نتایج جستجو برای: non intrusive coupling
تعداد نتایج: 1455632 فیلتر نتایج به سال:
Significant savings can be gained from terminating the optimization of a computationally expensive function well before traditional criteria, such as a maximum budget of evaluations, are satisfied. Early termination is especially desirable for noisy functions, where a solver could potentially proceed indefinitely while seeing changes insignificant relative to the noise. In this paper we conside...
We present a non-intrusive high-level SystemC debugging approach to be used with SystemC v2.0.1 and GNU debugger gdb. Our approach is integrated into an industrial design flow and enables developers to debug designs at high level working with signals, ports, events, and processes. Thus, one gets quick and concise insight into static structure and dynamic behavior of the design without the burde...
We show how, under certain conditions, programs written in the behavioral programming approach can be modified (e.g., as result of new requirements or discovered bugs) using automatically-generated code modules. Given a trace of undesired behavior, one can generate a relatively small piece of code, whose execution is interwoven at run time with the rest of the system and brings about the desire...
The Non-Intrusive Load Monitor (NILM) provides a method of measuring component performance and source power quality through a single point of entry in the power distribution system. A study was performed utilizing the NILM onboard three different ships (along with experimentation in the laboratory) to determine its effectiveness in determining the state of mechanical systems through analysis of...
The aim of our project is to provide a real time non-intrusive driver drowsiness detection to prevent the rapidly growing accidents caused by sleepy or drunk driver. We are going to merge the 2 requirements for safe driving in a single equipment. The car does not function unless the two conditions of safe driving are satisfied. Bio signals, such as brain waves, pulsation waves, and heart beat a...
Networked computer services are increasingly hosted on shared consolidated physical resources (servers, storage, network) in data centers. Thus, some form of resource control is required to ensure contractual performance targets for service customers under dynamic workload and system conditions. This paper proposes a solution for resource control that maximizes the yield of the performance cont...
We investigate how to build a non-intrusive scheduled TCP. For the flows of a given origin-destination pair, the objective is to schedule their TCP segments (according to some desired criteria) without modifying the network bandwidth-share used by these flows, which in turn ensures friendliness with respect to the rest of the network. We show that in order for a scheduling algorithm to be stric...
Intruders which log-in through a series of machines when conducting an attack are hard to trace because of the complex architecture of the Internet. The thumbprinting method provides an efficient way to tracing such intruders by determining whether two connections are part of the same connection chain. Since many connections are transient, and therefore short in length, choosing the best time i...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید