Volume 3, Issue 1, January 2015
Pages: 1 - 10
Multimedia content in web pages poses a variety of problems to mobile web users, such as incompatibility with mobile devices or failing to meet accessibility needs of users with vision disabilities. To address those problems, this study proposes and evaluates a context-aware approach to multimedia content...
Pages: 11 - 20
The alias and references escape are often used in Java programs. They bring much convenience to the developers,
but, at the same time, they also give adverse affects on the data flow and control flow of program
during program analysis. Therefore, when analyzing Java programs, we must take the alias...
Pages: 21 - 30
In order to communicate in cipher over IP multicast, each of joining and leaving participants causes
renewing keys. Moreover, the number of renewed keys depends on the key management system. LKH,
one of the key management systems, uses a tree structure to manage keys to share with participants.
Pages: 31 - 41
We improved the serial recursion calculation process of dynamic programming and introduced parallel dynamic programming based on stage reconstruction. Through the proposed algorithm a multistage decision problem can be repeatedly reconstructed and gradually transferred to a single stage issue. This algorithm...
Pages: 42 - 50
We propose a distributed storage system which relocates data blocks autonomously among the storage
nodes. In order to optimize I/O performance with slight administrative workload, our system is aimed
at the realization of the following two functions; (i) Run-time construction of the storage tiers from...
Pages: 51 - 59
Our research group has been working on the P-adic theory and its implementation. Based on the Chinese
Remainder theorem and the Hensel code a new data type, called Multiple P-adic Data Type, has been established to
realize rational calculation. With this data type all rational number operations are...
Pages: 60 - 68
In this paper, we conducted empirical experiments to study the performance of hashing with a large set of data and compared
the results of different collision approaches. The experiment results leaned more to closed addressing than to open addressing
and deemed linear probing impractical due to its...