نتایج جستجو برای: replica selection
تعداد نتایج: 323497 فیلتر نتایج به سال:
In recent years, cloud computing research, specifically data replication techniques and their applications, has been growing. If the replicas number is raised put in multiple positions, it will be expensive to maintain usability, performance stability of application systems. this paper, two bio- inspired algorithms were proposed improve both selection placement environment. The suggested for dy...
The alternative to the replica procedure, which we call the noncommutative replica procedure, is discussed. The detailed comparison with the standard replica procedure is performed.
The alternative to the replica procedure, which we call the noncommutative replica procedure, is discussed. The detailed comparison with the standard EA replica procedure is performed.
Computing services are highly integrated into modern society. Millions of people rely on these services daily for communication, coordination, trading, and accessing to information. To meet high demands, many popular services are implemented and deployed as geo-distributed applications on top of third party virtualized cloud providers. However, the nature of such deployment provides variable pe...
An innovative replica exchange (parallel tempering) method called replica exchange with solute tempering (REST) for the efficient sampling of aqueous protein solutions is presented here. The method bypasses the poor scaling with system size of standard replica exchange and thus reduces the number of replicas (parallel processes) that must be used. This reduction is accomplished by deforming the...
VolpexMPI is an MPI library designed for volunteer computing environments. In order to cope with the fundamental unreliability of these environments, VolpexMPI deploys two or more replicas of each MPI process. A receiver-driven communication scheme is employed to eliminate redundant message exchanges and sender based logging is employed to ensure seamless application progress with varying proce...
Today's standard molecular dynamics simulations of moderately sized biomolecular systems at full atomic resolution are typically limited to the nanosecond timescale and therefore suffer from limited conformational sampling. Efficient ensemble-preserving algorithms like replica exchange (REX) may alleviate this problem somewhat but are still computationally prohibitive due to the large number of...
In wireless sensor networks, replica node attacks are very dangerous because the attacker can compromise a single node and generate as many replicas of the compromised node as he wants, and then exploit these replicas to disrupt the normal operations of sensor networks. Several schemes have been proposed to detect replica node attacks in sensor networks. Although these schemes are capable of de...
2 Deriving inference error from the statistical physics of disordered systems 2 2.1 Replica equations at finite temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Replica equations in the low temperature limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Moreau envelope formulation of the replica equations . . . . . ....
In the study of Replica Symmetry Breaking (RSB), one is led to consider functions f of pseu-domatrices, i.e. of matrices of order , with a real, rather than an integer, number. We propose a mathematically rigorous deenition of pseudomatrices, and show that from this it follows that the minimum of f over the space of pseudomatrices Q(x; y) which depend only on (x ?y) is also a critical point for...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید