This book constitutes the refereed proceedings of the 23rd Australasian Joint conference on Rough Sets and Intelligent systems Paradigms, RSEISP 2014, held in Granada and Madrid, Spain, in July 2014. RSEISP 2014 was h...
ISBN:
(数字)9783319087290
ISBN:
(纸本)9783319087283;9783319087290
This book constitutes the refereed proceedings of the 23rd Australasian Joint conference on Rough Sets and Intelligent systems Paradigms, RSEISP 2014, held in Granada and Madrid, Spain, in July 2014. RSEISP 2014 was held along with the 9th internationalconference on Rough Sets and Current Trends in Computing, RSCTC 2014, as a major part of the 2014 Joint Rough Set Symposium, JRS 2014. JRS 2014 received 40 revised full papers and 37 revised short papers which were carefully reviewed and selected from 120 submissions and presented in two volumes. This volume contains the papers accepted for the conference RSEISP 2014, as well as the three invited papers presented at the conference. The papers are organized in topical sections on plenary lecture and tutorial papers; foundations of rough set theory; granular computing and covering-based rough sets; applications of rough sets; induction of decision rules - theory and practice; knowledge discovery; spatial data analysis and spatial databases; information extraction from images.
The π-calculus [12] was proposed by Milner, Parrow, and Walker about twenty years ago for describing concurrent systems with mobile communication. The π-calculus is equipped with operational semantics defined in ter...
详细信息
Network coordinate systems have gained much attention as they allow for an elegant estimation of distances between nodes in distributed systems. Their most prominent representative is Vivaldi, which is using a mass-sp...
详细信息
ISBN:
(纸本)9780769549507;9781467356459
Network coordinate systems have gained much attention as they allow for an elegant estimation of distances between nodes in distributed systems. Their most prominent representative is Vivaldi, which is using a mass-spring-damper system to embed peers into a two-dimensional Euclidean coordinate space with an additional height coordinate. In unimpaired overlay networks this simple method leads to a good approximation of pairwise delays. Unfortunately, like most distributed algorithms, Vivaldi is vulnerable to Byzantine failures, leading to possible routing attacks in peer-to-peer systems. Hence, several attack methods and countermeasures have been proposed. In this article, we analyze bounds for protection of Vivaldi network coordinates and show by theory and simulation how triangle inequality violations (TIVs) can be exploited to create instabilities, despite the proposed countermeasures.
To achieve anonymous and censorship-resistant overlay communication, darknets restrict overlay links to trusted parties. Efficient data retrieval in such a restricted topology requires a decentralized addressing schem...
详细信息
ISBN:
(纸本)9780769549507;9781467356459
To achieve anonymous and censorship-resistant overlay communication, darknets restrict overlay links to trusted parties. Efficient data retrieval in such a restricted topology requires a decentralized addressing scheme. We propose a greedy embedding algorithm, which is used to realize efficient routing and content addressing for darknets. The embedding guarantees success of greedy routing using compact address representations. Evaluation on trust graphs obtained from PGP's web of trust shows that our embedding enables much more efficient routing than existing darknet embeddings. Though, content addressing based on the embedding exhibits unbalanced load.
The problem of unsupervised classification of 3D objects from depth information is investigated in this paper. The range images are represented efficiently as sensor observations. Considering the high-dimensionality o...
详细信息
This article describes a simple and fast algorithm that can automatically detect any number of well separated clusters, which may be of any shape e.g. convex and/or non-convex. This is in contrast to most of the exist...
详细信息
We introduce a method, based on genetic algorithm to automate and optimize the design of combinational circuits. Usually, logic circuits are designed by human beings who have a specific repertoire of conventional desi...
详细信息
Association rules have relied on user-specified threshold of support and confidence. With no prior/little domain knowledge, if the user is specifying threshold for the mining task;then there is a direct impact on qual...
详细信息
Graph-based clustering techniques have widely been researched in the literature. Mst-based clustering is the well known graph-based model in producing the clusters of arbitrary shapes. However, the Mst-based clusterin...
详细信息
Most widely use of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based s...
详细信息
暂无评论