To solve the contradiction in using Dempster's method for the combination of highly conflicting evidences, an improved evidence combination method is presented based on Mahalanobis distance weight coefficients. Fi...
详细信息
ISBN:
(纸本)9783642192623
To solve the contradiction in using Dempster's method for the combination of highly conflicting evidences, an improved evidence combination method is presented based on Mahalanobis distance weight coefficients. First of all, the similarities between evidences are used as an approach to judge whether conflict exists. If there are more than 3 evidences consisting of conflicts, the Mahalanobis Distance algorithm can be used to calculate the,distance between each evidence and the others to obtain the evidences' weight coefficients, which could be transformed into BPA functions by means of the coefficients, and finally the Dempster's method is used for the combination. stimulation results show that this method can deal with conflicting evidences effectively, calculate faster than traditional algorithms, reduce more uncertainty in recognizing results, and retain the advantages of Dempster's method in tackling non-conflicting evidences.
This paper presents a method to identify the topics of documents based on Wikipedia category network. It is to improve the method previously proposed by Schonhofen by taking into account the weights of words in hyperl...
详细信息
ISBN:
(纸本)9781424450862
This paper presents a method to identify the topics of documents based on Wikipedia category network. It is to improve the method previously proposed by Schonhofen by taking into account the weights of words in hyperlink texts in Wikipedia articles. The experiments on Computing and Team Sport domains have been carried out and showed that our proposed method outperforms the Schonhofen's one.
In the world of recommender systems, it is a common practice to use public available datasets from different application environments (e.g. MovieLens, Book-Crossing, or Each- Movie) in order to evaluate recommendation...
详细信息
There is a growing interest in computational game theory, the study of algorithms for analyzing multi-agent strategic interaction cast as games. Work in this field has primarily focused on algorithmic complexity of so...
详细信息
ISBN:
(纸本)9781450330121
There is a growing interest in computational game theory, the study of algorithms for analyzing multi-agent strategic interaction cast as games. Work in this field has primarily focused on algorithmic complexity of solving given game forms, with relatively little attention paid to concerns about managing data underlying game models. We propose a model of game-play data implementable by a relational database system, designed to scale to the vast quantities of observations needed to describe real-world strategic scenarios with sufficient fidelity. Our model enables performing common game-theoretic analysis in the database, using a flexible, compact representation of games. Copyright 2014 ACM.
The proceedings contain 77 papers. The special focus in this conference is on Complexity theory and Graph Drawing. The topics include: The complexity of mean payoff games;approximation of coNP sets by NP-complete sets...
ISBN:
(纸本)354060216X
The proceedings contain 77 papers. The special focus in this conference is on Complexity theory and Graph Drawing. The topics include: The complexity of mean payoff games;approximation of coNP sets by NP-complete sets;an efficient orthogonal grid drawing algorithm for cubic graphs;constrained independence system and triangulations of planar point sets;three dimensional weak visibility;rectangulating rectilinear polygons in parallel;efficient randomized incremental algorithm for the closest pair problem using leafary trees;computing infinite relations using finite expressions;set-term unification in a logic database language;computations with finite closure systems and implications;optimal algorithms for finding connected components of an unknown graph;the multi-weighted spanning tree problem;algorithmic graph embeddings;a highly fault-tolerant quorum consensus method for managing replicated data;constructing craig interpolation formulas;currying of order-sorted term rewriting systems;stack and queue number of 2-trees;shortest paths in random weighted graphs;small weight bases for hamming codes;toeplitz words, generalized periodicity and periodically iterated morphisms;a construction for enumerating k-coloured motzkin paths;on public-key cryptosystem based on church-rosser string-rewriting systems;extending the hong-kung model to memory hierarchies;on log-time alternating turing machines of alternating depth k;new bound for affine resolvable designs and its application to authentication codes;efficient parallel algorithms for some tree layout problems and conservative algorithms for parallel and sequential integer sorting.
Testing satisfaction of guards is the essential operation of concurrent constraint programming (CCP) systems. We present and prove correct, for the first time, an incremental algorithm for the simultaneous tests of en...
详细信息
ISBN:
(纸本)3540602992
Testing satisfaction of guards is the essential operation of concurrent constraint programming (CCP) systems. We present and prove correct, for the first time, an incremental algorithm for the simultaneous tests of entailment and disentailment of rational tree constraints to be used in CCP systems with deep guards (e.g., in AKL or in Oz). The algorithm is presented as the simplification of the constraints which form the (possibly deep) guards and which are situated at different nodes in a tree (of arbitrary depth). The nodes correspond to local computation spaces. In this algorithm, a variable may have multiple bindings (which each represent a constraint on that same variable in a different node). These may be realized in various ways. We give a simple fixed-point algorithm and use it for proving that the tests implemented by another, practical algorithm are correct and complete for entailment and disentailment. We formulate the results in this paper for rational tree constraints;they can be adapted to finite and feature trees.
The Discrete EVent system Specification (DEVS) formalism allows for highly modular, hierarchical modelling of timed, reactive systems. DEVS can be used to describe complex control structures for programmed graph trans...
详细信息
ISBN:
(纸本)9783540699262
The Discrete EVent system Specification (DEVS) formalism allows for highly modular, hierarchical modelling of timed, reactive systems. DEVS can be used to describe complex control structures for programmed graph transformation. A side-effect of this approach is the introduction of an explicit notion of time. In this paper we show how the explicit notion of time allows for the simulation-based design of reactive systems such as modern computer games. We use the well-known game of PacMan as an example and model its dynamics with programmed graph transformation based on DEVS. This also allows the modelling of player behaviour, incorporating data about human players' behaviour and reaction times. Thus, a model of both player and game is obtained which can be used to evaluate, through simulation, the playability of a game design. We propose a playability performance measure and vary parameters of the PacMan game. For each variant of the game thus obtained, simulation yields a value for the quality of the game. This allows us to choose an "optimal" (from a playability point of view) game configuration. The user model is subsequently replaced by a visual interface to a real player and the game model is executed using a real-time DEVS simulator.
This article describes a simple and fast algorithm that can automatically detect any number of well separated clusters, which may be of any shape e.g. convex and/or non-convex. This is in contrast to most of the exist...
详细信息
Numerical optimization problems enjoy a significant popularity in chaos theory fields. All major chaotic techniques use such problems for various tests and experiments. However, many of these techniques encounter diff...
详细信息
ISBN:
(纸本)354028320X
Numerical optimization problems enjoy a significant popularity in chaos theory fields. All major chaotic techniques use such problems for various tests and experiments. However, many of these techniques encounter difficulties in solving some real-world problems which include non-trivial constrains. This paper discusses a closed loop algorithms (CLA) which based on chaos theory. Thus, for many constrained numerical optimization problems it might be beneficial to add a constraint, and make up of closed loop, using feedback theory. Given an initial best function value (BFV), after the first runs computation we subtract variable increment from obtained BFV, and name it as the new value. That the new value subtracts the new BFV in the next runs computation is defined the accessional constraints. Substituting the new BFV in the next AN runs for the old BFV and go on, until the global solution is searched. Eventually, some difficult test cases illustrate this approach is very available.
The proceedings contain 25 papers. The special focus in this conference is on key technologies and challenges of self-Organizing networks. The topics include: A green SON scheme based on SFFR in future cellular networ...
ISBN:
(纸本)9783319197456
The proceedings contain 25 papers. The special focus in this conference is on key technologies and challenges of self-Organizing networks. The topics include: A green SON scheme based on SFFR in future cellular networks;a graph coloring based resource allocation in cognitive networks;analyses of the interference mitigation in ad hoc network by using a heuristic scheme;blind symbol synchronization based on cyclic prefix for OFDM systems in multipath fading channels;connectivity performance of bidirectional transmission in mobile ad hoc networks;incident signals estimation based on a modified MCA learning algorithm;self-optimised coordinated traffic shifting scheme for LTE cellular systems;a survey of fastalgorithms for inter-prediction high efficiency video coding;research on self-organizing network based on MIMO technology;the key technology of LTE system in self-organized network;a video transmission system based on the self-organizing networks;fast intra prediction mode decision algorithm for HEVC;on using game theory to solve the scalable video multicasting problem in mobile ad-hoc networks;research on rate control combined with joint source-channel coding;a three-staged improved OSIC algorithm with lower complexity in MIMO system and improvement of the LR-aided MIMO SIC detection through a layered system.
暂无评论