Simple algorithm constructing search trees for the given set of binary words is presented. It is shown that the average cost of result of this algorithm, and, hence, the average cost of the optimum search tree is near...
详细信息
Simple algorithm constructing search trees for the given set of binary words is presented. It is shown that the average cost of result of this algorithm, and, hence, the average cost of the optimum search tree is near to their natural lower bound.
Constraining an interpolating curve to be bounded in a given region is an important task in curve design. In (Qi Duan et al., 1999) the rational cubic spline with a linear denominator has been used to control the inte...
详细信息
Constraining an interpolating curve to be bounded in a given region is an important task in curve design. In (Qi Duan et al., 1999) the rational cubic spline with a linear denominator has been used to control the interpolating curves to be bounded in the given region, but it does not work in some cases. This paper deals with the weighted rational cubic spline with a linear denominator for this kind of constraint, the sufficient condition for controlling the interpolating curves to be bounded in the given region are derived. An example is given which shows that the constraint which cannot be done by the rational spline defined in (Qi Duan et al., 1999) could be achieved by the weighted rational spline.
The data allocation problem in incomplete information environments consisting of self-motivated severs responding to users' queries is considered. Periodically, the servers use auctions for allocation of new data ...
详细信息
The data allocation problem in incomplete information environments consisting of self-motivated severs responding to users' queries is considered. Periodically, the servers use auctions for allocation of new data items, and for reallocation of old data items. The utility of a server from storing a data item strongly depends on the usage of the item. However, each server has information only about the past usage of the data stored locally, but does not have information about the usage of data stored elsewhere. In this paper we propose that in order to improve the behaviour of the servers in the auctions, each server learns the expected usage of data items from information about past usage of its own data items. We implemented this type of learning process using neural networks. Simulations showed that our learning methods improve the results of the bidding mechanism, and they are better than the results obtained when learning via k-nearest neighbors algorithms.
We study the L O(2) symmetric deformation of a circular ring, modeled using the beamshell theory of Libai and Simmonds. The equations of motion are based on general partial differential equations governing the elastod...
详细信息
We study the L O(2) symmetric deformation of a circular ring, modeled using the beamshell theory of Libai and Simmonds. The equations of motion are based on general partial differential equations governing the elastodynamics of geometrically exact rings, which have been formulated by Dempsey (Proc. Roy. Soc. London A 452 (1996) 1927-1943). Thus, the formulation is valid for arbitrary pressure forcing and large deformations, although the results are tempered by a linear constitutive relation and an assumption of plane strain. With the assumption that the deformations L O(2) symmetry, the partial differential equations are reduced to a set of coupled ordinary differential equations. Within this restricted space of solutions, we study the existence and stability of relative equilibria and discuss the effects of constant hydrostatic pressure on the dynamical response. Specifically, interaction between inertial effects arising from rotational motion and the combined elastic and external pressure forces can produce unexpected behavior, including the existence of a non-trivial state which retains the symmetry, yet physically implies that material planes do not lie in the radial direction. Such a state is shown to affect the large-amplitude response of the system in a singular limit of the governing equations.
There has recently been active research on quality of service (QoS) multicasting. Very few, however, address QoS inter-domain multicasting. In this paper, we present a differentiated service (DS) extension to MBGP (Mu...
详细信息
There has recently been active research on quality of service (QoS) multicasting. Very few, however, address QoS inter-domain multicasting. In this paper, we present a differentiated service (DS) extension to MBGP (Multicasting Border Gateway Protocol), which is an extension of BGP-4 (Border Gateway Protocol 4) to support multicasting. With limited modification to the MBGP, we extend it to support two prospective differentiated service protocols: expedited forwarding (formally premium service) and assured forwarding (formerly assured service). Detailed mechanisms of the DS extension are described. Performance is evaluated through extensive simulation of real-network scenarios (including nodes joining/leaving), supporting CBR, VBR, and best-effort traffic flows requesting different classes of service. We believe that the work presented here is significant to the advancement of the next-generation Internet supporting DS communications.
Dynamic Light Scattering (DLS) has been applied to examination of several clinically and biologically important materials including the lens of the eye. Visual comparison of DLS particle size distribution data from di...
详细信息
Dynamic Light Scattering (DLS) has been applied to examination of several clinically and biologically important materials including the lens of the eye. Visual comparison of DLS particle size distribution data from distinct classes; such as normal and cataractous eyes is often adequate for clinical grouping. However a more objective, formal and rigorous classification scheme is needed for evaluation of more subtle effects as may occur in therapeutic or toxicological investigations. We review sources of variability in DLS methodology as a step toward a classification scheme.
In this paper we address two important topics in hyperelliptic cryptography. The first is how to construct in a verifiably random manner hyperelliptic curves for use in cryptography in generas two and three. The secon...
详细信息
In this paper we address two important topics in hyperelliptic cryptography. The first is how to construct in a verifiably random manner hyperelliptic curves for use in cryptography in generas two and three. The second topic is how to perform divisor compression in the hyperelliptic case. Hence in both cases we generalize concepts used in the more familiar elliptic curve case to the hyperelliptic context.
We have built a distributed Ben-Ari Concurrent Interpreter (distributed BACI), which provides easy-to-use commands to implement distributed algorithms. In distributed BACI, a send process, receive process, and interpr...
An important aspect of Web navigation systems is to maintain the users sense of orientation and facilitate navigation within the context of the total information space. Most navigation systems (or browsers) display pa...
详细信息
Software systems are not just math.matical structures. The majority are also cognitive artefacts that rely on the ability of their users to understand and interpret information provided via an interface, and to act on...
详细信息
Software systems are not just math.matical structures. The majority are also cognitive artefacts that rely on the ability of their users to understand and interpret information provided via an interface, and to act on that information using actions provided by the system. The design of an interactive system must thus account for both the technical requirements of the given domain, and the cognitive abilities of the user. However, the disciplines involved (computerscience and psychology) traditionally operate with quite different methods and techniques, making it difficult to integrate their respective insights into system design. This paper reports on work that is creating a framework for interaction that encompasses both the description of complex software systems and the cognitive resources needed to operate those systems. An interface for supporting gestural interaction is used to illustrate the approach. The paper concludes with an assessment of the prospects for this kind of integrative modeling and sets out key areas for future progress.
暂无评论