欢迎访问行业研究报告数据库

行业分类

重点报告推荐

当前位置: 首页 > 行业报告

找到报告 5731 篇 当前为第 357 页 共 574

报告分类:外文技术报告

  • 3561.许普诺斯:低调的功率比例HPC框架

    [信息传输、软件和信息技术服务业] [2014-07-08]

    The proliferation of large High-Performance Computingclusters executing computation-intensive jobs on largedata sets has made cluster power proportionality very important [13]. Despite publicly available traces showing that many clusters have a low average utilization,existing power-proportionality techniques have seen low adoption, a major reason being that these techniques require modifications to the existing cluster software and network stack, and do not address the reliability concerns that may arise during the course of server powercycling.We present Hypnos, a defensive power proportionality system which is unobtrusive, extensible and gracefully handles possible server software and hardware failures which may occur during server power-cycling. We deployed Hypnos on a 57-server production cluster. From a 21-day run, we obtained a 36% energy saving in spite of multiple server and network failures.
    关键词:HPC框架;数据集;网络堆栈,;服务器软件
  • 3562.交互设计无功系统定时分析

    [信息传输、软件和信息技术服务业] [2014-07-08]

    Reactive systems are increasingly developed using high-level modeling tools. Such modeling tools may facilitate formal reasoning about concurrent programs, but provide little help when timing-related problems arise and deadlines are missed when running a real system.In these cases, the modeler has typically no information about timing properties and costly parts of the model; there is little or no guidance on how to improve the timing characteristics of the model. In this paper,we propose a design methodology where interactive timing analysis is an integral part of the modeling process. This methodology concerns how to aggregate timing values in a user-friendly manner and how to de netiming analysis requests. We also introduce and formalize a new timing analysis interface that is designed for communicating timing information between a high-level modeling tool and a lower-level timing analysis tool.
    关键词:交互设计;定时分析;反应系统;建模工具;时机分析
  • 3563.移动环境的应用评估

    [信息传输、软件和信息技术服务业] [2014-07-08]

    For many research problems, controlling and estimating the position of the mobile elementswithin an environment is desired. Realistic mobile environments are unstructured, but sharea set of common features, such as position, speed, and constraints on mobility. To estimate within these real-world environments requires careful selection of the best-suited estimation tools and software and hardware technologies. This dissertation discusses the design and implementation of applied estimation infrastructures which overcome the challenges of realworld deployments.
    关键词:移动环境;位置移动元素;应用评估基础设施;非结构化
  • 3564.结合实时数据测量和建筑能源模型来提高能源效率的软件方法

    [信息传输、软件和信息技术服务业] [2014-07-08]

    In this paper, we introduce an innovative software approach for building energyefficiency analysis. It takes real-time data from meters and sensors in the building, analyzes energy usage, and helps building managers to save energy.Buildings consume 40% of the $370 Billion annual energy cost in U.S., and 30% of energy consumption is wasted. Existing building control systems waste energy because of old HVAC(Heating, Ventilation and Air Conditioning) equipment, lack of maintenance, over-cooling, overventilation and other reasons. More and more sensor nodes are deployed in the building forenergy monitoring, but the large amounts of data generated are not fully utilized. On the other hand, building scientists use energy models to do energy efficiency analysis, but the models theyuse are not accurate and it takes a long time to develop a full model.
    关键词:数据测量;建筑能源模型;建筑控制系统;能源能效分析模型
  • 3565.规范矿业:新形式、算法和应用程序

    [信息传输、软件和信息技术服务业,采矿业] [2014-07-08]

    Speci cation is the rst and arguably the most important step for formal veri cation and correct-by-construction synthesis. These tasks require understanding precisely a design's intended behavior, and thus are only e ective if the speci cation is created right. For example,much of the challenge in bug nding lies in nding the speci cation that mechanized tools can use to nd bugs. It is extremely dicult to manually create a complete suite of goodquality formal speci cations, especially given the enormous scale and complexity of designs today. Many real-world experiences indicate that poor or the lack of sucient speci cations can easily lead to misses of critical bugs, and in turn design re-spins and time-to-market slips.
    关键词:矿业;应用程序;机械化工具
  • 3566.用于可打印、模块化和健壮的感应皮肤的最小架构

    [信息传输、软件和信息技术服务业] [2014-07-08]

    The ability to sense and react to the environment is whatseparates robotic systems from simple machines. Surfaceinteraction sensing is a vital component for robots to adapt tounstructured human and natural environments [1]. However,there is not yet to see a convenient method for covering curved and complex surfaces common to today’s research robots in tactile sensors. The problem of gathering this information from transducers distributed on the surface of a robot is key to a viable sensing solution.
    关键词:触觉传感器;低成本印刷;非结构化环境;原型系统
  • 3567.SCADA系统的弹性控制和入侵检测

    [信息传输、软件和信息技术服务业] [2014-07-08]

    Supervisory Control and Data Acquisition (SCADA) systems are deeply ingrained in the fabric of critical infrastructure sectors. These computerized real-time process control systems, over geographically dispersed continuous distribution operations, are increasingly subject to serious damage and disruption by cyber means due to their standardization and connectivity to other networks.However, SCADA systems generally have little protection from the escalating cyber threats. To achieve defense-in-depth for SCADA systems by means of intrusion detection and resilient control,this dissertation strives for a robust stochastic signal and system approach without being overly-pessimistic. Its main elements are (1) two SCADA-specific comprehensive taxonomies with one on cyber attacks and the other on intrusion detection system to layout the lay of the land and shed light to the workspace, (2) one overall framework/architecture for intrusion detection and resilient control – Xware (3) its measurement fusion assurance component – Trust counter, (4) one signal-based early-detection and resilient estimation scheme with proved theoretical performance bounds, for SCADA systems in general. Especially the said Robust General Likelihood Ratio Test (RGLRT) is generic enough and has been applied to linear dynamical systems in general and beyond.(5) The application of RGLRT in network traffic anomaly detection. (6) The application of RGLRT to anomaly detection for SCADA systems in smart grids through model construction and identification for both clean renewable energy supply and variable consumer demand.
    关键词:弹性控制;入侵检测;数据采集;深度防护
  • 3568.异步电路的超低能量计算

    [信息传输、软件和信息技术服务业] [2014-07-08]

    关键词:异步电路;计算 体系结构;最优时机策略;应用程序
  • 3569.手掌大小的爬行机器人触觉传感器

    [信息传输、软件和信息技术服务业] [2014-07-08]

    Legged millirobots, like the biological organisms that they mimic, can readily adapt to a va-riety of complex environments. These robots can operate in rough terrain, con ned spaces,and in the presence of obstacles such as foliage. This versatility makes legged millirobotsan ideal solution to tasks requiring high maneuverability in dicult and uncertain environments. Examples might include searching through wreckage in the aftermath of naturaldisasters, or performing inspection and maintenance tasks within the interiors of buildingsand other structures. Ideally, many of these tasks would be completed either autonomouslyor semi-autonomously, allowing human operators to focus on higher-level organization andcontrol. In order to operate e ectively without constant human guidance, legged millirobotsmust be equipped with adequate sensing capabilities to characterize and respond to their surroundings.
    关键词:触觉传感器;爬行机器人;传感功能
  • 3570.应用网络物理安全的三阶段ColonelBlotto游戏

    [信息传输、软件和信息技术服务业] [2014-07-08]

    We consider a three-step three-player complete information Colonel Blotto game in this paper, in which the rst two players ght against a common adversary. Each player is endowed with certain amount of resources at the beginning of the game, and the number of battle elds on which a player and the adversary ghts is speci ed. The rst two players are allowed to form a coalition if it improves their payo s. In the rst stage, the rst two players may add battle elds and incur costs. In the second stage, the rst two players may transfer resources among each other. The adversary observes this transfer, and decides on the allocation of its resources to the two battles with the players.at the third step, the adversary and the other two players ght on the updated number of battle elds and receive payo s. We characterize the subgame-perfect Nash equilibrium (SPNE) of the game in various parameter regions. In particular, we show that there are certain parameter regions in which if the players act according to the SPNE strategies, then (i) one of the rst two players add battle elds and transfer resources to the other player (a coalition is formed), (ii) there is no addition of battle elds and no transfer of resources (no coalition is formed). We discuss the implications of the results on resource allocation for securing cyber physical systems.
    关键词:网络物理安全;资源配置;游戏;应用程序
首页  上一页  ...  352  353  354  355  356  357  358  359  360  361  ...  下一页  尾页  
© 2016 武汉世讯达文化传播有限责任公司 版权所有 技术支持:武汉中网维优
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服