Date


Download Available

94 results

An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment

Conference Proceeding
Liu, X., & Liu, Q. (2017)
An Optimized Speculative Execution Strategy Based on Local Data Prediction in a Heterogeneous Hadoop Environment. In Proceedings of 2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), (128-131). https://doi.org/10.1109/cse-euc.2017.208
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to imbalance...

Selection methods and diversity preservation in many-objective evolutionary algorithms

Journal Article
Martí, L., Segredo, E., Sánchez-Pi, N., & Hart, E. (2018)
Selection methods and diversity preservation in many-objective evolutionary algorithms. Data Technologies and Applications, https://doi.org/10.1108/dta-01-2018-0009
Purpose – One of the main components of multi-objective, and therefore, many-objective evolutionary algorithms is the selection mechanism. It is responsible for performing two...

Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm.

Conference Proceeding
Al-Jassani, B. A., Urquhart, N. B., & Almaini, A. E. A. (2009)
Minimization of incompletely specified mixed polarity Reed Muller functions using genetic algorithm. https://doi.org/10.1109/12.67320
A New and efficient Genetic Algorithm (GA) based approach is presented to minimise the number of terms of Mixed Polarity Reed Muller (MPRM) single and multi output incompletel...

Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection

Journal Article
Tian, Z., Shi, W., Tan, Z., Qiu, J., Sun, Y., Jiang, F., & Liu, Y. (in press)
Deep Learning and Dempster-Shafer Theory Based Insider Threat Detection. Mobile Networks and Applications, https://doi.org/10.1007/s11036-020-01656-7
Organizations' own personnel now have a greater ability than ever before to misuse their access to critical organizational assets. Insider threat detection is a key component ...

Applying semantic technologies to multi-agent models in the context of business simulations.

Thesis
Farrenkopf, T. Applying semantic technologies to multi-agent models in the context of business simulations. (Thesis)
Edinburgh Napier University. Retrieved from http://researchrepository.napier.ac.uk/Output/1033149
Agent-based simulations are an effective simulation technique that can flexibly be applied to real-world business problems. By integrating such simulations into business games...

A refinement calculus for the development of real-time systems.

Conference Proceeding
Chen, Z., Cau, A., Zedan, H., Liu, X., & Yang, H. (1998)
A refinement calculus for the development of real-time systems. In 5th Asia Pacific Software Engineering Conference, APSEC '98, 61. https://doi.org/10.1109/APSEC.1998.733588
We present a calculus which can transfer specifications to objects for the development of real-time systems. The object model is based on a practical OO development technique—...

A scalable plane-based broadcast algorithm for 3D-Mesh networks

Conference Proceeding
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2002)
A scalable plane-based broadcast algorithm for 3D-Mesh networks. In Proceedings of the Eleventh Euromicro Conference on Parallel,Distributed and Network-Based Processing (Euro-PDP’03), 149-156. doi:10.1109/empdp.2003.1183581
Broadcast algorithms for wormhole–switched meshes have been widely reported in the literature. However, most of these algorithms handle broadcast in a sequential manner and do...

Using a conceptual data language to describe a database and its interface

Conference Proceeding
Mitchell, K., Kennedy, J., & Barclay, P. J. (1995)
Using a conceptual data language to describe a database and its interface. In C. Goble, & J. Keane (Eds.), Advances in Databases: Proceedings [of the] 13th British National Conference on Database - BNCOD13, 1995 (101-119). https://doi.org/10.1007/BFb0000543
We propose a conceptual approach to defining interfaces to databases which uses the features of a fully object oriented data language to specify interface objects combined wit...

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors

Journal Article
Lenka, R. K., Rath, A. K., Tan, Z., Sharma, S., Puthal, D., Simha, N. V. R., …Tripathi, S. S. (2018)
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access, 6, 30162-30173. https://doi.org/10.1109/ACCESS.2018.2842760
Wireless Sensors are an important component to develop the Internet of Things (IoT) Sensing infrastructure. There are enormous numbers of sensors connected with each other to ...

The Influence of Computer Self-efficacy and Subjective Norms on the Students’ Use of Learning Management Systems at King Abdulaziz University

Journal Article
Binyamin, S. S., Rutter, M. J., & Smith, S. (2018)
The Influence of Computer Self-efficacy and Subjective Norms on the Students’ Use of Learning Management Systems at King Abdulaziz University. International journal of information and education technology (IJIET), 8(10), 693-699. https://doi.org/10.18178/ijiet.2018.8.10.1124
Technology acceptance model (TAM) has been a standout amongst the most well-known models in understanding the users’ acceptance of technologies. This study develops a model to...