We propose a threshold decision-making frame-work for controlling the physical dynamics of an agent switching between two spatial tasks. Our framework couples a nonlinear opinion dynamics model that represents the evo...
详细信息
ISBN:
(数字)9783907144107
ISBN:
(纸本)9798331540920
We propose a threshold decision-making frame-work for controlling the physical dynamics of an agent switching between two spatial tasks. Our framework couples a nonlinear opinion dynamics model that represents the evolution of an agent's preference for a particular task with the physical dynamics of the agent. We prove the bifurcation that governs the behavior of the coupled dynamics. We show by means of the bifurcation behavior how the coupled dynamics are adaptive to the physical constraints of the agent. We also show how the bifurcation can be modulated to allow the agent to switch tasks based on thresholds adaptive to environmental conditions. We illustrate the benefits of the approach through a multi-robot task allocation application for trash collection.
The challenge of answering graph queries over incomplete knowledge graphs is gaining significant attention in the machine learning community. Neuro-symbolic models have emerged as a promising approach, combining good ...
详细信息
Graph neural networks are prominent models for representation learning over graph-structured data. While the capabilities and limitations of these models are well-understood for simple graphs, our understanding remain...
详细信息
The first step in classifying the complexity of an NP problem is typically showing the problem in P or NP-complete. This has been a successful first step for many problems, including voting problems. However, in this ...
详细信息
While numerous methods have been proposed for computing distances between probability distributions in Euclidean space, relatively little attention has been given to computing such distances for distributions on graph...
详细信息
In this paper, a clustering approach called CATRSO is proposed. The selection of cluster heads (CH) is performed by considering the trust value of the nodes in order to select the most trustworthy nodes as CH and Rat ...
详细信息
In this paper, a clustering approach called CATRSO is proposed. The selection of cluster heads (CH) is performed by considering the trust value of the nodes in order to select the most trustworthy nodes as CH and Rat Swarm Optimizer is employed for CH selection process. The trust value of the nodes and remaining energy are taken into account while designing the fitness function. In addition, a chain routing approach is employed between CHs for energy savings. The results demonstrate that the CATRSO technique is successful in selecting the most trustworthy nodes as CH and outperforms earlier efforts in the literature in terms of energy efficiency, average network lifetime, and trustworthiness of selected CHs.
Actor-critic methods are widely used in offline reinforcement learning practice, but are not so well-understood theoretically. We propose a new offline actor-critic algorithm that naturally incorporates the pessimism ...
详细信息
Containers provide a better performance, faster deployment than virtual machines and provide near-native performance, with isolation and security drawbacks. Although the security of containers for the Intel architectu...
详细信息
ISBN:
(数字)9781665486118
ISBN:
(纸本)9781665486125
Containers provide a better performance, faster deployment than virtual machines and provide near-native performance, with isolation and security drawbacks. Although the security of containers for the Intel architecture has been investigated in more detail, there is limited work on the security of containers for the ARM architecture. In this paper, we address this gap in research and focus on the security of containers designed for the ARM architecture, which is heavily used in IoT devices. Edge computing offers many advantages, including reduced latency and resource requirements at the cloud because data can be processed at the edge before it is sent to the cloud. Using containers at the edge nodes of IoT-Edge-Cloud systems can enhance such advantages at the cost of increasing security vulnerabilities in such systems. Therefore, it is essential to investigate the security of containers designed for the ARM architecture. Accordingly, we obtained official ARM images from DockerHub and used various security tools to scan these ARM images. We found that 72% of all the vulnerabilities show varying severity levels and each tool seems to work best for particular base images. We investigated how each tool detects sub-packages and achieves a different hit ratio while none of them alone can detect at least 80% of all the vulnerabilities. In addition, we also investigated how the Docker images and their vulnerability landscape change over a period of six months by running the scanning tools twice. Finally, we also conducted a dynamic analysis of some of the images on the Raspberry Pi and study their effects. We believe this paper will facilitate the use of ARM containers at the ARM-based edge nodes by addressing security issues.
In branching process theory, linear-fractional distributions are commonly used to model individual reproduction, especially when the goal is to obtain more explicit formulas than those derived under general model assu...
详细信息
暂无评论