This article examines the complex interplay between abstraction and representation in the ontology of images.Images inhabit an in-between space as tangible artifacts that also convey intangible ideas and meanings.The ...This article examines the complex interplay between abstraction and representation in the ontology of images.Images inhabit an in-between space as tangible artifacts that also convey intangible ideas and meanings.The analysis synthesizes perspectives from across the history of philosophy to elucidate how images bridge abstraction and representation through their form and function.It engages with ongoing epistemological and aesthetic debates concerning the dual nature of images.Plato’s theory of ideal forms is outlined as an early attempt to define abstraction.Modern semiotic theories are discussed for their insights into how images create meaning through codes and signs.Phenomenology offers an alternative approach by prioritizing the sensorial,affective impact of images.Poststructuralism problematizes representation in the context of mechanical reproduction and simulacra.While diverse,these philosophical frameworks all grapple with the issues images pose between abstract essence and concrete appearance,conceptual ideas and sensory manifestations.The article reveals the richness of images as liminal constructs that collapse dualisms in their creative interfacing of material forms and immaterial meanings.It concludes that this ontological ambiguity empowers images as mediators between imagination and perception,subjectivity and reality.展开更多
The excited-state intramolecular hydrogen abstraction reactions of butanal have been investigated using the CAS-MP2/6-311+G^*//CASSCF/6-31G^* methods. Calculated results show that the hydrogen transfer induced fluo...The excited-state intramolecular hydrogen abstraction reactions of butanal have been investigated using the CAS-MP2/6-311+G^*//CASSCF/6-31G^* methods. Calculated results show that the hydrogen transfer induced fluorescence quenching of the n,π^*-excited state of covalent butanal with three paths: (1) The first path corresponds to direct S0-react reconstitution, which involves the first S1 decay by partial hydrogen atom transfer. (2) The second stepwise mechanism can be viewed as a full hydrogen atom transfer followed by a partial hydrogen atom back transfer, electron transfer (near S1/S0 or S0-TS) and finally a proton transfer to S0-react. (3) On the triplet surface, the surface crossing to the singlet state would be clearly much efficient at the T1/S0 region due to the large SOC value of 8.3 cm^-1. The S0-react decay route from T1/S0 was studied with an intrinsic reaction coordinate (IRC) calculation at the CASSCF level, resulting in the S0-React minimum.展开更多
VPN service providers (VSP) and IP-VPN customers have traditionally maintained service demarcation boundaries between their routing and signaling entities. This has resulted in the VPNs viewing the VSP network as an o...VPN service providers (VSP) and IP-VPN customers have traditionally maintained service demarcation boundaries between their routing and signaling entities. This has resulted in the VPNs viewing the VSP network as an opaque entity and therefore limiting any meaningful interaction between the VSP and the VPNs. A key challenge is to expose each VPN to information about available network resources through an abstraction (TA) [1] which is both accurate and fair. In [2] we proposed three decentralized schemes assuming that all the border nodes performing the abstraction have access to the entire core network topology. This assumption likely leads to over- or under-subscription. In this paper we develop centralized schemes to partition the core network capacities, and assign each partition to a specific VPN for applying the decentralized abstraction schemes presented in [2]. First, we present two schemes based on the maximum concurrent flow and the maximum multicommodity flow (MMCF) formulations. We then propose approaches to address the fairness concerns that arise when MMCF formulation is used. We present results based on extensive simulations on several topologies, and provide a comparative evaluation of the different schemes in terms of abstraction efficiency, fairness to VPNs and call performance characteristics achieved.展开更多
ion and classification is put forward for periodic cyclic nonstationary vibration signal. The proposed method is applied to experimental data of an ISUZU C240 diesel engine. Experiment results show the effectiveness ...ion and classification is put forward for periodic cyclic nonstationary vibration signal. The proposed method is applied to experimental data of an ISUZU C240 diesel engine. Experiment results show the effectiveness of the proposed method in classification of engine faults.展开更多
Structures using constructors are of ordinary use in functional programming to represent data structures of unbound size. Lack of associativity of constructors, however, hinders program analyses or efficient execution...Structures using constructors are of ordinary use in functional programming to represent data structures of unbound size. Lack of associativity of constructors, however, hinders program analyses or efficient executions. This paper describes ideas of abstraction toward constructors, and similarly abstraction from constructing functions, which we call functional constructors. We demonstrate our ideas making program analyses easier and enable transformation to efficient execution.展开更多
ion technique of interference fringes used in phase modulation and phase scanning modulation interferometer is presented. For the measurement of amplitudes of interference fringes, fringes are fitted and their central...ion technique of interference fringes used in phase modulation and phase scanning modulation interferometer is presented. For the measurement of amplitudes of interference fringes, fringes are fitted and their central points are determined automatically according to their distribution rules. However, for the measurement of their phases, fringes should be recognized and processed with different calculating algorithms and least square optimization methods depending on the scanning modulation mode. When this technique is used for measurement of surface roughness, the measurement uncertainty is better than 5nm and the repeatability is less than 5%.展开更多
The two channels of the CH(3)OH+Cl hydrogen abstraction reaction, leading to the final products CH(2)OH+HCl (i) and CH(3)O+HCl (ii), have been studied by performing ab initio MP2 calculations with the triplet split-va...The two channels of the CH(3)OH+Cl hydrogen abstraction reaction, leading to the final products CH(2)OH+HCl (i) and CH(3)O+HCl (ii), have been studied by performing ab initio MP2 calculations with the triplet split-valence polarization basis sets. For each of the two channels the following simple reaction path is predicted: reactants --> transition state --> intermediate --> products. The previously reported complicated paths(2) calculated without using the IRC technique are criticized. Our calculations indicate that channel (i) is exothermic and has a negligible energy barrier while channel (ii) is endothermic and has a substantial energy barrier. These results imply that channel (i) is favorable, which is in line with experiment.展开更多
This paper adopts counterexample guided abstraction refinement scheme to alleviate the state explosion problem of deadlock detection. We extend the classical labeled transition system models by qualifying transitions ...This paper adopts counterexample guided abstraction refinement scheme to alleviate the state explosion problem of deadlock detection. We extend the classical labeled transition system models by qualifying transitions as certain and uncertain to make deadlock-freedom conservative, i.e. if the abstraction of a system is deadlock-free, then the system is deadlock-free. An abstraction refinement approach to deadlock detection is proposed, and the correctness of the approach is proved.展开更多
Aspects of human behavior in cyber security allow more natural security to the user. This research focuses the appearance of anticipating cyber threats and their abstraction hierarchy levels on the mental picture leve...Aspects of human behavior in cyber security allow more natural security to the user. This research focuses the appearance of anticipating cyber threats and their abstraction hierarchy levels on the mental picture levels of human. The study concerns the modeling of the behaviors of mental states of an individual under cyber attacks. The mental state of agents being not observable, we propose a non-stationary hidden Markov chain approach to model the agent mental behaviors. A renewal process based on a nonparametric estimation is also considered to investigate the spending time in a given mental state. In these approaches, the effects of the complexity of the cyber attacks are taken into account in the models.展开更多
The addition and abstraction reactions of OH radical with benzoate anion are investigated by density functional theory calculations that include solvent effects using UB3LYP, UCAM-B3LYP, UmPW1PW91 and UM06-2X function...The addition and abstraction reactions of OH radical with benzoate anion are investigated by density functional theory calculations that include solvent effects using UB3LYP, UCAM-B3LYP, UmPW1PW91 and UM06-2X functionals with the 6-311++G(2d,2p) basis set. Geometry optimizations of the reactants, products and transition state species are performed for the possible reaction paths. For the addition reactions, those targeting the ipso-, ortho-, meta- and para-carbons are predicted to be exoergic. The H-atom abstraction reactions from ortho, meta and para positions are also predicted to be exoergic. On the basis of the rate constants calculated by means of the transition state theory, the H-atom abstraction reaction from the ortho position is determined to be the favored path followed by the ortho OH addition reaction.展开更多
A non-photorealistic rendering technique is a method to show various effects different from those of realistic image generation.Of the various techniques,flow-based image abstraction displays the shape and color featu...A non-photorealistic rendering technique is a method to show various effects different from those of realistic image generation.Of the various techniques,flow-based image abstraction displays the shape and color features well and performs a stylistic visual abstraction.But real-time rendering is impossible when CPU is used because it applies various filtering and iteration methods.In this paper,we present real-time processing methods of video abstraction using open open computing language(OpenCL),technique of general-purpose computing on graphics processing units(GPGPU).Through the acceleration of general-purpose computing(GPU),16 frame-per-second(FPS)or greater is shown to process video abstraction.展开更多
Simulators are generally used during the design of computer architectures. Typically, different simulators with different levels of complexity, speed and accuracy are used. However, for early design space exploration,...Simulators are generally used during the design of computer architectures. Typically, different simulators with different levels of complexity, speed and accuracy are used. However, for early design space exploration, simulators with less complexity, high simulation speed and reasonable accuracy are desired. It is also required that these simulators have a short development time and that changes in the design require less effort in the implementation in order to perform experiments and see the effects of changes in the design. These simulators are termed high-level simulators in the context of computer architecture. In this paper, we present multiple levels of abstractions in a high-level simulation of a general-purpose many-core system, where the objective of every level is to improve the accuracy in simulation without significantly affecting the complexity and simulation speed.展开更多
The operational function of the trunk limbs (thoracic appendages), of Daphnia, P3 and P4, is a long-term disputed definition between “solid walls”, sieving filters. Sieving is unlikely process for routine particle c...The operational function of the trunk limbs (thoracic appendages), of Daphnia, P3 and P4, is a long-term disputed definition between “solid walls”, sieving filters. Sieving is unlikely process for routine particle collection, particle capture is not a simple mechanical process and not by sieving alone. Analysis promotion supported by direct observational examination of the in-vivo cinematographic slow-motion film and magnified solid photos of tethered Daphnia by high-speed camera (250 frames per second) resulted in a definite interpretation presented in this paper. The Daphnia’s feeding mechanism achieves particles abstraction not by sieving. The existence of two internal alternate water flow routs was indicated: Lateral and Median. These micro flow structures are suggested as vulnerability reduction.展开更多
Massive sequence view (MSV) is a classic timeline-based dynamic network visualization approach. However, it is vulnerable to visual clutter caused by overlapping edges, thereby leading to unexpected misunderstanding o...Massive sequence view (MSV) is a classic timeline-based dynamic network visualization approach. However, it is vulnerable to visual clutter caused by overlapping edges, thereby leading to unexpected misunderstanding of time-varying trends of network communications. This study presents a new edge sampling algorithm called edge-based multi-class blue noise (E-MCBN) to reduce visual clutter in MSV. Our main idea is inspired by the multi-class blue noise (MCBN) sampling algorithm, commonly used in multi-class scatterplot decluttering. First, we take a node pair as an edge class, which can be regarded as an analogy to classes in multi-class scatterplots. Second, we propose two indicators, namely, class overlap and inter-class conflict degrees, to measure the overlapping degree and mutual exclusion, respectively, between edge classes. These indicators help construct the foundation of migrating the MCBN sampling from multi-class scatterplots to dynamic network samplings. Finally, we propose three strategies to accelerate MCBN sampling and a partitioning strategy to preserve local high-density edges in the MSV. The result shows that our approach can effectively reduce visual clutters and improve the readability of MSV. Moreover, our approach can also overcome the disadvantages of the MCBN sampling (i.e., long-running and failure to preserve local high-density communication areas in MSV). This study is the first that introduces MCBN sampling into a dynamic network sampling.展开更多
Nowadays,application migration becomes more and more attractive.For example,it can make computation closer to data sources or make service closer to end-users,which may significantly decrease latency in edge computing...Nowadays,application migration becomes more and more attractive.For example,it can make computation closer to data sources or make service closer to end-users,which may significantly decrease latency in edge computing.Yet,migrating applications among servers that are controlled by different platform owners raises security issues.We leverage hardware-secured trusted execution environment(TEE,aka.,enclave)technologies,such as Intel SGX,AMD SEV,and ARM TrustZone,for protecting critical computations on untrusted servers.However,these hardware TEEs propose non-uniform programming abstractions and are based on heterogeneous architectures,which not only forces programmers to develop secure applications targeting some specific abstraction but also hinders the migration of protected applications.Therefore,we propose UniTEE which gives a unified enclave programming abstraction across the above three hardware TEEs by using a microkernel-based design and enables the secure enclave migration by integrating heterogeneous migration techniques.We have implemented the prototype on real machines.The evaluation results show the migration support incurs nearly-zero runtime overhead and the migration procedure is also efficient.展开更多
The insertion and abstraction reaction mechanisms of singlet and triplet CCl2 with CH3MH (M=O, S) have been studied by using the DFT, NBO and AIM methods. The geometries of reactions, the transition state and products...The insertion and abstraction reaction mechanisms of singlet and triplet CCl2 with CH3MH (M=O, S) have been studied by using the DFT, NBO and AIM methods. The geometries of reactions, the transition state and products were completely optimized by B3LYP/6-311G(d, p). All the energy of the species was obtained at the CCSD(T)/6-311G(d, p) level. The calculated results indicated that the major pathways of the reaction were obtained on the singlet potential energy surface. The singlet CCl2 can not only trigger the insertion reaction with C-H and M-H in four pathways, by which the products P1 [CH3OCHCl2, reactionⅠ(1)], P3[Cl2HCCH2OH, reactionⅠ(2)], P5[CH3SCHCl2, reactionⅡ(1)] and P7[Cl2HCCH2SH, reac-tion Ⅱ(2)] are produced respectively, but also abstract M-H, resulting P4 [CH2O+CH2Cl2, reactionⅠ(3)] and P8[CH2S+CH2Cl2, reactionⅡ(3)]. In addition, the important geometries in domain pathways have been studied by AIM and NBO theories.展开更多
Model checking multi-agent systems (MAS) always suffers from the state explosion problem. In this paper we focus on an abstraction technique which is one of the major methods for overcoming this problem. For a multi...Model checking multi-agent systems (MAS) always suffers from the state explosion problem. In this paper we focus on an abstraction technique which is one of the major methods for overcoming this problem. For a multi-agent system, we present a novel abstraction procedure which reduces the state space by collapsing the global states in the system. The abstraction is automatically computed according to the property to be verified. The resulting abstract system simulates the concrete system, while the universal temporal epistemic properties are preserved. Our abstraction is an over-approximation. If some universal temporal epistemic property is not satisfied, then we need to identify spurious counterexamples. We further show how to reduce complex counterexamples to simple structures, i.e., paths and loops, such that the counterexamples can be checked and the abstraction can be refined efficiently. Finally, we illustrate the abstraction technique with a card game.展开更多
Researchers around the world strive to communicate new knowledge,primarily via publication,with the abstract being crucial in conveying core insights.Previous research has generally analyzed the discourse features of ...Researchers around the world strive to communicate new knowledge,primarily via publication,with the abstract being crucial in conveying core insights.Previous research has generally analyzed the discourse features of abstracts from a macro perspective and often employed either outdated texts,such as those over a decade old,or papers written by authors with lower English academic writing proficiency as research material.In this study,we analyzed forty abstracts from leading journals in applied linguistics,evenly split between Chinese and international journals.It revealed that the use of nominalization in abstracts by Chinese and international scholars showed similarities due to the universal academic requirement for conciseness.However,due to cultural and educational differences,each group differed in their respective language choices and nominalization usage.By analyzing the application of nominalization in different cultural contexts,the results of our study offered practical suggestions for crafting abstracts that effectively convey information,thereby,contributing to the broader academic community.展开更多
Embodied cognition theories propose that language comprehension triggers a sensorimotor system in the brain.However,most previous research has paid much attention to concrete and factual sentences,and little emphasis ...Embodied cognition theories propose that language comprehension triggers a sensorimotor system in the brain.However,most previous research has paid much attention to concrete and factual sentences,and little emphasis has been put on the research of abstract and counterfactual sentences.The primary challenges for embodied theories lie in elucidating the meanings of abstract and counterfactual sentences.The most prevalent explanation is that abstract and counterfactual sentences are grounded in the activation of a sensorimotor system,in exactly the same way as concrete and factual ones.The present research employed a dual-task experimental paradigm to investigate whether the embodied meaning is activated in comprehending action-related abstract Chinese counterfactual sentences through the presence or absence of action-sentence compatibility effect(ACE).Participants were instructed to read and listen to the action-related abstract Chinese factual or counterfactual sentences describing an abstract transfer word towards or away from them,and then move their fingers towards or away from them to press the buttons in the same direction as the motion cue of the transfer verb.The action-sentence compatibility effect was observed in both abstract factual and counterfactual sentences,in line with the embodied cognition theories,which indicated that the embodied meanings were activated in both action-related abstract factuals and counterfactuals.展开更多
文摘This article examines the complex interplay between abstraction and representation in the ontology of images.Images inhabit an in-between space as tangible artifacts that also convey intangible ideas and meanings.The analysis synthesizes perspectives from across the history of philosophy to elucidate how images bridge abstraction and representation through their form and function.It engages with ongoing epistemological and aesthetic debates concerning the dual nature of images.Plato’s theory of ideal forms is outlined as an early attempt to define abstraction.Modern semiotic theories are discussed for their insights into how images create meaning through codes and signs.Phenomenology offers an alternative approach by prioritizing the sensorial,affective impact of images.Poststructuralism problematizes representation in the context of mechanical reproduction and simulacra.While diverse,these philosophical frameworks all grapple with the issues images pose between abstract essence and concrete appearance,conceptual ideas and sensory manifestations.The article reveals the richness of images as liminal constructs that collapse dualisms in their creative interfacing of material forms and immaterial meanings.It concludes that this ontological ambiguity empowers images as mediators between imagination and perception,subjectivity and reality.
基金supported by ‘Qinglan’ Talent Engineering Funds and Key Subject of Inorganic Chemistry by Tianshui Normal University
文摘The excited-state intramolecular hydrogen abstraction reactions of butanal have been investigated using the CAS-MP2/6-311+G^*//CASSCF/6-31G^* methods. Calculated results show that the hydrogen transfer induced fluorescence quenching of the n,π^*-excited state of covalent butanal with three paths: (1) The first path corresponds to direct S0-react reconstitution, which involves the first S1 decay by partial hydrogen atom transfer. (2) The second stepwise mechanism can be viewed as a full hydrogen atom transfer followed by a partial hydrogen atom back transfer, electron transfer (near S1/S0 or S0-TS) and finally a proton transfer to S0-react. (3) On the triplet surface, the surface crossing to the singlet state would be clearly much efficient at the T1/S0 region due to the large SOC value of 8.3 cm^-1. The S0-react decay route from T1/S0 was studied with an intrinsic reaction coordinate (IRC) calculation at the CASSCF level, resulting in the S0-React minimum.
文摘VPN service providers (VSP) and IP-VPN customers have traditionally maintained service demarcation boundaries between their routing and signaling entities. This has resulted in the VPNs viewing the VSP network as an opaque entity and therefore limiting any meaningful interaction between the VSP and the VPNs. A key challenge is to expose each VPN to information about available network resources through an abstraction (TA) [1] which is both accurate and fair. In [2] we proposed three decentralized schemes assuming that all the border nodes performing the abstraction have access to the entire core network topology. This assumption likely leads to over- or under-subscription. In this paper we develop centralized schemes to partition the core network capacities, and assign each partition to a specific VPN for applying the decentralized abstraction schemes presented in [2]. First, we present two schemes based on the maximum concurrent flow and the maximum multicommodity flow (MMCF) formulations. We then propose approaches to address the fairness concerns that arise when MMCF formulation is used. We present results based on extensive simulations on several topologies, and provide a comparative evaluation of the different schemes in terms of abstraction efficiency, fairness to VPNs and call performance characteristics achieved.
文摘ion and classification is put forward for periodic cyclic nonstationary vibration signal. The proposed method is applied to experimental data of an ISUZU C240 diesel engine. Experiment results show the effectiveness of the proposed method in classification of engine faults.
基金Supported by Research Fellowships of Japan Society for the Promotion of Science for Young Scientists(11-0 6 2 82 )
文摘Structures using constructors are of ordinary use in functional programming to represent data structures of unbound size. Lack of associativity of constructors, however, hinders program analyses or efficient executions. This paper describes ideas of abstraction toward constructors, and similarly abstraction from constructing functions, which we call functional constructors. We demonstrate our ideas making program analyses easier and enable transformation to efficient execution.
文摘ion technique of interference fringes used in phase modulation and phase scanning modulation interferometer is presented. For the measurement of amplitudes of interference fringes, fringes are fitted and their central points are determined automatically according to their distribution rules. However, for the measurement of their phases, fringes should be recognized and processed with different calculating algorithms and least square optimization methods depending on the scanning modulation mode. When this technique is used for measurement of surface roughness, the measurement uncertainty is better than 5nm and the repeatability is less than 5%.
文摘The two channels of the CH(3)OH+Cl hydrogen abstraction reaction, leading to the final products CH(2)OH+HCl (i) and CH(3)O+HCl (ii), have been studied by performing ab initio MP2 calculations with the triplet split-valence polarization basis sets. For each of the two channels the following simple reaction path is predicted: reactants --> transition state --> intermediate --> products. The previously reported complicated paths(2) calculated without using the IRC technique are criticized. Our calculations indicate that channel (i) is exothermic and has a negligible energy barrier while channel (ii) is endothermic and has a substantial energy barrier. These results imply that channel (i) is favorable, which is in line with experiment.
基金supported by the Natural Science Foundation of Shanghai (Grant No.09ZR1412100)the National Natural Science Foundation of China (Grant No.60673115)the Shanghai Leading Academic Discipline Project (Grant No.J50103)
文摘This paper adopts counterexample guided abstraction refinement scheme to alleviate the state explosion problem of deadlock detection. We extend the classical labeled transition system models by qualifying transitions as certain and uncertain to make deadlock-freedom conservative, i.e. if the abstraction of a system is deadlock-free, then the system is deadlock-free. An abstraction refinement approach to deadlock detection is proposed, and the correctness of the approach is proved.
文摘Aspects of human behavior in cyber security allow more natural security to the user. This research focuses the appearance of anticipating cyber threats and their abstraction hierarchy levels on the mental picture levels of human. The study concerns the modeling of the behaviors of mental states of an individual under cyber attacks. The mental state of agents being not observable, we propose a non-stationary hidden Markov chain approach to model the agent mental behaviors. A renewal process based on a nonparametric estimation is also considered to investigate the spending time in a given mental state. In these approaches, the effects of the complexity of the cyber attacks are taken into account in the models.
文摘The addition and abstraction reactions of OH radical with benzoate anion are investigated by density functional theory calculations that include solvent effects using UB3LYP, UCAM-B3LYP, UmPW1PW91 and UM06-2X functionals with the 6-311++G(2d,2p) basis set. Geometry optimizations of the reactants, products and transition state species are performed for the possible reaction paths. For the addition reactions, those targeting the ipso-, ortho-, meta- and para-carbons are predicted to be exoergic. The H-atom abstraction reactions from ortho, meta and para positions are also predicted to be exoergic. On the basis of the rate constants calculated by means of the transition state theory, the H-atom abstraction reaction from the ortho position is determined to be the favored path followed by the ortho OH addition reaction.
文摘A non-photorealistic rendering technique is a method to show various effects different from those of realistic image generation.Of the various techniques,flow-based image abstraction displays the shape and color features well and performs a stylistic visual abstraction.But real-time rendering is impossible when CPU is used because it applies various filtering and iteration methods.In this paper,we present real-time processing methods of video abstraction using open open computing language(OpenCL),technique of general-purpose computing on graphics processing units(GPGPU).Through the acceleration of general-purpose computing(GPU),16 frame-per-second(FPS)or greater is shown to process video abstraction.
文摘Simulators are generally used during the design of computer architectures. Typically, different simulators with different levels of complexity, speed and accuracy are used. However, for early design space exploration, simulators with less complexity, high simulation speed and reasonable accuracy are desired. It is also required that these simulators have a short development time and that changes in the design require less effort in the implementation in order to perform experiments and see the effects of changes in the design. These simulators are termed high-level simulators in the context of computer architecture. In this paper, we present multiple levels of abstractions in a high-level simulation of a general-purpose many-core system, where the objective of every level is to improve the accuracy in simulation without significantly affecting the complexity and simulation speed.
文摘The operational function of the trunk limbs (thoracic appendages), of Daphnia, P3 and P4, is a long-term disputed definition between “solid walls”, sieving filters. Sieving is unlikely process for routine particle collection, particle capture is not a simple mechanical process and not by sieving alone. Analysis promotion supported by direct observational examination of the in-vivo cinematographic slow-motion film and magnified solid photos of tethered Daphnia by high-speed camera (250 frames per second) resulted in a definite interpretation presented in this paper. The Daphnia’s feeding mechanism achieves particles abstraction not by sieving. The existence of two internal alternate water flow routs was indicated: Lateral and Median. These micro flow structures are suggested as vulnerability reduction.
基金supported in part by the National Key Research and Development Program of China(2018YFB1700403)the Special Funds for the Construction of an Innovative Province of Hunan(2020GK2028)+1 种基金the National Natural Science Foundation of China(Grant Nos.61872388,62072470)the Natural Science Foundation of Hunan Province(2020JJ4758).
文摘Massive sequence view (MSV) is a classic timeline-based dynamic network visualization approach. However, it is vulnerable to visual clutter caused by overlapping edges, thereby leading to unexpected misunderstanding of time-varying trends of network communications. This study presents a new edge sampling algorithm called edge-based multi-class blue noise (E-MCBN) to reduce visual clutter in MSV. Our main idea is inspired by the multi-class blue noise (MCBN) sampling algorithm, commonly used in multi-class scatterplot decluttering. First, we take a node pair as an edge class, which can be regarded as an analogy to classes in multi-class scatterplots. Second, we propose two indicators, namely, class overlap and inter-class conflict degrees, to measure the overlapping degree and mutual exclusion, respectively, between edge classes. These indicators help construct the foundation of migrating the MCBN sampling from multi-class scatterplots to dynamic network samplings. Finally, we propose three strategies to accelerate MCBN sampling and a partitioning strategy to preserve local high-density edges in the MSV. The result shows that our approach can effectively reduce visual clutters and improve the readability of MSV. Moreover, our approach can also overcome the disadvantages of the MCBN sampling (i.e., long-running and failure to preserve local high-density communication areas in MSV). This study is the first that introduces MCBN sampling into a dynamic network sampling.
基金supported in part by the National Key Research and Development Program of China under Grant No.2020AAA-0108502the National Natural Science Foundation of China under Grant Nos.61972244,U19A2060,and 61925206the HighTech Support Program from Shanghai Committee of Science and Technology under Grant No.19511121100.
文摘Nowadays,application migration becomes more and more attractive.For example,it can make computation closer to data sources or make service closer to end-users,which may significantly decrease latency in edge computing.Yet,migrating applications among servers that are controlled by different platform owners raises security issues.We leverage hardware-secured trusted execution environment(TEE,aka.,enclave)technologies,such as Intel SGX,AMD SEV,and ARM TrustZone,for protecting critical computations on untrusted servers.However,these hardware TEEs propose non-uniform programming abstractions and are based on heterogeneous architectures,which not only forces programmers to develop secure applications targeting some specific abstraction but also hinders the migration of protected applications.Therefore,we propose UniTEE which gives a unified enclave programming abstraction across the above three hardware TEEs by using a microkernel-based design and enables the secure enclave migration by integrating heterogeneous migration techniques.We have implemented the prototype on real machines.The evaluation results show the migration support incurs nearly-zero runtime overhead and the migration procedure is also efficient.
基金Supported by the National Natural Science Foundation of China (Grant No. 20335030)Foundation of Education Committee of Gansu Province (Grant No. 0708-11)
文摘The insertion and abstraction reaction mechanisms of singlet and triplet CCl2 with CH3MH (M=O, S) have been studied by using the DFT, NBO and AIM methods. The geometries of reactions, the transition state and products were completely optimized by B3LYP/6-311G(d, p). All the energy of the species was obtained at the CCSD(T)/6-311G(d, p) level. The calculated results indicated that the major pathways of the reaction were obtained on the singlet potential energy surface. The singlet CCl2 can not only trigger the insertion reaction with C-H and M-H in four pathways, by which the products P1 [CH3OCHCl2, reactionⅠ(1)], P3[Cl2HCCH2OH, reactionⅠ(2)], P5[CH3SCHCl2, reactionⅡ(1)] and P7[Cl2HCCH2SH, reac-tion Ⅱ(2)] are produced respectively, but also abstract M-H, resulting P4 [CH2O+CH2Cl2, reactionⅠ(3)] and P8[CH2S+CH2Cl2, reactionⅡ(3)]. In addition, the important geometries in domain pathways have been studied by AIM and NBO theories.
基金Supported by the National Natural Science Foundation of China (Grant Nos. 60573012 and 60421001) the National Grand FundamentalResearch 973 Program of China (Grant No. 2002cb312200)
文摘Model checking multi-agent systems (MAS) always suffers from the state explosion problem. In this paper we focus on an abstraction technique which is one of the major methods for overcoming this problem. For a multi-agent system, we present a novel abstraction procedure which reduces the state space by collapsing the global states in the system. The abstraction is automatically computed according to the property to be verified. The resulting abstract system simulates the concrete system, while the universal temporal epistemic properties are preserved. Our abstraction is an over-approximation. If some universal temporal epistemic property is not satisfied, then we need to identify spurious counterexamples. We further show how to reduce complex counterexamples to simple structures, i.e., paths and loops, such that the counterexamples can be checked and the abstraction can be refined efficiently. Finally, we illustrate the abstraction technique with a card game.
文摘Researchers around the world strive to communicate new knowledge,primarily via publication,with the abstract being crucial in conveying core insights.Previous research has generally analyzed the discourse features of abstracts from a macro perspective and often employed either outdated texts,such as those over a decade old,or papers written by authors with lower English academic writing proficiency as research material.In this study,we analyzed forty abstracts from leading journals in applied linguistics,evenly split between Chinese and international journals.It revealed that the use of nominalization in abstracts by Chinese and international scholars showed similarities due to the universal academic requirement for conciseness.However,due to cultural and educational differences,each group differed in their respective language choices and nominalization usage.By analyzing the application of nominalization in different cultural contexts,the results of our study offered practical suggestions for crafting abstracts that effectively convey information,thereby,contributing to the broader academic community.
文摘Embodied cognition theories propose that language comprehension triggers a sensorimotor system in the brain.However,most previous research has paid much attention to concrete and factual sentences,and little emphasis has been put on the research of abstract and counterfactual sentences.The primary challenges for embodied theories lie in elucidating the meanings of abstract and counterfactual sentences.The most prevalent explanation is that abstract and counterfactual sentences are grounded in the activation of a sensorimotor system,in exactly the same way as concrete and factual ones.The present research employed a dual-task experimental paradigm to investigate whether the embodied meaning is activated in comprehending action-related abstract Chinese counterfactual sentences through the presence or absence of action-sentence compatibility effect(ACE).Participants were instructed to read and listen to the action-related abstract Chinese factual or counterfactual sentences describing an abstract transfer word towards or away from them,and then move their fingers towards or away from them to press the buttons in the same direction as the motion cue of the transfer verb.The action-sentence compatibility effect was observed in both abstract factual and counterfactual sentences,in line with the embodied cognition theories,which indicated that the embodied meanings were activated in both action-related abstract factuals and counterfactuals.