In-Parameter-Order (IPO) algorithm is an effective strategy of combinatorial testing. And several variants of the algorithm have been developed for reducing the runtime and size of test cases or for dealing with certa...
详细信息
ISBN:
(纸本)9781479971992
In-Parameter-Order (IPO) algorithm is an effective strategy of combinatorial testing. And several variants of the algorithm have been developed for reducing the runtime and size of test cases or for dealing with certain problems in test case generation, such as IPOG, IPOG-F and IPOG-F2. In this paper, the general optimization strategies, which can be applied to these variants of the algorithm, are proposed to make each value of all parameters more evenly distributed in the test cases. The proposed optimization strategies mainly focus on choosing values for the extension to an additional parameter during the horizontal growth of the algorithm and filling values for don't care positions. Experimental results show that the proposed optimization strategies are effective in reducing runtime and producing smaller size of test suites with the increase of the domain size.
The problem of finding the optimal minimum-redundancy integer locations for an array of given sensors that span a prescribed distance N, such that any missing integer i (0 >
The problem of finding the optimal minimum-redundancy integer locations for an array of given sensors that span a prescribed distance N, such that any missing integer i (0 >
Network coding over a delay-free acyclic communication network with single source is considered in this paper. The network is modeled as a directed acyclic graph G where each edge in G is assumed to have unit link cap...
详细信息
Network coding over a delay-free acyclic communication network with single source is considered in this paper. The network is modeled as a directed acyclic graph G where each edge in G is assumed to have unit link capacity. Previous works on network coding require a sufficiently large field such that the network has either a linear multicast, a linear broadcast, or a linear dispersion solution. For certain graphs, it is also known that linear network codes over a field of smaller size might not exist. In this paper, we propose a linear network code with memory and show that for any directed acyclic network with single source, there always exists a binary linear dispersion network code. Such code can be explicitly constructed and requires only the binary field for realization. Thus, this approach would dramatically reduce the hardware complexity for code implementation. Also contained in this paper is an explicit construction of binary linear broadcast network code for any directed acyclic networks.
The paper is devoted to the study of a greedy algorithm for construction of approximate tests (super-reducts). This algorithm is applicable to decision tables with many-valued decisions where each row is labeled with ...
详细信息
The paper is devoted to the study of a greedy algorithm for construction of approximate tests (super-reducts). This algorithm is applicable to decision tables with many-valued decisions where each row is labeled with a set of decisions. For a given row, we should find a decision from the set attached to this row. The idea of algorithm is connected with so-called boundary subtables. After constructing a test we use algorithm which tries to remove attributes from a test and obtain a reduct. We present experimental results connected with the cardinality of tests and reducts for randomly generated tables and data sets from UCI Machine Learning Repository which were converted to decision tables with many-valued decisions. To make some comparative study we presents also experimental results for greedy algorithm which constructs a test based on generalized decision approach.
In the study of heuristics for combinatorial problems, it is often important to develop and compare different algorithms, strategies, and parameters for the same problem. This comparison is often biased not only by di...
详细信息
In the study of heuristics for combinatorial problems, it is often important to develop and compare different algorithms, strategies, and parameters for the same problem. This comparison is often biased not only by different implementation languages, but also by different architectures. This paper proposes a framework described using design patterns, modeling different aspects involved in local search heuristics, such as algorithms for the construction of initial solutions, methods for neighborhood generation, and movement selection criteria. Using this framework we fix a basic architecture and thus increase our ability to construct and compare heuristics.
Routing has a crucial impact on chip design [1]. In this paper, a BCA (Below-Cross-Above) routing, especially for critical routing layers, is proposed. It is assumed that horizontal routing capacity is tight and that ...
详细信息
ISBN:
(数字)9798350330991
ISBN:
(纸本)9798350331004
Routing has a crucial impact on chip design [1]. In this paper, a BCA (Below-Cross-Above) routing, especially for critical routing layers, is proposed. It is assumed that horizontal routing capacity is tight and that all pins of a net need to be connected by a Single Trunk Steiner Tree. Our proposed algorithm is a greedy algorithm based on a well-known Left-Edge algorithm. The track assignment of nets is determined iteratively by taking net priority into account to reduce the vertical length while keeping the required number of tracks as small as possible. In experiments, it is confirmed that the vertical wirelength is reduced by around 40% compared with the track assignment by Left Edge algorithm.
Scalable video coding (SVC) and Adaptive Modulation and Coding (AMC) are two key techniques for video multicast in broadband wireless networks. They can improve the system performance by enhancing the wireless resourc...
详细信息
Scalable video coding (SVC) and Adaptive Modulation and Coding (AMC) are two key techniques for video multicast in broadband wireless networks. They can improve the system performance by enhancing the wireless resource allocation schemes and assigning appropriate modulation and coding schemes (MCS) to different layers of scalable video sequences. We formulate the problem as maximizing the total system utility subject to the total resource constraint, where the utility of each user is a generic non-negative, non-decreasing function of received rate. We then propose a fast intra-session MCS assignment algorithm based on dynamic programming. This algorithm can be integrated with an existing inter-session resource allocation algorithm and applied to multi-session scenarios. Simulation results show that our algorithm achieves significant improvement on the video quality over a naive algorithm and an adapted greedy algorithm, and greatly reduces the running time in both single-session and multi-session scenarios compared to a former optimal algorithm.
Here, we consider test selection strategies in formal conformance testing. As the testing conformance relation we use the ioco relation, and extend the previously presented on-the-fly test generation algorithms for io...
详细信息
Here, we consider test selection strategies in formal conformance testing. As the testing conformance relation we use the ioco relation, and extend the previously presented on-the-fly test generation algorithms for ioco to include test selection heuristic based on a specification coverage metric. The proposed method combines a greedy test selection with randomization to guarantee completeness. As a novel implementation technique we employ bounded model checking for lookahead in greedy test selection.
In network function virtualization (NFV), the customer’s service requests are delivered by going through a set of deployed service functions (SFs). To accommodate customer’s requests, service providers have to insta...
详细信息
ISBN:
(纸本)9781665409513
In network function virtualization (NFV), the customer’s service requests are delivered by going through a set of deployed service functions (SFs). To accommodate customer’s requests, service providers have to install the required SFs onto a physical network (PN) and route the traffic through the installed SFs to form a traffic forwarding path called the service function path (SFP). Any failures of physical nodes or SF instances can significantly impact the service delivery. In the literature, existing work has focused on how to protect the PN from physical node failures. Few research attention has been paid to efficiently protecting the network while jointly taking physical and virtual node failures into consideration. In this work, we investigate a novel minimum cost hybrid node protection (MC-HOP) problem, which is proved to be an NP-hard problem. We propose an efficient algorithm called minimum cost pairwise node assistance (NOTION) to optimize the MC-HOP problem with latency requirements. Extensive simulations and analysis show that the proposed scheme significantly outperforms the algorithms that are directly extended from the existing work.
During target tracking, interruptions often occur due to target maneuvers, missed detections, and long sampling intervals. These interruptions can significantly hinder information fusion and situational awareness. Tra...
详细信息
ISBN:
(数字)9798350384185
ISBN:
(纸本)9798350384192
During target tracking, interruptions often occur due to target maneuvers, missed detections, and long sampling intervals. These interruptions can significantly hinder information fusion and situational awareness. Traditional methods, which rely on hypothetical models and estimation theories to measure similarity between track segments to be associated, have several drawbacks such as unreasonable hypotheses, unsuitable models, and uncertain thresholds. To address these issues, data-driven methods with strong learning ability, like deep learning methods, are gradually used. However, existing data-driven methods are difficult to generalize to scenarios with long interruption interval condition. In order to tackle this problem, a novel track segment association method using contextual contrasting (TSA-CC) is proposed. TSA-CC consists of three key components: (i) separation of track segment into subseries-level patches, which serve as input tokens for the Siamese Transformer encoders; (ii) introduction of learnable time-related embeddings to distinguish temporal distance between sampled segments; (iii) contextual contrasting module used for learning discriminative representations. TSA-CC then selects the track segments corresponding to the nearest vectors in the feature space as associated pairs. Experiments on a real-world AIS dataset demonstrate the effectiveness of TSA-CC.
暂无评论