Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to both sensor network applications and the ...
详细信息
ISBN:
(纸本)1595932860
Wireless sensor networks are tightly associated with the underlying environment in which the sensors are deployed. The global topology of the network is of great importance to both sensor network applications and the implementation of networking functionalities. In this paper we study the problem of topology discovery, in particular, identifying boundaries in a sensor network. Suppose a large number of sensor nodes are scattered in a geometric region, with nearby nodes communicating with each other directly. Our goal is to find the boundary nodes by using only connectivity information. We do not assume any knowledge of the node locations or inter-distances, nor do we enforce that the communication graph follows the unit disk graph model. We propose a simple, distributed algorithm that correctly detects nodes on the boundaries and connects them into meaningful boundary cycles. We obtain as a byproduct the medial axis of the sensor field, which has applications in creating virtual coordinates for routing. We show by extensive simulation that the algorithm gives good results even for networks with low density. We also prove rigorously the correctness of the algorithm for continuous geometric domains. Copyright 2006 ACM.
In order to model the behaviour of open concurrent systems by means of Petri nets, we introduce open Petri nets, a generalization of the ordinary model where some places, designated as open, represent an interface of ...
详细信息
Binary unlabeled ordered trees (further called binary trees) were studied at least since Euler, who enumerated them, The number of such trees with n nodes is now known as the Catalan number. Over the years various int...
详细信息
ISBN:
(纸本)0898715962
Binary unlabeled ordered trees (further called binary trees) were studied at least since Euler, who enumerated them, The number of such trees with n nodes is now known as the Catalan number. Over the years various interesting questions about the statistics of such trees were investigated (e.g., height and path length distributions for a randomly selected tree). Binary trees find an abundance of applications in computerscience. However, recently Seroussi posed a new and interesting problem motivated by information theory considerations: how many binary trees of a given path length (sum of depths) are there? This question arose in the study of universal types of sequences. Seroussi declares that two sequences of length p have the same universal type if they generate the same set of phrases in the incremental parsing of the LempelZiv'78 scheme. (He then proves that sequences of the same type converge to the same empirical distribution.) It turns out that the number of distinct types of sequences of length p corresponds to the number of binary (unlabeled and ordered) trees, Tp, of given path length p (and also the number of different Lempel-Ziv'78 parsings of length p sequences). We first show that the number of binary trees with given path length p is asymptotically equal to Tp ∼ 22p/(log2p). Then we establish various limiting distributions for the number of nodes (number of phrases in the Lempel-Ziv'78 scheme) when a tree is selected randomly among all Tp trees. Throughout, we use methods of analytic algorithmics such as generating functions and complex asymptotics, as well as methods of appliedmath.matics such as the WKB method and matched asymptotics.
The past decade has seen the advent of a number of parallel programming models such as Coarray Fortran (CAF), Unified Parallel C, X10, and Chapel. Despite the productivity gains promised by these models, most parallel...
详细信息
In this paper, applying the theory of L-fuzzy sets, we introduce the concept of an L-fuzzy ideal (L-fuzzy k-ideal) of an m-ary semigroup. Some properties of them are investigated and some structural theorems for L-fuz...
详细信息
The past decade has seen the advent of a number of parallel programming models such as Coarray Fortran (CAF), Unified Parallel C, X10, and Chapel. Despite the productivity gains promised by these models, most parallel...
详细信息
We introduce a formal framework to study the time and space complexity of computing with faulty memory. For the fault-free case, time and space complexities were studied using the "pebbling game" model. We e...
详细信息
It is well known that a digital elevation model (DEM) may contain systematic or other errors. In many 3-D visualization systems, problems in the data may be highlighted, but it is often difficult for the viewer to dis...
详细信息
It is well known that a digital elevation model (DEM) may contain systematic or other errors. In many 3-D visualization systems, problems in the data may be highlighted, but it is often difficult for the viewer to discern the exact nature of the problem. We present DEMView, a viewing and error assessment system specifically for use with DEMs. The system displays a DEM in 3-D with the usual translation, rotation, and zooming tools. However, the system incorporates a suite of visual (qualitative) and statistical (quantitative) assessment tools that help a researcher determine and analyze errors and uncertainty in a given DEM. A case study shows the efficacy of the system.
We consider the problem of implementing an individually rational, asymptotically Pareto optimal allocation in a barter-exchange economy where agents are endowed with goods and preferences over the goods of others, but...
详细信息
ISBN:
(纸本)9781450334105
We consider the problem of implementing an individually rational, asymptotically Pareto optimal allocation in a barter-exchange economy where agents are endowed with goods and preferences over the goods of others, but may not use money as a medium of exchange. Because one of the most important instantiations of such economies is kidney exchange - where the "input" to the problem consists of sensitive patient medical records - we ask to what extent such exchanges can be carried out while providing formal privacy guarantees to the participants. We show that individually rational allocations cannot achieve any non-trivial approximation to Pareto optimality if carried out under the constraint of differential privacy - or even the relaxation of joint-differential privacy, under which it is known that asymptotically optimal allocations can be computed in two sided markets [Hsu et al. STOC 2014]. We therefore consider a further relaxation that we call marginal-differential privacy - which promises, informally, that the privacy of every agent i is protected from every other agent j 6 ≡ i so long as j does not collude or share allocation information with other agents. We show that under marginal differential privacy, it is possible to compute an individually rational and asymptotically Pareto optimal allocation in such exchange economies.
Fuzzy Decision Tree (FDT) induction is an extraction technique of fuzzy rules, which has been widely used in handling ambiguous classification problems related to human's thought and sense. The entire process of b...
详细信息
ISBN:
(纸本)0780375084
Fuzzy Decision Tree (FDT) induction is an extraction technique of fuzzy rules, which has been widely used in handling ambiguous classification problems related to human's thought and sense. The entire process of building FDT is based on a specified parameter (called significant level) which seriously affects the computation of fuzzy entropy and classification result of FDT. Since the value of this parameter is usually given in terms of human experience while building a FDT, it is very difficult to determine its optimal value. This paper makes an attempt to give some guidelines for how to automatically choose the optimal value of this parameter by analyzing analytic expression between this parameter and fuzzy entropy and further by investigating the decision tree's sensitivity to the parameter perturbation.
暂无评论