In the maximum cover problem, we are given a collection of sets over a ground set of elements and a positive integer w, and we are asked to compute a collection of at most w sets whose union contains the maximum numbe...
详细信息
The problem of robust line planning requests for a set of origin-destination paths (lines) along with their traffic rates (frequencies) in an underlying railway network infrastructure, which are robust to fluctuations...
详细信息
ISBN:
(纸本)9783939897071
The problem of robust line planning requests for a set of origin-destination paths (lines) along with their traffic rates (frequencies) in an underlying railway network infrastructure, which are robust to fluctuations of real-time parameters of the solution. In this work, we investigate a variant of robust line planning stemming from recent regulations in the railway sector that introduce competition and free railway markets, and set up a new application scenario: there is a (potentially large) number of line operators that have their lines fixed and operate as competing entities struggling to exploit the underlying network infrastructure via frequency requests, while the management of the infrastructure itself remains the responsibility of a single (typically governmental) entity, the network operator. The line operators are typically unwilling to reveal their true incentives. Nevertheless, the network operator would like to ensure a fair (or, socially optimal) usage of the infrastructure, e.g., by maximizing the (unknown to him) aggregate incentives of the line operators. We show that this can be accomplished in certain situations via a (possibly anonymous) incentive-compatible pricing scheme for the usage of the shared resources, that is robust against the unknown incentives and the changes in the demands of the entities. This brings up a new notion of robustness, which we call incentive-compatible robustness, that considers as robustness of the system its tolerance to the entities' unknown incentives and elasticity of demands, aiming at an eventual stabilization to an equilibrium point that is as close as possible to the social optimum.
We discuss the impact of cultural differences on usability evaluations that are based on the thinking-aloud method (TA). The term 'cultural differences' helps distinguish differences in the perception and thin...
详细信息
We discuss the impact of cultural differences on usability evaluations that are based on the thinking-aloud method (TA). The term 'cultural differences' helps distinguish differences in the perception and thinking of Westerners (people from Western Europe and US citizens with European origins) and Easterners (people from China and the countries heavily influenced by its culture). We illustrate the impact of cultural cognition on four central elements of TA: (1) instructions and tasks, (2) the user's verbalizations, (3) the evaluator's reading of the user, and (4) the overall relationship between user and evaluator. In conclusion, we point to the importance of matching the task presentation to users' cultural background, the different effects of thinking aloud on task performance between Easterners and Westerners, the differences in nonverbal behaviour that affect usability problem detection, and, finally, the complexity of the overall relationship between user and evaluator when they have different cultural backgrounds.
This paper presents basic design principles for hardware implementation of a two-pass stereo-matching algorithm based on dynamic programming. For the first-pass a state-machine is proposed for the recursive calculatio...
详细信息
In this study, we performed a simulation of mobile agents running on Agilla middleware designed for sensor networks. The simulations are performed using TOSSIM assuming that Agilla middleware is installed on the senso...
详细信息
In this paper, we present a modification of the ns2 code for the RTP/RTCP protocols. The legacy RTP/RTCP code in ns2 has not yet been validated but it provides a framework of the protocol's specification for exper...
详细信息
E-Learning is increasingly being integrated into universities as a new means of learning and teaching. The web-based learning system can increase the learning efficiency. This paper presents the design and implementat...
详细信息
Wireless Sensor Networks (WSNs) has been identified as a promising technology for supporting assistive environments. This article introduces PROTECT, a system that employs autonomous software objects referred to as Mo...
详细信息
ISBN:
(纸本)9781605580678
Wireless Sensor Networks (WSNs) has been identified as a promising technology for supporting assistive environments. This article introduces PROTECT, a system that employs autonomous software objects referred to as Mobile Agents (MAs) able of locating and informing visually impaired persons for potential risks. PROTECT utilizes a 3-tier architecture where the first tier comprises a Base Station (BS), the second tier mobile sinks (carried by blinds on their sticks) and the third tier stationary sensor nodes. This WSN is deployed in an urban environment. In the event of an alarm issued by a sensor node, the BS launches a number of MAs supplied with a near-optimal itineraries that visit the nodes in the alarm's surrounding area and notify visually impaired people for potential hazards in their proximity. In the event of communication problems (e.g. failure of some sensor nodes) PROTECT modifies the itineraries of the MAs to bypass the problematic areas avoiding disruption of the data collection process from working sensors. Simulation results confirm the high effectiveness of our proposed scheme in WSNs used in assistive environments and its performance gain over alternative approaches in data fusion tasks. Copyright 2008 ACM.
In this paper we propose a model for describing deceptive crimes in general and social engineering in particular. Our research approach was naïve inductivist and the methods used were literature study and intervi...
详细信息
ISBN:
(纸本)9781841021898
In this paper we propose a model for describing deceptive crimes in general and social engineering in particular. Our research approach was naïve inductivist and the methods used were literature study and interviews with the lead investigator in a grooming case, as we see many similarities between the techniques used in grooming, and those used in social engineering. From this we create cycles describing attacker, defender, and the victim and merge them into a model describing the cycle of deception. The model is then extended into a possible deception sphere. The resulting models can be used to educate about social engineering, to create automated social engineering attacks, to facilitate better incident reporting, and to understand the impact and economical aspects of defenses.
The problem of selecting an adequate set of variables from a given data set of a sampled function becomes crucial by the time of designing the model that will approximate it. Several approaches have been presented in ...
详细信息
暂无评论