Search results for "Tribute"

showing 10 items of 1455 documents

Asynchronous Runtime Verification of Business Processes

2015

The authors propose a runtime verification mechanism for business processes. This mechanism allows verifying the correctness of business process execution and it runs in parallel with the base processes affecting them insignificantly. The authors have identified the case where the use of business process runtime verification is helpful and applicable. The verification mechanism monitors the business process execution and verifies compliance with the base process description. The verification mechanism prototype was developed and tested in real business processes, as well as limits of runtime verification overhead were evaluated.

Business Process Model and NotationHigh-level verificationFunctional verificationbusiness.industryComputer scienceDistributed computingRuntime verificationVerificationBusiness process modelingSoftware engineeringbusinessSoftware verificationIntelligent verification2015 7th International Conference on Computational Intelligence, Communication Systems and Networks
researchProduct

ImageRover: A Content-Based Image Browser for the World Wide Web

1997

ImageRover is a search-by-image-content navigation tool for the World Wide Web (WWW). To gather images expediently, the image collection subsystem utilizes a distributed fleet of WWW robots running on different computers. The image robots gather information about the images they find, computing the appropriate image decompositions and indices, and store this extracted information in vector form for searches based on image content. At search time, users can iteratively guide the search through the selection of relevant examples. Search performance is made efficient through the use of an approximate, optimized k-d tree algorithm. The system employs a novel relevance feedback algorithm that se…

CBIRInformation retrievalDistributed databasebusiness.industryComputer scienceSearch engine indexingRelevance feedbackcomputer.software_genreWorld Wide WebInformation extractionTree (data structure)RobotThe InternetbusinessImage retrievalcomputer
researchProduct

Impact of Novel Energy Management Actions on Household Appliances for Money Savings and CO2 Emissions Reduction

2009

In order to obtain CO2 emissions reductions, energy management control actions inside apartments and detached houses have to be carried out. In this work, new control actions devoted to the reduction of electrical energy consumptions inside typical Italian apartments are proposed. These “Distributed on Site” (DoS) actions consist in employing specific control strategies to smartly exploit the hot water provided by a solar panel, the electricity generated by a photovoltaic panel and the delayed starting of appliances.

CO2 Emissions Reductions Distributed on Site Control Actions Combined Photovoltaic and Solar panel (CPS)Settore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciSettore ING-INF/01 - Elettronica
researchProduct

Gossip

2019

Nowadays, a growing number of servers and workstations feature an increasing number of GPUs. However, slow communication among GPUs can lead to poor application performance. Thus, there is a latent demand for efficient multi-GPU communication primitives on such systems. This paper focuses on the gather, scatter and all-to-all collectives, which are important operations for various algorithms including parallel sorting and distributed hashing. We present two distinct communication strategies (ring-based and flow-oriented) to generate transfer plans for their topology-aware implementation on NVLink-connected multi-GPU systems. We achieve a throughput of up to 526 GB/s for all-to-all and 148 G…

CUDAComputer scienceGossipDistributed computingTransfer (computing)ServerHash functionOverhead (computing)Throughput (business)Proceedings of the 48th International Conference on Parallel Processing
researchProduct

Approximate Algorithm for Fast Capacity Provisioning in WANs with Trade-Off between Performance and Cost under Budget Constraint

2014

Due to the emergence of Software Defined Networking (SDN) with the idea of centralized control over computer networks, the Capacity and Flow Assignment Problem (CFA) may be approached in a classical non-distributed fashion in real-life scenarios. The question arises whether a heuristical approach to this NP-complete problem is of any use in practice.

Capacity provisioningFlow (mathematics)Computer scienceDistributed computingControl (management)Routing (electronic design automation)Trade-offSoftware-defined networkingAssignment problemBudget constraint
researchProduct

AN UNKNOWN TRIBUTE BY FARINELLI TO KING PHILIP V OF SPAIN

2021

ABSTRACTCarlo Broschi, better known as Farinelli, arrived in Madrid on 7 August 1737. King Philip V and his wife Elisabeth Farnese were deeply impressed by his vocal qualities and invited him to remain in their service, on extremely rewarding terms. Although few sources concerning his first months in Spain are available, a newly discovered libretto, L'ombra di Luigi XIV il Grande, sheds light on his position at the Spanish court and his response to the privileged situation he enjoyed. The work is a short solo cantata commissioned by Farinelli and offered to Philip V for his name day in 1738. The title-page indicates Francesco Feo as the composer, but no sources for the musical setting have …

Carlo Broschi Farinelli Philip V of Spain Francesco Feo solo cantata Giovanni Battista Filomarino music and diplomacymedia_common.quotation_subjectSettore L-ART/07 - Musicologia E Storia Della MusicaArt historyWifeTributeMagistrateGeneral MedicineMusicalArtMusicmedia_commonEighteenth Century Music
researchProduct

Generalized centro-invertible matrices with applications

2014

Centro-invertible matrices are introduced by R.S. Wikramaratna in 2008. For an involutory matrix R, we define the generalized centro-invertible matrices with respect to R to be those matrices A such that RAR = A^−1. We apply these matrices to a problem in modular arithmetic. Specifically, algorithms for image blurring/deblurring are designed by means of generalized centro-invertible matrices. In addition, if R1 and R2 are n × n involutory matrices, then there is a simple bijection between the set of all centro-invertible matrices with respect to R1 and the set with respect to R2.

Centro-symmetric matrixSquare root of a 2 by 2 matrixApplied MathematicsInvolutory matrixINGENIERIA TELEMATICAMatrius (Matemàtica)Matrix ringMatrix multiplicationCombinatoricsMatrix (mathematics)Integer matrix2 × 2 real matricesCentro-invertible matrixMatrix analysisInvolutory matrixMATEMATICA APLICADAComputer Science::Distributed Parallel and Cluster ComputingMathematics
researchProduct

The effects of lasers on bond strength to ceramic materials: A systematic review and meta-analysis

2018

Lasers have recently been introduced as an alternative means of conditioning dental ceramic surfaces in order to enhance their adhesive strength to cements and other materials. The present systematic review and meta-analysis aimed to review and quantitatively analyze the available literature in order to determine which bond protocols and laser types are the most effective. A search was conducted in the Pubmed, Embase and Scopus databases for papers published up to April 2017. PRISMA guidelines for systematic review and meta-analysis were followed. Fifty-two papers were eligible for inclusion in the review. Twenty-five studies were synthesized quantitatively. Lasers were found to increase bo…

CeramicsHigh variabilitylcsh:MedicineMaterials testinglaw.inventionAdhesion strength030207 dermatology & venereal diseasesMathematical and Statistical Techniques0302 clinical medicinelawMaterials TestingCeramicComposite materiallcsh:ScienceMultidisciplinaryBond strengthResearch AssessmentSystematic reviewOptical Equipmentvisual_artMeta-analysisPhysical SciencesCementsvisual_art.visual_art_mediumEngineering and TechnologyStatistics (Mathematics)Research ArticleMaterials scienceSystematic ReviewsMaterials by StructureAmorphous SolidsMaterials ScienceEquipmentResearch and Analysis MethodsDental Materials03 medical and health sciencesBindersStatistical MethodsMaterials by AttributeSurface TreatmentsLaserslcsh:R030206 dentistryLaserManufacturing ProcessesComposite Materialslcsh:QGlassMathematicsMeta-AnalysisPLOS ONE
researchProduct

Effects of femtosecond laser and other surface treatments on the bond strength of metallic and ceramic orthodontic brackets to zirconia.

2017

Femtosecond laser has been proposed as a method for conditioning zirconia surfaces to boost bond strength. However, metallic or ceramic bracket bonding to femtosecond lasertreated zirconia surfaces has not been tested. This study compared the effects of four conditioning techniques, including femtosecond laser irradiation, on shear bond strength (SBS) of metallic and ceramic brackets to zirconia.Three hundred zirconia plates were divided into five groups: 1) control (C); 2) sandblasting (APA); 3) silica coating and silane (SC); 4) femtosecond laser (FS); 5) sandblasting followed by femtosecond laser (APA+SC). A thermal imaging camera measured temperature changes in the zirconia during irrad…

CeramicsScanning electron microscopeOrthodontic Bracketslcsh:MedicineTissue AdhesionsCoating Materials030207 dermatology & venereal diseases0302 clinical medicineMedicine and Health SciencesSilaneElectron MicroscopyCubic zirconiaCeramicZirconium oxideComposite materiallcsh:ScienceMicroscopyMultidisciplinaryBond strengthBracketTemperatureOptical EquipmentMetalsvisual_artPhysical SciencesFemtosecondvisual_art.visual_art_mediumEngineering and TechnologyScanning Electron MicroscopyShear StrengthResearch ArticleMaterials scienceMaterials by StructureMaterials ScienceOral MedicineEquipmentOrthodonticsResearch and Analysis MethodsENPEP gene03 medical and health sciencesCoatingsAdhesivesShear strengthMaterials by AttributeUniversal testing machineSurface TreatmentsLaserslcsh:R030206 dentistryManufacturing ProcessesMicroscopy Electron Scanninglcsh:QZirconiumPLoS ONE
researchProduct

Mutual entity authentication for LTE

2011

In this paper we outline the Authentication and Key Agreement protocol (EPS-AKA) found in Long-Term Evolution (LTE) systems. This architecture is the 3GPP version of a 4G access security architecture. The LTE security architecture is a mature evolved architecture, with both strengths and weaknesses. In this paper we propose an amendment to the EPS-AKA protocol to make it a full mutual (online) entity authentication protocol. We also analyze the proposal, highlighting both the improvements and the drawbacks of the new AKA protocol.

Challenge-Handshake Authentication ProtocolKey-agreement protocolAuthenticationbusiness.industryComputer scienceAuthorizationMutual authenticationEnterprise information security architectureCryptographic protocolComputer securitycomputer.software_genreDistributed System Security ArchitectureGSMAuthentication protocolLightweight Extensible Authentication ProtocolbusinesscomputerAKAComputer network2011 7th International Wireless Communications and Mobile Computing Conference
researchProduct