Our goal is to show that both the fast and slow versions of the triangle map (a type of multi-dimensional continued fraction algorithm) in dimension n are ergodic, resolving a conjecture of Messaoudi, Noguiera and Sch...
详细信息
algorithms with predictions is a recent framework for decision-making under uncertainty that leverages the power of machine-learned predictions without making any assumption about their quality. The goal in this frame...
详细信息
Clustering is a key task in machine learning, with k-means being widely used for its simplicity and effectiveness. While 1D clustering is common, existing methods often fail to exploit the structure of 1D data, leadin...
详细信息
Many works have developed no-regret algorithms for contextual bandits with function approximation, where the mean rewards over context-action pairs belong to a function class F. Although there are many approaches to t...
详细信息
The Internet of Production (IoP) is changing the manufacturing industry by helping companies work more efficiently, increase profits, and speed up product delivery. However, ensuring secure communication among differe...
详细信息
ISBN:
(数字)9798331541217
ISBN:
(纸本)9798331541224
The Internet of Production (IoP) is changing the manufacturing industry by helping companies work more efficiently, increase profits, and speed up product delivery. However, ensuring secure communication among different stakeholders in various supply chains is a major challenge that affects data sharing and collaboration. This study presents a strong framework that uses blockchain technology to improve secure communication among these stakeholders. The motivation for this research comes from the growing need for better security measures in the IoP, especially as the amount of data being exchanged increases. At the heart of this framework is a new algorithm designed to enhance both security and efficiency in data exchanges. Testing with the Automated Validation of Internet Security Protocols and Applications tool shows that the algorithm is safe from replay and man-in-themiddle attacks. Additionally, an analysis using the Burrows-Abadi-Needham method confirms that it provides mutual authentication among stakeholders. Performance analysis indicates that the algorithm achieves faster execution times ($\sim 18$ milliseconds) compared to existing methods, while its communication time is transitional ($\sim 5152$ bits), marking a significant improvement in the field. This work significantly contributes to the field by providing a secure and efficient solution for cross-domain communication in the IoP.
We study the canonical fair clustering problem where each cluster is constrained to have close to population-level representation of each group. Despite significant attention, the salient issue of having incomplete kn...
详细信息
Community detection is the problem of identifying densely connected clusters within a network. While the Louvain algorithm is commonly used for this task, it can produce internally-disconnected communities. To address...
详细信息
We introduce PatternBoost, a flexible method for finding interesting constructions in mathematics. Our algorithm alternates between two phases. In the first "local" phase, a classical search algorithm is use...
详细信息
暂无评论