Cloud Computing (CC) is the new trend in computing and resource management, an architectural shift towards thin clients and conveniently centralized provision of computing and networking resources. Worldwide cloud ser...
详细信息
This paper presents an algorithm that provides a regularization for the costate dynamics of state constrained optimal control problems with a scalar constraint under the assumption that the Hamiltonian is convex in th...
This paper presents an algorithm that provides a regularization for the costate dynamics of state constrained optimal control problems with a scalar constraint under the assumption that the Hamiltonian is convex in the control and the state dynamics equation of the constrained state is monotonically increasing in the control variable. The algorithm is demonstrated with a classical optimal control problem.
Feedforward control can significantly improve the performance of a motion system through compensation of known disturbances. Recently, new feedforward algorithms have been proposed that exploit measured data from prev...
详细信息
ISBN:
(纸本)9781479932757
Feedforward control can significantly improve the performance of a motion system through compensation of known disturbances. Recently, new feedforward algorithms have been proposed that exploit measured data from previous tasks and a suitable feedforward parametrization to attain high performance. The aim of this paper is to analyze the accuracy of these approaches. To achieve this, related results from closed-loop identification are exploited in feedforward control. Furthermore, a new algorithm is proposed that leads to optimal accuracy. The results are confirmed in a simulation study of a motion system.
This paper proposes uRace, a unified race algorithm for efficient offline parameter tuning of deterministic algorithms. We build on the similarity between a stochastic simulation environment and offline tuning of dete...
详细信息
This paper proposes uRace, a unified race algorithm for efficient offline parameter tuning of deterministic algorithms. We build on the similarity between a stochastic simulation environment and offline tuning of deterministic algorithms, where the stochastic element in the latter is the unknown problem instance given to the algorithm. Inspired by techniques from the simulation optimization literature, uRace enforces fair comparisons among parameter configurations by evaluating their performance on the same training instances. It relies on rapid statistical elimination of inferior parameter configurations and an increasingly localized search of the parameter space to quickly identify good parameter settings. We empirically evaluate uRace by applying it to a parameterized algorithmic framework for loading problems at ORTEC, a global provider of software solutions for complex decision-making problems, and obtain competitive results on a set of practical problem instances from one of the world's largest multinationals in consumer packaged goods.
This paper presents a method for graphical representation of H.264 video content dynamics, based on the extraction of motion information from the video signal in order to define the content's spatiotemporal dynami...
详细信息
This paper presents a method for graphical representation of H.264 video content dynamics, based on the extraction of motion information from the video signal in order to define the content's spatiotemporal dynamics levels. For this purpose, the paper introduces a motion compensation and content residual grid, where each video signal is represented as a point with coordinates that are defined by its motion dynamics and content residual, respectively. The proposed method can be effectively integrated as part of the decision process in video adaptation systems, which perform spatial or temporal (or both) adaptation actions, like MPEG-DASH, in order to optimize the video service delivery.
Catheter-related bloodstream infection (CRBSI) is one of the major existing problems in Intensive Care Units (ICU). CRBSI has a high prevalence and its treatment is quite costly in time and medication. One of the esse...
详细信息
Catheter-related bloodstream infection (CRBSI) is one of the major existing problems in Intensive Care Units (ICU). CRBSI has a high prevalence and its treatment is quite costly in time and medication. One of the essential efforts in the diagnosis and treatment of CRBSI is the use of existing Clinical Guidelines (CG). Nevertheless, its adoption and integration into daily practice is quite complex due to the lack of software tools that cover all the needs. Considering this problem, in this work we identify some of the needs detected in daily work, and we present two tools for ICUs that makes the introduction of CGs and patient's data visualization simple. As a first goal we propose to obtain a computerized model of the clinical guideline. Gewel is an application that allows the mapping of a textual CG into a workflow model. In this tool we propose a process that (1) organizes the parts of the textual document according to GEM, (2) maps concepts to the Electronic Health Record (EHR) system, called CH4, so that it can automatically retrieve data and send HL7 messages, (3) supports the design of a workflow model that assists the following up of the steps and the measure of adherence to the CG, and (4) according to Evidence Based Medicine principles, allows the doctors to trace from the task or decision point of the workflow to the exact part of the document where it was originated. Once the CG is computerized and integrated in the EHR, the next goal is to identify key clinical problems, such as CRBSI, and retrieve the relevant information from the EHR. Due to the big amount of the EHR data registered in an ICU, physician's attention should be drawn to the clinical information related to the problem to be solved. We propose a mobile application, called mProblem View, that permits to establish and visualize relations between the elements of the EHR in a Problem-Oriented EHR approach.
At the 2011 Eurocrypt, Kiltz et al., in their best paper price awarded paper, proposed an ultra-lightweight authentication protocol, called AUTH. This new protocol is supported by a delegated security proof, against p...
详细信息
ISBN:
(纸本)9781450319980
At the 2011 Eurocrypt, Kiltz et al., in their best paper price awarded paper, proposed an ultra-lightweight authentication protocol, called AUTH. This new protocol is supported by a delegated security proof, against passive and active attacks, based on the conjectured hardness of the Learning Parity with Noise (LPN) problem. However, AUTH has two shortcomings. The security proof does not include man-in-the-middle (MIM) attacks and the communication complexity is high. The weakness against MIM attacks was recently verified as a very efficient key recovery MIM attack was introduced with only linear complexity with respect to the length of the secret key. Regarding the communication overhead, Kiltz et al. proposed a modified version of AUTH where the communication complexity is reduced at the expense of higher storage complexity. This modified protocol was shown to be at least as secure as AUTH. In this paper, we revisit the security of AUTH and we show, somehow surprisingly, that its communication efficient version is secure against the powerful MIM attacks. This issue was left as an open problem by Kiltz et al. We provide a security proof that is based on the hardness of the LPN problem to support our security analysis. Copyright 2013 ACM.
The constantly increasing amount of opinionated texts found in the Web had a significant impact in the development of sentiment analysis. So far, the majority of the comparative studies in this field focus on analyzin...
详细信息
RFID technology constitutes a fundamental part of what is known as the Internet of Things;i.e. accessible and interconnected machines and everyday objects that form a dynamic and complex environment. In order to secur...
详细信息
This work presents a symbiotic filtering approach enabling the exchange of relevant word features among different users in order to improve local anti-spam filters. The local spam filtering is based on a Content- Base...
详细信息
暂无评论