نتایج جستجو برای: mobile data collector

تعداد نتایج: 2542615  

2014
Bolatzhan Kumalakov Darkhan Akhmed-Zaki Grzegorz Dobrowolski

Presented case study is based on application of the previously designed volunteer peer-to-peer MapReduce computing platform to assist evacuation of people who are disoriented in a forest that is affected by wildfire. Problem solution requires extensive use of features which are built into mobile devices in such a way, that computing not only become execution device, but also interface and data ...

2009
Luis F Lopes João M Zamite Bruno C Tavares Francisco M Couto Mário J Silva

Recent epidemiological surveillance projects began collecting data from the Internet to identify inflectional diseases propagation. These systems collect data from pre-selected data sources somehow related to the subject. However, other sources, like web social networks, may present early evidences of an infection event. With the increasing popularity of social networks, where people post perso...

2016
Liu Qiuxia

Aiming at the problems existing in the work of traditional student’s attendance, using computer technology combined with the more advanced technology of face recognition, a real-time processing intelligent management system for student’s attendance has been studied and designed. The system is mainly composed of image collector and attendance management computer. Its control core is the digital ...

2007
Xiaoyong Su Chi-Cheng Chu

It is challengeable to utilize and integrate RFID data into current Enterprise Information Systems because high volume of RFID data is captured at high speed and the data are in heterogeneous formats. In this paper, we propose a “store and forward” and subscriptionbased integration approach in WinRFID Data Collector to solve the challenges. The Data Collector is a middleware which processes and...

2002
James R. Larus

This paper describes the design and implementation of a concurrent compacting garbage collector for languages that distinguish mutable data from immutable data (e.g., ML) as well as for languages that manipulate only immutable data (e.g., pure functional languages such as Haskell). The collector runs on shared-memory parallel computers and requires minimal mutator/collector synchronization. No ...

Journal: :CoRR 2014
David Terei Amit A. Levy

An increasing number of high-performance distributed systems are written in garbage collected languages. This removes a large class of harmful bugs from these systems. However, it also introduces high tail-latency do to garbage collection pause times. We address this problem through a new technique of garbage collection avoidance which we call BLADE. BLADE is an API between the collector and ap...

2002
John G. Allen Jesse S. Jin

This paper describes MGEN/x86, a toolkit that simplifies the process of creating dynamic code generators and just-in-time (JIT) compilers for the x86 series of processor. MGEN produces pattern-matching code generators based on a userdefined sequence of rules and semantic action associated with each rule. MGEN includes a number of useful and interesting features such as a table driven macro comp...

In this study, exergy analysis of a flat plat solar collector in a closed circuit has been performed using existing experimental data and the effects of utilization of the collector with upper, lower and side reflectors alone and together with lenses on exergy efficiency have been considered. Then, based on a mathematical model, optimization analysis has been performed. Unlike the past studies,...

1997
Andrzej Duda ephane Perret

Our goal is to de ne a communication architecture for nomadic applications. We notice that the mobile agent paradigm is particularly suitable for nomadic applications. Although many mobile agent systems are being proposed, few of them raise the problem of the interface between applications and mobile agents. We propose to use the MAP (Mobile Assistant Programming) architecture and add a middlew...

2009
Lu Cui Natalija Vlajic Andrew Eckford

A jamming attack on a wireless network is an attack in which the adversary attempts to cause a denialof-service (DoS) by conducting simple, continuous or intermittent, transmission of high-power interfering signal. Wireless sensor networks (WSNs) are particular vulnerable to jamming attacks due to its natural characters. In our work, we propose to combat jamming attacks on WSNs through the depl...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید