this book constitutes the refereed proceedings of the 23rd Australasian Joint conference on Rough Sets and Intelligent Systems Paradigms, RSEISP 2014, held in Granada and Madrid, Spain, in July 2014. RSEISP 2014 was h...
ISBN:
(数字)9783319087290
ISBN:
(纸本)9783319087283;9783319087290
this book constitutes the refereed proceedings of the 23rd Australasian Joint conference on Rough Sets and Intelligent Systems Paradigms, RSEISP 2014, held in Granada and Madrid, Spain, in July 2014. RSEISP 2014 was held along withthe 9th International conference on Rough Sets and currenttrends in Computing, RSCTC 2014, as a major part of the 2014 Joint Rough Set Symposium, JRS 2014. JRS 2014 received 40 revised full papers and 37 revised short papers which were carefully reviewed and selected from 120 submissions and presented in two volumes. this volume contains the papers accepted for the conference RSEISP 2014, as well as the three invited papers presented at the conference. the papers are organized in topical sections on plenary lecture and tutorial papers; foundations of rough set theory; granular computing and covering-based rough sets; applications of rough sets; induction of decision rules - theory and practice; knowledge discovery; spatial data analysis and spatial databases; information extraction from images.
We define two-dimensional rational automata for pictures as an extension of classical finite automata for strings. they are obtained replacing the finite relation computed by the transition function with a rational re...
详细信息
ISBN:
(纸本)9783642358432
We define two-dimensional rational automata for pictures as an extension of classical finite automata for strings. they are obtained replacing the finite relation computed by the transition function with a rational relation computed by a transducer. the model provides a uniform setting for the most important notions, techniques and results presented in the last decades for recognizable two-dimensional languages, and establishes new connections between one- and two-dimensional language theory.
the proceedings contain 45 papers. the topics discussed include: integrity and consistency for untrusted services;a structured codesign approach to many-core architectures for embedded systems;efficient algorithms for...
ISBN:
(纸本)9783642183805
the proceedings contain 45 papers. the topics discussed include: integrity and consistency for untrusted services;a structured codesign approach to many-core architectures for embedded systems;efficient algorithms for handling nondeterministic automata;tracking the evolution of code clones;liquidsoap: a high-level programming language for multimedia streaming;combining traditional map labeling with boundary labeling;on making a distinguished vertex minimum degree by vertex deletion;sequential optimization of matrix chain multiplication relative to different cost functions;collisionless gathering of robots with an extent;min-max coverage in multi-interface networks;bandwidth constrained multi-interface networks;cooperative query answering by abstract interpretation;a power consumption analysis technique using UML-based design models in embedded software development;and advice complexity and barely random algorithms.
From 2007 to 2010, researchers from Microsoft and the Verisoft XT project verified code from Hyper-V, a multi-core x-64 hypervisor, using VCC, a verifier for concurrent C code. However, there is a significant gap betw...
详细信息
ISBN:
(纸本)9783642358432
From 2007 to 2010, researchers from Microsoft and the Verisoft XT project verified code from Hyper-V, a multi-core x-64 hypervisor, using VCC, a verifier for concurrent C code. However, there is a significant gap between code verification of a kernel (such as a hypervisor) and a proof of correctness of a real system running the code. When the project ended in 2010, crucial and tricky portions of the hypervisor product were formally verified, but one was far from having an overall theory of multi core hypervisor correctness even on paper. For example, the kernel code itself has to set up low-level facilities such as its call stack and virtual memory map, and must continue to use memory in a way that justifies the memory model assumed by the compiler and verifier, even though these assumptions are not directly guaranteed by the hardware. Over the last two years, much of the needed theory justifying the approach has been worked out. We survey progress on this theory and identify the work that is left to be done.
Trust and reputation systems are decision support tools used to drive parties' interactions on the basis of parties' reputation. In such systems, parties rate with each other after each interaction. Reputation...
详细信息
ISBN:
(纸本)9783642358432
Trust and reputation systems are decision support tools used to drive parties' interactions on the basis of parties' reputation. In such systems, parties rate with each other after each interaction. Reputation scores for each ratee are computed via reputation functions on the basis of collected ratings. We propose a general framework based on Bayesian decision theory for the assessment of such systems, with respect to the number of available ratings. Given a reputation function g and n independent ratings, one is interested in the value of the loss a user may incur by relying on the ratee's reputation as computed by the system. To this purpose, we study the behaviour of both Bayes and frequentist risk of reputation functions with respect to the number of available observations. We provide results that characterise the asymptotic behaviour of these two risks, describing their limits values and the exact exponential rate of convergence. One result of this analysis is that decision functions based on Maximum-Likelihood are asymptotically optimal. We also illustrate these results through a set of numerical simulations.
A graph with forbidden transitions is a pair (G, F-G) where G := (V-G, E-G) is a graph and FG is a subset of the set {({y, x}, {x, z}) epsilon E-G(2)}. A path in a graph with forbidden transitions (G, F-G) is a path i...
详细信息
ISBN:
(纸本)9783642358432
A graph with forbidden transitions is a pair (G, F-G) where G := (V-G, E-G) is a graph and FG is a subset of the set {({y, x}, {x, z}) epsilon E-G(2)}. A path in a graph with forbidden transitions (G, F-G) is a path in G such that each pair ({y, x}, {x, z}) of consecutive edges does not belong to FG. It is shown in [S. Szeider, Finding paths in graphs avoiding forbidden transitions, DAM 126] that the problem of deciding the existence of a path between two vertices in a graph with forbidden transitions is Np-complete. We give an exact exponential time algorithm that decides in time O(2(n) center dot n(5) center dot log(n)) whether there exists a path between two vertices of a given n-vertex graph with forbidden transitions. We also investigate a natural extension of the minimum cut problem: we give a polynomial time algorithm that computes a set of forbidden transitions of minimum size that disconnects two given vertices (while in a minimum cut problem we are seeking for a minimum number of edges that disconnect the two vertices). the polynomial time algorithm for that second problem is obtained via a reduction to a standard minimum cut problem in an associated allowed line graph.
Non-local games are studied in quantum information because they provide a simple way for proving the difference between the classical world and the quantum world. A non-local game is a cooperative game played by 2 or ...
详细信息
the International Workshop on Emerging trends in Software Metrics aims at gathering together researchers and practitioners to discuss the progress of software metrics. the motivation for this workshop is the low impac...
详细信息
ISBN:
(纸本)9781467330756
the International Workshop on Emerging trends in Software Metrics aims at gathering together researchers and practitioners to discuss the progress of software metrics. the motivation for this workshop is the low impact that software metrics has on current software development. the goals of this workshop includes critically examining the evidence for the effectiveness of existing metrics and identifying new directions for metrics. Evidence for existing metrics includes how the metrics have been used in practice and studies showing their effectiveness. Identifying new directions includes use of new theories, such as complex network theory, on which to base metrics.
the k-COLORING problem is to test whether a graph can be colored with at most k colors such that no two adjacent vertices receive the same color. If a graph C does not contain a graph H as an induced subgraph, then C ...
详细信息
ISBN:
(纸本)9783642276590;9783642276606
the k-COLORING problem is to test whether a graph can be colored with at most k colors such that no two adjacent vertices receive the same color. If a graph C does not contain a graph H as an induced subgraph, then C is called H-free. For any fixed graph H on at most 6 vertices, it is known that 3-COLORING is polynomial-time solvable on H-free graphs whenever H is a linear forest and NP-complete otherwise. By solving the missing case P-2+P-3, we prove the same result for 4-COLORING provided that H is a fixed graph on at most 5 vertices.
We consider computations of a Turing machine under noise that causes consecutive violations of the machine's transition function. Given a constant upper bound β on the size of bursts of faults, we construct a Tur...
详细信息
暂无评论