欢迎访问行业研究报告数据库

行业分类

重点报告推荐

当前位置: 首页 > 行业报告

找到报告 5731 篇 当前为第 502 页 共 574

报告分类:外文技术报告

  • 5011.数字出版艺术:支撑出版业未来的一种组合标准的基础

    [信息传输、软件和信息技术服务业,印刷和记录媒介复制业] [2013-12-18]

    Scienti c content increasingly relies on the presentation and authoring of complex multimedia diagrams and gures, sometimes interactive, to convey information in a non-textual way. Wikis and user-generated hyper-linked content have both been very successful in the case for text|this is what we aim to do for mathematical diagrams. Many professors in higher education who write textbooks know TeX, however, they don't often know how to program the Web. The future of building interactive user interfaces should lie not in the hands of programmers, but in the hands of the expert of a given eld|the goal of this project is to supply math, physics, and engineering professors with a platform to express mathematical concepts to students to provide immersive learning environments.
    关键词:数字出版;编程;交互式用户界面
  • 5012.基于OBDDs的Submatch快速获取

    [信息传输、软件和信息技术服务业] [2013-12-18]

    Network-based intrusion detection systems (NIDS) commonly use pattern languages to identify packets of interest. Similarly, security information and event management (SIEM) systems rely on pattern languages for real-time analysis of security alerts and event logs. Both NIDS and SIEM systems use pattern languages extended from regular expressions. One such extension, the submatch construct, allows the extraction of substrings from a string matching a pattern. Existing solutions for submatch extraction are based on non-deterministic finite automata (NFAs) or recursive backtracking. NFA-based algorithms are time-inefficient. Recursive backtracking algorithms perform poorly on pathological inputs generated by algorithmic complexity attacks. We propose a new approach for submatch extraction that uses ordered binary decision diagrams (OBDDs) to represent and operate pattern matching. Our evaluation using patterns from the Snort HTTP rule set and a commercial SIEM system shows that our approach achieves its ideal performance when patterns are combined. In the best case, our approach is faster than RE2 and PCRE by one to two orders of magnitude.
    关键词:正则表达式;模式匹配;submatch;标记的NFA;有序二元决策图(OBDD)
  • 5013.通过局部优化冷却资源提高数据中心的效率

    [信息传输、软件和信息技术服务业] [2013-12-18]

    Data centers are large computing facilities that can house tens of thousands of computer servers, storage and networking devices. They can consume megawatts of power and, as a result, reject megawatts of heat. For more than a decade, researchers have been investigating methods to improve the efficiency by which these facilities are cooled. One of the key challenges to maintain highly efficient cooling is to provide on demand cooling resources to each server rack, which may vary with time and rack location within the larger data center. In common practice today, chilled water or refrigerant cooled computer room air conditioning (CRAC) units are used to reject the waste heatoutside the data center, and they also work together with the fans in the IT equipment to circulate air within the data center for heat transport. In a raised floor data center, the cool air exiting the multiple CRAC units enters the underfloor plenum before it is distributed through the vent tiles in the cold aisles to the IT equipment. The vent tiles usually have fixed openings and are not adapted to accommodate the flow demand that can vary from cold aisle to cold aisle or rack to rack. In this configuration, CRAC units have the extra responsibilities of cooling resources distribution as well as provisioning.
    关键词:数据中心;CRAC;冷却效率
  • 5014.建立基于知识IE系统的俄语提取模板的方法学

    [信息传输、软件和信息技术服务业] [2013-12-18]

    In this technical report we describe methodology for building information extraction (IE) rules. Rules are usually developed by experts and are widely used in knowledge-based IE systems. They consist of two parts: the left-hand side (LHS) of a rule is a template that matches a certain syntactico-semantic structure (SSS) and the right-hand side is an action that is executed when LHS template is matched against a particular text fragment. In the report we describe the process of building a more complex LHS part (template). This methodology was used for developing the information extraction system that extracts business events from news articles written in Russian language.
    关键词:信息提取规则;事件抽取;词典;规则;模式;意义文本模式;乔姆斯基语法
  • 5015.固态特斯拉线圈及其用途

    [电气机械和器材制造业] [2013-12-18]

    The solid state Tesla coil is a recentlydiscovered high voltage power supply. It has similarities to both the traditional Tesla coil and to the modern switched-mode flyback converter. This report will document the design, operation, and construction of such a system. Possible industrial applications for the device will also be considered.
    关键词:固态特斯拉线圈;高压电源
  • 5016.安全性分析:对一个组织的事件管理流程的风险分析

    [信息传输、软件和信息技术服务业] [2013-12-18]

    This document is an example of the type of report an organisation would receive at the end of a HP Security Analytics engagement. The focus is on the analysis of the security risks and performance of the organisation's Security Incident Management Processes and related Security Operation Centre (SOC)'s activities. HP Labs carried out the underlying R&D work in collaboration with HP Enterprise Security Services (HP ESS) and involved analysis of processes, probabilistic modeling, simulation and "what-if" analysis for some of HP's key customers. The outcome of this was a set of case studies from which we have been able to create this more general anonymised report illustrating the richness of the risk assessment and "what-if" analysis that has been carried out. The lifecycle management of security is critical for organisations to protect their key assets, ensure a correct security posture and deal with emerging risks and threats. It involves various steps, usually carried out on an ongoing, regular basis, including: risk assessment; policy definition; deployment of controls within the IT infrastructure; monitoring and governance. In this context, Security Information & Events Management (SIEM) solutions play a key role. Even the best information security practices and investments in security controls cannot guarantee that intrusions – accidental and criminal activities – and/or other malicious acts will not happen. Controls can fail, be bypassed or become inadequate over time; new threats emerge. Managing such incidents requires detective and corrective controls to minimise adverse impacts, gather evidence, and learn from previous situations in order to improve over time. These incident management processes are usually run in the context of a SOC and/or as part of specialised Computer Security Incident Response Teams (CSIRTS), built on top of SOCs. Even with SIEM solutions in place, a potential major risk for the organisation arises due to delays introduced in assessing and handling known incidents: this may postpone the successful resolution of critical security incidents (e.g. devices exposed on the Internet, exploitation of privileged accounts, deployed malware, etc.) and allow for further exploitation. Another related risk can be introduced by sudden and/or progressive changes of the threat landscape, due to changing economic and social scenarios, new business activities or process failings within the existing IT services. This might create unexpected volumes of new events and alerts to be processed by the security team and as such, introduce additional delays. Hence, it is important for an organisation to understand the risk exposure due to their Incident Management processes, explore potential future scenarios (e.g. changes in available resources or threats landscapes or adoption of Cloud solutions) and identify suitable ways to address related issues, e.g. by introducing process changes and/or making investments in security controls
    关键词:信息安全;安全分析;风险分析;如果分析;事件管理流程;SOC
  • 5017.在哺乳动物DNA甲基化研究中的统计算法

    [医药制造业,信息传输、软件和信息技术服务业] [2013-12-18]

    DNA methylation is a dynamic chemical modification that is abundant on DNA sequences and plays a central role in the regulatory mechanisms of cells. This modification can be inherited across cell divisions and generations, providing a “memory mechanism” for regulatory programs that is more flexible than that coded in the DNA sequence. In recent years, high-throughput sequencing technologies have enabled genome-wide annotation of DNA methylation. Coupled with novel computational machinery, these developments have enabled unperceivable insight to the characteristics,biological function and disease association of this phenomenon.
    关键词:DNA甲基化;统计算法
  • 5018.从历史数据估计数据中心的热相关指数

    [信息传输、软件和信息技术服务业] [2013-12-18]

    In order to better manage the cooling infrastructure in a data center with multiple computer room air conditioning (CRAC) units, the relationship between CRAC settings and temperature at various locations in the data center needs to be accurately and reliably determined. Usually this is done via a commissioning process which is both time consuming and disruptive. In this paper, we describe a machine learning based technique to model rack inlet temperature sensors in a data center as a function of CRAC settings. These models can then be used to automatically estimate thermal correlation indices (TCI) at any particular CRAC settings. We have implemented a prototype of our methodology in a real data center with eight CRACs and several hundred sensors. The temperature sensor models developed have high accuracy (mean RMSE error is 0.2 C). The results are validated using manual commissioning, demonstrating the effectiveness of our techniques in estimating TCI and in determining thermal zones or regions of influence of the CRACs.
    关键词:数据中心;温度传感器;裂纹;热区域的热相关指数;回归树;随机森林;机器学习
  • 5019.为实现可扩展性和灵活性的多代理集群调度

    [信息传输、软件和信息技术服务业] [2013-12-18]

    This dissertation presents a taxonomy and evaluation of three cluster scheduling architectures for scalability and exibility using a common high level taxonomy of cluster scheduling, a Monte Carlo simulator, and a real system implementation. We begin with the popular Monolithic State Scheduling (MSS), then consider two new architectures: Dynamically Partitioned State Scheduling (DPS) and Replicated State Scheduling (RSS). We describe and evaluate DPS, which uses pessimistic concurrency control for cluster resource sharing. We then present the design, implementation, and evaluation of Mesos, a real-world DPS cluster scheduler that allows diverse cluster computing frameworks to eciently share resources.
    关键词:可扩展性;灵活性;多代理集群调度
  • 5020.用InfoSphereBigInsights开发、发布和展开你的第一个大数据应用程序

    [信息传输、软件和信息技术服务业] [2013-12-18]

    Developing your first Big Data application and deploying it across your distributed computing environment doesn't have to be a daunting task. Learn how to use Eclipse-based tools for InfoSphere? BigInsights? to expedite application development, package your application for publication in a web-based catalog, and deploy your application so that business staff and others can easily launch it.
    关键词:InfoSphere BigInsights;大数据应用程序;Jaql
首页  上一页  ...  497  498  499  500  501  502  503  504  505  506  ...  下一页  尾页  
© 2016 武汉世讯达文化传播有限责任公司 版权所有 技术支持:武汉中网维优
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服