With the increasing popularity of cloud computing, large scale of documents are being outsourced to the cloud. To avoid information leakage, sensitive files usually have to be encrypted before out-sourcing. Thus, it i...
详细信息
To achieve reliability in distributed storage systems, fault tolerance techniques like replication strategy are adopted. As the rapid growth of data, distributed storage systems have been transitioning replication str...
详细信息
In node capture attacks, an attacker intellectually captures nodes and extracts cryptographic keys from their memories to wreck security, reliability and confidentiality of wireless sensor networks. Previous methods s...
详细信息
Today, various anomalies and large number of flows in a network make traffic anomaly detection a big challenge. In this paper, we propose DTE-FP (Dual q Tsallis Entropy for flow Feature with Properties), a more effici...
详细信息
Neural network (NN) modeling has been applied to forecasting of lumpy demand (Gutierrez, Solis, and Mukhopadhyay 2008;Mukhopadhyay, Solis, and Gutierrez 2012) and empirically compared with a number of well-referenced ...
详细信息
ISBN:
(纸本)9788897999508
Neural network (NN) modeling has been applied to forecasting of lumpy demand (Gutierrez, Solis, and Mukhopadhyay 2008;Mukhopadhyay, Solis, and Gutierrez 2012) and empirically compared with a number of well-referenced methods traditionally applied in studies on lumpy demand forecasting - simple moving average, weighted moving average with optimal weights, simple exponential smoothing, Croston's method, and the Syntetos-Boylan approximation. The overall superiority of NN over the other methods, in terms of forecast accuracy based on a number of scale-free error statistics, was demonstrated. However, demand forecasting performance with respect to standard accuracy measures may not translate into inventory systems efficiency. Applying a (T,S) inventory system, we consider fill rate (FR) as service criterion. We conduct simulation searches to find orderup-to levels required to meet a target FR of 0.90 or 0.95. We find that significantly higher levels of on-hand inventory are required when using the more statistically accurate NN forecasts.
This paper presents a framework for cooperation between a human and a general game playing agent. Cooperation is defined as two entities causing each other to modify their behaviour to achieve some mutual advantage. S...
详细信息
This paper is a description of our system for SemEval-2015 Task 18: Broad-Coverage Semantic Dependency Parsing. We implement a hybrid parser which benefits from both transition-based and graph-based parsing approaches...
详细信息
Non-uniform memory access (NUMA) is one of the main architectures of today’s high-performance server. The key feature of NUMA is the non-uniformity of access latency. Access from a processor to attached memory is fas...
详细信息
Recently, wireless sensor networks can provide a practicable realtime monitoring system because wireless sensors can be easily deployed in various environments. To provide secure and efficient communication, various u...
详细信息
Recently, various types of permutation patterns such as mesh patterns, boxed-mesh patterns, and consecutive patterns, have been studied where relative order between characters is considered rather than characters them...
详细信息
暂无评论