We consider again quantified logic programs (QLP). QLP is a logic program where a positive number not greater than 1 called dominance is associated with each rule in the program. The intuition is that rules with highe...
详细信息
A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solutions are useful in a number of application domai...
详细信息
ISBN:
(纸本)9781424418367
A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solutions are useful in a number of application domains including text mining, role engineering as well as knowledge discovery. While a binary matrix can be decomposed in several ways, however, certain decompositions better characterize the semantics associated with the original matrix in a succinct but comprehensive way. Indeed, one can find different decompositions optimizing different criteria matching various semantics. In this paper, we first present a number of variants to the optimal Boolean matrix decomposition problem that have pragmatic implications. We then present a unified framework for modeling the optimal binary matrix decomposition and its variants using binary integer programming. Such modeling allows us to directly adopt the huge body of heuristic solutions and tools developed for binary integer programming. Although the proposed solutions are applicable to any domain of interest, for providing more meaningful discussions and results, in this paper, we present the binary matrix decomposition problem in a role engineering context, whose goal is to discover an optimal and correct set of roles from existing permissions, referred to as the role mining problem (RMP). This problem has gained significant interest in recent years as role based access control has become a popular means of enforcing security in databases. We consider several variants of the above basic RMP, including the min-noise RMP, delta-approximate RMP and edge-RMP. Solutions to each of them aid security administrators in specific scenarios. We then model these variants as Boolean matrix decomposition and present efficient heuristics to solve them.
In recent years, there has been significant interest in development of ranking functions and efficient top-kappa retrieval algorithms to help users in ad-hoe search and retrieval in databases (e.g., buyers searching f...
详细信息
ISBN:
(纸本)9781424418367
In recent years, there has been significant interest in development of ranking functions and efficient top-kappa retrieval algorithms to help users in ad-hoe search and retrieval in databases (e.g., buyers searching for products in a catalog). In this paper we focus on a novel and complementary problem: how to guide a seller in selecting the best attributes of a new tuple (e.g., new product) to highlight such that it stands out in the crowd of existing competitive products and is widely visible to the pool of potential buyers. We develop several interesting formulations of this problem. Although these problems are NP-complete, we can give several exact algorithms as well as approximation heuristics that work well in practice. Our exact algorithms are based on Integer programming (IP) formulations of the problems, as well as on adaptations of maximal frequent itemset mining algorithms, while our approximation algorithms are based on greedy heuristics. We conduct a performance study illustrating the benefits of our methods on real as well as synthetic data.
Computer-assisted vertebra segmentation in x-ray images is a challenging problem. Inter-subject variability and the generally poor contrast of digitized radiograph images contribute to the segmentation difficulty. In ...
详细信息
ISBN:
(纸本)9780769532677
Computer-assisted vertebra segmentation in x-ray images is a challenging problem. Inter-subject variability and the generally poor contrast of digitized radiograph images contribute to the segmentation difficulty. In this paper, a semi-automated live wire approach is investigated for vertebrae segmentation. The live wire approach integrates initially selected user points with dynamic programming to generate a closed vertebra boundary. In order to assess the degree to which vertebra features are conserved using the live wire technique, convex hull-based features to characterize anterior osteophytes in lumbar vertebrae are determined for live wire and manually segmented vertebrae. Anterior osteophyte discrimination was performed over 405 lumbar vertebrae, 204 abnormal vertebrae with anterior osteophytes and 201 normal vertebrae. A leave-one-out standard back propagation neural network was used for vertebrae segmentation. Experimental results show that manual segmentation yielded slightly better discrimination results than the live wire technique.
The sensor tracking problem is an important problem studied in many different fields. But many of those studies use analysis or machine learning method rather than optimization method. Recently, several approaches hav...
详细信息
ISBN:
(纸本)9781605581897
The sensor tracking problem is an important problem studied in many different fields. But many of those studies use analysis or machine learning method rather than optimization method. Recently, several approaches have been proposed to solve the static version of the tracking problem, the sensor network localization problem, via Semi-definite programming(SDP). In this paper, we analyze a new real-time sensor tracking scheme by combining the SDP approach and the gradient method. We show that this approach provides fast and accurate tracking for network sensors. We also discuss the problem of extracting information from the moving sensors, which could be used to predict their movements.
Since the last decade, Semidefinite programming (SDP) has found its important application in locating the ad hoc wireless sensor networks. By choosing proper decomposition and computation schemes, SDP has been shown v...
详细信息
ISBN:
(纸本)9781605581897
Since the last decade, Semidefinite programming (SDP) has found its important application in locating the ad hoc wireless sensor networks. By choosing proper decomposition and computation schemes, SDP has been shown very efficient to handle the localization problem. Previous research also has shown that the SDP locates the sensor networks in Rd correctly provided the underlying framework is strong uniquely localizable. In this paper, we consider the localization problem in a more general and practical scenario, that is, the sensors are in movement following a certain trajectory. We show that given the initial position of each sensor and the instantaneous distance data, the dynamic sensor networks can be can be tracked correctly in the near future when the underlying framework is infinitesimal rigid and the trajectories of the sensors are subject to mild conditions. Our result also provides a way to approximate the sensor trajectories using Taylor series based on the distance data.
The Cell Broadband Engine (CBE) is a heterogeneous multi-core processor with unique design properties for high-performance computing. It consists of one Power Processing Element (PPE) and eight Synergistic Processing ...
详细信息
Touch is a very powerful but not much studied communication mean in human-robot interaction. Nonetheless many robots are not equipped with touch sensors, because it is often difficult to place such sensors over the ro...
详细信息
With the advent of domain specific languages for model engineering, detecting inconsistencies between models is becoming increasingly challenging. Nowadays, it is not uncommon for models participating in the same deve...
详细信息
With the advent of domain specific languages for model engineering, detecting inconsistencies between models is becoming increasingly challenging. Nowadays, it is not uncommon for models participating in the same development process to be captured using different modelling languages and even different modelling technologies. We present a classification of the types of relationships that can arise between models participating in a software development process and outline the types of inconsistencies each relationship can suffer from. From this classification we identify a set of requirements for a generic inconsistency detection and reconciliation mechanism and use a case study to demonstrate how those requirements are implemented in the Epsilon validation language (EVL), a task-specific language developed in the context of the Epsilon GMT component.
The Codewitz Learning Objects for programming are interactive visualizations of program code examples or programming tasks. They have been developed to help students to understand programmingstructures more easily. A...
详细信息
ISBN:
(纸本)9789973879141
The Codewitz Learning Objects for programming are interactive visualizations of program code examples or programming tasks. They have been developed to help students to understand programmingstructures more easily. A Codewitz Learning Object can cover any specific programming problem in any programming language. Learning Objects can also cover the problem-solving logic at the algorithmic level. A learning object focuses on one specific learning goal. Each learning object has to be independent, without links to other objects or resources. Thus for example, server-side generated web pages are not valid as Codewitz Learning Objects. This independence ensures the real reusability of the learning object.
暂无评论