Ordered search is the task of finding an item in an ordered list using comparison queries. The best exact classical algorithm for this fundamental problem uses [log2 n] queries for a list of length n. Quantum computer...
详细信息
This paper proposes a two-timescale compressed primal-dual (TiCoPD) algorithm for decentralized optimization with improved communication efficiency over prior works on primal-dual decentralized optimization. The algor...
详细信息
In this paper, we present a relaxation proximal point method with double inertial effects to approximate a solution of a non-convex equilibrium problem. We give global convergence results of the iterative sequence gen...
详细信息
As the energy structure shifts from fossil fuels to renewable energy, the energy industry is evolving towards decentralization and intelligence, with virtual power plants gradually gaining attention as a novel form of...
详细信息
ISBN:
(数字)9798331529482
ISBN:
(纸本)9798331529499
As the energy structure shifts from fossil fuels to renewable energy, the energy industry is evolving towards decentralization and intelligence, with virtual power plants gradually gaining attention as a novel form of energy organization. However, virtual power plants still face significant challenges in data privacy protection when participating in electricity market transactions. To address the issue of privacy leakage, this paper proposes a privacy protection strategy for virtual power plants based on a blockchain integrated with the AES algorithm. Firstly, the AES algorithm is used to encrypt the transaction data information to ensure that the internal data of the virtual power plant is encrypted and protected during the calculation process. Second, the RBFT consensus algorithm is combined with blockchain technology for data storage and identity verification. Finally, through MATLAB simulations, the effectiveness of this algorithm in protecting privacy during transactions is demonstrated.
We present three sublinear randomized algorithms for vertex-coloring of graphs with maximum degree ∆. The first is a simple algorithm that extends the idea of Morris and Song to color graphs with maximum degree ∆ usin...
详细信息
Over the past decade, there has been a growing interest in large-scale and privacy-concerned machine learning, especially in the situation where the data cannot be shared due to privacy protection or cannot be central...
详细信息
Over the past decade, there has been a growing interest in large-scale and privacy-concerned machine learning, especially in the situation where the data cannot be shared due to privacy protection or cannot be centralized due to computational limitations. Parallel computation has been proposed to circumvent these limitations, usually based on the master-slave and decentralized topologies, and the comparison study shows that a decentralized graph could avoid the possible communication jam on the central agent but incur extra communication cost. In this brief, a consensus algorithm is designed to allow all agents over the decentralized graph to converge to each other, and the distributed neural networks with enough consensus steps could have nearly the same performance as the centralized training model. Through the analysis of convergence, it is proved that all agents over an undirected graph could converge to the same optimal model even with only a single consensus step, and this can significantly reduce the communication cost. Simulation studies demonstrate that the proposed distributed training algorithm for multi-layer neural networks without data exchange could exhibit comparable or even better performance than the centralized training model.
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on i...
详细信息
Many MANET research works are based on the popular informal definition that MANET is a wireless ad-hoc network that has neither infrastructure nor backbone and every network node is autonomous and moves depending on its mobility. Unfortunately, this definition pays no attention to the network servers that are essential in core-based, mission-critical, and military MANETs. In core-based MANETs, external intrusion detection systems (IDS) cannot detect internal Byzantine attacks;in addition, internal Byzantine fault tolerant (BFT) systems are unqualified to detect typical external wireless attack. Therefore, there is a real need to combine both internal and external mobile ad-hoc network (MANET) ID systems. Here, CSMCSM is presented as a two-level client server model for comprehensive security in MANETs that integrates internal and external attack detectors in one device. The internal component is based on a BFT consensus algorithm while the external component employs decision tree to classify the MANET attacks.
The Quickselect algorithm (also called FIND) is a fundamental algorithm for selecting ranks or quantiles within a set of data. Grübel and Rösler showed that the number of key comparisons required by Quicksel...
详细信息
Finding a maximum-weight matching is a classical and well-studied problem in computer science, solvable in cubic time in general graphs. We consider the specialization called assignment problem where the input is a bi...
详细信息
In this paper, we study the behavior of the Upper Confidence Bound-Variance (UCB-V) algorithm for the Multi-Armed Bandit (MAB) problems, a variant of the canonical Upper Confidence Bound (UCB) algorithm that incorpora...
详细信息
暂无评论