this paper aims to understand the effects of biases in individual flood risk perception on aggregated land use patterns and their implications for macro policy. We develop a spatially explicit land market model and pa...
详细信息
ISBN:
(纸本)1844690172
this paper aims to understand the effects of biases in individual flood risk perception on aggregated land use patterns and their implications for macro policy. We develop a spatially explicit land market model and param-eterize individual risk perceptions with data from a survey held in the Nether-lands in 2008. Two sets of experiments are presented. A model with heteroge-neous agents produces qualitatively different results compared to a model with homogeneous agents. Individuals with low flood risk perception drive urban developments into the economically inefficient zone and leading to the increas-ing potential damage.
Word-of-mouth communication has been shown to play a key role in a variety of environments such as viral marketing and virus spreading. A family of algorithms, generally known as information spreading algorithms or wo...
详细信息
Mobile devices have the potential to support many older adults (age 65+) in their daily lives. However, older adults find it difficult to learn to use many existing mobile device applications and their interfaces. the...
详细信息
ISBN:
(纸本)9781605582474
Mobile devices have the potential to support many older adults (age 65+) in their daily lives. However, older adults find it difficult to learn to use many existing mobile device applications and their interfaces. the goal of this dissertation research is to improve the learnability of mobile software user interfaces for older adults. To achieve this goal, we will investigate three complementary design approaches that have not been well explored for this population.
the increasing complexity of enterprise information systems makes it very difficult to prevent local failures from causing ripple effects with serious repercussions to other systems. this paper proposes the use of Ent...
详细信息
ISBN:
(纸本)9783642012464
the increasing complexity of enterprise information systems makes it very difficult to prevent local failures from causing ripple effects with serious repercussions to other systems. this paper proposes the use of Enterprise Architecture models coupled with Bayesian Belief Networks to facilitate Failure Impact Analysis. By extending the Enterprise Architecture models withthe Bayesian Belief Networks we are able to show not only the architectural components and their interconnections but also the causal influence the availabilities of the architectural elements have on each other. Furthermore, by using the Diagnosis algorithm implemented in the Bayesian Belief Network tool GeNIe, we are able to use the network as a Decision Support System and rank architectural components withtheir respect to criticality for the functioning of a business process. An example featuring a car rental agency demonstrates the approach.
the proceedings contain 190 papers. the topics discussed include: BDI planning approach to distributed multiagent based semantic search engine;hyperheuristics for a dynamic-mapped multi-objective island-based model;hi...
ISBN:
(纸本)3642024807
the proceedings contain 190 papers. the topics discussed include: BDI planning approach to distributed multiagent based semantic search engine;hyperheuristics for a dynamic-mapped multi-objective island-based model;high level abstractions for improving parallel image reconstruction algorithms;creation of semantic overlay networks based on personal information;adding an ontology to a standardized QoS-based MAS middleware;a snapshot algorithm for mobile ad hoc networks;introducing a distributed architecture for heterogeneous wireless sensor networks;a distributed architectural strategy towards ambient intelligence;reviewing the use of requirements engineering techniques in the development of multi-agent systems;pervasive evolutionary algorithms on mobile devices;a hybrid differential evolution algorithm for solving the terminal assignment problem;and development of a camera-based portable automatic inspection system for printed labels using neural networks.
In this workshop we explore the notation of whole body interaction. We bring together different disciplines to create a new research direction for study of this emerging form of interaction.
ISBN:
(纸本)9781605582474
In this workshop we explore the notation of whole body interaction. We bring together different disciplines to create a new research direction for study of this emerging form of interaction.
Existing huge E-Commerce web sites such as Amazon and eBay tends to have a recommendation function to stimulate customer's potential needs by analyzing their click information. On the other hand, POS (Point of sal...
详细信息
An anytime algorithm is capable of returning a response to the given task at essentially any time;typically the quality of the response improves as the time increases. Here, we consider the challenge of learning when ...
详细信息
ISBN:
(纸本)9781605585161
An anytime algorithm is capable of returning a response to the given task at essentially any time;typically the quality of the response improves as the time increases. Here, we consider the challenge of learning when we should terminate such algorithms on each of a sequence of iid tasks, to optimize the expected average reward per unit time. We provide a system for addressing this challenge, which combines the global optimizer Cross-Entropy method with local gradient ascent. this paper theoretically investigates how far the estimated gradient is from the true gradient, then empirically demonstrates that this system is effective by applying it to a toy problem, as well as on a real-world face detection task.
In this paper, we propose contention resolution algorithms for multi-packet reception slotted ALOHA systems with immediate- and delayed-first-transmission protocols, in which a base station broadcasts the retransmissi...
详细信息
Nowadays, most 3D mesh model protections are based on embedding watermarking system. these methods have to change the original mesh data to achieve the watermarking. Considering the sensitivity and complexity of 3D me...
详细信息
ISBN:
(纸本)9780769537894
Nowadays, most 3D mesh model protections are based on embedding watermarking system. these methods have to change the original mesh data to achieve the watermarking. Considering the sensitivity and complexity of 3D mesh data, this paper proposes a disturbing free 'zero-watermarking' algorithm, which is based on octree partition. For each octant, we employ parameterization and Singular Value Decomposition (SVD) to analyze the 3D geometry signal and construct the zero-watermark with corresponding octree-codec. the integrity of protected 3D mesh can be checked through computingthe similarity of watermark between original and processed mesh. Moreover, the results are represented in a visual way, which means the tendency of deviation and changed region will be colored according to our merits of similarity. the Experiment results verify that the algorithm is robust to various attacks including affine transformation, vetex reordering, noise addition, cropping, simplifying, and even mixed attack.
暂无评论