Dataset Viewer
Auto-converted to Parquet Duplicate
200971
int64
549k
3.01B
ontology as a source for rule generation
stringlengths
5
255
This paper discloses the potential of OWL (Web Ontology Language) ontologies for generation of rules. The main purpose of this paper is to identify new types of rules, which may be generated from OWL ontologies. Rules, generated from OWL ontologies, are necessary for the functioning of the Semantic Web Expert System. It is expected that the Semantic Web Expert System (SWES) will be able to process ontologies from the Web with the purpose to supplement or even to develop its knowledge base.
stringlengths
91
9.63k
549,074
a novel methodology for thermal analysis a 3 dimensional memory integration
The semiconductor industry is reaching a fascinating confluence in several evolutionary trends that will likely lead to a number of revolutionary changes in the design, implementation, scaling, and the use of computer systems. However, recently Moore's law has come to a stand-still since device scaling beyond 65 nm is ...
630,234
spreadsheets on the move an evaluation of mobile spreadsheets
The power of mobile devices has increased dramatically in the last few years. These devices are becoming more sophisticated allowing users to accomplish a wide variety of tasks while on the move. The increasingly mobile nature of business has meant that more users will need access to spreadsheets while away from their ...
803,423
multi view metric learning for multi view video summarization
Traditional methods on video summarization are designed to generate summaries for single-view video records; and thus they cannot fully exploit the redundancy in multi-view video records. In this paper, we present a multi-view metric learning framework for multi-view video summarization that combines the advantages of ...
1,102,481
big data analytics in future internet of things
Current research on Internet of Things (IoT) mainly focuses on how to enable general objects to see, hear, and smell the physical world for themselves, and make them connected to share the observations. In this paper, we argue that only connected is not enough, beyond that, general objects should have the capability to...
1,532,644
machine learner for automated reasoning 0 4 and 0 5
Machine Learner for Automated Reasoning (MaLARea) is a learning and reasoning system for proving in large formal libraries where thousands of theorems are available when attacking a new conjecture, and a large number of related problems and proofs can be used to learn specific theorem-proving knowledge. The last versio...
1,649,614
guarded variable automata over infinite alphabets
We define guarded variable automata (GVAs), a simple extension of finite automata over infinite alphabets. In this model the transitions are labelled by letters or variables ranging over an infinite alphabet and guarded by conjunction of equalities and disequalities. GVAs are well-suited for modeling component-based ap...
1,703,066
asynchronous cellular operations on gray images extracting topographic shape features and their relations
A variety of operations of cellular automata on gray images is presented. All operations are of a wave-front nature finishing in a stable state. They are used to extract shape descripting gray objects robust to a variety of pattern distortions. Topographic terms are used: "lakes", "dales", "dales of dales". It is shown...
1,810,480
cryptographic hardening of d sequences
This paper shows how a one-way mapping using majority information on adjacent bits will improve the randomness of d-sequences. Supporting experimental results are presented. It is shown that the behavior of d-sequences is different from that of other RNG sequences.
2,127,868
off grid doa estimation based on analysis of the convexity of maximum likelihood function
Spatial compressive sensing (SCS) has recently been applied to direction-of-arrival (DOA) estimation owing to advantages over conventional ones. However the performance of compressive sensing (CS)-based estimation methods decreases when true DOAs are not exactly on the discretized sampling grid. We solve the off-grid D...
2,131,697
gesture based continuous authentication for wearable devices the google glass case
We study the feasibility of touch gesture behavioural biometrics for implicit authentication of users on a smartglass (Google Glass) by proposing a continuous authentication system using two classifiers: SVM with RBF kernel, and a new classifier based on Chebyshev's concentration inequality. Based on data collected fro...
2,224,865
adaptability checking in multi level complex systems
A hierarchical model for multi-level adaptive systems is built on two basic levels: a lower behavioural level B accounting for the actual behaviour of the system and an upper structural level S describing the adaptation dynamics of the system. The behavioural level is modelled as a state machine and the structural leve...
2,277,080
is twitter a public sphere for online conflicts a cross ideological and cross hierarchical look
The rise in popularity of Twitter has led to a debate on its impact on public opinions. The optimists foresee an increase in online participation and democratization due to social media's personal and interactive nature. Cyber-pessimists, on the other hand, explain how social media can lead to selective exposure and ca...
2,567,775
new mechanism of combination crossover operators in genetic algorithm for solving the traveling salesman problem
Traveling salesman problem (TSP) is a well-known in computing field. There are many researches to improve the genetic algorithm for solving TSP. In this paper, we propose two new crossover operators and new mechanism of combination crossover operators in genetic algorithm for solving TSP. We experimented on TSP instanc...
2,649,379
an all around near optimal solution for the classic bin packing problem
In this paper we present the first algorithm with optimal average-case and close-to-best known worst-case performance for the classic on-line problem of bin packing. It has long been observed that known bin packing algorithms with optimal average-case performance were not optimal in the worst-case sense. In particular ...
2,755,347
reaching approximate byzantine consensus in partially connected mobile networks
We consider the problem of approximate consensus in mobile networks containing Byzantine nodes. We assume that each correct node can communicate only with its neighbors and has no knowledge of the global topology. As all nodes have moving ability, the topology is dynamic. The number of Byzantine nodes is bounded by f a...
2,907,876
formal security analysis of registration protocols for interactive systems a methodology and a case of study
In this work we present and formally analyze CHAT-SRP (CHAos based Tickets-Secure Registration Protocol), a protocol to provide interactive and collaborative platforms with a cryptographically robust solution to classical security issues. Namely, we focus on the secrecy and authenticity properties while keeping a high ...
3,076,088
numerically representing a stochastic process algebra
The syntactic nature and compositionality characteristic of stochastic process algebras make models to be easily understood by human beings, but not convenient for machines as well as people to directly carry out mathematical analysis and stochastic simulation. This paper presents a numerical representation schema for ...
3,277,280
big spectrum data the new resource for cognitive wireless networking
AbstractThe era of Big Data is here now, which has brought both unprecedented opportunities and criticalchallenges. In this article, from a perspective of cognitive wireless networking, we start with a definitionof Big Spectrum Data by analyzing its characteristics in terms of six V’s, i.e., volume, variety, velocity,ve...
3,333,725
robust multirobot coordination using priority encoded homotopic constraints
We study the problem of coordinating multiple robots along fixed geometric paths. Our contribution is threefold. First we formalize the intuitive concept of priorities as a binary relation induced by a feasible coordination solution, without excluding the case of robots following each other on the same geometric path. ...
3,365,555
ultrametric component analysis with application to analysis of text and of emotion
We review the theory and practice of determining what parts of a data set are ultrametric. It is assumed that the data set, to begin with, is endowed with a metric, and we include discussion of how this can be brought about if a dissimilarity, only, holds. The basis for part of the metric-endowed data set being ultrame...
3,765,441
efficient mixed norm regularization algorithms and safe screening methods
Sparse learning has recently received increasing attention in many areas including machine learning, statistics, and applied mathematics. The mixed-norm regularization based on the l1/lq norm with q > 1 is attractive in many applications of regression and classification in that it facilitates group sparsity in the mode...
4,177,294
qualitative propagation and scenario based explanation of probabilistic reasoning
Comprehensible explanations of probabilistic reasoning are a prerequisite for wider acceptance of Bayesian methods in expert systems and decision support systems. A study of human reasoning under uncertainty suggests two different strategies for explaining probabilistic reasoning: The first, qualitative belief propagat...
4,318,847
on the μ parameters of the petersen graph
For an undirected, simple, finite, connected graph $G$, we denote by $V(G)$ and $E(G)$ the sets of its vertices and edges, respectively. A function $\varphi:E(G)\rightarrow \{1,...,t\}$ is called a proper edge $t$-coloring of a graph $G$, if adjacent edges are colored differently and each of $t$ colors is used. The lea...
4,403,717
quantitative testing semantics for non interleaving
This paper presents a non-interleaving denotational semantics for the π-calculus. The basic idea is to define a notion of test where the outcome is not only whether a given process passes a given test, but also in how many different ways it can pass it. More abstractly, the set of possible outcomes for tests forms a se...
4,407,728
visual noise from natural scene statistics reveals human scene category representations
Our perceptions are guided both by the bottom-up information entering our eyes, as well as our top-down expectations of what we will see. Although bottom-up visual processing has been extensively studied, comparatively little is known about top-down signals. Here, we describe REVEAL (Representations Envisioned Via Evol...
4,412,340
is matching pursuit solving convex problems
Sparse recovery ({\tt SR}) has emerged as a very powerful tool for signal processing, data mining and pattern recognition. To solve {\tt SR}, many efficient matching pursuit (\texttt{MP}) algorithms have been proposed. However, it is still not clear whether {\tt SR} can be formulated as a convex problem that is solvabl...
4,481,033
on mobile bluetooth tags
This paper presents a new approach for hyper-local data sharing and delivery on the base of discoverable Bluetooth nodes. Our approach allows customers to associate user-defined data with network nodes and use a special mobile application (context-aware browser) for presenting this information to mobile users in proxim...
4,728,653
manyclaw slicing and dicing riemann solvers for next generation highly parallel architectures
Next generation computer architectures will include order of magnitude more intra-node parallelism; however, many application programmers have a difficult time keeping their codes current with the state-of-the-art machines. In this context, we analyze Hyperbolic PDE solvers, which are used in the solution of many impor...
4,913,547
fast generation of dynamic complex networks with underlying hyperbolic geometry
Complex networks have become increasingly popular for modeling real-world phenomena, ranging from web hyperlinks to interactions between people. Realistic generative network models are important in this context as they avoid privacy concerns of real data and simplify complex network research regarding data sharing, rep...
5,159,100
agent oriented approach for detecting and managing risks in emergency situations
This paper presents an agent-oriented approach to build a decision support system aimed at helping emergency managers to detect and to manage risks. We stress the flexibility and the adaptivity characteristics that are crucial to build a robust and efficient system, able to resolve complex problems. The system should b...
5,319,776
constructing strategy of online learning in higher education transaction cost economy
The online learning tools and management also known as Learning Management System (LMS) have been adopted by higher education as it allows convenient and flexibility in learning process between students and instructors or tutors with minimal cost. The adoption of online learning tools in university has allowed users (s...
5,896,900
effective spectral unmixing via robust representation and learning based sparsity
Hyperspectral unmixing (HU) plays a fundamental role in a wide range of hyperspectral applications. It is still challenging due to the common presence of outlier channels and the large solution space. To address the above two issues, we propose a novel model by emphasizing both robust representation and learning-based ...
6,657,555
optimistic rates for learning with a smooth loss
We establish an excess risk bound of O(H R_n^2 + R_n \sqrt{H L*}) for empirical risk minimization with an H-smooth loss function and a hypothesis class with Rademacher complexity R_n, where L* is the best risk achievable by the hypothesis class. For typical hypothesis classes where R_n = \sqrt{R/n}, this translates to ...
6,908,809
adadelta an adaptive learning rate method
We present a novel per-dimension learning rate method for gradient descent called ADADELTA. The method dynamically adapts over time using only first order information and has minimal computational overhead beyond vanilla stochastic gradient descent. The method requires no manual tuning of a learning rate and appears ro...
7,087,849
on channels with asynchronous side information
Several channels with asynchronous side information are introduced. We first consider channels that are state dependent with asynchronous side information at the transmitter. It is assumed that the state information sequence is a possibly delayed version of the state sequence, and that the encoder and the decoder are a...
7,271,355
sockpuppet detection in wikipedia a corpus of real world deceptive writing for linking identities
This paper describes the corpus of sockpuppet cases we gathered from Wikipedia. A sockpuppet is an online user account created with a fake identity for the purpose of covering abusive behavior and/or subverting the editing regulation process. We used a semi-automated method for crawling and curating a dataset of real s...
7,399,832
autonomous reconfiguration procedures for ejb based enterprise applications
Enterprise Applications (EA) are complex software systems for supporting the business of companies. Evolution of an EA should not affect its availability, e.g., because of a temporal shutdown, business operations may be affected. One possibility to address this problem is the seamless reconfiguration of the affected EA...
7,610,491
a cf based randomness measure for sequences
This note examines the question of randomness in a sequence based on the continued fraction (CF) representation of its corresponding representation as a number, or as D sequence. We propose a randomness measure that is directly equal to the number of components of the CF representation. This provides a means of quantif...
7,728,809
optimal auction mechanism for spectrum allocation in cognitive radio networks under uncertain spectrum availability
In this paper, we consider the problem of dynamic spectrum allocation in cognitive radio (CR) networks and propose a new sealed-bid auction framework to address the spectrum allocation problem when the spectrum is not available with certainty. In our model, we assume that the moderator plays the dual role of being a fu...
8,696,858
extended core and choosability of a graph
YVES AUBRY, JEAN-CHRISTOPHE GODIN AND OLIVIER TOGNIAbstract. A graph G is (a,b)-choosable if for any color list of size aassociated with each vertices, one can choose a subset of b colors suchthat adjacent vertices are colored with disjoint color sets. This papershows an equivalence between the (a,b)-choosability of a ...
8,796,604
conditional model checking
Software model checking, as an undecidable problem, has three possible outcomes: (1) the program satisfies the specification, (2) the program does not satisfy the specification, and (3) the model checker fails. The third outcome usually manifests itself in a space-out, time-out, or one component of the verification too...
9,255,041
service provisioning and profit maximization in network assisted adaptive http streaming
Adaptive HTTP streaming with centralized consideration of multiple streams has gained increasing interest. It poses a special challenge that the interests of both content provider and network operator need to be deliberately balanced. More importantly, the adaptation strategy is required to be flexible enough to be por...
9,420,056
statistical patterns in written language
Quantitative linguistics has been allowed, in the last few decades, within the admittedly blurry boundaries of the field of complex systems. A growing host of applied mathematicians and statistical physicists devote their efforts to disclose regularities, correlations, patterns, and structural properties of language st...
9,657,784
evasion attacks against machine learning at test time
In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data. In one pertinent, well-motivated attack scenario, an adversary may attempt to evade a deployed system at test time by carefully manipulating attack samples. In this work, we present...
9,822,165
source unfoldings of convex polyhedra via certain closed curves
We extend the notion of a source unfolding of a convex polyhedron P to be based on a closed polygonal curve Q in a particular class rather than based on a point. The class requires that Q \lives on a cone" to both sides; it includes simple, closed quasigeodesics. Cutting a particular subset of the cut locus of Q (in P)...
10,023,423
science and ethnicity how ethnicities shape the evolution of computer science research community
Globalization and the world wide web has resulted in academia and science being an international and multicultural community forged by researchers and scientists with different ethnicities. How ethnicity shapes the evolution of membership, status and interactions of the scientific community, however, is not well unders...
10,088,590
wireless sensor networks localization methods multidimensional scaling vs semidefinite programming approach
With the recent development of technology, wireless sensor networks are becoming an important part of many applications such as health and medical applications, military applications, agriculture monitoring, home and office applications, environmental monitoring, etc. Knowing the location of a sensor is important, but ...
10,346,559
comment on robustness and regularization of support vector machines by h xu et al journal of machine learning research vol 10 pp 1485 1510 2009 arxiv 0803 3490
This paper comments on the published work dealing with robustness and regularization of support vector machines (Journal of Machine Learning Research, vol. 10, pp. 1485-1510, 2009) [arXiv:0803.3490] by H. Xu, etc. They proposed a theorem to show that it is possible to relate robustness in the feature space and robustne...
10,542,216
cryptanalyzing an image encryption scheme based on logistic map
Abstract Recently, an image encryption scheme based 2 on logistic map was proposed. It has been reported by a 3 research group that its equivalent secret key can be re- 4 constructed with only one pair of known-plaintext and 5 the corresponding cipher-text. Utilizing stable distribu- 6 tion of the chaotic states genera...
11,415,338
genetic algorithm to make persistent security and quality of image in steganography from rs analysis
Retention of secrecy is one of the significant features during communication activity. Steganography is one of the popular methods to achieve secret communication between sender and receiver by hiding message in any form of cover media such as an audio, video, text, images etc. Least significant bit encoding is the sim...
11,799,683
energy aware lease scheduling in virtualized data centers
Energy efficiency has become an important measurement of scheduling algorithms in virtualized data centers. One of the challenges of energy-efficient scheduling algorithms, however, is the trade-off between minimizing energy consumption and satisfying quality of service (e.g. performance, resource availability on time ...
11,937,046
metric learning across heterogeneous domains by respectively aligning both priors and posteriors
In this paper, we attempts to learn a single metric across two heterogeneous do-mains where source domain is fully labeled and has many samples while targetdomain has only a few labeled samples but abundant unlabeled samples. Tothe best of our knowledge, this task is seldom touched. The proposed learningmodel has a sim...
12,544,235
reliable deniable and hidable communication over parallel link networks
We consider the scenario wherein Alice wants to (potentially) communicate to the intended receiver Bob over a network consisting of multiple parallel links in the presence of a passive eavesdropper Willie, who observes an unknown subset of links. A primary goal of our communication protocol is to make the communication...
12,599,010
high throughput genome wide association analysis for single and multiple phenotypes
The variance component tests used in genomewide association studies of thousands of individuals become computationally exhaustive when multiple traits are analysed in the context of omics studies. We introduce two high-throughput algorithms -- CLAK-CHOL and CLAK-EIG -- for single and multiple phenotype genome-wide asso...
12,653,049
on the design and analysis of multiple view descriptors
We propose an extension of popular descriptors based on gradient orientation histograms (HOG, computed in a single image) to multiple views. It hinges on interpreting HOG as a conditional density in the space of sampled images, where the effects of nuisance factors such as viewpoint and illumination are marginalized. H...
12,686,061
why early stage software startups fail a behavioral framework
Software startups are newly created companies with little operating history and oriented towards producing cutting-edge products. As their time and resources are extremely scarce, and one failed project can put them out of business, startups need effective practices to face with those unique challenges. However, only f...
12,798,267
an optical image encryption scheme based on depth conversion integral imaging and chaotic maps
Integral imaging-based cryptographic algorithms provides a new way to design secure and robust image encryption schemes. In this paper, we introduce a performance-enhanced image encryption schemes based on depth-conversion integral imaging and chaotic maps, aiming to meet the requirements of secure image transmission. ...
12,803,156
survey on combinatorial register allocation and instruction scheduling
Register allocation (mapping variables to processor registers or memory) and instruction scheduling (reordering instructions to increase instruction-level parallelism) are essential tasks for generating efficient assembly code in a compiler. In the past three decades, combinatorial optimization has emerged as an altern...
12,847,816
unweighted stochastic local search can be effective for random csp benchmarks
We present ULSA, a novel stochastic local search algorithm for random binary constraint satisfaction problems (CSP). ULSA is many times faster than the prior state of the art on a widely-studied suite of random CSP benchmarks. Unlike the best previous methods for these benchmarks, ULSA is a simple unweighted method tha...
12,848,949
tracking the frequency moments at all times
The traditional requirement for a randomized streaming algorithm is just {\em one-shot}, i.e., algorithm should be correct (within the stated $\eps$-error bound) at the end of the stream. In this paper, we study the {\em tracking} problem, where the output should be correct at all times. The standard approach for solvi...
13,053,856
granular association rule mining through parametric rough sets for cold start recommendation
Granular association rules reveal patterns hide in many-to-many relationships which are common in relational databases. In recommender systems, these rules are appropriate for cold start recommendation, where a customer or a product has just entered the system. An example of such rules might be "40% men like at least 3...
13,404,512
probabilistic verifiers for asymmetric debates
We examine the power of silent constant-space probabilistic verifiers that watch asymmetric debates (where one side is unable to see some of the messages of the other) between two deterministic provers, and try to determine who is right. We prove that probabilistic verifiers outperform their deterministic counterparts ...
13,864,758
lattice polytopes in coding theory
In this paper we discuss combinatorial questions about lattice polytopes motivated by recent results on minimum distance estimation for toric codes. We also include a new inductive bound for the minimum distance of generalized toric codes. As an application, we give new formulas for the minimum distance of generalized ...
13,891,724
efficient computation of mean truncated hitting times on very large graphs
Previous work has shown the effectiveness of random walk hitting times as a measure of dissimilarity in a variety of graph-based learning problems such as collaborative filtering, query suggestion or finding paraphrases. However, application of hitting times has been limited to small datasets because of computational r...
13,980,395
tight approximation of image matching
In this work we consider the image matching problem for two grayscale n n images, M1 and M2 (where pixel values range from 0 to 1). Our goal is to nd an ane transformation T that maps pixels from M1 to pixels in M2 so that the dierences over pixels p between M1(p) and M2(T (p)) is minimized. Our focus here is on sublin...
14,178,847
benchmarking motion planning algorithms an extensible infrastructure for analysis and visualization
Motion planning is a key problem in robotics that is concerned with finding a path that satisfies a goal specification subject to constraints. In its simplest form, the solution to this problem consists of finding a path connecting two states, and the only constraint is to avoid collisions. Even for this version of the...
14,230,115
lagrangian duality based algorithms in online scheduling
We consider Lagrangian duality based approaches to design and analyze algorithms for online energy-efficient scheduling. First, we present a primal-dual framework. Our approach makes use of the Lagrangian weak duality and convexity to derive dual programs for problems which could be formulated as convex assignment prob...
14,398,335
uw spf the university of washington semantic parsing framework
The University of Washington Semantic Parsing Framework (SPF) is a learning and inference framework for mapping natural language to formal representation of its meaning.
14,456,953
recognition of handwritten bangla basic characters and digits using convex hull based feature set
In dealing with the problem of recognition of handwritten character patterns of varying shapes and sizes, selection of a proper feature set is important to achieve high recognition performance. The current research aims to evaluate the performance of the convex hull based feature set, i.e. 125 features in all computed ...
14,609,079
gardner s minichess variant is solved
A 5x5 board is the smallest board on which one can set up all kind of chess pieces as a start position. We consider Gardner's minichess variant in which all pieces are set as in a standard chessboard (from Rook to King). This game has roughly 9x10^{18} legal positions and is comparable in this respect with checkers. We...
14,769,209
decentralised multi agent reinforcement learning for dynamic and uncertain environments
Multi-Agent Reinforcement Learning (MARL) is a widely used technique for optimization in decentralised control problems. However, most applications of MARL are in static environments, and are not suitable when agent behaviour and environment conditions are dynamic and uncertain. Addressing uncertainty in such environme...
15,233,957
an epistemic strategy logic
This paper presents an extension of temporal epistemic logic with operators that quantify over agent strategies. Unlike previous work on alternating temporal epistemic logic, the semantics works with systems whose states explicitly encode the strategy being used by each of the agents. This provides a natural way to exp...
15,652,975
incremental view maintenance for nested relational databases
Incremental view maintenance is an essential tool for speeding up the processing of large, locally changing workloads. Its fundamental challenge is to ensure that changes are propagated from input to output more efficiently than via recomputation. We formalize this requirement for positive nested relational algebra (NR...
15,740,608
systems for near real time analysis of large scale dynamic graphs
Graphs are widespread data structures used to model a wide variety of problems. The sheer amount of data to be processed has prompted the creation of a myriad of systems that help us cope with massive scale graphs. The pressure to deliver fast responses to queries on the graph is higher than ever before, as it is deman...
16,124,843
analyzing incentives for protocol compliance in complex domains a case study of introduction based routing
Formal analyses of incentives for compliance with network protocols often appeal to gametheoretic models and concepts. Applications of game-theoretic analysis to network security have generally been limited to highly stylized models, where simplified environments enable tractable study of key strategic variables. We pr...
16,289,923
waterfowl a compact self indexed rdf store with inference enabled dictionaries
In this paper, we present a novel approach { called WaterFowl { for the storage of RDF triples that addresses some key issues in the contexts of big data and the Semantic Web. The architecture of our prototype, largely based on the use of succinct data structures, enables the representation of triples in a self-indexed...
16,627,279
polynomial systems solving by fast linear algebra
Polynomial system solving is a classical problem in mathematics with a wide range of applications. This makes its complexity a fundamental problem in computer science. Depending on the context, solving has different meanings. In order to stick to the most general case, we consider a representation of the solutions from...
16,868,154
factors influencing the quality of the user experience in ubiquitous recommender systems
The use of mobile devices and the rapid growth of the internet and networking infrastructure has brought the necessity of using Ubiquitous recommender systems. However in mobile devices there are different factors that need to be considered in order to get more useful recommendations and increase the quality of the use...
16,874,441
a novel modified apriori approach for web document clustering
The Traditional apriori algorithm can be used for clustering the web documents based on the association technique of data mining. But this algorithm has several limitations due to repeated database scans and its weak association rule analysis. In modern world of large databases, efficiency of traditional apriori algori...
17,147,848
dynamic optimization for heterogeneous powered wireless multimedia sensor networks with correlated sources and network coding
The energy consumption in wireless multimedia sensor networks (WMSN) is much greater than that in traditional wireless sensor networks. Thus, it is a huge challenge to remain the perpetual operation for WMSN. In this paper, we propose a new heterogeneous energy supply model for WMSN through the coexistence of renewable...
17,233,403
solving linear equations using a jacobi based time variant adaptive hybrid evolutionary algorithm
Large set of linear equations, especially for sparse and structured coefficient (matrix) equations, solutions using classical methods become arduous. And evolutionary algorithms have mostly been used to solve various optimization and learning problems. Recently, hybridization of classical methods (Jacobi method and Gau...
17,842,384
a betweenness structure entropy of complex networks
The structure entropy is an important index to illuminate the structure property of the complex network. Most of the existing structure entropies are based on the degree distribution of the complex network. But the structure entropy based on the degree can not illustrate the structure property of the weighted networks....
17,860,788
intelligent paging strategy for multi carrier cdma system
Subscriber satisfaction and maximum radio resource utilization are the pivotal criteria in communication system design. In multi-Carrier CDMA system, different paging algorithms are used for locating user within the shortest possible time and best possible utilization of radio resources. Different paging algorithms und...
17,876,968
design and evaluation of mechanisms for a multicomputer object store
Multicomputers have traditionally been viewed as powerful compute engines. It is from this perspective that they have been applied to various problems in order to achieve significant performance gains. There are many applications for which this compute intensive approach is only a partial solution. CAD, virtual reality...
18,471,624
a graph based perspective to total carbon footprint assessment of non marginal technology driven projects use case of ott iptv
Life Cycle Assessment (LCA) of green and sustainable projects has been found to be a necessary analysis in order to include all upstream, downstream, and indirect impacts. Because of the complexity of interactions, the differential impacts with respect to a baseline, i.e., a business-as-usual (BAU) scenario, are common...
18,595,695
global bandits with holder continuity
Standard Multi-Armed Bandit (MAB) problems assume that the arms are independent. However, in many application scenarios, the information obtained by playing an arm provides information about the remainder of the arms. Hence, in such applications, this informativeness can and should be exploited to enable faster converg...
19,654,316
efficient and distributed secret sharing in general networks
Shamir's (n, k) threshold secret sharing is an important component of several cryptographic protocols, such as those for secure multiparty-computation, key management, and Byzantine agreement. These protocols typically assume the presence of direct communication links from the dealer to all participants, in which case,...
19,690,682
the dynamics of offensive messages in the world of social media the control of cyberbullying on twitter
The 21st century has redefined the way we communicate, our concept of individual and group privacy, and the dynamics of acceptable behavioral norms. The messaging dynamics on Twitter, an internet social network, has opened new ways/modes of spreading information. As a result cyberbullying or in general, the spread of o...
19,777,160
an implementation of sub cad in maple
AbstractCylindrical algebraic decomposition (CAD) is an important tool for the investiga-tion of semi-algebraic sets, with applications in algebraic geometry and beyond. Wehave previously reported on an implementation of CAD in Maple which offers theoriginal projection and lifting algorithm of Collins along with subsequ...
20,142,263
novelty search in competitive coevolution
One of the main motivations for the use of competitive coevolution systems is their ability to capitalise on arms races between competing species to evolve increasingly sophisticated solutions. Such arms races can, however, be hard to sustain, and it has been shown that the competing species often converge prematurely ...
21,181,113
a framework of constructions of minimum storage regenerating codes with the optimal update access property for distributed storage systems based on invariant subspace technique
In this paper, we present a generic framework for constructing systematic minimum storage regenerating codes with two parity nodes based on invariant subspace technique. Codes constructed in our framework not only contain some best known codes as special cases, but also include some new codes with good properties such ...
21,492,475
do starting and ending effects in fixed price group buying differ
With the growing popularity of group-buying websites, a plethora of group-buying options is available to consumers. Given this range of choices, information diffusion in group-buying can greatly influence consumers' purchase decisions. Our study uses large-scale datasets from the top two group-buying websites in China,...
21,537,352
the vectorial λ calculus
We describe a type system for the linear-algebraic λ-calculus. The type system accounts for the linear-algebraic aspects of this extension of λ-calculus: it is able to statically describe the linear combinations of terms that will be obtained when reducing the programs. This gives rise to an original type theory where ...
21,732,078
collaborative p2p streaming of interactive live free viewpoint video
We study an interactive live streaming scenario where multiple peers pull streams of the same free viewpoint video that are synchronized in time but not necessarily in view. In free viewpoint video, each user can periodically select a virtual view between two anchor camera views for display. The virtual view is synthes...
21,814,889
diameters of permutation groups on graphs and linear time feasibility test of pebble motion problems
Let $G$ be an $n$-vertex connected, undirected, simple graph. The vertices of $G$ are populated with $n$ uniquely labeled pebbles, one on each vertex. Allowing pebbles on cycles of $G$ to rotate (synchronous rotations along multiple disjoint cycles are permitted), the resulting pebble permutations form a group $\G$ uni...
21,938,781
enhancing navigation on wikipedia with social tags
Social tagging has become an interesting approach to improve search and navigation over the actual Web, since it aggregates the tags added by different users to the same resource in a collaborative way. This way, it results in a list of weighted tags describing its resource. Combined to a classical taxonomic classifica...
22,313,492
controlling a software defined network via distributed controllers
In this paper, we propose a distributed OpenFlow controller and an associated coordination framework that achieves scalability and reliability even under heavy data center loads. The proposed framework, which is designed to work with all existing OpenFlow controllers with minimal or no required changes, provides suppor...
22,413,998
extracting herbrand trees from coq
Software certification aims at proving the correctness of programs but in many cases, the use of external libraries allows only a conditional proof: it depends on the assumption that the libraries meet their specifications. In particular, a bug in these libraries might still impact the certified program. In this case, ...
22,895,787
animation of virtual mannequins robot like simulation or motion captures
In order to optimize the costs and time of design of the new products while improving their quality, concurrent engineering is based on the digital model of these products, the numerical model. However, in order to be able to avoid definitively physical model, old support of the design, without loss of information, new...
22,981,764
tractable strong outlier identification
In knowledge bases expressed in default logic, outliers are sets of literals, or observations, that feature unexpected properties. This paper introduces the notion of strong outliers and studies the complexity problems related to outlier recognition in the fragment of acyclic normal unary theories and the related one o...
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
5