200971 int64 549k 3.01B | ontology as a source for rule generation stringlengths 5 255 | This paper discloses the potential of OWL (Web Ontology Language) ontologies for generation of rules. The main purpose of this paper is to identify new types of rules, which may be generated from OWL ontologies. Rules, generated from OWL ontologies, are necessary for the functioning of the Semantic Web Expert System. It is expected that the Semantic Web Expert System (SWES) will be able to process ontologies from the Web with the purpose to supplement or even to develop its knowledge base. stringlengths 91 9.63k |
|---|---|---|
549,074 | a novel methodology for thermal analysis a 3 dimensional memory integration | The semiconductor industry is reaching a fascinating confluence in several evolutionary trends that will likely lead to a number of revolutionary changes in the design, implementation, scaling, and the use of computer systems. However, recently Moore's law has come to a stand-still since device scaling beyond 65 nm is ... |
630,234 | spreadsheets on the move an evaluation of mobile spreadsheets | The power of mobile devices has increased dramatically in the last few years. These devices are becoming more sophisticated allowing users to accomplish a wide variety of tasks while on the move. The increasingly mobile nature of business has meant that more users will need access to spreadsheets while away from their ... |
803,423 | multi view metric learning for multi view video summarization | Traditional methods on video summarization are designed to generate summaries for single-view video records; and thus they cannot fully exploit the redundancy in multi-view video records. In this paper, we present a multi-view metric learning framework for multi-view video summarization that combines the advantages of ... |
1,102,481 | big data analytics in future internet of things | Current research on Internet of Things (IoT) mainly focuses on how to enable general objects to see, hear, and smell the physical world for themselves, and make them connected to share the observations. In this paper, we argue that only connected is not enough, beyond that, general objects should have the capability to... |
1,532,644 | machine learner for automated reasoning 0 4 and 0 5 | Machine Learner for Automated Reasoning (MaLARea) is a learning and reasoning system for proving in large formal libraries where thousands of theorems are available when attacking a new conjecture, and a large number of related problems and proofs can be used to learn specific theorem-proving knowledge. The last versio... |
1,649,614 | guarded variable automata over infinite alphabets | We define guarded variable automata (GVAs), a simple extension of finite automata over infinite alphabets. In this model the transitions are labelled by letters or variables ranging over an infinite alphabet and guarded by conjunction of equalities and disequalities. GVAs are well-suited for modeling component-based ap... |
1,703,066 | asynchronous cellular operations on gray images extracting topographic shape features and their relations | A variety of operations of cellular automata on gray images is presented. All operations are of a wave-front nature finishing in a stable state. They are used to extract shape descripting gray objects robust to a variety of pattern distortions. Topographic terms are used: "lakes", "dales", "dales of dales". It is shown... |
1,810,480 | cryptographic hardening of d sequences | This paper shows how a one-way mapping using majority information on adjacent bits will improve the randomness of d-sequences. Supporting experimental results are presented. It is shown that the behavior of d-sequences is different from that of other RNG sequences. |
2,127,868 | off grid doa estimation based on analysis of the convexity of maximum likelihood function | Spatial compressive sensing (SCS) has recently been applied to direction-of-arrival (DOA) estimation owing to advantages over conventional ones. However the performance of compressive sensing (CS)-based estimation methods decreases when true DOAs are not exactly on the discretized sampling grid. We solve the off-grid D... |
2,131,697 | gesture based continuous authentication for wearable devices the google glass case | We study the feasibility of touch gesture behavioural biometrics for implicit authentication of users on a smartglass (Google Glass) by proposing a continuous authentication system using two classifiers: SVM with RBF kernel, and a new classifier based on Chebyshev's concentration inequality. Based on data collected fro... |
2,224,865 | adaptability checking in multi level complex systems | A hierarchical model for multi-level adaptive systems is built on two basic levels: a lower behavioural level B accounting for the actual behaviour of the system and an upper structural level S describing the adaptation dynamics of the system. The behavioural level is modelled as a state machine and the structural leve... |
2,277,080 | is twitter a public sphere for online conflicts a cross ideological and cross hierarchical look | The rise in popularity of Twitter has led to a debate on its impact on public opinions. The optimists foresee an increase in online participation and democratization due to social media's personal and interactive nature. Cyber-pessimists, on the other hand, explain how social media can lead to selective exposure and ca... |
2,567,775 | new mechanism of combination crossover operators in genetic algorithm for solving the traveling salesman problem | Traveling salesman problem (TSP) is a well-known in computing field. There are many researches to improve the genetic algorithm for solving TSP. In this paper, we propose two new crossover operators and new mechanism of combination crossover operators in genetic algorithm for solving TSP. We experimented on TSP instanc... |
2,649,379 | an all around near optimal solution for the classic bin packing problem | In this paper we present the first algorithm with optimal average-case and close-to-best known worst-case performance for the classic on-line problem of bin packing. It has long been observed that known bin packing algorithms with optimal average-case performance were not optimal in the worst-case sense. In particular ... |
2,755,347 | reaching approximate byzantine consensus in partially connected mobile networks | We consider the problem of approximate consensus in mobile networks containing Byzantine nodes. We assume that each correct node can communicate only with its neighbors and has no knowledge of the global topology. As all nodes have moving ability, the topology is dynamic. The number of Byzantine nodes is bounded by f a... |
2,907,876 | formal security analysis of registration protocols for interactive systems a methodology and a case of study | In this work we present and formally analyze CHAT-SRP (CHAos based Tickets-Secure Registration Protocol), a protocol to provide interactive and collaborative platforms with a cryptographically robust solution to classical security issues. Namely, we focus on the secrecy and authenticity properties while keeping a high ... |
3,076,088 | numerically representing a stochastic process algebra | The syntactic nature and compositionality characteristic of stochastic process algebras make models to be easily understood by human beings, but not convenient for machines as well as people to directly carry out mathematical analysis and stochastic simulation. This paper presents a numerical representation schema for ... |
3,277,280 | big spectrum data the new resource for cognitive wireless networking | AbstractThe era of Big Data is here now, which has brought both unprecedented opportunities and criticalchallenges. In this article, from a perspective of cognitive wireless networking, we start with a definitionof Big Spectrum Data by analyzing its characteristics in terms of six V’s, i.e., volume, variety, velocity,ve... |
3,333,725 | robust multirobot coordination using priority encoded homotopic constraints | We study the problem of coordinating multiple robots along fixed geometric paths. Our contribution is threefold. First we formalize the intuitive concept of priorities as a binary relation induced by a feasible coordination solution, without excluding the case of robots following each other on the same geometric path. ... |
3,365,555 | ultrametric component analysis with application to analysis of text and of emotion | We review the theory and practice of determining what parts of a data set are ultrametric. It is assumed that the data set, to begin with, is endowed with a metric, and we include discussion of how this can be brought about if a dissimilarity, only, holds. The basis for part of the metric-endowed data set being ultrame... |
3,765,441 | efficient mixed norm regularization algorithms and safe screening methods | Sparse learning has recently received increasing attention in many areas including machine learning, statistics, and applied mathematics. The mixed-norm regularization based on the l1/lq norm with q > 1 is attractive in many applications of regression and classification in that it facilitates group sparsity in the mode... |
4,177,294 | qualitative propagation and scenario based explanation of probabilistic reasoning | Comprehensible explanations of probabilistic reasoning are a prerequisite for wider acceptance of Bayesian methods in expert systems and decision support systems. A study of human reasoning under uncertainty suggests two different strategies for explaining probabilistic reasoning: The first, qualitative belief propagat... |
4,318,847 | on the μ parameters of the petersen graph | For an undirected, simple, finite, connected graph $G$, we denote by $V(G)$ and $E(G)$ the sets of its vertices and edges, respectively. A function $\varphi:E(G)\rightarrow \{1,...,t\}$ is called a proper edge $t$-coloring of a graph $G$, if adjacent edges are colored differently and each of $t$ colors is used. The lea... |
4,403,717 | quantitative testing semantics for non interleaving | This paper presents a non-interleaving denotational semantics for the π-calculus. The basic idea is to define a notion of test where the outcome is not only whether a given process passes a given test, but also in how many different ways it can pass it. More abstractly, the set of possible outcomes for tests forms a se... |
4,407,728 | visual noise from natural scene statistics reveals human scene category representations | Our perceptions are guided both by the bottom-up information entering our eyes, as well as our top-down expectations of what we will see. Although bottom-up visual processing has been extensively studied, comparatively little is known about top-down signals. Here, we describe REVEAL (Representations Envisioned Via Evol... |
4,412,340 | is matching pursuit solving convex problems | Sparse recovery ({\tt SR}) has emerged as a very powerful tool for signal processing, data mining and pattern recognition. To solve {\tt SR}, many efficient matching pursuit (\texttt{MP}) algorithms have been proposed. However, it is still not clear whether {\tt SR} can be formulated as a convex problem that is solvabl... |
4,481,033 | on mobile bluetooth tags | This paper presents a new approach for hyper-local data sharing and delivery on the base of discoverable Bluetooth nodes. Our approach allows customers to associate user-defined data with network nodes and use a special mobile application (context-aware browser) for presenting this information to mobile users in proxim... |
4,728,653 | manyclaw slicing and dicing riemann solvers for next generation highly parallel architectures | Next generation computer architectures will include order of magnitude more intra-node parallelism; however, many application programmers have a difficult time keeping their codes current with the state-of-the-art machines. In this context, we analyze Hyperbolic PDE solvers, which are used in the solution of many impor... |
4,913,547 | fast generation of dynamic complex networks with underlying hyperbolic geometry | Complex networks have become increasingly popular for modeling real-world phenomena, ranging from web hyperlinks to interactions between people. Realistic generative network models are important in this context as they avoid privacy concerns of real data and simplify complex network research regarding data sharing, rep... |
5,159,100 | agent oriented approach for detecting and managing risks in emergency situations | This paper presents an agent-oriented approach to build a decision support system aimed at helping emergency managers to detect and to manage risks. We stress the flexibility and the adaptivity characteristics that are crucial to build a robust and efficient system, able to resolve complex problems. The system should b... |
5,319,776 | constructing strategy of online learning in higher education transaction cost economy | The online learning tools and management also known as Learning Management System (LMS) have been adopted by higher education as it allows convenient and flexibility in learning process between students and instructors or tutors with minimal cost. The adoption of online learning tools in university has allowed users (s... |
5,896,900 | effective spectral unmixing via robust representation and learning based sparsity | Hyperspectral unmixing (HU) plays a fundamental role in a wide range of hyperspectral applications. It is still challenging due to the common presence of outlier channels and the large solution space. To address the above two issues, we propose a novel model by emphasizing both robust representation and learning-based ... |
6,657,555 | optimistic rates for learning with a smooth loss | We establish an excess risk bound of O(H R_n^2 + R_n \sqrt{H L*}) for empirical risk minimization with an H-smooth loss function and a hypothesis class with Rademacher complexity R_n, where L* is the best risk achievable by the hypothesis class. For typical hypothesis classes where R_n = \sqrt{R/n}, this translates to ... |
6,908,809 | adadelta an adaptive learning rate method | We present a novel per-dimension learning rate method for gradient descent called ADADELTA. The method dynamically adapts over time using only first order information and has minimal computational overhead beyond vanilla stochastic gradient descent. The method requires no manual tuning of a learning rate and appears ro... |
7,087,849 | on channels with asynchronous side information | Several channels with asynchronous side information are introduced. We first consider channels that are state dependent with asynchronous side information at the transmitter. It is assumed that the state information sequence is a possibly delayed version of the state sequence, and that the encoder and the decoder are a... |
7,271,355 | sockpuppet detection in wikipedia a corpus of real world deceptive writing for linking identities | This paper describes the corpus of sockpuppet cases we gathered from Wikipedia. A sockpuppet is an online user account created with a fake identity for the purpose of covering abusive behavior and/or subverting the editing regulation process. We used a semi-automated method for crawling and curating a dataset of real s... |
7,399,832 | autonomous reconfiguration procedures for ejb based enterprise applications | Enterprise Applications (EA) are complex software systems for supporting the business of companies. Evolution of an EA should not affect its availability, e.g., because of a temporal shutdown, business operations may be affected. One possibility to address this problem is the seamless reconfiguration of the affected EA... |
7,610,491 | a cf based randomness measure for sequences | This note examines the question of randomness in a sequence based on the continued fraction (CF) representation of its corresponding representation as a number, or as D sequence. We propose a randomness measure that is directly equal to the number of components of the CF representation. This provides a means of quantif... |
7,728,809 | optimal auction mechanism for spectrum allocation in cognitive radio networks under uncertain spectrum availability | In this paper, we consider the problem of dynamic spectrum allocation in cognitive radio (CR) networks and propose a new sealed-bid auction framework to address the spectrum allocation problem when the spectrum is not available with certainty. In our model, we assume that the moderator plays the dual role of being a fu... |
8,696,858 | extended core and choosability of a graph | YVES AUBRY, JEAN-CHRISTOPHE GODIN AND OLIVIER TOGNIAbstract. A graph G is (a,b)-choosable if for any color list of size aassociated with each vertices, one can choose a subset of b colors suchthat adjacent vertices are colored with disjoint color sets. This papershows an equivalence between the (a,b)-choosability of a ... |
8,796,604 | conditional model checking | Software model checking, as an undecidable problem, has three possible outcomes: (1) the program satisfies the specification, (2) the program does not satisfy the specification, and (3) the model checker fails. The third outcome usually manifests itself in a space-out, time-out, or one component of the verification too... |
9,255,041 | service provisioning and profit maximization in network assisted adaptive http streaming | Adaptive HTTP streaming with centralized consideration of multiple streams has gained increasing interest. It poses a special challenge that the interests of both content provider and network operator need to be deliberately balanced. More importantly, the adaptation strategy is required to be flexible enough to be por... |
9,420,056 | statistical patterns in written language | Quantitative linguistics has been allowed, in the last few decades, within the admittedly blurry boundaries of the field of complex systems. A growing host of applied mathematicians and statistical physicists devote their efforts to disclose regularities, correlations, patterns, and structural properties of language st... |
9,657,784 | evasion attacks against machine learning at test time | In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data. In one pertinent, well-motivated attack scenario, an adversary may attempt to evade a deployed system at test time by carefully manipulating attack samples. In this work, we present... |
9,822,165 | source unfoldings of convex polyhedra via certain closed curves | We extend the notion of a source unfolding of a convex polyhedron P to be based on a closed polygonal curve Q in a particular class rather than based on a point. The class requires that Q \lives on a cone" to both sides; it includes simple, closed quasigeodesics. Cutting a particular subset of the cut locus of Q (in P)... |
10,023,423 | science and ethnicity how ethnicities shape the evolution of computer science research community | Globalization and the world wide web has resulted in academia and science being an international and multicultural community forged by researchers and scientists with different ethnicities. How ethnicity shapes the evolution of membership, status and interactions of the scientific community, however, is not well unders... |
10,088,590 | wireless sensor networks localization methods multidimensional scaling vs semidefinite programming approach | With the recent development of technology, wireless sensor networks are becoming an important part of many applications such as health and medical applications, military applications, agriculture monitoring, home and office applications, environmental monitoring, etc. Knowing the location of a sensor is important, but ... |
10,346,559 | comment on robustness and regularization of support vector machines by h xu et al journal of machine learning research vol 10 pp 1485 1510 2009 arxiv 0803 3490 | This paper comments on the published work dealing with robustness and regularization of support vector machines (Journal of Machine Learning Research, vol. 10, pp. 1485-1510, 2009) [arXiv:0803.3490] by H. Xu, etc. They proposed a theorem to show that it is possible to relate robustness in the feature space and robustne... |
10,542,216 | cryptanalyzing an image encryption scheme based on logistic map | Abstract Recently, an image encryption scheme based 2 on logistic map was proposed. It has been reported by a 3 research group that its equivalent secret key can be re- 4 constructed with only one pair of known-plaintext and 5 the corresponding cipher-text. Utilizing stable distribu- 6 tion of the chaotic states genera... |
11,415,338 | genetic algorithm to make persistent security and quality of image in steganography from rs analysis | Retention of secrecy is one of the significant features during communication activity. Steganography is one of the popular methods to achieve secret communication between sender and receiver by hiding message in any form of cover media such as an audio, video, text, images etc. Least significant bit encoding is the sim... |
11,799,683 | energy aware lease scheduling in virtualized data centers | Energy efficiency has become an important measurement of scheduling algorithms in virtualized data centers. One of the challenges of energy-efficient scheduling algorithms, however, is the trade-off between minimizing energy consumption and satisfying quality of service (e.g. performance, resource availability on time ... |
11,937,046 | metric learning across heterogeneous domains by respectively aligning both priors and posteriors | In this paper, we attempts to learn a single metric across two heterogeneous do-mains where source domain is fully labeled and has many samples while targetdomain has only a few labeled samples but abundant unlabeled samples. Tothe best of our knowledge, this task is seldom touched. The proposed learningmodel has a sim... |
12,544,235 | reliable deniable and hidable communication over parallel link networks | We consider the scenario wherein Alice wants to (potentially) communicate to the intended receiver Bob over a network consisting of multiple parallel links in the presence of a passive eavesdropper Willie, who observes an unknown subset of links. A primary goal of our communication protocol is to make the communication... |
12,599,010 | high throughput genome wide association analysis for single and multiple phenotypes | The variance component tests used in genomewide association studies of thousands of individuals become computationally exhaustive when multiple traits are analysed in the context of omics studies. We introduce two high-throughput algorithms -- CLAK-CHOL and CLAK-EIG -- for single and multiple phenotype genome-wide asso... |
12,653,049 | on the design and analysis of multiple view descriptors | We propose an extension of popular descriptors based on gradient orientation histograms (HOG, computed in a single image) to multiple views. It hinges on interpreting HOG as a conditional density in the space of sampled images, where the effects of nuisance factors such as viewpoint and illumination are marginalized. H... |
12,686,061 | why early stage software startups fail a behavioral framework | Software startups are newly created companies with little operating history and oriented towards producing cutting-edge products. As their time and resources are extremely scarce, and one failed project can put them out of business, startups need effective practices to face with those unique challenges. However, only f... |
12,798,267 | an optical image encryption scheme based on depth conversion integral imaging and chaotic maps | Integral imaging-based cryptographic algorithms provides a new way to design secure and robust image encryption schemes. In this paper, we introduce a performance-enhanced image encryption schemes based on depth-conversion integral imaging and chaotic maps, aiming to meet the requirements of secure image transmission. ... |
12,803,156 | survey on combinatorial register allocation and instruction scheduling | Register allocation (mapping variables to processor registers or memory) and instruction scheduling (reordering instructions to increase instruction-level parallelism) are essential tasks for generating efficient assembly code in a compiler. In the past three decades, combinatorial optimization has emerged as an altern... |
12,847,816 | unweighted stochastic local search can be effective for random csp benchmarks | We present ULSA, a novel stochastic local search algorithm for random binary constraint satisfaction problems (CSP). ULSA is many times faster than the prior state of the art on a widely-studied suite of random CSP benchmarks. Unlike the best previous methods for these benchmarks, ULSA is a simple unweighted method tha... |
12,848,949 | tracking the frequency moments at all times | The traditional requirement for a randomized streaming algorithm is just {\em one-shot}, i.e., algorithm should be correct (within the stated $\eps$-error bound) at the end of the stream. In this paper, we study the {\em tracking} problem, where the output should be correct at all times. The standard approach for solvi... |
13,053,856 | granular association rule mining through parametric rough sets for cold start recommendation | Granular association rules reveal patterns hide in many-to-many relationships which are common in relational databases. In recommender systems, these rules are appropriate for cold start recommendation, where a customer or a product has just entered the system. An example of such rules might be "40% men like at least 3... |
13,404,512 | probabilistic verifiers for asymmetric debates | We examine the power of silent constant-space probabilistic verifiers that watch asymmetric debates (where one side is unable to see some of the messages of the other) between two deterministic provers, and try to determine who is right. We prove that probabilistic verifiers outperform their deterministic counterparts ... |
13,864,758 | lattice polytopes in coding theory | In this paper we discuss combinatorial questions about lattice polytopes motivated by recent results on minimum distance estimation for toric codes. We also include a new inductive bound for the minimum distance of generalized toric codes. As an application, we give new formulas for the minimum distance of generalized ... |
13,891,724 | efficient computation of mean truncated hitting times on very large graphs | Previous work has shown the effectiveness of random walk hitting times as a measure of dissimilarity in a variety of graph-based learning problems such as collaborative filtering, query suggestion or finding paraphrases. However, application of hitting times has been limited to small datasets because of computational r... |
13,980,395 | tight approximation of image matching | In this work we consider the image matching problem for two grayscale n n images, M1 and M2 (where pixel values range from 0 to 1). Our goal is to nd an ane transformation T that maps pixels from M1 to pixels in M2 so that the dierences over pixels p between M1(p) and M2(T (p)) is minimized. Our focus here is on sublin... |
14,178,847 | benchmarking motion planning algorithms an extensible infrastructure for analysis and visualization | Motion planning is a key problem in robotics that is concerned with finding a path that satisfies a goal specification subject to constraints. In its simplest form, the solution to this problem consists of finding a path connecting two states, and the only constraint is to avoid collisions. Even for this version of the... |
14,230,115 | lagrangian duality based algorithms in online scheduling | We consider Lagrangian duality based approaches to design and analyze algorithms for online energy-efficient scheduling. First, we present a primal-dual framework. Our approach makes use of the Lagrangian weak duality and convexity to derive dual programs for problems which could be formulated as convex assignment prob... |
14,398,335 | uw spf the university of washington semantic parsing framework | The University of Washington Semantic Parsing Framework (SPF) is a learning and inference framework for mapping natural language to formal representation of its meaning. |
14,456,953 | recognition of handwritten bangla basic characters and digits using convex hull based feature set | In dealing with the problem of recognition of handwritten character patterns of varying shapes and sizes, selection of a proper feature set is important to achieve high recognition performance. The current research aims to evaluate the performance of the convex hull based feature set, i.e. 125 features in all computed ... |
14,609,079 | gardner s minichess variant is solved | A 5x5 board is the smallest board on which one can set up all kind of chess pieces as a start position. We consider Gardner's minichess variant in which all pieces are set as in a standard chessboard (from Rook to King). This game has roughly 9x10^{18} legal positions and is comparable in this respect with checkers. We... |
14,769,209 | decentralised multi agent reinforcement learning for dynamic and uncertain environments | Multi-Agent Reinforcement Learning (MARL) is a widely used technique for optimization in decentralised control problems. However, most applications of MARL are in static environments, and are not suitable when agent behaviour and environment conditions are dynamic and uncertain. Addressing uncertainty in such environme... |
15,233,957 | an epistemic strategy logic | This paper presents an extension of temporal epistemic logic with operators that quantify over agent strategies. Unlike previous work on alternating temporal epistemic logic, the semantics works with systems whose states explicitly encode the strategy being used by each of the agents. This provides a natural way to exp... |
15,652,975 | incremental view maintenance for nested relational databases | Incremental view maintenance is an essential tool for speeding up the processing of large, locally changing workloads. Its fundamental challenge is to ensure that changes are propagated from input to output more efficiently than via recomputation. We formalize this requirement for positive nested relational algebra (NR... |
15,740,608 | systems for near real time analysis of large scale dynamic graphs | Graphs are widespread data structures used to model a wide variety of problems. The sheer amount of data to be processed has prompted the creation of a myriad of systems that help us cope with massive scale graphs. The pressure to deliver fast responses to queries on the graph is higher than ever before, as it is deman... |
16,124,843 | analyzing incentives for protocol compliance in complex domains a case study of introduction based routing | Formal analyses of incentives for compliance with network protocols often appeal to gametheoretic models and concepts. Applications of game-theoretic analysis to network security have generally been limited to highly stylized models, where simplified environments enable tractable study of key strategic variables. We pr... |
16,289,923 | waterfowl a compact self indexed rdf store with inference enabled dictionaries | In this paper, we present a novel approach { called WaterFowl { for the storage of RDF triples that addresses some key issues in the contexts of big data and the Semantic Web. The architecture of our prototype, largely based on the use of succinct data structures, enables the representation of triples in a self-indexed... |
16,627,279 | polynomial systems solving by fast linear algebra | Polynomial system solving is a classical problem in mathematics with a wide range of applications. This makes its complexity a fundamental problem in computer science. Depending on the context, solving has different meanings. In order to stick to the most general case, we consider a representation of the solutions from... |
16,868,154 | factors influencing the quality of the user experience in ubiquitous recommender systems | The use of mobile devices and the rapid growth of the internet and networking infrastructure has brought the necessity of using Ubiquitous recommender systems. However in mobile devices there are different factors that need to be considered in order to get more useful recommendations and increase the quality of the use... |
16,874,441 | a novel modified apriori approach for web document clustering | The Traditional apriori algorithm can be used for clustering the web documents based on the association technique of data mining. But this algorithm has several limitations due to repeated database scans and its weak association rule analysis. In modern world of large databases, efficiency of traditional apriori algori... |
17,147,848 | dynamic optimization for heterogeneous powered wireless multimedia sensor networks with correlated sources and network coding | The energy consumption in wireless multimedia sensor networks (WMSN) is much greater than that in traditional wireless sensor networks. Thus, it is a huge challenge to remain the perpetual operation for WMSN. In this paper, we propose a new heterogeneous energy supply model for WMSN through the coexistence of renewable... |
17,233,403 | solving linear equations using a jacobi based time variant adaptive hybrid evolutionary algorithm | Large set of linear equations, especially for sparse and structured coefficient (matrix) equations, solutions using classical methods become arduous. And evolutionary algorithms have mostly been used to solve various optimization and learning problems. Recently, hybridization of classical methods (Jacobi method and Gau... |
17,842,384 | a betweenness structure entropy of complex networks | The structure entropy is an important index to illuminate the structure property of the complex network. Most of the existing structure entropies are based on the degree distribution of the complex network. But the structure entropy based on the degree can not illustrate the structure property of the weighted networks.... |
17,860,788 | intelligent paging strategy for multi carrier cdma system | Subscriber satisfaction and maximum radio resource utilization are the pivotal criteria in communication system design. In multi-Carrier CDMA system, different paging algorithms are used for locating user within the shortest possible time and best possible utilization of radio resources. Different paging algorithms und... |
17,876,968 | design and evaluation of mechanisms for a multicomputer object store | Multicomputers have traditionally been viewed as powerful compute engines. It is from this perspective that they have been applied to various problems in order to achieve significant performance gains. There are many applications for which this compute intensive approach is only a partial solution. CAD, virtual reality... |
18,471,624 | a graph based perspective to total carbon footprint assessment of non marginal technology driven projects use case of ott iptv | Life Cycle Assessment (LCA) of green and sustainable projects has been found to be a necessary analysis in order to include all upstream, downstream, and indirect impacts. Because of the complexity of interactions, the differential impacts with respect to a baseline, i.e., a business-as-usual (BAU) scenario, are common... |
18,595,695 | global bandits with holder continuity | Standard Multi-Armed Bandit (MAB) problems assume that the arms are independent. However, in many application scenarios, the information obtained by playing an arm provides information about the remainder of the arms. Hence, in such applications, this informativeness can and should be exploited to enable faster converg... |
19,654,316 | efficient and distributed secret sharing in general networks | Shamir's (n, k) threshold secret sharing is an important component of several cryptographic protocols, such as those for secure multiparty-computation, key management, and Byzantine agreement. These protocols typically assume the presence of direct communication links from the dealer to all participants, in which case,... |
19,690,682 | the dynamics of offensive messages in the world of social media the control of cyberbullying on twitter | The 21st century has redefined the way we communicate, our concept of individual and group privacy, and the dynamics of acceptable behavioral norms. The messaging dynamics on Twitter, an internet social network, has opened new ways/modes of spreading information. As a result cyberbullying or in general, the spread of o... |
19,777,160 | an implementation of sub cad in maple | AbstractCylindrical algebraic decomposition (CAD) is an important tool for the investiga-tion of semi-algebraic sets, with applications in algebraic geometry and beyond. Wehave previously reported on an implementation of CAD in Maple which offers theoriginal projection and lifting algorithm of Collins along with subsequ... |
20,142,263 | novelty search in competitive coevolution | One of the main motivations for the use of competitive coevolution systems is their ability to capitalise on arms races between competing species to evolve increasingly sophisticated solutions. Such arms races can, however, be hard to sustain, and it has been shown that the competing species often converge prematurely ... |
21,181,113 | a framework of constructions of minimum storage regenerating codes with the optimal update access property for distributed storage systems based on invariant subspace technique | In this paper, we present a generic framework for constructing systematic minimum storage regenerating codes with two parity nodes based on invariant subspace technique. Codes constructed in our framework not only contain some best known codes as special cases, but also include some new codes with good properties such ... |
21,492,475 | do starting and ending effects in fixed price group buying differ | With the growing popularity of group-buying websites, a plethora of group-buying options is available to consumers. Given this range of choices, information diffusion in group-buying can greatly influence consumers' purchase decisions. Our study uses large-scale datasets from the top two group-buying websites in China,... |
21,537,352 | the vectorial λ calculus | We describe a type system for the linear-algebraic λ-calculus. The type system accounts for the linear-algebraic aspects of this extension of λ-calculus: it is able to statically describe the linear combinations of terms that will be obtained when reducing the programs. This gives rise to an original type theory where ... |
21,732,078 | collaborative p2p streaming of interactive live free viewpoint video | We study an interactive live streaming scenario where multiple peers pull streams of the same free viewpoint video that are synchronized in time but not necessarily in view. In free viewpoint video, each user can periodically select a virtual view between two anchor camera views for display. The virtual view is synthes... |
21,814,889 | diameters of permutation groups on graphs and linear time feasibility test of pebble motion problems | Let $G$ be an $n$-vertex connected, undirected, simple graph. The vertices of $G$ are populated with $n$ uniquely labeled pebbles, one on each vertex. Allowing pebbles on cycles of $G$ to rotate (synchronous rotations along multiple disjoint cycles are permitted), the resulting pebble permutations form a group $\G$ uni... |
21,938,781 | enhancing navigation on wikipedia with social tags | Social tagging has become an interesting approach to improve search and navigation over the actual Web, since it aggregates the tags added by different users to the same resource in a collaborative way. This way, it results in a list of weighted tags describing its resource. Combined to a classical taxonomic classifica... |
22,313,492 | controlling a software defined network via distributed controllers | In this paper, we propose a distributed OpenFlow controller and an associated coordination framework that achieves scalability and reliability even under heavy data center loads. The proposed framework, which is designed to work with all existing OpenFlow controllers with minimal or no required changes, provides suppor... |
22,413,998 | extracting herbrand trees from coq | Software certification aims at proving the correctness of programs but in many cases, the use of external libraries allows only a conditional proof: it depends on the assumption that the libraries meet their specifications. In particular, a bug in these libraries might still impact the certified program. In this case, ... |
22,895,787 | animation of virtual mannequins robot like simulation or motion captures | In order to optimize the costs and time of design of the new products while improving their quality, concurrent engineering is based on the digital model of these products, the numerical model. However, in order to be able to avoid definitively physical model, old support of the design, without loss of information, new... |
22,981,764 | tractable strong outlier identification | In knowledge bases expressed in default logic, outliers are sets of literals, or observations, that feature unexpected properties. This paper introduces the notion of strong outliers and studies the complexity problems related to outlier recognition in the fragment of acyclic normal unary theories and the related one o... |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 5