学科分类
/ 1
17 个结果
  • 简介:SomeresultsonRaRbtransformationofcompoundfiniteautomataoverfinitefieldaregeneralizedtothecaseofcommutativerings.PropertiesofRaRbtransformationarediscussedandappliedtotheinversionproblemforcompoundfiniteautomata.

  • 标签: 通信 环形线路 RaRb变换法
  • 简介:本文主题的KVMoverIP就是采用OVERIP技术的一个热门例子。本文介绍了KVM的基本概念和发展历程,并通过KVMoverIP技术在市气象局机房和雷达站机房的应用实例,指出KVMoverIP的应用可以大大提升气象业务网络的管理效率。

  • 标签: KVM OVER IP 远程控制 机房管理 服务器
  • 简介:Adatastreamisamassiveunboundedsequenceofdataelementscontinuouslygeneratedatarapidrate.Duetothisreason,mostalgorithmsfordatastreamssacrificethecorrectnessoftheirresultsforfastprocessingtime.Theprocessingtimeisgreatlyinfluencedbytheamountofinformationthatshouldbemaintained.Thisissuebecomesmoreseriousinfindingfrequentitemsetsorfrequencycountingoveranonlinetransactionaldatastreamsincetherecanbealargenumberofitemsetstobemonitored.WehaveproposedamethodcalledtheestDecmethodforfindingfrequentitemsetsoveranonlinedatastream.Inordertoreducethenumberofmonitoreditemsetsinthismethod,monitoringthecountofanitemsetisdelayeduntilitssupportislargeenoughtobecomeafrequentitemsetinthenearfuture.Forthispurpose,thecountofanitemsetshouldbeestimated.Consequently,howtoestimatethecountofanitemsetisacriticalissueinminimizingmemoryusageaswellasprocessingtime.Inthispaper,theeffectsofvariouscountestimationmethodsforfindingfrequentitemsetsareanalyzedintermsofminingaccuracy,memoryusageandprocessingtime.

  • 标签: 计数估计 数据流 数据分析 频繁项设置
  • 简介:随着RPCoverHTTP功能在国内的普及,Exchange管理员可能会碰到各种各样的问题。作为一名长期从事Exchange技术支持的工程师,笔者希望在这里为大家提供一些如何解决RPCoverHTTP问题的基本思路。

  • 标签: OVER HTTP RPC EXCHANGE 故障 技术支持
  • 简介:Visitingtrianglesthatconformadigitalterrainmodelisacoreoperationinanumberoffieldslikeanimationandvideogamesorgeneratingprofiles,cross-sections,andcontoursincivilengineering.Perfornfingthevisitinanefficientmannerisanissuespeciallywhentheoutputofthetraversaldependsinsomewayonadditionalparametersorinformationchangingovertime,forexample,amovingpointofview.Inthisworkwereportasetofrulesthat,givenadigitalterrainmodeldefinedoveraregulargridandanarbitrarypointofviewoutsidetheterrain,defineatotalback-to-frontorderinthesetofdigitalterrainmodeltriangleswithrespecttothepoint.Thesetofrulesisminimal,completeandcorrect.Toassesshowtherulesperform,wehaveimplementedaCPU-basedalgorithmforrealisticallyrenderingheightfieldsdefinedoverregulargrids.Thealgorithmdoesnotmakeuseofthez-bufferorshadersfeaturedbyourgraphicscard.Weshowhowouralgorithmisimplementedandshowvisualresultsobtainedfromsyntheticandrealdata.Wefurtherdiscussthealgorithmperformancewithrespecttotwoalgorithms:anaivealgorithmthatvisitstrianglesaccordingtogridindicesanddoesnotsolvethehiddenlineproblem,andthez-bufferprovidedbythegraphicscardfeaturedbyourcomputer.Ouralgorithmallowsreal-timeinteractionwhenthepointofviewarbitrarilymovesin3Dspaceandweshowthatitsperformanceisasgoodasthatofthez-buffergraphicscard.

  • 标签: back-to-front ORDERING digital TERRAIN MODEL elevation
  • 简介:一线性(q,,,m(n))局部地可译码的代码(LDC)C:\mathbbF{\mathbbF}n\mathbbF{\mathbbF}m(n)是从向量空间\mathbbF的线性转变{\mathbbF}n到空间\mathbbF{\mathbbF}每消息标志xi能与概率为被恢复的m(n)至少\frac1|\mathbbF|+e\frac{1}{{\left|\mathbb{F}\right|}}从由查询仅仅q的一个使随机化的算法的C(x)的+\varepsilonC放(x),就算直到C的m(n)位置(x)被贿赂。在Dvir的一个最近的工作,为线性LDC降低界限的作者表演能为算术电路暗示更低的界限。他建议那证明界限更低因为在建筑群或真实的地上的LDC是为接近他的之一的一个好起点推测。我们的主要结果是m(n)=(n2)为在任何东西上的线性3质问LDC的更低的界限,可能无限,地。常数在(

  • 标签: 线性变换 查询 局部可解 代码 任意域 不发达国家
  • 简介:Cloudcomputingisatechnologythatprovidesuserswithalargestoragespaceandanenormouscomputingpower.However,theoutsourceddataareoftensensitiveandconfidential,andhencemustbeencryptedbeforebeingoutsourced.Consequently,classicalsearchapproacheshavebecomeobsoleteandnewapproachesthatarecompatiblewithencrypteddatahavebecomeanecessity.Forprivacyreasons,mostoftheseapproachesarebasedonthevectormodelwhichisatimeconsumingprocesssincetheentireindexmustbeloadedandexploitedduringthesearchprocessgiventhatthequeryvectormustbecomparedwitheachdocumentvector.Tosolvethisproblem,weproposeanewmethodforconstructingasecureinvertedindexusingtwokeytechniques,homomorphicencryptionandthedummydocumentstechnique.However,1)homomorphicencryptiongeneratesverylargeciphertextswhicharethousandsoftimeslargerthantheircorrespondingplaintexts,and2)thedummydocumentstechniquethatenhancestheindexsecurityproduceslotsoffalsepositivesinthesearchresults.Theproposedapproachexploitstheadvantagesofthesetwotechniquesbyproposingtwomethodscalledthecompressedtableofencryptedscoresandthedoublescoreformula.Moreover,weexploitasecondsecureinvertedindexinordertomanagetheusers'accessrightstothedata.Finally,inordertovalidateourapproach,weperformedanexperimentalstudyusingadatacollectionofonemilliondocuments.Theexperimentsshowthatourapproachismanytimesfasterthananyotherapproachbasedonthevectormodel.

  • 标签: searchable ENCRYPTION CLOUD COMPUTING homomorphic ENCRYPTION
  • 简介:通过建立push-over分析方法中的等效单自由度体系,分析得到钢一混凝土组合框架结构的等延性需求谱.利用有限元软件对组合框架进行非线性静力推覆分析,基于位移模式把多自由度体系转换为等效单自由度体系,建立其等效加速度与等效位移曲线.按现行抗震规范建立组合框架结构谱加速度与谱位移曲线,从而对该类结构进行抗震评估.用非线性动力时程分析方法对本文提出方法进行了比较,验证了该方法的可靠性.

  • 标签: 静力弹塑性分析 非线性动力时程分析 钢-混组合框架
  • 简介:UAC已经有很多负面消息了,但是它在帮助保护环境方面是一项非常好的技术。在提升请求期间,OTS提升允许管理员键入凭证来提供凭证。默认情况下,在您使用OTS时,会在独立的、安全的桌面上输入您的凭证,阻止与其它桌面的交互,使应用程序更难受到干扰(但不是不可能的)。

  • 标签: 用户访问控制 UAC 权限提升 恶意软件 即时 屏幕