摘要:
A method, apparatus and computer program product are disclosed for incrementally checkpointing the state of a computer memory in the presence of at least one executing software application at periodic instants. A secure hash function is periodically applied to each partitioned contiguous block of memory to give a periodic block hash value. At each periodic instant, a block hash value for each block is compared with a respective preceding block hash value to determine if said memory block has changed according to whether said block hash values are different. Only changed memory blocks are stored in a checkpoint record. The memory block sizes are adapted at each periodic instant to split changed blocks into at least two parts and to merge only two non-changed contiguous blocks at a time.
摘要:
A method, apparatus and computer program product are disclosed for incrementally checkpointing the state of a computer memory in the presence of at least one executing software application at periodic instants. A secure hash function is periodically applied to each partitioned contiguous block of memory to give a periodic block hash value. At each periodic instant, a block hash value for each block is compared with a respective preceding block hash value to determine if said memory block has changed according to whether said block hash values are different. Only changed memory blocks are stored in a checkpoint record. The memory block sizes are adapted at each periodic instant to split changed blocks into at least two parts and to merge only two non-changed contiguous blocks at a time.
摘要:
In some embodiments, an apparatus includes a first switch having an egress port configured to be coupled to a second switch to collectively to define a single logical entity having a set of virtual identifiers. A first set of virtual identifiers from the set of virtual identifiers is associated with the first switch, a second set of virtual identifiers from the set of virtual identifiers is associated with the second switch. The first switch is configured to receive a forwarding table associating a first set of destination addresses with a set of identifiers local to the first switch and associating a second set of destination addresses with a set of identifiers local to the second switch. Each identifier from the first set of identifiers is uniquely associated the first set of virtual identifiers. Each identifier from the set of identifiers is uniquely associated the second set of virtual identifiers.
摘要:
A virtual device includes multiple devices connected to operate as a single device. A first one of the devices is configured to determine that the first device connects to a second one of the devices via a first link; identify a second link; determine that the second link connects the first device to the second device; and automatically aggregate the first link and the second link to form a link aggregation with the second device based on determining that the first device connects to the second device via both the first and second links. The first device is further configured to transmit packets to the second device via the first and second links of the link aggregation.
摘要:
A method using weighted aggregated ensemble model for energy demand management of buildings includes initializing data values for integrated model to measure energy consumption, perform statistical analysis on data values to estimate accurate prediction, optimizing the data values using marine predator optimization for integrated model, analyze the output to minimize the mean square error and results show improvement in accuracy of integrated model. The data values comprise of σ, maximum number of splits, minimum leaf size, and λ. The weighted aggregated ensemble model for energy demand management of buildings shows best performance compared with other predictive models such as linear regression (LR), support vector regression (SVR), multilayer perceptron neural network (MLPNN), decision tree (DT), and generalized additive model (GAM).
摘要:
A virtual device includes multiple devices connected to operate as a single device. A first one of the devices is configured to determine that the first device connects to a second one of the devices via a first link; identify a second link; determine that the second link connects the first device to the second device; and automatically aggregate the first link and the second link to form a link aggregation with the second device based on determining that the first device connects to the second device via both the first and second links. The first device is further configured to transmit packets to the second device via the first and second links of the link aggregation.
摘要:
Rolling software upgrades may be employed for a network device in a modular chassis and/or virtual chassis. The network device may include memory devices to store a software upgrade package and a group of instructions, and a processor. The processors may install the software upgrade package on a backup routing engine; determine subsets of multiple line cards on which to perform a software upgrade, where ports in each of the multiple line cards are part of a link aggregation group (LAG); initiate a reboot process for each of the subsets of multiple line cards, in sequence, where the reboot process for each of the line cards results in a software upgrade without deactivating any LAG. The processors may also switch the backup routing engine and a master routing engine to create a new master routing engine and a new backup routing engine, and install the upgrade package on the new backup routing engine.
摘要:
A virtual device includes multiple devices connected to operate as a single device. A first one of the devices is configured to determine that the first device connects to a second one of the devices via a first link; identify a second link; determine that the second link connects the first device to the second device; and automatically aggregate the first link and the second link to form a link aggregation with the second device based on determining that the first device connects to the second device via both the first and second links. The first device is further configured to transmit packets to the second device via the first and second links of the link aggregation.
摘要:
A method for data embedding in a digital image under the constraint of a pre-specified upper bound value on the amount of change in the value of a property associated with the image. For compression tolerant data hiding in digital images, a property is selected in which the required information can be embedded. The property should be such that the value obtained from the property before and after a lossy compression does not change by a significant amount, and the change should be bounded. The property should be such that a property value as obtained from the image will not vary due to compression, but only due to malicious tampering. The value obtained from the property is stored so that the image can be verified. The complete image is considered in deciding whether to increase or decrease the property value in a particular region. The method also takes into account the fact that blocks having values of 0 or L, corresponding to the minimum and maximum property values, respectively, are incapable of change in a particular region. The method also attempts to vary even the checksum (stored information), in addition to modifying the image so that the net resultant checksum and the modified image coincide with each other.
摘要:
A verification system for still images that embeds a watermark so that no visual artifacts are created in the images and thus maintains the visual quality of the image. The algorithm embeds information in an uncompressed image so as to later detect the alteration of the image, as well as the location of the alteration. The embedding of information into a source image is based on a defined mapping process. An image plane consists of macroblocks, which are themselves comprised of microblocks. A code is embedded corresponding to the value of this image property in each macroblock. The specific sequence of microblocks used for embedding this information in the watermarking image plane is a unique function of this property for the corresponding set of microblocks in the indexing image plane. This information can be later decoded from the stamped image. The watermark is embedded by combining the pixel values of the image with the watermark. The watermark is altered if the image is altered.