and the implementation of a working prototype.

  • Web-Cached Multicast for On-Demand Video Distribution

    BackHyun KIM  Iksoo KIM  

     
    PAPER-Multicast

      Vol:
    E88-B No:12
      Page(s):
    4435-4441

    In this paper, we propose multicast technique in order to reduce the required network bandwidth by n times, by merging the adjacent multicasts depending on the number of HENs (Head-End-Nodes) n that request the same video. Allowing new clients to immediately join an existing multicast through patching improves the efficiency of the multicast and offers services without any initial latency. A client might have to download data through two channels simultaneously, one for multicast and the other for patching. Each video stream is divided into blocks which are the same size of multicast grouping interval Im. Blocks then are evenly distributed into different HENs according to their popularity and the order of requests. Only when the playback time exceeds the amount of cached video data, server generates new multicast channel. Since the interval of multicast can be dynamically expanded according to the popularity of videos, it can be reduced the server's workload and the network bandwidth. We adopt the cache replacement strategy as LFU (Least-Frequently-Used) for popular videos, LRU (Least-Recently-Used) for unpopular videos, and the method for replacing the first block of video last to reduce end-to-end latency. We perform simulations to compare its performance with that of conventional multicast. From simulation results, we confirm that the proposed multicast technique offers substantially better performance.

  • Bayesian Approach to Optimal Release Policy of Software System

    HeeSoo KIM  Shigeru YAMADA  DongHo PARK  

     
    PAPER-Reliability, Maintainability and Safety Analysis

      Vol:
    E88-A No:12
      Page(s):
    3618-3626

    In this paper, we propose a new software reliability growth model which is the mixture of two exponential reliability growth models, one of which has the reliability growth and the other one does not have the reliability growth after the software is released upon completion of testing phase. The mixture of two such models is characterized by a weighted factor p, which is the proportion of reliability growth part within the model. Firstly, this paper discusses an optimal software release problem with regard to the expected total software cost incurred during the warranty period under the proposed software reliability growth model, which generalizes Kimura, Toyota and Yamada's (1999) model with consideration of the weighted factor. The second main purpose of this paper is to apply the Bayesian approach to the optimal software release policy by assuming the prior distributions for the unknown parameters contained in the proposed software reliability growth model. Some numerical examples are presented for the purpose of comparing the optimal software release policies depending on the choice of parameters by the non-Bayesian and Bayesian methods.

  • Adaptive Mode Control for Low-Power Caches Based on Way-Prediction Accuracy

    Hidekazu TANAKA  Koji INOUE  

     
    PAPER-Low Power Methodology

      Vol:
    E88-A No:12
      Page(s):
    3274-3281

    This paper proposes a novel cache architecture for low power consumption, called "Adaptive Way-Predicting Cache (AWP cache)." The AWP cache has multi-operation modes and dynamically adapts the operation mode based on the accuracy of way-prediction results. A confidence counter for way prediction is implemented to each cache set. In order to analyze the effectiveness of the AWP cache, we perform a SRAM design using 0.18 µm CMOS technology and cycle-accurate processor simulations. As the results, for a benchmark program (179.art), it is observed that a performance-aware AWP cache reduces the 49% of performance overhead caused by an original way-predicting cache to 17%. Furthermore, a energy-aware AWP cache achieves 73% of energy reduction, whereas that obtained from the original way-predicting scheme is only 38%, compared to an non-optimized conventional cache. For the consideration of energy-performance efficiency, we see that the energy-aware AWP cache produces better results; the energy-delay product of conventional organization is reduced to only 35% in average which is 6% better than the original way-predicting scheme.

  • Multiuser Detection for MC-CDMA System Using an RQP Approach

    Xianmin WANG  Zhiwei MAO  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E88-B No:11
      Page(s):
    4394-4397

    A recursive quadratic programming (RQP) approach is proposed for multiuser detection in multicarrier code-division multiple-access (MC-CDMA) systems. In this approach, the combinatorial problem associated with the optimal maximum likelihood (ML) detection is relaxed to a quadratic programming (QP) problem first and then a recursive approach is developed to improve the detection performance. Computer simulations are presented which demonstrate that the detector developed based on the proposed approach offers close-to-optimal symbol-error rate (SER) performance which outperforms several existing suboptimal detectors.

  • Symbolic Reachability Analysis of Probabilistic Linear Hybrid Automata

    Yosuke MUTSUDA  Takaaki KATO  Satoshi YAMANE  

     
    PAPER

      Vol:
    E88-A No:11
      Page(s):
    2972-2981

    We can model embedded systems as hybrid systems. Moreover, they are distributed and real-time systems. Therefore, it is important to specify and verify randomness and soft real-time properties. For the purpose of system verification, we formally define probabilistic linear hybrid automaton and its symbolic reachability analysis method. It can describe uncertainties and soft real-time characteristics.

  • Minimizing the Directory Size for Large-Scale Shared-Memory Multiprocessors

    Jinseok KONG  Pen-Chung YEW  Gyungho LEE  

     
    PAPER-Computer Systems

      Vol:
    E88-D No:11
      Page(s):
    2533-2543

    Directory-based cache coherence schemes are commonly used in large-scale shared-memory multiprocessors, but most of them rely on heuristics to avoid large hardware requirements. We proposed using physical address mapping on directories to significantly reduce directory size needed. This approach allows the size of directory to grow as O(cn log2 n) as in optimal pointer-based directory schemes [11], where n is the number of nodes in the system and c is the number of cache lines in each cache memory. Performance aspects of the proposed scheme are studied in detail using simulation.

  • A Survey of Object-Oriented Petri Nets and Analysis Methods

    Toshiyuki MIYAMOTO  Sadatoshi KUMAGAI  

     
    INVITED PAPER

      Vol:
    E88-A No:11
      Page(s):
    2964-2971

    Petri nets are a well-known graphical and modeling tool for concurrent and distributed systems, and there have been many results on the theory, and also on practical applications. In the last decade, various Object-Oriented Petri nets (OO-nets) are proposed. As object orientation was adopted for programming languages, extension to OO-nets inspired from object-oriented programming is a natural flow. This article presents state-of-the-art on OO-nets.

  • A Challenge to Bernstein's Degrees-of-Freedom Problem in Both Cases of Human and Robotic Multi-Joint Movements

    Suguru ARIMOTO  Masahiro SEKIMOTO  Ryuta OZAWA  

     
    INVITED PAPER

      Vol:
    E88-A No:10
      Page(s):
    2484-2495

    This paper aims at challenging Bernstein's problem called the "Degrees-of-Freedom problem," which remains unsolved from both the physiological and robotics viewpoints. More than a half century ago A.N. Bernstein observed that "dexterity" residing in human limb motion emerges from accumulated involvement of multi-joint movements in surplus DOF. It is also said in robotics that redundancy of DOFs in robot mechanisms may contribute to enhancement of dexterity and versatility. However, kinematic redundancy incurs a problem of ill-posedness of inverse kinematics from task-description space to joint space. In the history of robotics research such ill-posedness problem of inverse-kinematics has not yet been attacked directly but circumvented by introducing an artificial performance index and determining uniquely an inverse kinematics solution by minimizing it. Instead of it, this paper introduces two novel concepts named "stability on a manifold" and "transferability to a submanifold" in treating the case of human multi-joint movements of reaching and shows that a sensory feedback from task space to joint space together with a set of adequate dampings enables any solution to the overall closed-loop dynamics to converge naturally and coordinately to a lower-dimensional manifold describing a set of joint states fulfilling a given motion task. This means that, without considering any type of inverse kinematics, the reaching task can be accomplished by a sensory feedback with adequate choice of a stiffness parameter and damping coefficients. It is also shown that these novel concepts can cope with annoying characteristics called "variability" of redundant joint motions seen typically in human skilled reaching. Finally, it is pointed out that the proposed control signals can be generated in a feedforward manner in case of human limb movements by referring to mechano-chemical characteristics of activation of muscles. Based on this observation, generation of human skilled movements of reaching can be interpreted in terms of the proposed "Virtual-Spring" hypothesis instead of the traditional "Equilibrium-Point" hypothesis.

  • Uplink Performance of WCDMA with Mixed Traffics of Voice/WWW over DCH/CPCH

    Seokjoo SHIN  Kyounghwan LEE  Yeomin YOON  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E88-B No:10
      Page(s):
    4102-4106

    The uplink performance of WCDMA with voice and World Wide Web (WWW) traffic over Dedicated Channel (DCH)/Common Packet Channel (CPCH) is investigated. The probability of voice packet dropping and average data packet delay are obtained by system level simulation. The system level simulation is conducted based on received Signal-to-Interference Ratio (SIR) with imperfect power control. In addition, we show that the performance of CPCH in terms of probability of data packet dropping is superior to that of DCH for transmitting WWW traffic. Furthermore, we obtain the supportable number of voice users when the target probability of voice packet dropping is set to be 10-2. The supportable number of data users is also found around knee area of average data packet delay.

  • Composite Support Vector Machines with Extended Discriminative Features for Accurate Face Detection

    Tae-Kyun KIM  Josef KITTLER  

     
    PAPER-Image Recognition, Computer Vision

      Vol:
    E88-D No:10
      Page(s):
    2373-2379

    This paper describes a pattern classifier for detecting frontal-view faces via learning a decision boundary. The proposed classifier consists of two major parts for improving classification accuracy: the implicit modeling of both the face and the near-face classes resulting in an extended discriminative feature set, and the subsequent composite Support Vector Machines (SVMs) for speeding up the classification. For the extended discriminative feature set, Principal Component Analysis (PCA) or Independent Component Analysis (ICA) is performed for the face and near-face classes separately. The projections and distances to the two different subspaces are complementary, which significantly enhances classification accuracy of SVM. Multiple nonlinear SVMs are trained for the local facial feature spaces considering the general multi-modal characteristic of the face space. Each component SVM has a simpler boundary than that of a single SVM for the whole face space. The most appropriate component SVM is selected by a gating mechanism based on clustering. The classification by utilizing one of the multiple SVMs guarantees good generalization performance and speeds up face detection. The proposed classifier is finally implemented to work in real-time by cascading a boosting based face detector.

  • Properties of Role-Based Access Control in a Teaching Management System

    Kazushi TANIHIRA  Hiromi KOBAYASHI  

     
    LETTER-Educational Technology

      Vol:
    E88-D No:10
      Page(s):
    2417-2421

    This paper presents properties of role-based access control which were obtained through a development of a prototype of a teaching management system. These properties are related to assignment of temporal constraints and access control procedure in terms of the corresponding flow of user's view and considered to be suitable to other information systems.

  • Load Balancing Routing Algorithm for Reverse Proxy Servers

    Satosi KATO  Hidetosi OKAMOTO  Toyofumi TAKENAKA  

     
    PAPER-Internet

      Vol:
    E88-B No:9
      Page(s):
    3693-3700

    We propose a novel routing algorithm for reverse proxy servers, called load balancing content address hashing (LB-CAH), and evaluate the performance of the proposed routing algorithm compared with that of the content address hashing (CAH) and the hash and slide (HAS) routing algorithms. The proposed LB-CAH routing algorithm calculates the popularity of pages in the load balancer using an LFU caching technique and periodically makes a popularity list. Using this popularity list, the proposed routing algorithm selects a reverse proxy server as follows. When the requested page appears in the popularity list, the request is routed according to the round robin method; otherwise, it is routed according to the content address hashing method. We evaluate and compare the LB-CAH, CAH and HAS routing algorithms by simulation experiments from the viewpoints of load balancing, consumed cache space and cache hit rate. Simulation experiments show that the proposed LB-CAH routing algorithm achieves almost the same degree of load balancing as the HAS algorithm and the same cache hit rate as the CAH algorithm for reverse proxy servers in various web site environments.

  • Petri Nets with Simple Circuits

    Hsu-Chun YEN  Lien-Po YU  

     
    PAPER-Fundamentals of Software and Theory of Programs

      Vol:
    E88-D No:9
      Page(s):
    2113-2125

    We study the complexity of the reachability problem for a new subclass of Petri nets called simple-circuit Petri nets, which properly contains several well known subclasses such as conflict-free, BPP, normal Petri nets and more. A new decomposition approach is applied to developing an integer linear programming formulation for characterizing the reachability sets of such Petri nets. Consequently, the reachability problem is shown to be NP-complete. The model checking problem for some temporal logics is also investigated for simple-circuit Petri nets.

  • An Iterative MPEG Super-Resolution with an Outer Approximation of Framewise Quantization Constraint

    Hiroshi HASEGAWA  Toshiyuki ONO  Isao YAMADA  Kohichi SAKANIWA  

     
    PAPER-Image

      Vol:
    E88-A No:9
      Page(s):
    2427-2435

    In this paper, we present a novel iterative MPEG super-resolution method based on an embedded constraint version of Adaptive projected subgradient method [Yamada & Ogura 2003]. We propose an efficient operator that approximates convex projection onto a set characterizing framewise quantization, whereas a conventional method can only handle a convex projection defined for each DCT coefficient of a frame. By using the operator, the proposed method generates a sequence that efficiently approaches to a solution of super-resolution problem defined in terms of quantization error of MPEG compression.

  • A Cache Optimized Multidimensional Index in Disk-Based Environments

    Myungsun PARK  Sukho LEE  

     
    PAPER-Database

      Vol:
    E88-D No:8
      Page(s):
    1932-1939

    R-trees have been traditionally optimized for I/O performance with disk pages as tree nodes. Recently, researchers have proposed cache-conscious variations of R-trees optimized for CPU cache performance in main memory environments, where the node size is several cache lines wide and more entries are packed in a node by compressing MBR keys. However, because there is a big difference between the node sizes of two types of R-trees, disk-optimized R-trees show poor cache performance while cache-optimized R-trees exhibit poor disk performance. In this paper, we propose a cache and disk optimized R-tree, called PR-tree (Prefetching R-tree). For cache performance, the node size of the PR-tree is wider than a cache line, and the prefetch instruction is used to reduce the number of cache misses. For I/O performance, the nodes of the PR-tree are fitted into one disk page. We represent the detailed analysis of cache misses for range queries, and enumerate all the reasonable in-page leaf and nonleaf node sizes, and heights of in-page trees to figure out tree parameters for the best cache and I/O performance. The PR-tree that we propose achieves better cache performance than the disk-optimized R-tree: a factor of 3.5-15.1 improvement for one-by-one insertions, 6.5-15.1 improvement for deletions, 1.3-1.9 improvement for range queries, and 2.7-9.7 improvement for k-nearest neighbor queries. All experimental results do not show notable declines of I/O performance.

  • Analysis of Crosstalk between Finite-Length Multiconductor Transmission Lines on a PCB by Using Circuit-Concept Approach

    Sang Wook PARK  Jae Cheol JU  Dong Chul PARK  

     
    PAPER-Printed Circuit Boards

      Vol:
    E88-B No:8
      Page(s):
    3189-3194

    In this paper, crosstalk between multiconductor transmission lines of finite length in arbitrary directions on a printed circuit board is studied by using a circuit-concept approach. The circuit-concept approach of (2+1) finite-length lines is expanded for the crosstalk calculation of (n+1) lines where n>2.2n-port network expression is derived from the modified telegrapher equations. The effect of via currents flowing through the vertical short line sections at the line terminals is also investigated. Due to this expansion the derived equations for (n+1) lines are expected to be easily applied for crosstalk analysis of a variety of complex structures such as via fences and guard traces, etc.

721-740hit(1072hit)