نتایج جستجو برای: bottleneck detection
تعداد نتایج: 581089 فیلتر نتایج به سال:
Bottlenecks, as the key ingredients for improving the performances of the production networks, have been profoundly studied. However, the major definitions of bottlenecks are derived in terms of the throughput and based on the Theory of Constraints (TOC). Moreover, before the specific measures can be applied on them, it is not straightforward to localise dynamic bottlenecks due to their complex...
Landmark-based navigation in unknown unstructured environments is far from solved. The bottleneck nowadays seems to be the fast detection of reliable visual references in the image stream as the robot moves. In our research, we have decoupled the navigation issues from this visual bottleneck, by first using artificial landmarks that could be easily detected and identified. Once we had a navigat...
The ability to locate bottleneck link along Internet paths is of great interest to end users as well as network operators. End users can use the information to estimate performance of a network path to a given destination. The knowledge of bottlenecks can provide network operators insight into the causes of congestion and ways of circumventing it. Flows that share a common bottleneck resource c...
In this paper, the bottleneck dominating set problem and one of its variants, the bottleneck independent dominating set problem, are considered. Let G(V, E, W) denote a graph with n-vertex-set V and m-edge-set E, where each vertex v is associated with a real cost W(v). Given any subset V′ of V, the bottleneck cost of V′ is defined as max{W(x) x ∈ V′}. The major task involves identifying a dom...
In this paper, we propose a new technique to enhance the trajectory shape analysis by explicitly considering the speed attribute of trajectory data, as an effective and efficient way for anomaly detection. An object motion trajectory is mathematically represented by the Kernel Density Estimation, taking into account both the shape of the trajectory and the speed of the moving object. An unsuper...
This paper describes a novel method of calculating the sensitivity of the manufacturing system throughput to the variables of the machines. The sensitivity analysis needs only a single simulation, yet is easy to use and provides accurate results. This sensitivity analysis is then used to predict the change in the system throughput due to a change of the variables of the machines provided that t...
In a hardware transactional memory system with lazy versioning and lazy conflict detection, the process of transaction commit can emerge as a bottleneck. For a large-scale distributed memory system, we propose novel algorithms to implement commit that are deadlockand livelock-free and do not employ any centralized resource. These algorithms improve upon the state-of-the-art by yielding up to 59...
Vehicle handover from one road-side unit to another is a common phenomenon in vehicular ad-hoc networks (VANETs). Authenticating vehicles effectively is the key to success of VANETs. Recently, Li and Liu proposed a lightweight identity authentication protocol for VANETs, which was claimed to integrate efficiency and security. However, in this paper, we show that their protocol is vulnerable to ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید