Network science has emerged over the last years as an interdisciplinary area spanning traditional domains including mathematics, computerscience, sociology, biology and economics. Since complexity in social, biologic...
ISBN:
(纸本)9781450321747
Network science has emerged over the last years as an interdisciplinary area spanning traditional domains including mathematics, computerscience, sociology, biology and economics. Since complexity in social, biological and economical systems, and more generally in complex systems, arises through pairwise interactions there exists a surging interest in understanding *** this tutorial, we will provide an in-depth presentation of the most popular random-graph models used for modeling real-world networks. We will then discuss efficient algorithmic techniques for mining large graphs, with emphasis on the problems of extracting graph sparsifiers, partitioning graphs into densely connected components, and finding dense subgraphs. We will motivate the problems we will discuss and the algorithms we will present with real-world *** aim is to survey important results in the areas of modeling and mining large graphs, to uncover the intuition behind the key ideas, and to present future research directions.
An asynchronous P300-based brain computer interface (BCI) allows users to operate the BCI at their own pace by being able to detect a user's engagement. In our previous work, band powers has been shown to be able ...
详细信息
ISBN:
(纸本)9781467319676
An asynchronous P300-based brain computer interface (BCI) allows users to operate the BCI at their own pace by being able to detect a user's engagement. In our previous work, band powers has been shown to be able to provide additional information for characterizing user engagement and yielded better performance compared to the use of only the amplitudes of event-related potentials. In this follow up study, 19 subjects participated in an experiment which was designed to further evaluate additional predictors of user engagement using band powers. In addition to the regular P300 attended condition, two not-engaged conditions were considered: one withthe P300 stimulus matrix still shown (control 1) and the other with stimulus covered by a blank screen (control 2). Alpha and beta band activities decreased in the order of control 2, control 1 and attended. Furthermore, the attended condition had lower delta activity compared to the control conditions. Classification results indicated that band powers were better at differentiating attended and control 2 conditions. Using band powers as additional features resulted in a moderate to moderately large (dz= 0.52 to 0.74) improvement over the classification of the two conditions.
In the classic selection problem the task is to find the kth smallest of N elements. We study the complexity of this problem on a space-bounded random-access machine: the input is given in a read-only array and the ca...
详细信息
Considered the method of structure identification for macromodel distribution distribution of humidity drywall sheets based on interval difference operator.
ISBN:
(纸本)9781467364614
Considered the method of structure identification for macromodel distribution distribution of humidity drywall sheets based on interval difference operator.
this article focuses on the application of SARIMA models and Last Absolute Deviation pseudo-estimator in Auto Regression models of network traffic for various types of network protocols in sample computer networks. th...
详细信息
ISBN:
(纸本)9783642312168
this article focuses on the application of SARIMA models and Last Absolute Deviation pseudo-estimator in Auto Regression models of network traffic for various types of network protocols in sample computer networks. the models are used to build predicted patterns of traffic.
the network management, systems support the network operators by providing automation of common management tasks, fault management and automation of network reconfiguration. the testing and performance analysis of suc...
详细信息
ISBN:
(纸本)9783642312168
the network management, systems support the network operators by providing automation of common management tasks, fault management and automation of network reconfiguration. the testing and performance analysis of such system is a challenging engineering issue. In this paper the methodology for testing and performance analysis of the network management systems is proposed, based on a software device emulator. the emulator fully represents the managed devices and implements the management protocols to provide the same load on the server as the real devices. the sample results achieved by the proposed framework are presented.
Vehicular sensor networks (VSNs) are built on top of vehicular ad-hoc networks (VANETs) by equipping vehicles with sensing devices. these new technologies create a huge opportunity to extend the sensing capabilities o...
详细信息
ISBN:
(纸本)9783642312168
Vehicular sensor networks (VSNs) are built on top of vehicular ad-hoc networks (VANETs) by equipping vehicles with sensing devices. these new technologies create a huge opportunity to extend the sensing capabilities of the existing road traffic controlsystems and improve their performance. Efficient utilisation of wireless communication channel is one of the basic issues in the vehicular networks development. this paper presents and evaluates data collection algorithms that use uncertainty estimates to reduce data transmission in a VSN-based road traffic control system.
the High Energy Physics (HEP) experiments, due to their large scale, required performance and precision, have to be controlled by complex, distributed controlsystems. the systems are responsible for processing thousa...
详细信息
there is little detailed information about the lifetime of network malware and malware infected systems. there is a lot of information about the emergence of some new versions of malware, used security vulnerabilities...
详细信息
ISBN:
(纸本)9783642312168
there is little detailed information about the lifetime of network malware and malware infected systems. there is a lot of information about the emergence of some new versions of malware, used security vulnerabilities, methods and the range of infection but they are generally related to the start of life cycle of malware. Much less information is available about what happens next how long the malware actively is distributed on the network, how long operate infected hosts and how the amount of infected systems fluctuates with time. the paper presents the results of nearly two years' operation of honeypot systems, installed on unprotected research network, throwing some lights on the longtime malware activity.
In the article we study a model of TCP/UDP connection with Active Queue Management in an intermediate IP router. We use the fluid flow approximation technique to model the interactions between the set of TCP/UDP flows...
详细信息
ISBN:
(纸本)9783642312168
In the article we study a model of TCP/UDP connection with Active Queue Management in an intermediate IP router. We use the fluid flow approximation technique to model the interactions between the set of TCP/UDP flows and AQM. We model a system where RED or NLRED are the AQM policy. the obtained results confirm the advantage of our NLRED algorithm.
暂无评论