Intrusion Detection System (IDS) is the key technology to ensure the security of dynamic systems. We employ a sequential pattern mining approach to discover significant system call sequences to prevent malicious attac...
详细信息
Due to the advantages of higher efficiency over fixed-price trading and the ability to discover equilibrium prices quickly, auction is a popular way of trading goods. In business-to-business e-commerce (B2B), many goo...
详细信息
ISBN:
(纸本)9781849192088
Due to the advantages of higher efficiency over fixed-price trading and the ability to discover equilibrium prices quickly, auction is a popular way of trading goods. In business-to-business e-commerce (B2B), many goods with complementarities or substitutabilities are being traded using auctions. Combinatorial auctions can be applied to improve the efficiency of trading in B2B marketplaces. In combinatorial auctions, a bidder can bid on a combination of goods with one limit price for the total combination. This improves the efficiency when the procurement of one good is dependent on the acquisition of another. Most of the combinatorial auctions studied in the literature are one-sided: either multiple buyers compete for commodities sold by one seller, or, multiple sellers compete for the right to sell to one buyer. Combinatorial double auctions in which both sides submit demand or supply bids are much more efficient than several one-sided auctions combined. However, combinatorial double auctions are notoriously difficult to solve from computation point of view. In this paper, we formulate the combinatorial double auction problem and propose an algorithm for finding near optimal solutions. The algorithm is developed by decomposing the combinatorial double auction problem into several subproblems and applying the subgradient algorithm to iteratively adjust the shadow prices for the subproblems.
Severe received signal strength (RSS) fluctuation is one of the crucial problems in an indoor positioning system using fingerprint-based algorithms. Even at a fixed location, the RSSs received by a mobile device at di...
详细信息
Wireless multimedia sensor networks (WMSN) emerges as an important category of Wireless Sensor Networks, which retrieves real-time information such as video and audio streams, still images etc. One of the prominent ch...
详细信息
The conventional Mobile Ad-hoc Network (MANET) is composed of mobile nodes without any infrastructure. But, emergent traffic such as disaster positioning by using wireless infrastructure is indeed required. Therefore,...
详细信息
In this paper, an energy efficient MAC protocol based on the finite projective plane (FPP) theory is proposed. Our protocol introduces an adaptive energy-efficient duty cycle for the sensor nodes to reduce the idle li...
详细信息
Temporal reasoning plays an important role in artificial intelligence. Temporal logics provide a natural framework for its formalization and implementation. A standard way of enhancing the expressive power of temporal...
详细信息
Two mechanisms are proposed in this paper to be incorporated with IEEE 802.11e EDCA MAC protocol for providing the QoS provisioning capability of such network. First, the call admission control function, which conside...
详细信息
In wireless sensor networks, it is an important task to periodically collect data from an area of interest for timesensitive applications. The sensed data must be gathered and transmitted to a base station for further...
详细信息
Many people increasingly rely on mobile communication services to carry out daily activities. Due to the limitation of the PCS network architecture, a constantly relocating user may encounter significant delay when re...
详细信息
暂无评论