As an emerging technique, Mobil Edge Computing (MEC) brings high computational capacity close to the mobile users. In MEC, edge servers accept the computation-intensive demands offloaded from the mobile users. Given t...
详细信息
Differential and linear cryptanalysis are two of the most powerful techniques to analyze symmetric-key primitives. For modern ciphers, resistance against these attacks is therefore a mandatory design criterion. In thi...
详细信息
Due to the global competition in manufacturing, flexibility to provide for individually customized products is considered an important selling point. Constantly changing manufacturing processes face higher production ...
详细信息
Conventional methods for picture recovery are not upheld for the consistently far reaching picture information base. these drawbacks can be eliminated by using substance of the picture for picture retrieval. Such a pi...
详细信息
Personal advertisements are the next-generation in the world of advertisement. In this article we consider the personal advertisement allocation problem with constraints that are motivated by the TV and Mobile adverti...
详细信息
ISBN:
(纸本)9781605586595
Personal advertisements are the next-generation in the world of advertisement. In this article we consider the personal advertisement allocation problem with constraints that are motivated by the TV and Mobile advertisement worlds. this problem is a version of the Generalized Multi-Assignment Problem, defined as an extension of GAP with assignment restrictions and all-or-nothing constraints. We present an Integer programming (IP) model of the problem, prove that it is an NP-hard problem, and propose heuristic algorithms to solve it. through computational experiments, we compare the performance of these heuristics to solutions obtained with IP solvers. We show that the Backtrack Heuristic outperforms the others and on average it attains 98% of the possible revenue. though this paper is Mobile TV oriented, the results suit any other personal advertisement "push" method in the mobile market such as SMS (Short Message Service) and MMS (Multimedia Messaging Service). Copyright 2009 ACM.
We investigate techniques that detect, dynamically during search, undeclared symmetries in the form of interchangeability (Freuder’91) in Constraint Satisfaction Problems, withthe long-term goal of drawing ...
ISBN:
(纸本)3540428631
We investigate techniques that detect, dynamically during search, undeclared symmetries in the form of interchangeability (Freuder̵7;91) in Constraint Satisfaction Problems, withthe long-term goal of drawing a compact landscape of the solution space of a given CSP instance. As a first step towards our goal, we propose a new algorithm for dynamically computing interchangeability during backtrack search and demonstrate how it enhances the performance of search.
A face determination algorithm based on multi-template is proposed, which is combined with convolution and dynamic programming. Firstly, three kinds of templates are synthesized using the experimental face dataset, in...
详细信息
the two-latent variable stochastic block model is a new graph synthetic model making a connection between the conventional stochastic block model and real-world networks. In this model, each node contains two latent v...
详细信息
there have been research initiatives in centralized control recently, which advocate that the control of an autonomous system (AS) should be performed in a centralized fashion. In this paper, we propose an approach to...
详细信息
ISBN:
(纸本)9783540795483
there have been research initiatives in centralized control recently, which advocate that the control of an autonomous system (AS) should be performed in a centralized fashion. In this paper, we propose an approach to perform traffic engineering and routing in networks with centralized control, named LP-redirect. LP-redirect is based on an efficient formulation of linear programming (LP) that reduces the number of variables and constraints. As LP is not fast enough for runtime routing, LP-redirect uses a fast scheme to recompute routing paths when a network topology changes. the performance evaluation of LP-redirect shows that it is more efficient in both traffic engineering and computation than an approach using optimized link weights. In addition, LP-redirect is suitable for runtime traffic engineering and routing.
the increasing use of IoT devices with multiple requirements has made it necessary to develop a new architecture that can support new features. While there have been developments in individual sectors, there are limit...
详细信息
暂无评论