One-dimensional fragment of first-order logic is obtained by restricting quantification to blocks of existential quantifiers that leave at most one variable free. We investigate one-dimensional fragment over words and...
详细信息
Cooperation among nodes is mandatory for smooth operation of Mobile Ad Hoc Networks (MANETs) in terms of data routing. A participating node may refuse to deplete its resources for the benefit of others because of not ...
详细信息
ISBN:
(纸本)9781509018574
Cooperation among nodes is mandatory for smooth operation of Mobile Ad Hoc Networks (MANETs) in terms of data routing. A participating node may refuse to deplete its resources for the benefit of others because of not getting any direct advantage for its service. Nodes showing such behavior are called selfish or non-cooperative nodes. Non-cooperative nodes can severely affect the performance of MANETs. Noncooperative behavior of nodes in the MANETs may lead to network partitioning. In this paper, we address the issue of noncooperative behavior by incorporating the concept of fuzzy logic closely coupled withthe concept of trust. Fuzzy-based analyzer is used to distinguish between the non-cooperative behavior nodes and trustworthy nodes. We propose a fuzzy-based scheme to detect and isolate non-cooperative nodes in MANETs. In the proposed scheme, every node in the network constantly monitors its one-hop neighbors for their actions. Every node computes the trust of the observed neighbors. these trust values are passed on to a fuzzy function which is mapped into different classes. the resulting classes show the trust levels of the observed nodes. On the basis of the calculated trust value, the non-cooperative nodes are detected and isolated from the active routes of the MANET. Proposed fuzzy-based scheme is robust enough in terms of detecting packet drop attack in the network. Results show that proposed scheme detects non-cooperative nodes effectively with low false positives rate. Moreover, proposed scheme increases the packet delivery ratio and throughput in the presence of noncooperative nodes in the network.
We consider the problem of serving a set of sensors/end-users at multi-level quality of service. Consider for example the problem, which arises in augmented reality applications, of single-hop radio broadcasting a com...
详细信息
ISBN:
(纸本)9781509024612
We consider the problem of serving a set of sensors/end-users at multi-level quality of service. Consider for example the problem, which arises in augmented reality applications, of single-hop radio broadcasting a common content from a provider. Each end-user requires a minimal quality level of the common content. the provider must satisfy all end-users at their required minimal quality level with a point-to-point encrypted transmission. Since the number of different quality level versions of the common content cannot be as large as the number of end-users, the provider has to partition the end-users into groups. the provider adopts for each group a quality level which is the maximum among the levels required by the end-users of that group. In doing so, the provider incurs into an encryption and transmission cost which is proportional to the product between the end-user group size and the adopted quality level. Such a problem consists in finding a partition of the end-users that satisfies their requests and minimizes the overall provider cost. these quality of service problems are optimally solved in polynomial time by dynamic programming techniques for an arbitrary number of end-users. A faster greedy heuristic is also proposed which quickly finds a solution very close to the optimum one.
A group of wireless devices withthe ability to sense physical events (sensors) or/and to perform relatively complicated actions (actors), is referred to as Wireless Sensor and Actor Network (WSAN). In this work, we p...
详细信息
ISBN:
(纸本)9781509018574
A group of wireless devices withthe ability to sense physical events (sensors) or/and to perform relatively complicated actions (actors), is referred to as Wireless Sensor and Actor Network (WSAN). In this work, we propose and implement two Fuzzy Based Actor Selection Systems (FBASS): FBASS1 and FBASS2 for actor selection in WSANs. the systems decide whether the actor will be selected for the required job or not, based on data supplied by sensors and actual actor condition. the simulation results show that the proposed systems decide the actor selection in order to have short delays, low energy consumption and proper task assignment. Comparing FBASS1 with FBASS2, the FBASS2 is more complex than FBASS1, because it has more rules in FRB. However, FBASS2 is able to decide secure actor nodes, which makes the system more secure.
the height of a piecewise-testable language L is the maximum length of the words needed to define L by excluding and requiring given subwords. the height of L is an important descriptive complexity measure that has no...
详细信息
ISBN:
(纸本)9783959770224
the height of a piecewise-testable language L is the maximum length of the words needed to define L by excluding and requiring given subwords. the height of L is an important descriptive complexity measure that has not yet been investigated in a systematic way. this paper develops a series of new techniques for bounding the height of finite languages and of languages obtained by taking closures by subwords, superwords and related operations. As an application of these results, we show that FO2 (A∗
We investigate the proof theory of a modal fragment of XPath equipped with data (in)equality tests over finite data trees, i.e. over finite unranked trees where nodes are labelled with both a symbol from a finite alph...
详细信息
During the past decade, dependence logic has emerged as a formalism suitable for expressing and analyzing notions of dependence and independence that arise in different scientific areas. the sentences of dependence lo...
详细信息
Derived values are values calculated from base values. they can be expressed in object-oriented languages by means of getters calculating the derived value, and in relational or logic databases by means of (materializ...
详细信息
Boolean functions in Answer Set programming have proven a useful modelling tool. they are usually specified by means of aggregates or external atoms. A crucial step in computing answer sets for logic programs containi...
详细信息
ISBN:
(纸本)9781577357605
Boolean functions in Answer Set programming have proven a useful modelling tool. they are usually specified by means of aggregates or external atoms. A crucial step in computing answer sets for logic programs containing Boolean functions is verifying whether partial interpretations satisfy a Boolean function for all possible values of its undefined atoms. In this paper, we develop a new methodology for showing when such checks can be done in deterministic polynomial time. this provides a unifying view on all currently known polynomial time decidability results, and furthermore identifies promising new classes that go well beyond the state of the art. Our main technique consists of using an ordering on the atoms to significantly reduce the necessary number of model checks. For many standard aggregates, we show how this ordering can be automatically obtained.
the first intelligent tutoring systems for computer programming have been proposed more than 30 years ago, mostly focusing on well defined programming tasks e.g. in the context of logicprogramming. Recent systems als...
详细信息
暂无评论